Introduction to Networking

In: Computers and Technology

Submitted By sanfelpe
Words 915
Pages 4
1. Which of the following is true about the distance limitations in this LAN?
c. All Ethernet user devices can be up to 100 meters away. (but no farther), while WLAN devices can typically be farther away than 100 meters.

2. Which of the following answers matches a particular standard to its maximum bit rate?
a. 802.11g: 54 Mbps

3. Which of the following answers list a condition that could have affected the speeds that the engineer observed when testing the WLAN?
b. The current radio noise
d. The distance between the client device and the AP

4. Which of the following statements are true when comparing the wired and wireless LANs on this floor?
b. The wireless LAN has a larger capacity
d. A single transmission from the AP to a WLAN user device goes faster than the transmission from the Ethernet switch to a wired user device.

5. Which of the following answers describes the most accurate method the engineer can use to determine the coverage area?
a. Do a wireless site survey.

6. Which of the following plays the biggest role in testing and certifying products to prove that they work with other products that have already been certified?
c. Wi-Fi Alliance

7. Which of the following answers define a wireless LAN physical layer standard that was originally ratified by the IEEE before the year 2000?
a. 802.11a
b. 802.11.b

8. Which of the following locations is the least likely place to find a wireless LAN?
b. As a link between two Ethernet switches on two different floors of the same building

9. Which of the following wireless LAN topologies use at least one wireless access point?
a. BSS
b. ESS

10. Which of the following is true of an ESS-WLAN topology but not a BSS-WLAN topology?
c. The wireless LAN has at least two access points.

11. Which answer is most likely to be true about how these user’s tablets work?
c. Chuck’s tablet is…...

Similar Documents

Introduction to Networking Final Exam Study Guide

...Parentheses of math equation 4. Node on a network? A generic term for any networking device that sits on the end of links, for the purpose of both connection links to create physical paths and to make decisions about how to forward data through the network 5. Topology-bus 6. Identify protocol and web address Protocol- set of rules that different devices and/or software must follow so that the network work correctly Web address- text that identifies details about one object in a network so that a client can request that object from a serve. An informal term for URL. 7. Basic to every networking standard A document that details information about some technology or protocol related to networking and that document has been passed through a review and approval process that certifies the document as a standard (pg.106) 8. Why is TCP/IP divided into layers Makes it easier for humans to understand and makes it easier to divide the work among different products (pg.110) 9. What layer of OSI model is responsible for encryption The presentation layer (6th layer) 10. Electrical circuit closed A complete loop of material over which electricity can flow 11. Networking coding scheme Is a technique which can be used to improve a network's throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping* 12. Full duplex A networking link that allows bits to be sent in both directions and at the same time2 ......

Words: 1388 - Pages: 6

Networking

...Compute RF Behavior Calculate each of the five measurements in the project by performing every step in sequence. In your own words, summarize what you have learned concerning RF behavior. Calculations Step 4 (dBm of 1W): ___________________ Step 11 (max gain): ____________________ Step 15 (.11g free space loss): ____________________ Step 17 (.11a free space loss): ____________________ Step 19 (link budget): ____________________ Summary of RF Behavior In your own words, summarize what you have learned concerning RF behavior from your calculations, readings, and research. Begin section here   MIMO Introduction What is MIMO? What’s the history? What issues are addressed? What are the goals? is the use of multiple antennas at both the transmitter and receiver to improve communication performance. It is one of several forms of smart antenna technology. Note that the terms input and output refer to the radio channel carrying the signal, not to the devices having antennas. Advantages and Disadvantages of MIMO Identify all advantages and disadvantages of MIMO. 1. Some of the benefits to using MIMO routers include faster speeds, greater distances between your paired devices, more simultaneous users, less signal fading and dead spots, and better resistance to interference. 2. Another important advantage is that throughput at on home networks are having a lower drop rate. Traditionally WLANs operated at distances of up to 300 feet, with perhaps less if walls or...

Words: 380 - Pages: 2

Introduction to Networking

...Intro to Networking Concepts-Chapter 1 Network protocols – first built in 1950’s for a way to effectively communicate with other computers and protocols are set. These computers can communicate through binary numbers with 0’s and 1’s. Numerous protocols are placed and it eventually evolved into a different term for the online use, this is called TCP/IP (Transmission Control Protocols/Internet Protocol). TP/IP networks are hierarchical fashion that allows for great flexibility and scalability; by subdividing the networks into smaller groups called subnets. TCP/IP networking are fundamentals of IP network addressing and the distinction between IPv4 and IPv6. Also basic concepts protocols are DHCP, DNS and routing the process of transferring data across a networking from one LAN to another. TCP/IP networks was first introduced in the 1960’s, these were called IPv4 and IPv6. IPv4 (Internet Protocol version 4) was first introduced and is most commonly used in modern networks. IPv6 (Internet Protocol version 6) is the latest version of the internet protocols and will be prevalence as the number of shortcoming to the IPv4. IPv4 uses 32 bits (four bytes or octets) thus giving a mathematical limit of 2³² possible addresses. As for IPv6 which was developed in the 1990’s that would threaten and even to exhaust the 4-billion-plus IP addresses available through IPv4. At the end, IP6 is the next generation of the TCP/IP protocol. DNS (Domain Name System) provides the mechanism for......

Words: 462 - Pages: 2

Networking

...Introduction: After assiduously reading and meticulously scrutinizing the quintessential details of the practical, this practical indeed acquainted me with intriguing and profound knowledge on how to exploit the versatile and robust Wire shark protocol analyzer to capture and examine a plethora of network packets accompanied by the ability to intercept and view network traffic which facilitates the expiation (correction) of address connection errors to establish optimal connectivity in the client and server communication interface in tandem with resolving, alleviating and troubleshooting the increase of multitudinous and perplexing networking conundrums (problems). In addition, this practical also enables us to assimilate a wide array of techniques on how to dissect important information that is being encased within each packet which enables you to covertly view secretive and confidential information such as passwords or usernames that a particular user has typed in a login interface of a certain website which might pose an imminent risk to the user as it might have dire and unbridled ramifications for the victim. Furthermore, it also succinctly accentuates the dire consequences that would ensue from the contravening of the wiretap act in tandem with the valid and justifiable exceptions that would not be regarded as flouting the Wiretapping act. Body: First and foremost, the Wire shark protocol analyzer serves as an imperative tool for inspecting and scrutinizing data......

Words: 1540 - Pages: 7

Networking

...INF 162: Introduction to Information Systems Telecommunications and Networks Ghana Telecom University College Lecturer - Lempogo Forgor 2013 Objectives  By the end of this unit, students should be able to: Demonstrate understanding of computer networking, including the concepts and types as well as hardware and software Compare and contrast internet, extranet and intranet Demonstrate practical knowledge of using the internet Discuss the business value of computer networks INF 162: Introduction to Information Systems - GTUC 2013 Delivery Overview  Computer Networks and Networking  Types of computer networks  Network Connection technologies  Hardware in computer Networking  The business value of internet, extranet and intranet INF 162: Introduction to Information Systems - GTUC 2013 Delivery What is a Computer Network?  A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.  Computer Network is a set of interconnected computer systems using special communication devices, media and software. INF 162: Introduction to Information Systems - GTUC 2013 Delivery What is Computer networking?  Networking in the field of computing is the practice of linking computer devices together to support digital communication among them.  The computers and devices on...

Words: 2597 - Pages: 11

Networking

...Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 1.5 Session Layer 12 1.6 Presentation......

Words: 5991 - Pages: 24

Nt1210 Introduction to Networking Onsite Course

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to......

Words: 4400 - Pages: 18

Networking

...Introduction Computer Networks were the pioneer of the Internet era. The definition of a computer network is “A network of data processing nodes that are interconnected for the purpose of data communication. 2. A communications network in which the end instruments are computers.”[1] The first networks were narrowly used by important personnel like military bases so they can maintain connection with their traveling co-workers, keeping them safe, and giving them direction. These networks were not connected to the Internet, as we know it. They were just basic networks for the sake of communication. Networks became much more widely used in the 1990’s when the internet emerged to the masses. Now corporate offices and residential homes alike could start a network of their own so they can to connected to whatever they like. The importance of networking was realized very quickly, the number of networks rose at a rapid pace, and today there are billions of people connected to each other in different ways. Whether it be in a small corporate office connecting employees, or the network that connects a business to its manufacturer in China, its very obvious that the network changed the world, and helped it prosper. In this paper I will discuss every networking feature in the Windows operating system as well as its importance to the network. Importance Of A Network Now that it is common for a household to have multiple devices with the ability to connect, networks have become more...

Words: 2060 - Pages: 9

Introduction to Networking

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify......

Words: 16043 - Pages: 65

Nt1210 Introduction to Networking

...Lab 3.1 Review 1. Because there is no transport or application layers, and the different layers communicate upward and downward in order to operate properly. 2. The idea behind the creation of networking standards is to define widely-accepted ways of setting up networks and connecting them together. The OSI Reference Model represented an early attempt to get all of the various hardware and software manufacturers to agree on a framework for developing various networking technologies. 3. TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Lab 3.2 Review 1. There may not be areas where wires can access, but there is always wireless capabilities. 2. The model helps visualize what is happening. It endures because it is a set a proven model. 3. The layers are all about how the application handles data, not the network, which is what the model demonstrates. They could be combined or separated. Lab 3.3 Review 1. UDP is useful for video data transfer like VoIP where a dropped package isn’t a big deal. UDP transfers data a lot faster. 2. The PORT is an entirely imaginary entity, created just to make Internet programming......

Words: 295 - Pages: 2

Networking

...Brandi Davis NT1210: Introduction to Networking Week 2 Complete Lab : IT Certifications 1. List the top five IT certifications along with a brief description that appears in at least three different sources. Which of these IT certifications will be in demand in the future and why? “* Microsoft unveiled the latest crop of new certifications in 2012, driving a large spike in popularity. Earning a 2012 MCSA certification in 2013 will give you a foundation in basic information technology know-how and prepare you for higher Microsoft certifications. * MCSE: Private Cloud. If you’ve stepped in an IT department over the last year, you know “cloud” is the buzzword on the tip of everyone’s tongue. This Microsoft expert certification has been reinvented for the cloud - after only 8 months, the Private Cloud certification is already as popular as the rival CompTIA and CCP cloud certifications. The popularity of cloud computing has increased demand for IT professionals who can build private cloud computing solutions using common technology platforms. Microsoft is also discontinuing the popular MCITP program in 2014 and directing individuals to become MCSE’s. This makes 2013 the perfect year to obtain the MCSE certification and get jump start on those who convert in 2014. * Project management is a classic, foundational skill that evolves with new technologies and will never become outdated. A strong understanding of project management enables IT professionals to plan,......

Words: 609 - Pages: 3

Netw-202 Introduction to Networking with Lab Final Exam Answers

...NETW-202 Introduction to Networking with Lab Final Exam Answers Follow Link Below To Get Tutorial http://homeworklance.com/downloads/netw-202-introduction-to-networking-with-lab-final-exam-answers/ NETW-202 Introduction to Networking with Lab Final Exam Answers 1. (TCO 5) _____ is a network-scanning technique used to identify which host IP addresses are operational. (Points : 5) 2. (TCO 5) _____ create(s) noise that interferes with information being transmitted across unshielded copper cabling. (Points : 5) 3. (TCO 5) _____ is used in Ethernet where some pairs of twisted-pair wires are crossed, when comparing the RJ-45 connectors on either end of the cable. These 10BASE-T and 100BASE-T cables connect the pair at pins 1 and 2 on each end to pins 3 and 6 on the other end. (Points : 5) 4. (TCO 5) _____ is a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium. (Points : 5) 5. (TCO 5) _____ are a collection of data that establishes a reference for network performance and behavior over a period of time. (Points : 5) 6. (TCO 5) The ______ provides a physical connection to the network (from the network end (Telco, ISP) of the user-to-network equipment), forwards traffic, and provides a clocking signal used to synchronize data transmission. (Points : 5) 7. (TCO 5) The _______ command will bring up a router interface. (Points : 5) 8. (TCO 5) A(n) _____ is an......

Words: 8529 - Pages: 35

Nt 1210 Introduction to Networking

...John Holbrook Step by Step Installation of a Secure Linux Web, DNS and Mail Server Feb 10, 2004 GIAC GSEC Practical – Version 1.4b, Option 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. 1 Table of Contents Abstract................................. Introduction.........................................................................................................................4 Current Setup..................................................................................................................4 Reasons for new install ..................................................................................................4 Sudo...............................................................................................................................5 Security Comparison of Redhat 9.0 and Openna 1.0..........................................................7 Default Installed Services...............................................................................................7 Configuration Notes............................................................................................................8 The New Setup...............................................................................................................8 Layers of Protection........................................................................................................9 Verifying Integrity of Downloaded Files.................................

Words: 16169 - Pages: 65

Social Networking (Introduction)

...Social Networking Sites: Effects on the Academic Performance of Students Introduction: Nowadays, people frequently use the Internet to spend time and most of them are students. In the last ten years, the online world has changed dramatically. Thanks to the invention of the social media making young men and women exchange ideas, personal information, pictures and videos easily through the Internet. Social networking is now one of the most interesting branch of the Internet, making the relationships that exists between networks of people draw in to a smaller place. One of the major factors of our life that got affected is our education, knowing that the majority of social media users globally, range from the age of 14 – 29 also known as schools years more or less. As social media sites continues to grow in popularity, it is our premise that technology has been a vital part of today’s student success. Making social networking and media more a part of studying life also has the potential to boost productivity, rather than taking away from it. Social Networking sites just like Facebook, Twitter and Tumblr were just some examples of social media sites that has been always talked about for years, making it to the top visited social media sites globally. Students on the younger years were never late about the news of using one these social media sites. However, every day, students spend countless hours immersed in social networking sites, such as Facebook, Twitter,......

Words: 281 - Pages: 2

Networking

...St. Anthony College Camilmil, Calapan City, Oriental Mindoro Term Paper (A Facebook Case Study) In Partial Fulfillment for the Subject SOFTWARE ENGINEERING Presented by: Arexter R. Male Bachelor of Science in Information Technology March 14, 2012 INTRODUCTION Facebook.com is a popular online social network site providing its users with a means for representing their identities in the digital world. With the “Profile,” each user can manipulate his or her online identity that concurrently delineates personal information and converses with other online identities or “Friends.” Gender, date of birth, hobbies, interests, and relationship status are some of the identifying pieces of information that users display to fill out their Profile. The Profile not only depicts the user, but also shapes the representation of other individuals on Facebook. Scholars have recently begun to study the Facebook phenomenon using surveys and statistical analyses, but none have used ethnography as a means for analysis. This paper draws upon ethnographic data to provide a phenomenological explanation to the Facebook experience. It argues that the digital world is a large part of the experience of young Americans and that the Internet is more social than commonly thought. Moreover, this paper problematizes the static nature of the Profile, arguing that the Profile converses directly with others’ Profiles in a constantly changing digital context that is simultaneously......

Words: 3201 - Pages: 13