Module 3 Reading Organizer Using the curriculum define and explain the following terms: Coulomb’s Law Bohr’s model – Electromotive Force (EMF) – Attenuation Semiconductor Electrical current Alternating current (AC) - voltages vary over time by changing their polarity, or direction. AC flows in one direction, then reverses its direction and flows in the other direction, and then repeats the process. AC voltage is positive at one terminal, and negative at the other. Then the AC voltage reverses its polarity, so that the positive terminal becomes negative, and the negative terminal becomes positive. This process repeats itself continuously. Direct Current (DC) - always flows in the same direction, and DC voltages always have the same polarity. One terminal is always positive, and the other is always negative. They do not change or reverse. 10BASE-T - refers to the speed of transmission at 10 Mbps. The type of transmission is baseband, or digitally interpreted. The T stands for twisted pair. 10BASE5 – Modulation - The process of altering the carrier signal that will enter the antenna of the transmitter. Questions: 1. What characteristics comprise impedance? a. b. c. CCNA 1: Networking Basics V 3.0 1 3/6/2016 2. List four Semiconductors: a. carbon (C), b. germanium (Ge) c. d. 3. The unit of measurement for current is Ampere. 4. Current flows in closed loops called______ . These ______ must be composed of conducting materials, and must have sources of voltage. 5. What are three specifications or expectations for data transmission cable performance? a. b. What kind of transmission is being considered? Will the transmissions be digital or will they be analog-based? c. 6. What are the advantages of using coaxial cable? a. b. Coaxial cable is less expensive than fiber-optic cable. 7. Shielded twisted-pair cable (STP) reduces electrical noise within the cable such as pair to pair coupling and crosstalk. STP also reduces electronic noise from outside the cable, for example electromagnetic interference (EMI) and radio frequency interference (RFI). 8. STP affords greater protection from all types of external interference than UTP. Why isn’t it used more often instead of UTP? 9. Why does the metallic shielding materials in STP and ScTP need to be grounded at both ends? If improperly grounded or if there are any discontinuities in the entire length of the shielding material, STP and ScTP become susceptible to major noise problems. They are susceptible because they allow the shield to act like an antenna picking up unwanted signals. 10. Unshielded twisted-pair (UTP) cable relies solely on the cancellation effect produced by the ______________, to limit signal degradation caused by EMI and RFI. To further reduce crosstalk between the pairs in UTP cable, the number of twists in the wire pairs varies. CCNA 1: Networking Basics V 3.0 2 3/6/2016 11. What are the advantages of using UTP cable? a. b. It is c. It has a small external diameter 12. What are the disadvantages of using UTP cable? a. b.The distance between signal boosts is shorter for UTP than it is for coaxial and fiber optic cables 13. The cable that connects from the switch port to the computer NIC port is called a _________________ 14. The cable that connects from one switch port to another switch port is called a __________________ 15. The cable that connects the RJ-45 adapter on the com port of the computer to the console port of the router or switch is called a ________________ 16. Human can see electromagnetic energy with wavelengths between _________________ and ???? nanometers (nm). 17. Describe the ray model of light. (or why is light able to travel through a an optical fiber even when it curves) The light energy in the incident ray that is not reflected will enter the glass. The entering ray will be bent at an angle from its original path. This ray is called the refracted ray. How much the incident light ray is bent depends on the angle at which the incident ray strikes the surface of the glass and the different rates of speed at which light travels through the two substances. 18. What two conditions must be met for the light rays in a fiber to be reflected back into the fiber without any loss due to refraction? a. The core of the optical fiber has to have a larger index of refraction (n) than the material that surrounds it. The material that surrounds the core of the fiber is called the cladding. b. The angle of incidence of the light ray is greater than the critical angle for the core and its cladding. 19. Fiber-optic cable used for networking consists of two glass fibers encased in separate sheaths. Why? CCNA 1: Networking Basics V 3.0 3 3/6/2016 20. Fiber-optic cable is usually made in five parts. List and describe each. a. the core – describe …. b. the cladding c. a buffer d. a strength material e. an outer jacket 21. A single-mode core fiber optic cable is eight to ten microns in diameter. 22. What are the advantages of single mode fiber over multimode fiber cable? a. b. 23. Why are laser lights used in single mode considered dangerous? 24. What causes a PIN photodiode to produce an electric current of the proper voltage for the network? When it’s struck by a pulse of light at the proper wavelength 25. List and explain three factors that can lead to a loss of signal strength in fiber optic cable? a. Scattering – explain each … b. Absorption c. Dispersion CCNA 1: Networking Basics V 3.0 4 3/6/2016 26. When the fiber has been pulled, the ends of the fiber must be cleaved (cut) and properly polished to ensure that the ends are smooth. Improperly installed connectors, improper splices, or the splicing of two cables with different core sizes will dramatically _________________ of a light signal. 27. After the fiber-optic cable and connectors have been installed, the connectors and the ends of the fibers must be kept _______________. The ends of the fibers should be covered with protective covers to prevent ______________ to the fiber ends. When these covers are removed prior to connecting the fiber to a port on a switch or a router, the fiber ends must be cleaned. Clean the fiber ends with lint free lens tissue moistened with isopropyl alcohol. The fiber ports on a switch or router should also be kept covered when not in use and cleaned with lens tissue and isopropyl alcohol before a connection is made. Dirty ends on a fiber will cause a drop in the amount of light that reaches the receiver. 28. Explain what an optical link loss budget is. When a fiber-optic link is being planned, the amount of signal power loss that can be tolerated must be calculated. 29. Which wireless standard operates at 1, 2, 5.5 and 11 Mbps. 30. What is the minimum number of devices that can make up a wireless network? 31. Explain scanning. When a client is activated within the WLAN, it will start "listening" for a compatible device with which to "associate". This is referred to as "scanning" and may be active or passive. 32. When a source node on a wireless LAN sends a frame, the receiving node returns a positive acknowledgment (ACK). This can cause consumption of _____ of the available bandwidth. This overhead when combined with the collision avoidance protocol overhead reduces the actual data throughput to a maximum of 5.0 to 5.5 Mbps on an 802.11b wireless LAN rated at ________. 33. Explain the following authentication and association types: Unauthenticated and unassociated Authenticated and unassociated Authenticated and associated The node is connected to the network and able to transmit and receive data through the access point. 34. List and explain the three basic ways in which a radio carrier signals can be modulated. CCNA 1: Networking Basics V 3.0 5 3/6/2016 a. Amplitude Modulated (AM) radio stations modulate the height (amplitude) of the carrier signal. b. Frequency Modulated (FM) radio stations modulate the frequency of the carrier signal as determined by the electrical signal from the microphone. c. Phase Modulation is used to superimpose the data signal onto the carrier signal that is broadcast by the transmitter. 35. Which devices can cause interference in home and small office wireless networks? a. b. 2.4GHZ Wireless phones 36. List and explain several security solutions or protocols used in WLANs. a. EAP-MD5 Challenge – Extensible Authentication Protocol is the earliest b. c. d. e. authentication type, which is very similar to CHAP password protection on a wired network. LEAP (Cisco) – Lightweight Extensible Authentication Protocol is the type primarily used on Cisco WLAN access points. LEAP provides security during credential exchange, encrypts using dynamic WEP keys, and supports mutual authentication. User authentication – Allows only authorized users to connect, send and receive data over the wireless network. Encryption – Provides encryption services further protecting the data from intruders. Data authentication – Ensures the integrity of the data, authenticating source and destination devices. CCNA 1: Networking Basics V 3.0 6 3/6/2016