Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
Chapter 12
Connectivity
1. Define the following terms: client, server, resources, and LAN.
A LAN (local area network) is a network of computers connected together and located in one room or building. In the network, a computer that provides shared resources to network users is called a server and a computer that accesses the shared network resources provided by a server is called a client. Resources refer to the elements that are shared. The elements could be such things as a disk drive, a printer, a file, or a folder.
2. Compare and contrast a client computer and a server computer.
The client computer and server computers both have many resources that can be shared, but the server’s purpose is to provide resources to the client computer. The client computer accesses the resources provided by the server computer.
3. Compare and contrast a server-based network and a peer-to-peer network.
A server-based network is used when the network serves more than ten users, while a peer-topeer network is often used when the number of users is less than ten. In a server-based network, a single computer—the server—provides security and network functions. In a peerto-peer network, each computer on the network can act as both server and client.
4. List and explain three reasons you might set up a network.
Any answer that involves a reason why users would want to share resources is valid.
5. Compare and contrast a LAN and a WAN.
A wide area network, or WAN, is just a version of a LAN except that the computers are connected by long-distance telecommunication means. The Internet is a global WAN composed of local area networks connected together.
6. What is the purpose and function of a network interface card?
A network interface card, or NIC, allows a computer to be connected to a network and share the network’s resources.
7. Compare and contrast setting up a peer-to-peer network using bus topology and using star topology.
In a bus topology all the computers are connected to a single cable. It looks like a long line. It is easy to install, relatively inexpensive, and easy to expand. But because all the computers are connected to a single cable, if one segment of the cable fails, the entire network will fail.
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 1
Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
Chapter 12
Connectivity
The star topology uses a hub where each connection is like a spoke of a bicycle wheel
where one end connects to the hub and the other end connects to a computer or a device. A
single piece of defective cabling affects only the computer it connects to. It is more expensive
to set up than a bus topology. Expansion of network may require additional hubs if all
connections on existing hub are used. The wiring can become unwieldy.
8. Explain the purpose and function of a hub. Identify one advantage to using a hub.
Today the most popular way to create a peer-to-peer network is to use a hub. Using a hub is considered to be using star topology. Wireless connections are of the star type. Each connection is like a spoke of a bicycle wheel where one end connects to the hub and the other end connects to a computer or device. A single piece of defective cabling affects only the computer it connects to, unless it is the hub itself. Each computer would still work, but there would be no network connection to the computer on the segment of cable that failed.
9. Why is it important that all computers in a peer-to-peer network use the same workgroup name?
Only computers in the same workgroup can share resources or “see” each other.
10. Explain the difference between using a printer locally and using a print server on a network.
In a large network there will be one computer dedicated to handling printing. It will be designated as the print server. Any computer on the network can use this printer.
In a small network each computer will take on the role of the print server as dedicated by the needs of the users. In this case using a printer locally would mean that the printer is physically attached to the computer.
11. List and explain the steps you need to take in order to share your drive on a peer-to-peer network.
The drive on a peer-to-peer network is shared in the same manner that a printer is shared.
There are two steps that must be followed. First set up the drive of the computer to be shared.
Then the client computer can access the shared drive via My Network Neighborhood.
12. Give the syntax of the network path and explain each part of the syntax.
\\SERVER\SERVERCD The double backslash indicates the location is on the network, not on a local drive, the first part, SERVER, is the name of the server where the resource is located, and the second part, SERVERCD, is the share name of the shared device. If you were referring to a specific file on that device, such as MUSIC.MDI, that would follow as:
\\SERVER\SERVERCD\MUSIC.MDI
13. When sharing your drive with another computer, why is it unwise for your share name to be C?
The name C is not a good share name for a drive because every computer has a drive C and a share name should be a name unique on the network.
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 2
Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
14. What are the net commands? Identify two net commands and how they can be used and what information they will provide.
Chapter 12
Connectivity
The NET commands are:
ACCOUNTS
FILE
COMPUTER
GROUP
LOCALGROUP NAME
CONFIG CONTINUE
HELP HELPMSG
PAUSE PRINT
SEND
STATISTICS
SESSION
STOP
SHARE
TIME
USER VIEW
Responses on the information they will provide varies.
START
USE
15. What is an Administrative share? How can it be used?
In Windows XP Professional, all drives are on your computer are shared using the syntax of driveletter$ . This type of share allows administrators to connect to the root directory of a drive over a network. These are hidden directories. However, the drive must be shared for it to be accessed.
16. Explain the purpose and function of a mapped drive.
A mapped drive is a network drive or folder that a user can connect to in order to gain access to files located on a different computer. A mapped drive will appear in My Computer/Explorer so that the user does not need to go through Network Neighborhood to access the shared drive/folder.
17. Identify two ways you may map a drive.
1.
Right-click My network places, click Map Network drive, choose unused drive letter, and provide the path to the resource.
2.
Click Map Drive icon on the My Computer toolbar, choose drive, provide path.
3.
With the DOS SUBST command and the network path.
18. What is the purpose and function of the Internet?
The Internet is a global network of networks that allows transfer of all sorts of electronic data around the world. The Internet allows millions of people and organizations to communicate with other computer users.
19. How can the Internet be used?
The Internet can be used to communicate with other users or other computers around the world.
Through the Internet you can connect to public and private institutions to gather information, research, learn, or buy and sell items. The Internet also provides access to the government, universities, other educational institutions, and other organizations.
20. Compare and contrast the Internet and the World Wide Web.
The Internet is an actual network that transports data globally, while the World Wide Web is a graphical interface composed of standards and protocols used to access the information of the
Internet. The World Wide Web allows ease of use of the Internet.
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 3
Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
21. Explain the purpose of URLs, HTML, and HTTP.
Chapter 12
Connectivity
Three standards used by the World Wide Web are URLs, HTML, and HTTP. Universal
Resource Locators (URLs) tell the location of documents. Hypertext Markup Language
(HTML) is the programming language used to create Web documents. Hypertext Transfer
Protocol (HTTP) is the most common information transfer protocol used on the World Wide
Web.
22. List the three types of information a URL needs to retrieve a document.
A URL specifies 1) the protocol to be used, 2) the server address, and 3) the path to the information.
23. What is a Web site?
A Web site is both the virtual and physical location of a person’s or group’s web pages. A web site is located on a server.
24. Compare and contrast a Web site with a Web page.
A Web page is a single screen of text and graphics that usually has hypertext links to other pages. A Web site is composed of many Web pages linked together.
A website is composed of many web pages linked together. It is both the physical and virtual location of person or organization’s Web pages.
25. The type of Web site is indicated by its “dot” address. Explain.
A Web site’s type is indicated by its “dot” address. A server name ending with .COM is a commercial site, while .EDU indicates an educational site. Other dot addresses include .GOV
(government), .MIL (military), and .ORG (nonprofit organization). There are other dot addresses not noted in the text such as .NET.
26. What is a hypertext link?
A hypertext link is a pointer to another Web page that is jumped to when the link is clicked on.
27. List and explain three ways the computer user can connect to the Internet.
Answers will vary.
Modem, communication software, online provider.
ISP (Internet Service Providers).
Some cable companies provide direct cable connections.
ISDN (Integrated Series Digital Network).
DSL ( digital subscriber line ).
T1 or T3 leased line .
Via Satellite .
Wireless connection
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 4
Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
28. Why is TCP/IP considered the protocol of the Internet?
Chapter 12
Connectivity
TCP/IP is considered the protocol of the Internet because when transferring data through
TCP/IP, the user does not have to consider how the data travels. The TCP/IP protocol allows the data to be routed through several networks along the best path to where the data needs to go. Because of this intelligent data transfer, TCP/IP is the best protocol for the Internet. It is also the primary protocol used on the Internet.
29. What is a router?
A router is a device that connects networks and routes data being transferred to the next network as the data travels the Internet toward its destination. If a router encounters a packet addressed to a location outside its own network, it makes a decision about the best place to send the data and then sends it.
30. Compare and contrast the purposes and functions of TCP and IP.
TCP/IP is actually two protocols. TCP (Transmission Control Protocol) breaks data into packets, numbers the packets, and controls the reassembling of numbered packets in the correct order when the packets reach their destination.
IP (Internet Protocol) essentially controls the sending of packets from IP address to IP address.
31. Data is divided into packets when it is transferred over the Internet. Why?
There are two main reasons data is split into packets when it is transferred over the Internet.
First, this prevents large files from taking up too much of a network’s time. Second, if some data is corrupted during transfer, only the corrupted packet has to be resent.
32. What is the purpose of an IP address?
An IP address is a unique numeric address that identifies a computer on the Internet. It tells routers where to send data. The IP address is what allows data sent across a network or the
Internet to be sent to the correct location.
33. Compare and contrast a static versus a dynamic IP address.
Static IP addresses are numerical, unchanging addresses that uniquely identify each network on the Internet. A dynamic IP address is a temporary address that a computer uses only as long as it is logged on.
34. Why is the format of an IP address called dotted-decimal notation?
The format of an IP address is called dotted-decimal notation because an IP address consists of four numbers from 0 to 255 separated by periods.
35. Describe the format of a Class A, Class B, and Class C IP address.
The format of Class A, B, and C IP addresses differ in the number of octets used to denote the network address and the range of numbers used in the octets.
Class A addresses use only the first octet to denote the network and this octet can range from 0 to 127. The remaining octets identify each host on the system.
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 5
Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
Chapter 12
Connectivity
Class B addresses use the first two octets to identify the network. The first octet can range from 128 to 191 and the second from 0 to 255. The remaining octets identify nodes on the network.
Class C addresses use the first three octets to identify the network. The first octet in a Class C address can range from 192 to 254 while the other octets can range from 0 to
255.
36. What is a loopback address?
A loopback address is an address that allows you to “loop back” to access your own computer without going through you network card. The loopback address is 127.0.0.0.
37. Explain the purpose and function of the domain name system.
The domain name system (DNS) ensures that every site on the Internet has a unique address.
The system divides the Internet into different domains responsible for maintaining the uniqueness of address in the next lower-level domain. Computers called domain root servers maintain databases containing information about addresses in their specified domain.
38. What is the purpose of name resolution?
A domain name must be resolved into a numerical IP address before it can be used to communicate across the Internet
39. Why can computers have both an IP address and a domain name?
A domain name is just an alias to an IP address.
40. Define each part of the following URL: http://www.amazon.com/books.
The “http://” indicates that hypertext transfer protocol is to be used to retrieve the books item from the www host on the amazon network (or computer), which is in the commercial domain.
41. Explain the purposes and functions of two utilities that are automatically installed when TCP/IP network protocol is installed.
When TCP/IP is installed, IPCONFIG, PING, tracert and so on are installed. IPCONFIG presents all the TCP/IP configurations in one place. PING tests whether there is a valid connection to another computer. TRACERT traces the route the data is taking.
42. How can you receive help on the TCP/IP utilities?
When you want help with any of the command line utilities, at the command line key in the command name, a space and then /?.
43. What is the purpose and function of IPCONFIG?
IPCONFIG can be used to view and alter the configuration setting for TCP/IP.
44. What is the purpose and function of ping? Tracert?
PING is a tool that be used to “ping” another computer through TCP/IP to see if it is up and running. To use ping, at the command line type ping followed by an IP address or host name.
TRACERT allows you to trace the route along the Internet that your data is traveling.
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 6
Instructor: Prof. Michael P. Harris
Answers to Discussion Questions
45. What is the purpose and function of FTP? Of Telnet?
Chapter 12
Connectivity
FTP (File Transfer Protocol) is a protocol used to transfer files from an FTP-enabled server.
FTP can transfer files between computers with different operating systems.
Telnet is a connection to a remote computer, which makes your computer act like a terminal on the remote machine. It is the protocol and the terminal handler portion of the TCP/IP protocol suite that tells the remote computer how to transfer commands from the local computer on which you are working to another computer in a remote location.
Carolyn Z. Gillay, Bette A. Peat, WUGXP Command Line
Franklin, Beedle & Associates, Inc. 2002 ©
Page 7