0% found this document useful (0 votes)
451 views5 pages

CH 15 Answers

computer science unit 3 questions

Uploaded by

Bob Bill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
451 views5 pages

CH 15 Answers

computer science unit 3 questions

Uploaded by

Bob Bill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Chapter 15 Exercises and Answers

Answers are in blue.

For Exercises1-6, match the word or acronym with the definition or the appropriate blank.
A. LAN
B. WAN
C. Gateway
D. Bus topology
E. Ethernet
F. Internet

1. The Internet is a _________.


B
2. The industry standard for LANs.
E
3. A node that handles communication between its LAN and other networks.
C
4. A network that connects other networks.
B
5. Star technology is a ______ configuration.
A
6. Ethernet uses __________.
D

For Exercises 7 - 15, match the word or acronym with the definition or the appropriate blank.
A. DLS
B. TCP/IP
C. UDP
D. IP
E. TCP
F. Broadband

7. _________ and voice communication can use the same phone line.
A
8. DLS and cable modems are_________ connections.
F
9. An Internet connection made using a digital signal on regular phone lines.
A
10. Network technologies that generally provide data transfer speeds greater than 128I bps.
F
11. The network protocol that breaks messages into packets, reassembles the packets at the destination,
and takes care of errors.
E
12. The suite of protocols and programs that supports low-level network communication.
B
13. An alternative to TCP that achieves higher transmission speeds.
C
14. Software that deals with the routing of packets.
D
15. _________ has more reliability than UDP.
E

For Exercises 15 -20, match the protocol or standard with what it specifies or defines.
© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
A. SMTP
B. FTP
C. Telnet
D. HTTP
E. MIME type

16. Transfer of electronic mail.


A
17. Log into a remote computer system.
C
18. Transfer files to and from another computer.
B
19. Format of email attachments.
E
20. Exchange of World Wide Web documents.
D

For Exercises 21-28, mark the answers true and false as follows:
A. True
B. False

21. A P2P network establishes a single portal through which communication is managed.
B
22. A port is a numeric designation that corresponds to a particular high-level protocol.
A
23. A firewall protects a local-area network from physical damage.
B (it protects it from inappropriate access)
24. Each company can establish its own access control policy.
A
25. A TV cable company cannot also be an Internet service provider.
B
26. Some top-level domains are based on the country in which the registering organization is based.
A
27. Hundreds of new top-level domains have recently been added to the domain name system.
A
28. Two organizations cannot have the same name for a computer.
B

Exercises 29 - 68 are problems or short answer questions.

29. What is a computer network?


A computer network is a collection of computing devices connected so that they can
communicate and share resources.
30. How are computers connected together?
The computers in a network can be physically connected by wires or cables or logically
connected by radio waves or infrared signals.
31. To what does the word node (host) refer?
A node or host is any addressable device attached to a network.
32. Name and describe two key issues related to computer networks.
Data transfer rate: The speed with which data is moved across the network
Protocol: The set of rules that define how data is formatted and processed across a network
33. What is a synonym for data transfer rate?
Bandwidth
34. Describe the client/server model and discuss how has it has changed how we think about
© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
computing.
The client/server is a model in which resources are spread across the web. The client
makes a request for information or an action from a server and the server responds. For
example, a file server, a computer dedicated to storing and managing files for network
users, responds to requests for files. A web server, a computer dedicated to responding to
requests for web pages, produces the requested page. Before the client/server model was
developed, a user thought of computing within the boundaries of the computer in front of
him or her. Now the functions that were provided within one computer are distributed
across a network, with separate computers in charge of different functions.
35. What is a P2P network? A peer-to-peer network is decentralized, with nodes that share both
resources and the responsibility for making these resources available to other peers.
36. Just how local is a local-area network?
A local-area network connects a relatively small number of machines in a relatively close
geographical area, usually within the same room or building, but occasionally a LAN spans a
few close buildings.
37. Distinguish between the following LAN topologies: ring, star, and bus.
A ring topology is one in which the nodes are connected in a closed loop. A star topology is
one in which the nodes are all connected to a central node. A bus topology is one in which
the nodes share a common line.
38. How does the shape of the topology influence message flow through a LAN?
In a ring topology, messages flow in only one direction around the LAN. In a star topology,
messages flow through the central node. In a bus topology, messages flow in both directions
along the bus.
39. What is a MAN and what makes it different from a LAN and a WAN?
A MAN is a metropolitan-are network. It is a network with some of the features of both a
LAN and a WAN. Large metropolitan areas have special needs because of the volume of
traffic. MANs are collections of smaller networks but are implemented using such techniques
as running optical fiber cable through subway tunnels.
40. Distinguish between the Internet backbone and an Internet service provider (ISP).
The Internet backbone is a set of high-speed networks that carry Internet traffic. An ISP is a
company that provides access to the Internet, usually for a fee. An ISP connects directly to
the Internet backbone or to a larger ISP with a connection to the backbone.
41. Name and describe three technologies for connecting a home computer to the Internet.
The text states that “the three most popular techniques for home connections are a phone
modem, a digital subscriber line, or a cable modem.” Other technologies include satellite
connections (especially via a satellite television provider) and WiFi hotspots on cellular
telephones.
42. What role do ISPs play with the three technologies in Exercise 41?
Each of the technologies in Exercise 17 requires the connection to go through an ISP. With a
phone modem, you dial up a computer that is permanently connected to the Internet. Once
the connection is made, you may transfer data. A DSL line maintains an active connection
between your home and the ISP. The communication set up to and from your home using
cable goes through an ISP.
43. What are the advantages and disadvantages of each of the technologies in Exercise 41?
Phone modems are the cheapest because the phone lines are in place, but transfer speed is
very slow because computer data must be converted into an analog audio signal for transfer.
DSL service uses regular phone lines to transfer digital data and you do not have to dial in,
but you must be within a certain distance of special equipment or the signal degrades.
Cable modems uses service that many people already have, but the signal deteriorates if too
many people in the neighborhood have the service.
Both DSL and cable modems are broadband connections.
44. Phone modems and digital subscriber lines (DSL) use the same kind of phone line to transfer
data. Why is DSL so much faster than phone modems?
Phone modems translate digital signals to analog in order to send them over voice
frequencies. DSL sends the digital signals over the same phone line but at a different

© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
frequency. Because DSL and voice are at different frequencies, they can share the same
phone line.
45. Why do DSL and cable modem suppliers use technology that devotes more speed to down
loads than to upload?
Users spend more time asking for data to be sent to their machines (downloads) than they do
sending data to other machines (uploads). Therefore, DSL and cable modem suppliers
maximize the speed on the most common task.
46. Messages sent across the Internet are divided into packets. What is a packet and why are
messages divided into them?
A packet is a unit of data sent across a network. It is more efficient to send uniform sized
messages across the Internet.
47. Explain the term packet switching.
Packets that make up a message are sent individually over the Internet and may take different
routes to their destination. When all the packets arrive at the destination they are reassembled
into the original message.
48. What is a router?
A router is a network device that directs packets between networks towards their final
destinations.
49. What is a repeater?
A repeater is a network device that strengthens and propagates a signal along a lone
communication line.
50. What problems arise due to packet switching?
Because packets may take different routes, they may not arrive in order. Thus, they must be
reassembled into the right order at the receiving end.
51. What are proprietary systems and why do they cause a problem?
A proprietary system is one designed and built by a commercial vendor that keeps the
technologies used private. If a network's software is a proprietary system, then it can only
communicate with other networks that use the same software.
52. What do we call the ability of software and hardware on multiple platforms from multiple
commercial vendors to communicate?
Interoperability
53. What is an open system and how does it foster interoperability?
An open system is a system based on a common model of network architecture adhering to an
accompanying suite of protocols. If all commercial vendors adhere to a common logical
architecture and protocols, then networks on multiple platforms from multiple vendors can
communicate.
54. Compare and contrast proprietary and open systems.
Both proprietary and open systems can be used to create networks. Networks using the same
proprietary systems can communicate with each other, but not with networks that do not use
the same system. Networks using open systems can all communicate.
55. What is the seven-layer logical breakdown of network interaction called?
Open Systems Interconnection (OSI) Reference Model
56. What is a protocol stack and why is it layered?
A protocol stack is layers of protocols that build and rely on each other. Protocols are layered
so that new protocols can be developed without abandoning fundamental aspects of lower
levels.
57. What is a firewall, what does it accomplish, and how does it accomplish it?
A firewall is a computer system that protects a network from inappropriate access. A firewall
filters incoming traffic, checking the validity of incoming messages, and perhaps denying
access to messages. For example a LAN might deny any remote access by refusing all traffic
that comes in on port 23 (the port for telnet).
What is a hostname and how is it composed?
A hostname is a unique identification for a specific computer on the Internet made up of
58.
words separated by dots.

© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
Why was the IPv6 protocol created for IP addresses?
IPv4 is limited in the number of unique computers it could identify, and was used up by 2011.
59.
IPv6 was created as the successor to IPv4, providing many more addresses.
What is the primary difference between the IPv4 and IPv6 protocols?
An IPv6 address is bigger (using 128 bits instead of 32) which, in addition to providing more
60.
addresses, provides additional features that improve the management of network traffic.
61. What is a domain name?
58. A domain name is that part of the hostname that specifies the organization or group to which
the host belongs.
62. What is a top-level domain name?
The last part of a domain name that specifies the type of organization or its country of origin.
63. What is network neutrality?
Network neutrality is the principle that ISPs should deliver data to everyone equally, as fast as
the technology allows.
64. How does the current domain name system try to resolve a hostname?
First a request is sent to a nearby domain name server (a computer that attempts to translate a
hostname into an IP address). If that server cannot resolve the hostname, it sends a request to
another domain name server. If the second server can't resolve the hostname, the request
continues to propagate until the hostname is resolved or the request expires because it took
too much time.
65. What is cloud computing?
Cloud computing is an Internet service through which you can do things such as obtain online
storage, synchronize devices, or access particular resources. The idea is that these services are
somewhere "in the cloud" of the Internet.
66. Compare cloud computing to an email service such as Gmail.
The Gmail email service can be thought of as a particular example of cloud computing. They
provide the service of receiving and storing you email messages, which you can then retrieve
from wherever you are on any device that can access the Internet.
67. What are the four types of cloud computing services?
The four types of cloud computing services are:
 public cloud - accessible by any subscriber
 private cloud - established for a specific group or organization and limiting access to
that group
 community cloud - shared among two or more organizations with similar needs
 hybrid cloud - some combination of the above cloud types

© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com

You might also like