Name __________________________________________________________ Date ________________
Chapter 3 Reading Organizer Answer Key
3.1
1. Explain the difference between a dedicated networks and converged networks. Dedicated networks for voice, video and computer data communications required a different t pe of device in order to access the network. !elephones, televisions, and computers used specific technologies and different dedicated network structures, to communicate. "onverged networks are capable of delivering voice, video and data services over the same communication channel or network structure. #. $h is the internet considered a %network of networks%& 'ecause it is literall made up of thousands of networks that are connected to each other. (. Explain the four main categories of network components. )ist examples in each area. *osts + *osts send and receive user traffic. , host is a generic name for most end-user devices. , host has an ./ network address. Examples of hosts are personal computers and network attached printers. 0hared peripherals + 0hared peripheral devices do not communicate directl on the network. .nsteead, peripherals rel on their connected host to perform all network operations. Examples of shared peripherals are cameras, scanners, and locall attached printers. Networking devices + Networking devices connect other devices, mainl hosts. !hese devices move and control network traffic. Examples of network evices include hubs, switches, and routers. Networking media + Network media provides connections between hosts and network devices. Network media can be wired, such as copper and fiber optic or use wireless technologies.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
1. Explain what the simplest form of peer-to-peer network is. !he simplest peer-to-peer network consists of two directl connected computers using a wired or wireless connection. 7. $hat are the advantages of a peer-to-peer network& a. Eas to set up b. )ess complexit c. )ower cost d. "an be used for simple tasks such as transferring files and sharing printers 8. $hat are the disadvantages of a peer-to-peer network& a. No centrali9ed administration b. Not as secure c. Not scalable c. ,ll devices ma act as both clients and servers which can slow their performance 6.
Complete Lab Activity 3.1.5
:. Explain the features of a ph sical topolog . , ph sical topolog map is created to record where each host is located and how it is connected to the network. !he ph sical topolog map also shows where the wiring is installed and the locations of the networking devices that connect the hosts.
4. Explain the features of a logical topolog .
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
, logical topolog map groups hosts b how the use the network, no matter where the are ph sicall located. *ost names, addresses, group information and applications can be recorded on the logical topolog map.
3.
12. $hat issues do networking protocols help to manage& a. ;essage format b. ;essage si9e c. !iming d. Encapsulation e. Encoding f. 0tandard message pattern 11. $hat is encapsulation& !he process of placing one message format <the letter= inside another message format <the envelope= is called encapsulation. 1#. Explain in detail the three rules of engagement with regard to timing. ,ccess ;ethod ,ccess ;ethod determines when someone is able to send a message. !hese timing rules are based on the environment. >or example, ou ma be able to speak whenever ou have something to sa . .n this environment, a person must wait until no one else is talking before speaking. .f two people talk at the same time, a collision of information occurs and it is necessar for the two to back off and start again. !hese rules ensure communication is successful. )ikewise, it is necessar for computers to define an access method. *osts on a network need an access method to know when to begin sending messages and how to respond when errors occur. >low "ontrol !iming also effects how much information can be sent and the speed that it can be delivered. .f one person speaks too quickl , it is difficult for the other person to hear and understand the message. !he receiving person must ask the sender to slow down. .n network communication, a sending host can transmit messages at a faster rate than the destination host can receive and process. 0ource and destination hosts use flow control to negotiate correct timing for successful communication. ?esponse !imeout .f a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingl . !he person ma repeat the question, or ma go on with the conversation. *osts on the
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
network also have rules that specif how long to wait for responses and what action to take if a response timeout occurs. 1(. Explain the following t pes of network communication. @ncast + , one-to-one message pattern is referred to as a unicast, meaning that there is onl a single destination for the message. ;ultcast + $hen a host needs to send messages using a one-to-man pattern, it is referred to as a multicast. ;ulticasting is the deliver of the same message to a group of host destinations simultaneousl . 'roadcast .f all hosts on the network need to receive the message at the same time, a broadcast is used. 'roadcasting represents a one-to-all message pattern. 11.
Draw a line between the communication characteristic producing the problem to the appropriate scenario.
3.3
17. Explain what protocols allow networks to accomplish.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
/rotocols are especiall important on a local network. .n a wired environment, a local network is defined as an area where all hosts must %speak the same language% or in computer terms %share a common protocol%. 18. $hat is the most common set of protocols used on local wired networks& Ethernet 16. !he above protocol defines man aspects of communication over the local networks, includingA a. message format b. message si9e c. timing d. encoding e. message patterns 1:. 0tandards are beneficial to networking in man wa s. !hese includeA a. >acilitate design b. 0implif product development c. /romote competition d. /rovide consistent interconnections e. >acilitate training f. /rovide more vendor choices for customers 14. 'reakdown and explain the term 122',0E-!. 122 - is the speed in ;bps ',0E - stands for baseband transmission ! - stands for the t pe of cable, in this case, twisted pair. #2. Explain in detail how Ethernet networks use ;edia ,ccess "ontrol <;,"= addresses when communicating and sending frames. $hen a host on an Ethernet network communicates, it sends frames containing its own ;," address as the source and the ;," address of the intended recipient. ,n hosts that receive the frame will decode the frame and read the destination ;," address. .f the destination ;," address matches the address configured on the N.", it will process the message and store it for the host application to use. .f the destination ;," address does not match the host ;," address, the N." will ignore the message. #1. $hich specific address do N."s use when deciding whether or not to accept a frame& Destination ;," address
Complete Lab Activity 3.3.3
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
##. Explain each part of the Ethernet frame below.
/reamble + Defined pattern of alternating 1 and 2 bits used to s nchroni9e timing 0>D + 0tart of >rame Delimiter. ;arks the end of the timing information and start of the frame. Destination ;," ,ddress + !he Destination ;," ,ddress field contains the destination ;," address <receiver=. !he destination ;," address can be unicast <a specific host=, multicast <a group of hosts=, or broadcast <all hosts on the local network=. 0ource ;," ,ddress + !he 0ource ;," ,ddress field contains the source ;," address <sender=. !his is the unicast address of the Ethernet node that transmitted the frame. )ength 5 ! pe + !he )ength5! pe field supports two different uses. , t pe value indicates which protocol will receive the data. !he length indicates the number of b tes of data that follows this field. Encapsulated Data + !he Data field contains the packet of information being sent. Ethernet requires each frame to be between 81 and 171: b tes. >"0 + !he >"0 contains a 1-b te value that is created b the device that sends data and is recalculated b the destination device to check for damaged frames. #(. $hat does the format for Ethernet frames specif & a. the location of the destination and source ;," addresses b. /reamble for sequencing and timing c. 0tart of frame delimiter d. )ength and t pe of frame e. >rame check sequence to detect transmission errors
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
#1. .n networking, what is the hierarchical design used to do& .t is used to group devices into multiple networks that are organi9ed in a la ered approach. .t consists of smaller, more manageable groups that allow local traffic to remain local. Bnl traffic that is destined for other networks is moved to a higher la er. #7. Explain the three basic la ers of the hierarchical design modelA ,ccess )a er - to provide connections to hosts in a local Ethernet network. Distribution )a er - to interconnect the smaller local networks. "ore )a er - a high-speed connection between distribution la er devices. #8. Explain in detail the differences between ph sical and logical addresses. Bn a host, the ;," address does not changeC it is ph sicall assigned to the host N." and is known as the ph sical address. !he ph sical address remains the same regardless of where the host is placed on the network. !he ./ address is similar to the address of a person. .t is known as a logical address because it is assigned logicall based on where the host is located. !he ./ address, or network address, is assigned to each host b a network administrator based on the local network. #6. )ist and explain the two parts of an ./ address. ./ addresses contain two parts. Bne part identifies the local network. !he network portion of the ./ address will be the same for all hosts connected to the same local network. !he second part of the ./ address identifies the individual host. $ithin the same local network, the host portion of the ./ address is unique to each host.
Complete Lab Activity 3.3.!
#:. "#plain in detail the three la ers of the hierarchical design model. ,ccess )a er !he ,ccess )a er provides a connection point for end user devices to the network and allows multiple hosts to connect to other hosts through a network device, usuall a hub or switch. ! picall , all devices within a single ,ccess )a er will have the same network portion of the ./ address.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
.f a message is destined for a local host, based on the network portion of the ./ address, the message remains local. .f it is destined for a different network, it is passed up to the Distribution )a er. *ubs and switches provide the connection to the Distribution )a er devices, usuall a router. Distribution )a er + !he Distribution )a er provides a connection point for separate networks and controls the flow of information between the networks. .t t picall contains more powerful switches than the ,ccess )a er as well as routers for routing between networks. Distribution )a er devices control the t pe and amount of traffic that flows from the ,ccess )a er to the "ore )a er. "ore )a er + !he "ore )a er is a high-speed backbone la er with redundant <backup= connections. .t is responsible for transporting large amounts of data between multiple end networks. "ore )a er devices t picall include ver powerful, high-speed switches and routers. !he main goal of the "ore )a er is to transport data quickl . *ubs, switches, and routers are discussed in more detail in the next two sections. #4.
3.$
(2. $ithin an Ethernet network, each host is able to connect directl to an ,ccess )a er networking device using a point-to-point cable. $hat are these networking devices that each host connects to& *ubs and switches
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
(1. $hen a hub receives a message from a host for another host what does it do with it& *ubs cannot determine which host should get an particular message. , hub simpl accepts electronic signals from one port and regenerates <or repeats= the same message out all of the other ports. (#. $hat happens after a collision occurs in a collision domain& , collision causes the messages to become garbled and unreadable b the hosts. , hub does not decode the messagesC therefore it does not detect that the message is garbled and repeats it out all the ports. !he area of the network where a host can receive a garbled message resulting from a collision is known as a collision domain. .nside a collision domain, when a host receives a garbled message, it detects that a collision has occurred. Each sending host waits a short amount of time and then attempts to send, or retransmit, the message again. ,s the number of hosts connected to the hub increases, so does the chance of collisions. ;ore collisions cause more retransmissions.
((. $h do ou need to limit the si9e of collision domains& ;ore collisions cause more retransmissions. Excessive retransmissions can clog up the network and slow down network traffic. >or this reason, it is necessar to limit the si9e of a collision domain.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
(1.
'ased on the graphic above complete the following questions.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
(7. $hat advantage does a switch have over a hub when forwarding messages through the network& @nlike a hub, a switch can forward a message to a specific host. (8. $hat is a ;," address table& , table on the switch, called a ;," address table, contains a list of all of the active ports and the host ;," addresses that are attached to them. (6. $hat happens when the switch receives a frame addressed to a new host that is not et in the ;," address table& .f the destination ;," address is not in the table, the switch does not have the necessar information to create an individual circuit. $hen the switch cannot determine where the destination host is located, it uses a process called flooding to forward the message out to all attached hosts. Each host compares the destination ;," address in the message to its own ;," address, but onl the host with the correct destination address processes the message and responds to the sender. (:. *ow does the ;," address of a new host get into the ;," address table& , switch builds the ;," address table b examining the source ;," address of each frame that is sent between hosts. $hen a new host sends a message or responds to a flooded message, the switch immediatel learns its ;," address and the port to which it is connected. !he table is d namicall updated each time a new source ;," address is read b the switch. .n this wa , a switch quickl learns the ;," addresses of all attached hosts.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
(4. *ow man collision domains are in the graphic&
12 <ten=
Ever switch port creates a separate collision domain.
12.
'ased on the graphic above complete the following questions.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
11. Explain what a network broadcast is& $ithin the local network it is often necessar for one host to be able to send messages to all the other hosts at the same time. !his can be done using a message known as a broadcast. 'roadcasts are useful when a host needs to find information without knowing exactl what other host can suppl it or when a host wants to provide information to all other hosts in the same network in a timel manner. 1#. *ow is a 'roadcast ;," address represented& ;," addresses are usuall represented in hexadecimal notation. !he broadcast ;," address in hexadecimal notation is %%%%.%%%%.%%%%.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
1(. Explain the problem encountered with too man computers in a broadcast domain& .f too man hosts are connected to the same broadcast domain, broadcast traffic can become excessive. !he number of hosts and the amount of network traffic that can be supported on the local network is limited b the capabilities of the hubs and switches used to connect them. ,s the network grows and more hosts are added, network traffic, including broadcast traffic, increases. .t is often necessar to divide one local network, or broadcast domain, into multiple networks to improve performance. 11.
17.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
18.
16. Explain the three step process that ,ddress ?esolution /rotocol <,?/= uses to discover and store ;," addresses.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
1. !he sending host creates and sends a frame addressed to a broadcast ;," address. "ontained in the frame is a message with the ./ address of the intended destination host. #. Each host on the network receives the broadcast frame and compares the ./ address inside the message with its configured ./ address. !he host with the matching ./ address sends its ;," address back to the original sending host. (. !he sending host receives the message and stores the ;," address and ./ address information in a table called an ,?/ table.
3.5
1:. .n ver general terms, what is the function of a router& , router is a networking device that connects a local network to other local networks. 14. *ow do routers and switches differ& 0witches onl decode <unencapsulate= the frame containing the ;," address information ?outers. !he router reads the network portion of the destination ./ address and uses it to find which one of the attached networks is the best wa to forward the message to the destination.
Complete Lab Activity 3.5.
72. Explain how a router determines what path to send the message to get to the destination network& $hen a router receives a frame, it decodes the frame to get to the packet containing the destination ./ address. .t matches the address of the destination to all of the networks that are contained in the routing table. .f the destination network address is in the table, the router encapsulates the packet in a new frame in order to send it out. .t forwards the new frame out of the interface associated with the path, to the destination network. 71. *ow do routers handle broadcasts messages using a ;," address& ?outer interfaces do not forward messages that are addressed to the broadcast ;," address. ,s a result, local network broadcasts are not sent across routers to other local networks.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
7#. $hich device is t picall used as a hosts default gatewa & !he default gatewa address is the address of the router interface connected to the same local network as the source host. 7(. $h are default gatewa s necessar to proper network functionalit & .f no default gatewa is configured in the host !"/5./ settings, or if the wrong default gatewa is specified, messages addressed to hosts on remote networks cannot be delivered. 71.
'ased on the information included with the graphic, list the correct default gatewa for each computer. *1 ___________14#.18:.1.1__________________ *# ___________12.2.2.1_____________________ *( ___________16#.18.2.72__________________ 77. $hat do routers use routing tables to determine& ?outers use the routing tables to determine which interface to use to forward a message to its intended destination. 78. Explain the purpose of configuring a routing table with a default route. .f the router cannot determine where to forward a message, it will drop it. Network administrators configure a routing table with a default route to keep a packet from being dropped because the path to the destination network is not in the routing table. , default route is the interface through which the router forwards a packet containing an unknown destination ./ network address. 76. $hen host , forwards a frame to host ' in the same network which destination ;," address is used&
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
*ost ' 7:. $hen host , forwards a frame to host > which is in a different network through router " which destination ;," address is used& ?outer " 74.
82.
81. Explain the term )ocal ,rea Network <),N=.
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226
!he term )ocal ,rea Network <),N= refers to a local network, or a group of interconnected local networks that are under the same administrative control. .n the earl da s of networking,
Learn to &se 'ac(et )racer 3.5.*
3.!
8#. , network plan starts with the gathering of information about how the network will be used. !his information could includeA a. !he number and t pe of hosts to be connected to network b. !he applications to be used c. 0haring and .nternet connectivit requirements d. 0ecurit and privac considerations e. ?eliabilit and uptime expectations f. "onnectivit requirements including, wired and wireless 8(. Explain what should be included in a ph sical topolog of the networkA a. /h sical location of devices such as routers, switches, and hosts b. *ow all devices are interconnected c. )ocation and length of all cable runs d. *ardware configuration of end devices such as hosts and servers 81. Explain what should be included in a logical topolog of the networkA a. )ocation and si9e of broadcast and collision domains b. ./ addressing scheme c. Naming scheme d. 0haring configuration e. /ermissions 87. $hat is the purpose of protot ping& , protot pe allows a network administrator to test whether or not the planned network will operate as expected, before mone is spent on equipment and installation. Documentation should be maintained on all aspects of the protot ping process.
'ac(et )racer Activity 3.!.
88. ,n integrated services router <.0?= can perform the functions of what devices& 0witch, ?outer, and ,ccess /oint
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses 245215#226
Complete Lab Activity 3.!.$
86. $h would ou disable 0imple >ile 0haring on our computer& 0imple >ile 0haring can be disabled so that more specific securit access levels can be assigned.
Complete Lab Activity 3.!.5
""N, Discover 1.2 3onesr2 Networking for *ome and 0mall 'usinesses
245215#226