Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Networking

Similar presentations


Presentation on theme: "Introduction to Networking"— Presentation transcript:

1 Introduction to Networking
CHAPTER 1 Introduction to Networking

2 The sneakernet

3 A simple computer Network.

4 Local area network. .

5 Wide area network.

6 Typical per-to-per and Server-based Networks

7 Comparison of Networking Models

8 Physical bus topology.

9 C01dem 2 al 8

10 Advantages and Disadvantages of the Bus Topology .
Compared to other topologies, a bus is cheap and easy to implement. There might be network disruption when computers are added or removed. Requires less cable than other topologies. Because all systems on the network connect to a single backbone, a break in the cable will prevent all systems from accessing the network. Does not use any specialized network equipment. Difficult to troubleshoot.

11 Logical design of the ring network.

12 C01 dem 12 al 16

13 Advantages and Disadvantages of the Ring Topology.
Cable faults are easily located, making troubleshooting easier. Expansion to the network can cause network disruption. Ring networks are moderately easy to install. A single break in the cable can disrupt the entire network.

14 Star topology

15 C01 dem 9 al 11

16 Advantages and Disadvantages of the Star Topology.
Star networks are easily expanded without disruption to the network. Requires more cable than most of the other topologies. Cable failure affects only a single user. A central connecting device allows for a single point of failure. Easy to troubleshoot and isolate problems. More difficult than other topologies to implement.

17 Mesh topology

18 Advantages and Disadvantages of the Mesh Topology.
Provides redundant paths between devices. Requires more cable than the other LAN topologies. The network can be expanded without disruption to current users. Complicated implementation.

19 Wireless network.

20 Advantages and Disadvantages of the Wireless Topology .
Allows for wireless remote access. Potential security issues associated with wireless transmissions. Network can be expanded without disruption to current users. Limited speed in comparison to other network topologies.

21 IEEE 802 AND NETWORKING STANDARDS
802.1 802.2 802.3 802.4 802.5 802.6 802.7 802.8 802.9 802.10 802.11 802.12 INTERNETWORKING LLC (LOGICAL LINK CONTROL) CSMA/CD FOR ETHERNET TOKEN PASSING BUS TOKEN RING MAN BROADBAND TECHNICAL ADVISORY GROUP FIBER OPTIC TECHNICAL ADVISORY GROUP INTEGRATED VOICE AND DATA STANDARDS FOR INTEROPERABLE LAN/MAN SECURITY WIRELESS 100Mbps TECHNOLOGIES

22 802.2 IEEE standard Logical Link Control (LLC) Data flow control regulates how much data can be transmitted in a certain amount of time

23 802.3 IEEE standard SPEED: 10Mbps, 100Mbps, 1000Mbps
TOPOLOGY: BUS, STAR MEDIA: COAXIAL, TWISTED PAIR, FIBER OPTIC ACCESS METHOD: CSMA/CD

24 802.5 IEEE standard SPEED: 16Mbps
TOPOLOGY: LOGICAL RING, PHYSICAL STAR MEDIA: UTP, STP ACCESS METHOD: TOKEN PASSING

25 802.11B IEEE standard SPEED: 11Mbps TOPOLOGY: PHYSICAL WIRELESS
MEDIA: 2.4 Ghz, RADIO WAVES ACCESS METHOD: CSMA/CA

26 FDDI network.

27 FDDI SPEED: 100 Mbps AND HIGHER TOPOLOGY: DUAL RING
MEDIA: COPPER, FIBER OPTIC ACCESS METHOD: TOKEN PASSING

28 IEEE 802 Network Standards.
Speed Physical Topology Logical Topology Media Access Method 802.3 10Mbps Bus and Star Coaxial and twisted pair CSMA/CD (802.3u) 100Mbps (Fast Ethernet) Star Bus Twisted pair (802.3z) 1000Mbps 802.5 4Mbps and 16Mbps Ring Token passing 802.11b 11Mbps Wireless Radio waves CSMA/CA FDDI 100Mbps Dual ring Fiber-optic Twisted pair (CDDI)

29 EXAM

30 Which of the following standards uses a dual ring configuration for fault tolerance?
B. FDDI C D

31 The correct answer is B. FDDI uses a ring network design but uses dual rings for fault tolerance. If there is disruption in one of the rings, network traffic can use the other ring. Answer A is incorrect, as the specifies Ethernet networks and does not use a ring design. Answer C is incorrect, as only defines a single ring. Answer D is incorrect, as is the IEEE standard for the Logical Link Layer.

32 Which of the following access methods is associated with Ethernet networks?
A. CSMA/CD B. CSMA/CA C. Token Passing D. Demand Polling

33 The correct answer is A. CSMA/CD works by monitoring the computers that are sending data on the network. If two computers transmit data at the same time onto the network, a data collision will occur. Answer B is incorrect; CSMA/CA uses collision avoidance as an access method. Answer C is incorrect; token passing is associated with ring networks. Demand polling is an access method based on priority and is not used on Ethernet networks; therefore, answer D is incorrect.

34 You have been asked to install a network that will provide the network users with the greatest amount of fault tolerance. Which of the following network topologies would you choose? A. Star B. Ring C. Mesh D. Bus

35 The correct answer is C. A mesh network uses a point-to-point connection to every device on the network. This creates multiple points for the data to be transmitted around the network and therefore creates a high degree of redundancy. The star, ring, and bus topologies do not offer fault tolerance.

36 Which of the following access methods is associated with the 802
Which of the following access methods is associated with the b standard? A. CSMA/CD B. CSMA/CA C. Token Passing D. Radio Waves

37 The correct answer is B b specifies CSMA/CA as the access method for wireless networks. CSMA/CD is the access method associated with the IEEE standards and is therefore incorrect. Token passing is an access method but is not used for wireless networks making answer C incorrect. Answer D is incorrect as radio waves represent the media used by wireless, not the access method.

38 Which of the following topologies allow for network expansion with the least amount of disruption for the current network users? A. Bus B. Ring C D E. Star

39 The correct answer is E. On a star network, each network device uses a separate cable to make a point-to-point connection to a centralized device such as a hub. With such a configuration, a new device can be added to the network by attaching the new device to the hub with its own cable. This process does not disrupt the users who are currently on the network. Answers A, B, C, and D are incorrect because the addition of new network devices on a ring or bus network can cause a disruption in the network and cause network services to be unavailable during the installation of a new device is the IEEE specification for a ring network and is the IEEE specification for a token bus.

40 Which of the following are functions of the LLC? (Choose all that apply.)
A. Data flow control B. Data fault tolerance C. Error control D. Token passing

41 The correct answers are A and C
The correct answers are A and C. The LLC manages both the data flow control and error control for LAN networking standards such as 802.3, 802.5, and b. The function of the LLC is not to provide fault tolerance; therefore, answer B is incorrect. Similarly, the function of LLC is not associated with token passing.

42 Which of the following statements are associated with a bus LAN network? (Choose all correct answers.) A. A single cable break can cause complete network disruption. B. All devices connect to a central device. C. Uses a single backbone cable to connect all network devices. D. Uses a dual ring configuration.

43 The correct answers are A and C
The correct answers are A and C. In a bus network, a single break in the network cable can disrupt all of the devices on that segment of the network, a significant shortcoming. A bus network also uses a single cable as a backbone to which all networking devices attach. A star network requires networked devices to connect to a centralized device such as a hub or MSAU. Therefore answer B is incorrect. A dual ring topology is associated with FDDI, not a bus network.

44 Which of the following is associated with 802.3u?
A. Gigabit Ethernet B. Fast Ethernet C. FDDI D

45 The correct answer is B u is the specification for Fast Ethernet under the original IEEE standard z is the specification for Gigabit Ethernet; therefore, answer A is incorrect. FDDI is not associated with 802.3u; FDDI uses a dual ring network design is the IEEE standard for the LLC sublayer.

46 What is the maximum speed for the 802.11b IEEE standard?
A. 100Mbps B. 40Mbps C. 11Mbps D. 32Mbps

47 The correct answer is C. 802.11b allows for a transfer rate of 11Mbps.

48 As a network administrator, you are called in to troubleshoot a problem on a token ring network. The network uses two MSAUs connected using the ring in ports on both devices. All network cards are set at the same speed. What is the likely cause of the problem? A. Bad network card B. Break in the network C. MSAU configuration D. Network card configuration

49 The correct answer is C. To create the complete ring, the Ring In (RI) port on each MSAU is connected to the Ring Out (RO) port on another MSAU. The last MSAU in the ring is then connected to the first, to complete the ring.

50 Cabling and Connectors
CHAPTER 2 Cabling and Connectors

51 BROADBAND ANALOG TRANSMISSIONS BIDIRECTIONAL (ONLY SPLITING THE MEDIA) USES FDM BASEBAND DIGITAL SIGNALING BIDIRECTIONAL USES TDM USES A SINGLE CHANNEL

52 SIMPLEX ONE WAY TRANSMISSION HALF DUPLEX TWO WAY NOT SIMULTANEOUS TRANSMISSION FULL DUPLEX TWO WAY SIMULTANEOUS TRANSMISSION

53 MEDIA INTERFERENCE EMI CROSSTALK NEXT FEXT RFI

54 ATTENUATION BANDWIDTH

55 Coaxial cabling.

56 Thin Coax Categories. Cable Type RG-58 /U Solid copper core RG-58 A/U
Stranded wire core RG-58 C/U Military specification RG-59 Often used for cable TV and cable modems RG-62 Used for ARCnet specifications

57 THICK COAXIAL CABLE RG-8 USES VAMPIRE TAP CONNECTORS

58 TWISTED PAIR STP and UTP cabling.

59 UTP Cable Categories. Category Cable Type Application 1 UTP
Analog voice 2 Digital voice, 1Mbps data 3 UTP, STP 16Mbps data 4 20Mbps data 5 100Mbps data 6 155Mbps data 7 1000Mbps data

60 Fiber-optic cable.

61 WIRELESS RADIO WAVES INFRARED MICROWAVE

62 BNC connectors.

63 RJ-45 connectors.

64 AUI connector on a network router .

65 Fiber connectors.

66 IEEE 802.3 STANDARDS (ETHERNET)
COAXIAL 10 BASE 2 10 BASE 5 COAXIAL AND THE RULE

67 TWISTED PAIR 10 BASE T USES UTP OR STP CAT 3, 4, 5 UTP AND THE 5-4 RULE

68 10Mbps Network Comparison.
Standard Cable Type Segment Length Connector Topology 10Base2 Thin coaxial 185 meters BNC Physical bus 10Base5 Thick coaxial 500 Meters Vampire taps 10BaseT Category 3, 4, 5 twisted pair 100 meters RJ-45 Physical star

69 Fast Ethernet. Standard Cable Type Segment Length Connector Topology
100BaseTX Category 5 UTP 100 meters RJ-45 Physical star 100BaseT4 Category 3, 4, 5 UTP 100BaseFX Multimode/single-mode fiber-optic cable 412/multimode fiber-optic 10,000/single-mode fiber-optic SC, ST, MIC

70 Gigabit Ethernet. Standard Cable Type Segment Length Connector
1000BaseLX Multimode/single-mode fiber 550/multimode 5000/single-mode Fiber connectors 1000BaseSX Multimode fiber 550 meters using 50 Micron multimode fiber 1000BaseCX STP twisted pair 25 meters 9-pin shielded connector, 8-pin fiber channel type 2 connector 1000BaseT Category 5 UTP 100 meters RJ-45

71 EXAM

72 You are troubleshooting a network using 1000BaseCX cable and suspect that the maximum length has been exceeded. What is the maximum length of 1000BaseCX cable? A meters B. 100 meters C. 25 meters D. 10,000 meters

73 The correct answer is C. The 802
The correct answer is C. The 802.3ab standard specifies Gigabit Ethernet transfer over Category 5 UTP cable, including 1000BaseCX. It uses STP twisted-pair cable and has a 25-meter length restriction.

74 As system administrator you find yourself working on a legacy 10Base2 network. Which of the following technologies would you be working with? (Choose three.) A. UTP B. RG-58 C. BNC connectors D. Terminators E. RJ-45 connectors

75 The correct answers are B, C, and D
The correct answers are B, C, and D. 10Base2 networks use thin coax (RG-58) media, BNC connectors, and a terminator at each end of the bus to dampen the signal reflection. Answers A and E are incorrect as they are used by other network standards such as 10BaseT and 100BaseTX.

76 If you are working on a network and using vampire taps, which of the following cable types are you working with and what is the speed of your network? A. Thin coax at 100Mbps B. Thin coax at 10Mbps C. Thick coax at 100Mbps D. Thick coax at 10Mbps

77 The correct answer is D. Vampire taps are used with thick coax in 10Base5 networks. 10Base5 networks have a maximum transmission speed of 10Mbps. Answer A and B are incorrect, as thin coax does not use vampire taps and does not transmit at 100Mbps speeds. Answer C is incorrect as thick coax does not transmit at speeds of 100Mbps.

78 Which of following connectors are commonly used with fiber cabling?
A. RJ-45 B. BNC C. SC D. RJ-11

79 The correct answer is C. SC connectors are used with fiber-optic cable
The correct answer is C. SC connectors are used with fiber-optic cable. RJ-45 connectors are used with UTP cable, BNC is used for thin coax cable, and RJ-11 is used for regular phone connectors.

80 Which of the following definitions describe the loss of signal strength as a signal travels through a particular media? A. Attenuation B. Crosstalk C. EMI D. Chatter

81 The correct answer is A. The term used to describe the loss of signal strength for media is attenuation. Crosstalk refers to the interference between two cables, EMI is electromagnetic interference and chatter is not a valid media interference concern.

82 You install a new 10Mbps network card into an existing system and configure it for full-duplex communication. What is the maximum throughput of the card? A. 10Mbps B. 20Mbps C. 100Mbps D. 200Mbps

83 The correct answer is B. Full-duplex communication allows for two-way communication between devices, doubling the transmission speeds. In this case, the 10Mbps network card will transmit at 20Mbps.

84 In a 100BaseT network environment, what is the maximum distance between the device and the networking equipment, assuming that no repeaters are used? A meters B. 100 meters C. 500 meters D. 185 meters

85 The correct answer is B. 100BaseT networks use UTP cabling, which has a maximum cable length of 100 meters. Answer A is incorrect. This distance could only be achieved with UTP cabling by using repeaters. Answer C specifies the maximum cable length for 10Base5 networks; and answer D specifies the maximum cable length for 10Base2 networks.

86 You are troubleshooting a problem in which a user is experiencing periodic problems connecting to the network. Upon investigation you find that the cable connecting the user's PC to the switch is close to a fluorescent light fitting. What condition is most likely causing the problem? A. Crosstalk B. EMI C. Attenuation D. Faulty cable

87 The correct answer is B. EMI is a type of interference that is often seen when cables run too closely to electrical devices. Answer A is incorrect; crosstalk describes the interference whereby two cables interfere with each other. Attenuation identifies the loss of signal strength. Answer D is incorrect also. It may be that a faulty cable is causing the problem however the question asks for the most likely cause and because the cable is running near the fluorescent lights, the problem is more likely associated with EMI.

88 Which connector is represented in the following picture?
A. ST connector B. SC connector C. BNC connector D. SCSI-2 connector

89 The correct answer is C. SC is represented in the figure and is used with fiber cable. None of the other answers are applicable.

90 Which of the following fiber connectors uses a twist-type connection method?
A. ST B. SC C. BNC D. SA

91 The correct answer is A. ST fiber connectors use a twist-type connection method. Answer B is incorrect as SC connectors use a push-type connection method. The other choices are not valid fiber connectors.


Download ppt "Introduction to Networking"

Similar presentations


Ads by Google