<< Nursing A Concept Based Approach to Learning Volume II 2nd Ed | Neuroscience Fundamentals Rehabilitation 4th Edition Lundy Ekman Test Bank >> |
Chapter 5: Topologies and Ethernet Standards
TRUE/FALSE
ANS: T PTS: 1 REF: 202
ANS: F PTS: 1 REF: 205
ANS: T PTS: 1 REF: 205
ANS: F PTS: 1 REF: 210
ANS: T PTS: 1 REF: 212
MULTIPLE CHOICE
a. | specifies device types | c. | specifies connectivity methods |
b. | depicts a network in broad scope | d. | specifies addressing schemes |
ANS: B PTS: 1 REF: 199
a. | hubs | c. | terminators |
b. | repeaters | d. | jamming |
ANS: C PTS: 1 REF: 199
a. | repeater | c. | terminator |
b. | amplifier | d. | manager |
ANS: A PTS: 1 REF: 200
a. | mixed | c. | compound |
b. | hybrid | d. | mulitpart |
ANS: B PTS: 1 REF: 203
a. | bus | c. | wired |
b. | star | d. | hybrid |
ANS: A PTS: 1 REF: 204
a. | star | c. | ring |
b. | star-wired ring | d. | daisy-chain |
ANS: D PTS: 1 REF: 205
a. | disassembles | c. | reassembles |
b. | deletes | d. | separates |
ANS: C PTS: 1 REF: 210
a. | header | c. | frame |
b. | shim | d. | title |
ANS: B PTS: 1 REF: 211
a. | CSMA | c. | CSAM/CD |
b. | CSMA/DC | d. | CSMA/CD |
ANS: D PTS: 1 REF: 212
a. | jam | c. | carrier sense |
b. | collision | d. | multiple access event |
ANS: B PTS: 1 REF: 212
a. | collision domain | c. | interference domain |
b. | crash domain | d. | duplicate domain |
ANS: A PTS: 1 REF: 212
a. | 2 | c. | 10 |
b. | 5 | d. | 100 |
ANS: C PTS: 1 REF: 216
a. | coaxial | c. | fiber |
b. | twisted pair | d. | atmosphere |
ANS: B PTS: 1 REF: 216
a. | 1000Base-T | c. | 10GBase-SR |
b. | 1000Base-SX | d. | 1000Base-LX |
ANS: D PTS: 1 REF: 217
a. | 1 Gbps | c. | 100 Gbps |
b. | 10 Gbps | d. | 1000 Gbps |
ANS: A PTS: 1 REF: 217
a. | 10GBase-T | c. | 10GBase-LR |
b. | 10GBase-SR | d. | 10GBase-ER |
ANS: B PTS: 1 REF: 218
a. | long reach | c. | long ring |
b. | LAN | d. | little ring |
ANS: A PTS: 1 REF: 218
a. | VANs | c. | LANs |
b. | MANs | d. | WANs |
ANS: D PTS: 1 REF: 219
a. | FCS | c. | preamble |
b. | header | d. | frame |
ANS: C PTS: 1 REF: 221
a. | 15 | c. | 21 |
b. | 18 | d. | 24 |
ANS: B PTS: 1 REF: 221
a. | data | c. | source |
b. | length | d. | type |
ANS: D PTS: 1 REF: 222
COMPLETION
ANS: star
PTS: 1 REF: 201
ANS: backbone
PTS: 1 REF: 205
ANS: Switching
PTS: 1 REF: 209
ANS: jamming
PTS: 1 REF: 212
ANS:
Ethernet II (DIX)
Ethernet II
DIX
PTS: 1 REF: 222
MATCHING
Match each item with a statement below:
a. | PSE | f. | 802.3ae |
b. | 1000Base-LX | g. | 802.3z |
c. | 10Base-T | h. | 802.3u |
d. | 100Base-T | i. | PD |
e. | 1000Base-T |
SHORT ANSWER
ANS:
Because they include a centralized connection point, star topologies can easily be moved, isolated, or interconnected with other networks; they are, therefore, scalable. For this reason, and because of their fault tolerance, the star topology has become the most popular fundamental layout used in contemporary LANs.
PTS: 1 REF: 202
ANS:
In a star-wired bus topology, groups of workstations are star-connected to connectivity devices and then networked via a single bus, as shown in Figure 5-5. With this design, you can cover longer distances and easily interconnect or isolate different network segments. One drawback is that this option is more expensive than using the star topology alone because it requires more cabling and potentially more connectivity devices. However, compared with the benefits, these drawbacks are negligible. The star-wired bus topology forms the basis for modern Ethernet networks, which commonly use switches or routers as the connectivity devices.
PTS: 1 REF: 203
ANS:
Understanding logical topologies is useful when troubleshooting and designing networks. For example, on Ethernet networks, it is necessary to understand that all of a segments broadcast traffic is transmitted to all of the segments nodes. As an example, suppose you connect your laptop to your companys Ethernet network. In an attempt to contact a DHCP server and obtain an IP address, your laptop issues a DHCP discover packet in broadcast fashion. Therefore, the packet is sent to every workstation connected to the same Ethernet segment as your laptop, even though the request wasnt meant for them.
PTS: 1 REF: 204
ANS:
A distributed backbone consists of a number of connectivity devices connected to one or more central connectivity devices, such as switches or routers, in a hierarchy. This kind of topology allows for simple expansion and limited capital outlay for growth, because more layers of devices can be added to existing layers.
PTS: 1 REF: 206
ANS:
In CSMA/CD, when a node wants to transmit data it must first access the transmission media and determine whether the channel is free. If the channel is not free, it waits and checks again after a very brief amount of time. If the channel is free, the node transmits its data. Any node can transmit data after it determines that the channel is free.
PTS: 1 REF: 212
ANS:
10Base-T follows the 5-4-3 rule of networking. This rule says that, between two communicating nodes, the network cannot contain more than five network segments connected by four repeating devices, and no more than three of the segments may be populated (at least two must be unpopulated). The maximum distance that a 10Base-T segment can traverse is 100 meters. To go beyond that distance, Ethernet star segments must be connected by additional hubs or switches to form more complex topologies. This arrangement can connect a maximum of five sequential network segments, for an overall distance between communicating nodes of 500 meters.
PTS: 1 REF: 215
ANS:
All Ethernet frames contain a 4-byte FCS (Frame Check Sequence) field. Recall that the function of the FCS field is to ensure that the data at the destination exactly matches the data issued from the source using the CRC (Cyclic Redundancy Check) algorithm. Together, the FCS and the header make up the 18-byte frame for the data.
PTS: 1 REF: 221
ANS:
If fewer than 46 bytes of data are supplied by the higher layers, the source node fills out the data portion with extra bytes until it totals 46 bytes. The extra bytes are known as padding and have no significance other than to fill out the frame. They do not affect the data being transmitted.
PTS: 1 REF: 221
ANS:
The SFD (start-of-frame delimiter) identifies where the data field begins.
PTS: 1 REF: 221
ANS:
In 2003, IEEE released its 802.3af standard, which specifies a method for supplying electrical power over Ethernet connections, also known as PoE (Power over Ethernet). Although the standard is relatively new, the concept is not. In fact, your home telephone receives power from the telephone company over the lines that enter your residence. This power is necessary for dial tone and ringing. On an Ethernet network, carrying power over signaling connections can be useful for nodes that are far from traditional power receptacles or need a constant, reliable power source.
PTS: 1 REF: 222
Chapter 15: Network Management
TRUE/FALSE
ANS: T PTS: 1 REF: 698
ANS: F PTS: 1 REF: 699
ANS: F PTS: 1 REF: 707
ANS: F PTS: 1 REF: 708
ANS: F PTS: 1 REF: 715
MULTIPLE CHOICE
a. | Change | c. | Asset |
b. | Performance | d. | Configuration |
ANS: D PTS: 1 REF: 696
a. | Multi Router Traffic Grapher | c. | wiring schematic |
b. | network diagram | d. | event viewer |
ANS: B PTS: 1 REF: 696
a. | Multi Router Traffic Grapher | c. | wiring schematic |
b. | network diagram | d. | event viewer |
ANS: C PTS: 1 REF: 697
a. | Performance | c. | Network |
b. | Fault | d. | Configuration |
ANS: A PTS: 1 REF: 701
a. | Performance | c. | Network |
b. | Fault | d. | Configuration |
ANS: B PTS: 1 REF: 701
a. | base lining | c. | polling |
b. | interrogating | d. | pushing |
ANS: C PTS: 1 REF: 701
a. | software routine | c. | GUI |
b. | hardware device | d. | probe |
ANS: A PTS: 1 REF: 701
a. | Traffic monitoring | c. | Traffic polling |
b. | Traffic routing | d. | Traffic shaping |
ANS: D PTS: 1 REF: 704
a. | Swapping | c. | Caching |
b. | Paging | d. | Segmentation |
ANS: C PTS: 1 REF: 706
a. | online | c. | Internet |
b. | Web | d. | device |
ANS: B PTS: 1 REF: 706
a. | cache engine | c. | server |
b. | Web site host | d. | database host |
ANS: A PTS: 1 REF: 706
a. | performance | c. | configuration |
b. | change | d. | asset |
ANS: D PTS: 1 REF: 707
a. | revision | c. | patch |
b. | change | d. | software upgrade |
ANS: C PTS: 1 REF: 708
a. | revision | c. | patch |
b. | change | d. | software upgrade |
ANS: D PTS: 1 REF: 708
a. | Principle | c. | Patch |
b. | Application | d. | Full |
ANS: B PTS: 1 REF: 708
a. | database | c. | NOS |
b. | application | d. | backbone |
ANS: C PTS: 1 REF: 709
a. | backleveling | c. | downgrading |
b. | reverse engineering | d. | change back |
ANS: A PTS: 1 REF: 711
a. | workstation | c. | printer |
b. | hub | d. | server |
ANS: A PTS: 1 REF: 713
a. | user inconvenience | c. | costs |
b. | time | d. | safety |
ANS: D PTS: 1 REF: 715
a. | cabling | c. | NOS |
b. | printer | d. | backbone |
ANS: D PTS: 1 REF: 715
a. | research | c. | plan |
b. | justify | d. | document |
ANS: B PTS: 1 REF: 716
COMPLETION
ANS: Network management
PTS: 1 REF: 695
ANS: baseline
PTS: 1 REF: 698
ANS:
MIB (Management Information Base)
Management Information Base
MIB
PTS: 1 REF: 701
ANS: Event Viewer
PTS: 1 REF: 703
ANS: Traffic policing
PTS: 1 REF: 705
MATCHING
Match each item with a statement below:
a. | HIPAA | f. | system log |
b. | CALEA | g. | event log |
c. | SNMP | h. | NOS |
d. | syslog function | i. | RFP |
e. | agent |
SHORT ANSWER
ANS:
Baseline measurements allow you to compare future performance increases or decreases caused by network changes or events with past network performance. Obtaining baseline measurements is the only way to know for certain whether a pattern of usage has changed (and requires attention) or, later, whether a network upgrade made a difference. Each network requires its own approach. The elements you measure depend on which functions are most critical to your network and its users.
PTS: 1 REF: 699
ANS:
Although you could theoretically use a network monitor or network analyzer and record its output at regular intervals, several software applications can perform the baselining for you. These applications range from freeware available on the Internet to expensive, customizable hardware and software combination products. Before choosing a network-baselining tool, you should determine how you will use it. If you manage a small network that provides only one critical application to users, an inexpensive tool may suffice. If you work on a WAN with several critical links, however, you should investigate purchasing a more comprehensive package. The baseline measurement tool should also be capable of collecting the statistics needed.
PTS: 1 REF: 699
ANS:
After data is collected, the network management application can present an administrator with several ways to view and analyze the data. For example, a popular way to view data is in the form of a map that shows fully functional links or devices in green, partially (or less than optimally) functioning links or devices in yellow, and failed links or devices in red.
PTS: 1 REF: 702
ANS:
Several types of traffic prioritization that is, treating more important traffic preferentially exist. Software running on a router, multilayer switch, gateway, server, or even a client workstation can prioritize traffic according to any of the following characteristics:
PTS: 1 REF: 706
ANS:
The asset management tool you choose depends on your organizations needs. You might purchase an application that can automatically discover all devices on the network and then save that information in a database, or you might use a simple spreadsheet to save the data. In either case, your asset management records should be comprehensive and accessible to all personnel who may become involved in maintaining or troubleshooting the network. In addition, ensure that the asset management database is regularly updated, either manually or automatically, as changes to network hardware and software occur. The information you retain is useful only while it is current.
PTS: 1 REF: 707
ANS:
Asset management simplifies maintaining and upgrading the network chiefly because you know what the system includes. For example, if you discover that a router purchased two years ago requires an upgrade to its operating system software to fix a security flaw, you need to know how many routers are installed, where they are installed, and whether any have already received the software upgrade. An up-to-date asset management system allows you to avoid searching through old invoices and troubleshooting records to answer these questions.
PTS: 1 REF: 707
ANS:
A patch is a correction, improvement, or enhancement to a software application. It differs from a revision or software upgrade in that it changes only part of an application, leaving most of the code untouched. Patches are often distributed at no charge by software vendors in an attempt to fix a bug in their code or to add slightly more functionality.
PTS: 1 REF: 708
ANS:
A networked printer is easy to add to your network, too. Adding this equipment is slightly more complex than adding a networked workstation, however, because of its unique configuration process and because it is shared. Although it affects multiple users, a networked printer does not typically perform a mission-critical function in an organization, so the length of time required to install one does not usually affect productivity. Thus, although you should notify the affected users of a networked printer addition, you do not need to notify all users and support staff. Likewise, you do not need to restrict access to the network or worry about downtime in this instance.
PTS: 1 REF: 713-714
ANS:
A single hub or access point might service as few as one or as many as 64 users. You do not have to worry about downtime or notifying users when adding a new hub or access point, because it cannot affect anyone until it is actually in use. However, if you are upgrading or swapping out an existing hub or access point, you must notify the affected users, because the upgrade or swap will create downtime. In addition, consider the traffic and addressing implications of adding or upgrading a hub or access point.
PTS: 1 REF: 714
ANS:
As with software changes, you should provide a way to reverse the hardware upgrade and reinstall the old hardware if necessary. If you are replacing a faulty component or device, this restoration, of course, is not possible. If you are upgrading a component in a device, on the other hand, keep the old component safe (for example, keep NICs in static-resistant containers) and nearby. Not only might you need to put it back in the device, but you might also need to refer to it for information. Even if the device seems to be operating well with the new component, keep the old component for a while, especially if it is the only one of its kind at your organization.
PTS: 1 REF: 716
Once the order is placed, the order will be delivered to your email less than 24 hours, mostly within 4 hours.
If you have questions, you can contact us here