Why do switched ethernet network improve network performance

Assignment Help Computer Networking
Reference no: EM13783659

Part 1

1. This layer is responsible for translating electrical pulses into data.

2. A(n) _____ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.

3. Cables and wireless transmissions are also known as ____.

4. Today we have access to the broadband Internet access from home appliances, televisions, mobile phones, MP3 players, cars, computers, phones and many other devices. This is an example of the coming existence of _____.

5. Which standards body is responsible for the development of local area network (LAN) standards?

6. You have five physical computers in available to you. Your organization has started a project that requires 10 different servers to meet all requirements. You have no additional funding to purchase new servers. Using ____ technology is the best option you have.

7. The company vice president has just received an email from an associate with claims that 50,000 dollars needs to be wired to a location in Eastern Europe. You want to confirm that this email is indeed from the associate by identifying the message ID and From address. What portion of the SMTP packet would you examine?

8. There are required and optional parts of an HTTP response. They are:

9. The Cisco Telepresense system has grown in use over the past years and is a type of ____.

10. Which application architecture is known for having the lowest cost of infrastructure?

Part 2

1. A(n) _____circuit is another name for a multipoint configuration.

2. The technology director has decided that a host based application architecture based on mainframes is best for the payroll application. As the network engineer you need to decide which type of transmission is best and want to keep things as simple as possible. Select the transmission type that is ideally suited for this situation.

3. The Chief Information Officer has put you in charge of building the network. The CIO has informed you that cost are a factor in building the network. Security is not a concern and the CIO would like moderate speed. What type of media would you consider to build this network using to meet the CIO's needs?

4. Which is true regarding parallel transmission mode?

5. With respect to converting digital data into analog signals, AM stands for:

6. A member of upper management has just informed you that an office space needs to accommodate seven new networked computers. In this office space you have one network cable that runs back to the main network distribution point. You want to get the seven new computers running as soon as possible. What is the fasted method of getting them connected to the network?

7. The storage capacity of your servers is quickly being exhausted. Organizational leadership has given you as much funding as you need to establish a long term solution to this problem. Which is the best option below to address this storage space problem from a long term perspective?

8. Why do Switched Ethernet networks improve network performance?

9. Which is true about a network hub?

10. Which technology do most organizations today employ?

11. A(n) ______ circuit is another name for a multipoint configuration.

12. The type of media usually installed on homes and businesses by the telephone company is called _____.

13. The Chief Information Officer has put you in charge of building the network. The CIO has informed you that cost are a factor in building the network. Security is not a concern and the CIO would like moderate speed. What type of media would you consider to build this network using to meet the CIO's needs?

14. Which is true regarding parallel transmission mode?

15. With respect to converting digital data into analog signals, AM stands for:

16. You are the network engineer for XYZ hospital. Your supervisor has asked you to connect the MRI machine to the network via the network interface card built into the machine. You have been informed that you need to purchase the most cost effective cable available to perform this installation and gigabyte speed is necessary. What would be your best option given the scenario?

17. Microsoft Windows Active Directory is an example of a:

18. Network bottlenecks typically reside in what two places?

19. The basic layout of a network is called the _____.

20. Which of the following should not be considered when installing cables or performing maintenance?

Part 3

1. Which of the following is true with respect to the data link layer?

2. You are working to resolve a problem with communication to an office in your building. The Sr. Network Engineer asks you to go get a mini-switch or repeater so that the source of the error can be resolved. What was the likely source of this error?

3. This error checking scheme adds 8, 16, 24, or 32 bits to the message.

4. This type of transmission is typically used on a point-to-point full-duplex circuits.

5. Your new position requires that you maintain a Token Ring network that includes several IBM mainframes. What type of access control would this network most likely use?

6. You are working with a co-worker over the phone to connect a router at your location in New York to their network in San Francisco. After hours of troubleshooting the WAN protocol configured on the routers you find that the root of the problem is that he has a Cisco router and you have a Nortel router. Which WAN protocol are you most likely configuring in this scenario?

7. ____ is not a function of a data link protocol.

8. The key to selecting the best access control technique is to _______.

9. In general, controlled approaches:

10. With contention:

Part 4

1. _____ controls stop a person from acting.

2. A _____ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

3. Your organization has decided to host a web server that will be accessible by the public. Organizational leadership is concerned about the web server being compromised and thus allowing the remaining network to be compromised. You want to come up with a solution to host the secure the web server internally, but still protect your network. What should you do?

4. The traditional network design approach does not work well for ____ networks.

5. Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?

6. Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?

7. ____ refers to keeping track of the operation of network circuits to make sure they are working properly.

8. _____ is a simple method that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates.

9. A _____ is an organizational department that is responsible for monitoring and fixing overall network problems.

10. Service Level Agreements (SLA) are significant for what reason?

Reference no: EM13783659

Questions Cloud

Topic related to intended profession : Briefly explain this topic. Why is it of interest? Why do you think it would be helpful at this time? Summarize what type of research you would use to conduct a study on this topic (experiment, survey, correlation, etc). Why is this type of resea..
Strategic management : Strategic Mgt.
Systems analysis and design methodologies : How might the project team recommending an ERP design strategy justify its recommendation as compared with other types of design strategies?
Eliminate the clients potential tax liability : Imagine that you are a tax preparer and your client has asked for your help in mitigating or eliminating the potential estate tax liability for the property that the client owns so that he/she may pass it on to his/her heirs.
Why do switched ethernet network improve network performance : The company vice president has just received an email from an associate with claims that 50,000 dollars needs to be wired to a location in Eastern Europe. You want to confirm that this email is indeed from the associate by identifying the message ..
Write an essay onfine art in the western tradition : Write an essay onFine Art in the Western Tradition that for you is inspirational, exciting, challenging and meaningful. You'll need to be sure you've got the right kind of art: Fine Art.
Monetary benefits of an information system : What are some sources of risk in a systems analysis and design project, and how does a project manager cope with risk during the stages of project management?
Professional associations and state regulatory boards : Address how professional associations and state regulatory boards view online therapy.
Create a fictional client experiencing : Create a fictional client experiencing your chosen disorder. Apply cognitive and behavioral theories to the client's issue to develop a cognitive behavioral experiment you might use with this client.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe how transport layer protocols implement

Describe how error checking is handled in the data link layer. Define a check sum and describe how Transport layer protocols implement them to ensure data integrity. Define and describe sequencing.

  Draft a enterprise-wide telecommunications network

draft a top-level design of an enterprise-wide telecommunications network for a fictitious company, including LAN topology and WAN infrastructure that will handle a constant stream of traffic between the company offices

  Use a straight-through cable to connect to hub

Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B?

  Long-distance communication in a wan infrastructure

How can cables like UTP and coaxial cable be used for long-distance communication in a WAN infrastructure? Where are these cables used most often?

  Advantages of using extranet instead of private phone lines

Write down the benefits of using extranet instead of dedicated/private phone lines in this situation? How do you expect your customers restaurants to react to change to extranets?

  Description of the network security

The thesis statement: following technological advancement, it is advisable to consider the new forms to manage security within possible limits

  Importance of using routing protocol-general functionality

Discuss the importance of using a routing protocol and explain general functionality. Router Information Protocol (RIP) is a distance-vector routing protocol than can be used by a router to send data from one network to another. What are the demer..

  Explain how professional associations and state regulatory

write a 1050- to 1750-word paper in which you discuss the content in each site the professionals involved and how the

  Draw a simple graph to show conflict degree

Draw a simple graph to show conflict degree. Use channels as colors and show the algorithm step by step to color the graph. Explain what does thismean i.e. what have you constructed?

  Specify protocol by listing the different messages

Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by providing the message structure.

  Maximum ethernet payload

Host B can send TCP acknowledgements to host A, even though it has no data to send - experiment in which host A blasts a 26 Megabyte file to host B through a single TCP Tahoe connection over a 1 Gigabit/sec Ethernet. B transmits no data. Neither ho..

  Explain the osi model and tcp-ip protocol

Define and explain the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd