Describe role of protocols in network communications

Assignment Help Computer Networking
Reference no: EM13742788

1. Network administrators and support personnel commonly use the _ utility to verify connectivity between two network end points.

A. Path

B. Transport

C. Ping

D. SYN

2. A _ spans multiple geographic areas and is usually connected by common telecommunication carriers.

A. WAN

B. LAN

C. MAN

D. SAN

3. Network administrators typically configure a router directly through the port known as the port located on the back of the router.

A. console

B. Aux

C. Serial

D. Fast Ethernet

4. A _ is an intermediary device that operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and moves packets based on the layer 3 addresses.

A. Personal Computer

B. Switch

C. Hub

D. Router

5. The OSI model layer defines transmission of light over a fiber optic cable.

A. Transport

B. Physical

C. Data Link

D. Network

6. Which term below is used to prioritize traffic in network systems?

A. Fault-tolerance

B. QoS

C. Security

D. Scalability

7. Which answer below describes a converged network?

A. One Local Area Network connected to another

B. One Wide Area Network connected to another

C. A network that is currently out of service

D. A network that can carry many different types of traffic

8. A (n) _ address identifies both a network and a host, so you can route communications through large networks, including the Internet.

A. Port

B. ARP

C. IP

D. MAC

9. A ___ is contained within one company or department and located in a single geographic area, usually a campus, building or part of a building.

A. SAN

B. MAN

C. WAN

D. LAN

10.   Which layer has both a header and trailer used in its encapsulation?

A. Presentation

B. Internet

C. Network Access

D. Physical

11.   Which one of the following pieces of equipment is not an end device in a network environment?

A. IP Phone

B. Router

C. Personal Computer

D. Server

12.   In _ communications, devices can send or receive signals, but not both at the same time.

A. half-duplex

B. full-duplex

C. duplex

D. wire-duplex

13.   Which of the following terms is another name for a physical numeric address?

A. IP address

B. MAC layer address

C. PROM address

D. Port address

14.   The PDU at the nehwork access layer is called a(n)

A. Segment

B. Datapack

C. Frame

D. Packet

15.   Which is the user prompt or enable prompt below:

A. Route r>

B. Routerff

C. Router(Config)ff

D. Router(£nable)>

16. How do you saw changes to the configuration file?

A. Copy run start

B. Copy start run

C. Copy flash start

D. Copy run nwam

17. In TCP/IP the Network Access includes the following OSt layers.

A. Network and Data Link

B. Network and Transport

C. Data Link and Physical

D. Session and Transport

18. After creating data with a software application, the first step of Data Encapsulation is?

A. Frame Headers and trailers added

B. Bit Transmission

C. Segmentation

D. Packet creation and network header

19. What command do you use to enter global configuration mode?

A. global conf

B. term global conf

C. con f global

D. configure terminal

20. Which of the following describes the OS[ Physical Layer?

A. Handles Link control and uses the MAC address on the NIC

B. Translates, encrypts or prepares data from the Application Layer for network transmission

C. Provides the electrical transmission of data

D. Establishes, maintains and manages sessions between applications

21.  For the OSI network model list all 7 layers of the QSI model in order from top to bottom.

22. Complete the table below for the 4 layers of the TCP/IP model. The 1st layer is done for you. 

TCP/IP Layer Name

PDU TYPE

AODRESStNG USED

 

Application

Data

None

 

 

 

 

 

 

 

 

 

23. Name 3 main components of any modern day network.

24. Describe the role of protocols In network communications.

Reference no: EM13742788

Questions Cloud

What technical/economi revolution started in england : what technical/economi revolution started in England and that has had long-lasting implications?
Write an essay on the nuclear testing to global terrorism : Write an essay on the Cold War America: From Nuclear Testing to Global Terrorism. The prosperity and freedoms of favored American citizens has always required that others be deprived.
Home country : Home Country: Given that the total market of the Home country is 900,000 units. Given the equations and parameter values above, solve for the equilibrium number of automobile companies, the number of cars each firm will produce, and the price of the ..
The intra-industry trade model : Explain the Krugman Imperfect Competition Model of intra-industry trade in automobiles, and what the model means. Use diagrams to demonstrate the model in autarky and in free trade, and to show the existence of gains from trade.
Describe role of protocols in network communications : Describe the role of protocols In network communications and what command do you use to enter global configuration mode and Name three main components of any modern day network.
Ease and simplicity of our current technological devices : What are some of the ways that the ease and simplicity of our current technological devices also lead us at times to surrogate our daily responsibilities onto these devices?
Describe the innovation life cycle proposed : Describe the innovation life cycle proposed by Abernathy and Utterback. Does the model provide a useful tool to guide and manage the innovation process? Do you see any weak points in the model?
Market demand for long-playing records : Over the years the market demand for “long-playing records made of polyvinyl has fallen considerably as new technologies replaced the old “lp” yet lps are still available for sale and they sell at price points higher (in some cases much higher) than ..
Representative consumer has well-behaved preferences : Consider the utility-maximizing model in a two-good world, where our representative consumer has well-behaved preferences that result in smooth indifference curves that are convex to the origin.

Reviews

Write a Review

Computer Networking Questions & Answers

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

  Install backbone to connect four base-t ethernet lans

You have been hired by a small company to install backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to give a connection to Internet. Develop simple backbone and determine total cost.

  Describe the methods to tackle and mitigate rf multipath

Describe the methods to tackle and mitigate RF multipath that impact to WLAN throughput. Explain the purposes of POE in WLAN design.

  Explain move of ethernet from lan technology to man

Explain the move of Ethernet from LAN technology to MAN and Wan technology. Explain what has made this possible? Additionally, explain the social significance of this move.

  What are the benefits of cloud computing adoption

What are the key organisational and environmental factors that influence SMEs to adopt Cloud based services?

  Purposethe primary objective of the project is to encourage

purposethe primary objective of the project is to encourage students to explore in modest depth the operations function

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

  Networking solution - wan communications between sites

The management team would like a networking solution which would offer easier troubleshooting, less down time, and WAN Communications between sites. They would like t he WAN Connections to support 256 Kbps of data and several telephone conversatio..

  Assignment related to mobile application

You are employed in the corporate IT department of URCovered, Inc., which is one of the largest major auto insurance companies in North America. Based on a yearlong study, your company management has identified a mobile application as an opportuni..

  Discuss some of the problems nats create for ipsec security

discuss some of the problems nats create for ipsec security. see phifer 2000. can we solve these problems by using

  What are some merits and demerits of using centralized

question 1. when working on a design what are some of the typical business goals you can expect to find for todays

  Complete one paper summarizing the actions steps tools etc

complete one paper summarizing the actions steps tools etc. of the hacking techniques used to execute the attack on the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd