Sie sind auf Seite 1von 17

Answers of Chapter 1 Review Questions:

1. Which of the following is a device directly used by an end user to access a


network?
Client
2. Which device makes traffic-forwarding decisions based on MAC
addresses?
Switch
3. A company has various locations in a city interconnected using Metro
Ethernet connections. This is an example of what type of network?
MAN
4. A network formed by interconnecting a PC to a digital camera via a USB
cable is considered what type of network?
PAN
5. Which of the following physical LAN topologies requires the most
cabling?
Star
6. Which of the following topologies offers the highest level of redundancy?
Full mesh
7. How many WAN links are required to create a full mesh of connections
between five remote sites?
10
8. Identify two advantages of a hub-and-spoke WAN topology as compared
to afull-mesh WAN topology.
Lower cost
More scalable
9. Which type of network is based on network clients sharing resources with
one another?
Peer-to-peer
10. Which of the following is an advantage of a peer-to-peer network, as
compared with a client/server network?
Less expensive

Answers of Chapter 2 Review Questions


1. Which layer of the OSI reference model contains the MAC and LLC
sublayers?
Data link layer
2. Which approach to bandwidth usage consumes all the available
frequencies on medium to transmit data?
Baseband
3. Windowing is provided at what layer of the OSI reference model?
Transport layer
4. IP addresses reside at which layer of the OSI reference model?
Network layer
5. Which of the following is a connectionless transport layer protocol?
UDP
6. Identify the four layers of the TCP/IP stack.
Transport layer
Internet layer
Application layer
Network interface layer
7. What is the range of well-known TCP and UDP ports?
Below 1024
8. Which protocol supports a secure connection to a remote host via terminal
emulation software?
SSH
9. Identify the well-known UDP port number for NTP.
123
10. Identify three e-mail protocols.
SMTP
POP3
IMAP4
Chapter 1 Simulations:
Memorization Tables for Chapter 1
Table 1.1: Characteristics, Benefits, and Drawbacks of a Bus Topology

Characteristics Benefits Drawbacks

One cable is used per Less cable is required Because of a single cable is used
network segment. to install a bus per network segment, the cable
topology, as becomes a potential single
compared with other point of failure.
topologies.

To maintain appropriate Depending of the Troubleshooting bus topology


electrical characteristics media used by the can be difficult because
of the cable, the cable bus, a bus topology problem isolation might be
requires a terminator (of can be less necessitate an inspection of
specific resistance) at expensive. multiple network taps to make
each end of the cable. sure they either have a device
connected or they are properly
terminated.

Bus topologies were Installation of a Adding devices to a bus might


popular in early network based on a cause an outage for other users
Ethernet networks. bus topology is on the bus.
easier than other
network topologies,
which might require
extra wiring to be
installed.

Network components An error conditioning existing


tap directly into cable on one device on the bus can
via a connector or a impact performance of the
vampire tap such as a T other devices on the bus.
connector or a vampire
tap.

A bus topology does not scale


well because all devices share
the bandwidth available on the
bus. Also, if two devices on the
bus simultaneously request
access to the bus, an error
condition results.

Table 1.2: Characteristics, Benefits, and Drawbacks of a Ring Topology

Characteristics Benefits Drawbacks

Devices are A dual ring topology adds a A break in a ring when a


interconnected to a layer of fault tolerance. single ring topology is used
single ring or, in Therefore, if a cable break results in a network outage
some cases(for occurred, connectivity to all for all devices connected to
example, FDDI) a devices could be restore. the ring.
dual ring.
Each device on a Troubleshooting is simplified Rings have scalability
ring includes both in the event of a cable break, limitations. Specifically, a
receiver( for the because each device on a ring ring has a maximum
incoming cable) contains a repeater. When the number of attached
and a transmitter ( repeater on the far side of a stations. Once either of
for the outgoing cable break does not receive these limits is exceeded, a
cable). any data within certain single ring might need to be
amount of time, it reports an divided into two
error condition ( typically in interconnected rings. A
the form of an indicator light network maintenance
on a network interface card window might need to be
[NIC]). scheduled to perform this
ring division.

Each device on the Because a ring must be a


rings repeats the complete loop, the amount
signal it receives. of cable required for a ring
is usually higher that the
amount of cable required
for a bus topology serving
the same number of
devices.
Table 1.3: Characteristics, Benefits, and Drawbacks of a Start Topology

Characteristics Benefits Drawbacks

Devices have A cable breaks only the More cable is require for a
independent device connected via the start topology, as opposed
connections back to a broken cable, and not the to a bus or a ring
central device( for entire topology. topologies because each
example, a hub or a device requires its own
switch). cable to connect back to
the central device.

Start topologies are Troubleshooting is relative Installation can take


commonly used with simple because a central longer for a start topology,
Ethernet technologies( device in the start topology as opposed to a bus or ring
describes in chapter acts as the aggregation topologies because each
4). point of all the connected device requires its own
devices. cable to connect back to
the central device.

Table 1.4: Characteristics, Benefits, and Drawbacks of a Hub-


and-spoke WAN Topology

Characteristics Benefits Drawbacks

Each remote site that is Costs are reduced ( as Suboptimal routes must be
a spoke) connects back compared to a full-mesh used between remote sites
to a main site (that is, or partial-mesh topology) because all intersite
the hub) via WAN link. because a minimal communication must travel
number of links is used. via the main site.

Communication Adding one or more Because all remote sites


between two remote additional sites is easy ( converge on the main site,
sites travels through the as compared to a full- this hub site potentially
hub site. mesh or partial-mesh becomes a single point of
topology) because only failure.
one link needs to be
added per site.
Because each remote site is
reachable y only a single
WAN link, the hub-and-
spoke topology lacks
redundancy.

Table 1.5: Characteristics, Benefits, and Drawbacks of a Full-


Mesh WAN Topology

Characteristics Benefits Drawbacks

Every site has direct WAN An optimal route exits A full-mesh network
connection to every other site. between any two sites. can be a difficult and
expensive to scale,
because the
addiction of one new
site requires a new
WAN link between
the new site and
every other existing
site.

The number of required WAN A full-mesh network s


connections can be calculated fault tolerant because
with the formula w=n * (n-1)/2, one or more links can
where w= the number of WAN be lost and reachability
links and n= the number of between all sites might
sites. For example, a network still be maintained.
with 10 sites would requires 45
WAN connections to form a
fully meshed network: 45 =10*
(10-1)/ 2
Troubleshooting a full-
mesh network is
relatively easy because
each link is
independent of the
other links.
Table 1.6: Characteristics, Benefits, and Drawbacks of a Partial-
Mesh WAN Topology

Characteristics Benefits Drawbacks

Selected sites ( that is, sites A partial-mesh topology A partial-mesh


which frequent intersite provide optimal routes topology is less
communication) are between selected sites which fault tolerance
interconnected via direct links, higher intersite traffic than a full-mesh
whereas sites that have less- volumes while avoiding the topology.
frequent communication can expense of interconnecting
communicate via another site. every site to every other site.
A partial-mesh topology uses A partial-mesh topology is A partial-mesh
fewer links that a full-mesh more redundant that a hub- topology is
topology and more links that a and-spoke topology. more expensive
hub-and-spoke topology for that a hub-and-
interconnecting the same spoke topology.
number of sites.

Table 1.7: Characteristics, Benefits, and Drawbacks of a


Client/Server Network

Characteristics Benefits Drawbacks

Client devices( for Client/Server networks Because multiple clients


example, PCs) share a can easily scale, which might rely on a single
common set of might require the server for their resources,
resources ( for example, purchase of additional the single server can
file or print resources) client licenses. become a single point of
located on one or more failure in the network.
dedicated servers.

Resources sharing is Administration is Client/ Server networks can


made possible via simplified, because cost more than peer-to-
dedicated server parameters, such as file peer networks. For
hardware and network sharing permissions and example, client/server
operating systems. other security settings, networks might require the
can be administer on a purchase of dedicated
server as opposed to server hardware and a
multiple clients. network OS with an
appropriate number of
licenses.

Table 1.8: Characteristics, Benefits, and Drawbacks of a Peer-to-


Peer

Characteristics Benefits Drawbacks

Client devices( for Peer-to-Peer networks Scalability is limited because


example, PCs) share can be installed easily of the increased
their resources( for because resource administration burden of
example, file and sharing is made possible managing multiple clients.
printer resources) with by the client’s operating
other client devices. systems, and knowledge
of advance NOSs is not
required.

Resource sharing is Peer-to-Peer networks Performance might be less


made available usually cost less that than seen in a client/server
through the clients’ client/server networks network because the devices
operating systems. because there is no providing network resources
requirement for might be performing other
dedicated server tasks not related to resource
resources or advanced sharing ( for example, word
NOS software. processing).
Chapter 2 Simulations:
Memorization Tables for Chapter 2

Protocol Description TCP Port UDP Port

File Transfer Protocol: Transfers files with a


FTP remote 20 and 21
host (typically requires authentication of user
credentials)

SSH Secure Shell: Securely connect to a remote host 22


(typically via a terminal emulator)

Secure FTP: Provides FTP file-transfer service


SFTP over a 22
SSH connection

Secure Copy: Provides a secure file-transfer service


SCP over 22
a SSH connection and offers a file’s original date
and
time information, which is not available with FTP
Telnet: Used to connect to a remote host
Telnet (typically via a 23
terminal emulator)

Remote Shell: Allows commands to be executed


rsh on a 514
computer from a remote user

Domain Name System: Resolves domain names


DNS to 53 53
corresponding IP addresses
Protocol Description TCP Port UDP Port

Network Basic Input/Output System: Provides


NetBIOS network 139 137, 138
communication services for LANs that use
NetBIOS

Server Message Block: Used to share files, printers,


SMB and 445
other network resources

Trivial File Transfer Protocol: Transfers files with


TFTP a 69
remote host (does not require authentication of
user
credentials)

Dynamic Host Configuration Protocol:


DHCP Dynamically 67, 68
assigns IP address information (for example, IP
address,
subnet mask, DNS server’s IP address, and
default
gateway’s IP address) to a network device

Hypertext Transfer Protocol: Retrieves content


HTTP from a 80
web server

Hypertext Transfer Protocol Secure: Used to


HTTPS securely 443
retrieve content from a web server

Simple Mail Transfer Protocol: Used for sending


SMTP e-mail 25

Post Office Protocol Version 3: Retrieves e-mail


POP3 from 110
an e-mail server

Internet Message Access Protocol: Retrieves e-mail


IMAP from 143
an e-mail server
NNTP Network News Transport Protocol: Supports the 119
posting and reading of articles on Usenet news
servers

Network Time Protocol: Used by a network


NTP device to 123
synchronize its clock with a time server (NTP
server)

SNTP Simple Network Time Protocol: Supports time 123


synchronization among network devices, similar
to
Network Time Protocol (NTP), although SNTP
uses a
less complex algorithm in its calculation and is
slightly
less accurate than NTP

Internet Message Access Protocol Version 4:


IMAP4 Retrieves 143
e-mail from an e-mail server

LDAP Lightweight Directory Access Protocol: Provides 389


directory services (for example, a user
directory—
including username, password, e-mail, and
phone
number information) to network clients

Real Time Streaming Protocol: Communicates


RTSP with a 554 554
media server (for example, a video server) and
controls
the playback of the server’s media files

Protocol Description TCP Port UDP Port

Remote Desktop Protocol: A Microsoft protocol


RDP that 3389
allows a user to view and control the desktop of
a
remote computer

SNMP Simple Network Management Protocol: Used to 161


monitor and manage network devices
SNMP Simple Network Management Protocol Trap: A 162 162
notification sent from an SNMP agent to an
Trap SNMP
manager

Session Initiation Protocol: Used to create and


SIP end 5061 5060
sessions for one or more media connections,
including
Voice over IP calls

Media Gateway Control Protocol: Used as a call 2427,


MGCP control 2727
and communication protocol for Voice over IP
networks

H.323 is a signaling protocol used to provide


H.323 multimedia 1720
communications over a network

5004, 5004,
RTP Real-time Transport Protocol: Used for delivering 5005 5005
media-based data over networks, such as Voice
over IP

Das könnte Ihnen auch gefallen