CH 15 Answers
CH 15 Answers
Answers are in blue.
For Exercises1-6, match the word or acronym with the definition or the appropriate blank.
A. LAN
B. WAN
C. Gateway
D. Bus topology
E. Ethernet
F. Internet
For Exercises 7 - 15, match the word or acronym with the definition or the appropriate blank.
A. DLS
B. TCP/IP
C. UDP
D. IP
E. TCP
F. Broadband
7. _________ and voice communication can use the same phone line.
A
8. DLS and cable modems are_________ connections.
F
9. An Internet connection made using a digital signal on regular phone lines.
A
10. Network technologies that generally provide data transfer speeds greater than 128I bps.
F
11. The network protocol that breaks messages into packets, reassembles the packets at the destination,
and takes care of errors.
E
12. The suite of protocols and programs that supports low-level network communication.
B
13. An alternative to TCP that achieves higher transmission speeds.
C
14. Software that deals with the routing of packets.
D
15. _________ has more reliability than UDP.
E
For Exercises 15 -20, match the protocol or standard with what it specifies or defines.
© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
A. SMTP
B. FTP
C. Telnet
D. HTTP
E. MIME type
For Exercises 21-28, mark the answers true and false as follows:
A. True
B. False
21. A P2P network establishes a single portal through which communication is managed.
B
22. A port is a numeric designation that corresponds to a particular high-level protocol.
A
23. A firewall protects a local-area network from physical damage.
B (it protects it from inappropriate access)
24. Each company can establish its own access control policy.
A
25. A TV cable company cannot also be an Internet service provider.
B
26. Some top-level domains are based on the country in which the registering organization is based.
A
27. Hundreds of new top-level domains have recently been added to the domain name system.
A
28. Two organizations cannot have the same name for a computer.
B
© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
frequency. Because DSL and voice are at different frequencies, they can share the same
phone line.
45. Why do DSL and cable modem suppliers use technology that devotes more speed to down
loads than to upload?
Users spend more time asking for data to be sent to their machines (downloads) than they do
sending data to other machines (uploads). Therefore, DSL and cable modem suppliers
maximize the speed on the most common task.
46. Messages sent across the Internet are divided into packets. What is a packet and why are
messages divided into them?
A packet is a unit of data sent across a network. It is more efficient to send uniform sized
messages across the Internet.
47. Explain the term packet switching.
Packets that make up a message are sent individually over the Internet and may take different
routes to their destination. When all the packets arrive at the destination they are reassembled
into the original message.
48. What is a router?
A router is a network device that directs packets between networks towards their final
destinations.
49. What is a repeater?
A repeater is a network device that strengthens and propagates a signal along a lone
communication line.
50. What problems arise due to packet switching?
Because packets may take different routes, they may not arrive in order. Thus, they must be
reassembled into the right order at the receiving end.
51. What are proprietary systems and why do they cause a problem?
A proprietary system is one designed and built by a commercial vendor that keeps the
technologies used private. If a network's software is a proprietary system, then it can only
communicate with other networks that use the same software.
52. What do we call the ability of software and hardware on multiple platforms from multiple
commercial vendors to communicate?
Interoperability
53. What is an open system and how does it foster interoperability?
An open system is a system based on a common model of network architecture adhering to an
accompanying suite of protocols. If all commercial vendors adhere to a common logical
architecture and protocols, then networks on multiple platforms from multiple vendors can
communicate.
54. Compare and contrast proprietary and open systems.
Both proprietary and open systems can be used to create networks. Networks using the same
proprietary systems can communicate with each other, but not with networks that do not use
the same system. Networks using open systems can all communicate.
55. What is the seven-layer logical breakdown of network interaction called?
Open Systems Interconnection (OSI) Reference Model
56. What is a protocol stack and why is it layered?
A protocol stack is layers of protocols that build and rely on each other. Protocols are layered
so that new protocols can be developed without abandoning fundamental aspects of lower
levels.
57. What is a firewall, what does it accomplish, and how does it accomplish it?
A firewall is a computer system that protects a network from inappropriate access. A firewall
filters incoming traffic, checking the validity of incoming messages, and perhaps denying
access to messages. For example a LAN might deny any remote access by refusing all traffic
that comes in on port 23 (the port for telnet).
What is a hostname and how is it composed?
A hostname is a unique identification for a specific computer on the Internet made up of
58.
words separated by dots.
© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com
Why was the IPv6 protocol created for IP addresses?
IPv4 is limited in the number of unique computers it could identify, and was used up by 2011.
59.
IPv6 was created as the successor to IPv4, providing many more addresses.
What is the primary difference between the IPv4 and IPv6 protocols?
An IPv6 address is bigger (using 128 bits instead of 32) which, in addition to providing more
60.
addresses, provides additional features that improve the management of network traffic.
61. What is a domain name?
58. A domain name is that part of the hostname that specifies the organization or group to which
the host belongs.
62. What is a top-level domain name?
The last part of a domain name that specifies the type of organization or its country of origin.
63. What is network neutrality?
Network neutrality is the principle that ISPs should deliver data to everyone equally, as fast as
the technology allows.
64. How does the current domain name system try to resolve a hostname?
First a request is sent to a nearby domain name server (a computer that attempts to translate a
hostname into an IP address). If that server cannot resolve the hostname, it sends a request to
another domain name server. If the second server can't resolve the hostname, the request
continues to propagate until the hostname is resolved or the request expires because it took
too much time.
65. What is cloud computing?
Cloud computing is an Internet service through which you can do things such as obtain online
storage, synchronize devices, or access particular resources. The idea is that these services are
somewhere "in the cloud" of the Internet.
66. Compare cloud computing to an email service such as Gmail.
The Gmail email service can be thought of as a particular example of cloud computing. They
provide the service of receiving and storing you email messages, which you can then retrieve
from wherever you are on any device that can access the Internet.
67. What are the four types of cloud computing services?
The four types of cloud computing services are:
public cloud - accessible by any subscriber
private cloud - established for a specific group or organization and limiting access to
that group
community cloud - shared among two or more organizations with similar needs
hybrid cloud - some combination of the above cloud types
© 2016 Jones & Bartlett Learning LLC, an Ascend Learning Company
www.jblearning.com