Uploaded by Shadow Fiend

CCNA

advertisement
Christian Daniel M. Mangio
WD-301
1. How has the internet changed the way we work and play?

Internet has completely changed the way companies collaborate. Internet has
helped us connect with people anywhere and at any time. This increased
collaboration has brought a high level of flexibility in communication that
allows employees, co-workers, and managers to connect with each other
easily
2. What is an end device? Give 3 examples.

An end device forms the interface between users and the underlying
communication network.
Examples: (1) Computers
(2) Security cameras
(3) Mobile phones
3. What is an intermediary network device? List some examples of the types of
intermediary devices you must pass through to access the internet.

These devices provide connectivity and work behind the scenes to ensure
that data flows across the network. Intermediary devices connect the
individual hosts to the network and can connect multiple individual networks
to form an internetwork.
Examples: switches and wireless access points (network access)
routers (internetworking)
firewalls (security)
4. What is a server? Explain the Client – Server relationship.


A server is a computer equipped with specific programs and/or hardware that
enables it to offer services to other computers (clients) on its network. There
are different types and capabilities of servers.
The client-server model describes how a server provides resources and
services to one or more clients.
5. What are the criteria for choosing network media?


the distance the media can successfully carry a signal
the environment in which the media is to be installed


the amount of data and the speed at which it must be transmitted
the cost of the media and installation.
6. Compare and Contrast between Physical and Logical Topologies.


A physical topology describes how network devices are physically connected - in
other words, how devices are actually plugged into each other. We're talking about
cables, wireless connectivity, and more. While a logical topology describes how
network devices appear to be connected to each other.
They both describe devices connectivity in each other but in a different way.
7. Define the following Network Infrastructures:
o Local Area Network (LAN) – a network infrastructure that provides access to
users and end devices in a limited area
o Wide Area Network (WAN) – a network infrastructure that interconnects LANs
over wide geographical areas
o Metropolitan Area Network (MAN) – a network infrastructure that interconnects
users with computer resources in a geographic region of the size of a
metropolitan area
o Wireless LAN (WLAN) – is a wireless network infrastructure that links two or
more devices using wireless communication to form a local area network (LAN)
within a limited area
o Storage Area Network (SAN) – is a specialized, high-speed network that
provides block-level network access to storage
8. Explain the difference between and Intranet, Extranet and Internet:

Intranet is shared content accessed by members within a single organization.
Extranet is shared content accessed by groups through cross-enterprise
boundaries. Internet is global communication accessed through the Web.
9. Explain the difference between a traditional dedicated network and a converged
network.

Early data networks were limited to exchanging character-based information
between connected computer systems. Traditional telephone, radio, and
television networks were maintained separately from data networks. While
converged data networks carry multiple services on one network.
10. Give some key characteristics of each type of Internet connection:
o Cable – attenuation and bandwitdh
o DSL – digital signal that travels on the same telephone lines
o Cellular – ability to re-use frequencies to increase both coverage and capacity
Satellite – Provides connections between the Earth-based base station and the
satellites
o Dial-up Telephone – uses the facilities of the public switched telephone network
to establish a connection to an Internet service provider by dialing a telephone
number
o Dedicated Leased Line – each side of the line is permanently connected, always
active and dedicated to the other
o Metro Ethernet – scalable bandwidth that begins from 3 megabits per second
and goes up to 1 gigabit per second
11. What is a Fault Tolerant Network?
o

A network that recovers quickly when a failure occurs and depends on
redundancy to limit the impact of a failure
12. Compare and Contrast: Circuit Switched Networks and Packet Switched Networks


Packet-switched networks move data in separate, small blocks -- packets -based on the destination address in each packet. When received, packets are
reassembled in the proper sequence to make up the message. Circuitswitched networks require dedicated point-to-point connections during calls.
Circuit-switched networks and packet-switched networks have traditionally
occupied different spaces within corporations. Circuit-switched networks were
used for phone calls and packet-switched networks handled data. But
because of the reach of phone lines and the efficiency and low cost of data
networks, the two technologies have shared chores for years.
13. How can you make a network scalable?

a scalable network is a network that can cope with the existing demands placed
upon it but also one that be expanded to meet future demands in a planned,
graceful way. When you scale a network, you design for the current needs but
you also design with future needs in mind.
14. How is QoS used to make congested networks more efficient?

Quality of Service (QoS) is a feature of routers and switches which prioritizes
traffic so that more important traffic can pass first. The result is a performance
improvement for critical network traffic.
15. What are some consequences of having a network that is not secure?

Computer viruses, Software Vulnerabilities Pose Network Security Risks,
Hackers and others.
16. Explain the three goals of network security:
o Ensuring Confidentiality – the function of confidentiality is to protect precious
business data from unauthorized persons
o Maintaining Communication Integrity –the function of integrity is to make sure
that the data is reliable and is not changed by unauthorized persons
o Ensuring Availability – the function of availability in Network Security is to make
sure that the data, network resources/services are continuously available to the
legitimate users, whenever they require it
17. List some Advantages and Disadvantages of the BYOD trend.
Advantages: Cost savings, Morale, Productivity
Disadvantages: Security, Exit procedures, Support
18. What are some things that have led to the need for an increase in Video
Communication?

Video communication boosts productivity, saves time, reduces travel
expenses, and overall promotes collaboration. The advantage of video
communication is the ability to facilitate all of those benefits without requiring
constant travel for face-to-face communication.
19. What are some benefits of Cloud Computing?

Reduced IT costs, Scalability, Business continuity, Collaboration efficiency,
Flexibility of work practices and Access to automatic updates.
20. What is a data center, and what are some of its common components?

A data center's design is based on a network of computing and storage
resources that enable the delivery of shared applications and data. The key
components of a data center design include routers, switches, firewalls,
storage systems, servers, and application-delivery controllers.
Download