Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Network Plus 2005 In Depth

.pdf
Скачиваний:
85
Добавлен:
12.02.2015
Размер:
17.39 Mб
Скачать

752 Appendix E ANSWERS TO CHAPTER REVIEW QUESTIONS

Chapter 1

Chapter 3

1.

a

1.

d

2.

d

2.

b

3.

c

3.

a

4.

b

4.

b

5.

d

5.

c

6.

True

6.

True

7.

True

7.

False

8.

False

8.

True

9.

False

9.

True

10.

True

10.

False

11.

Mail services

11.

wavelength

12.

Web server

12.

Overhead

13.

soft skills

13.

Crosstalk

14.

Certification

14.

Shielded twisted-pair, STP

15.

File services

 

manual

 

 

 

 

15.

Fault tolerance

Chapter 2

Chapter 4

1.

b

2.

a

1.

a

 

 

3.

d

2.

c

 

 

4.

c

3.

d

 

 

5.

a

4.

b

 

 

6.

True

5.

c

 

 

7.

False

6.

False

 

 

8.

True

7.

True

 

 

9.

True

8.

False

 

 

10.

False

9.

True

 

 

11.

Connection-oriented

10.

False

 

 

12.

segments

11.

Multicasting

 

 

13.

virtual addresses, logical

12.

subnet mask

 

 

 

addresses

13.

Resolvers

14.

physical layer

14.

Telnet

15.

Presentation

15.

Network Time Protocol, NTP

ANSWERS TO CHAPTER REVIEW QUESTIONS Appendix E 753

Chapter 5

Chapter 7

1.

a

1.

a

2.

b

2.

c

3.

d

3.

b

4.

c

4.

d

5.

a

5.

a

6.

False

6.

False

7.

True

7.

False

8.

False

8.

True

9.

True

9.

True

10.

True

10.

True

11.

jumper

11.

Wide Area Network, WAN

12.

interrupt request, IRQ

12.

X.25

13.

memory range

13.

terminal adapter, TA

14.

loopback plug, loopback adapter

14.

uplink

15.

collision domain

15.

Integrated Services Digital Net-

 

 

 

work, ISDN

Chapter 6

Chapter 8

1.

c

2.

a

1.

c

 

 

3.

d

2.

a

 

 

4.

b

3.

d

 

 

5.

d

4.

b

 

 

6.

False

5.

b

 

 

7.

True

6.

True

 

 

8.

True

7.

True

 

 

9.

False

8.

False

 

 

10.

True

9.

True

 

 

11.

bus

10.

False

 

 

12.

distributed backbone

11.

Mapping

 

 

13.

access method

12.

Administrator

 

 

14.

Switched Ethernet

13.

physical memory

 

 

15.

token passing

14.

Hardware Compatibility List,

 

HCL

 

 

 

 

 

15.

trust relationship

754 Appendix E ANSWERS TO CHAPTER REVIEW QUESTIONS

Chapter 9

Chapter 11

1.

c

1.

b

2.

a

2.

a

3.

d

3.

d

4.

b

4.

c

5.

a

5.

a

6.

True

6.

True

7.

True

7.

True

8.

False

8.

False

9.

True

9.

False

10.

False

10.

True

11.

kernel

11.

ANDing

12.

kernel module

12.

intranet

13.

HFS+

13.

whois

14.

command interpreter

14.

traceroute, tracert

15.

pipeline

15.

ifconfig

Chapter 10

Chapter 12

1.

b

1.

a

2.

a

2.

c

3.

d

3.

d

4.

c

4.

c

5.

a

5.

b

6.

True

6.

True

7.

True

7.

True

8.

False

8.

False

9.

True

9.

True

10.

False

10.

False

11.

kernel

11.

supported services list

12.

Netware loadable modules,

12.

change management system

 

NLMs

13.

crossover

 

 

13.

X Server

14.

tone locator

 

 

14.

DOS

15.

ohms

 

 

15.

eDirectory

 

 

ANSWERS TO CHAPTER REVIEW QUESTIONS Appendix E 755

Chapter 13

Chapter 15

1.

d

1.

b

2.

b

2.

d

3.

a

3.

a

4.

c

4.

c

5.

a

5.

d

6.

True

6.

True

7.

False

7.

False

8.

True

8.

True

9.

True

9.

False

10.

False

10.

True

11.

Network

11.

milestone

12.

brownout

12.

feasibility study

13.

hot swappable

13.

Contingency planning

14.

Clustering

14.

backleveling

15.

Disaster recovery

15.

Project management

Chapter 14

1.c

2.a

3.d

4.b

5.a

6.True

7.False

8.False

9.True

10.True

11.denial-of-service attack

12.security policy

13.packet-filtering firewall

14.private key, symmetric

15.IPSec, Internet Protocol Security

This page intentionally left blank

Glossary

1 gigabit per second (Gbps)—1,000,000,000 bits per second.

1 kilobit per second (Kbps)—1000 bits per second.

1 megabit per second (Mbps)—1,000,000 bits per second.

1 terabit per second (Tbps)—1,000,000,000,000 bits per second.

1000BASE-CX—A Physical layer standard for achieving 1-Gbps throughput over twinaxial copper wire. 1000BASE-CX segments are limited to 25 meters, and are useful mainly to connect devices such as servers or switches.

1000BASE-LX—A Physical layer standard for networks that specifies 1-Gbps transmission over fiberoptic cable using baseband transmission. 1000BASE-LX can run on either single-mode or multimode fiber. The “LX” represents its reliance on “long wavelengths” of 1300 nanometers. 1000BASE-LX can extend to 5000-meter segment lengths using single-mode, fiber-optic cable. 1000BASE-LX networks can use one repeater between segments.

1000BASE-SX—A Physical layer standard for networks that specifies 1-Gbps transmission over fiberoptic cable using baseband transmission. 1000BASE-SX runs on multimode fiber. Its maximum segment length is 550 meters. The “SX” represents its reliance on “short wavelengths” of 850 nanometers. 1000BASE-SX can use one repeater.

1000BASE-T—A Physical layer standard for achieving 1 Gbps over UTP. 1000BASE-T achieves its higher throughput by using all four pairs of wires in a CAT 5 or higher twisted-pair cable to both transmit and receive signals. 1000BASE-T also uses a different data encoding scheme than that used by other UTP Physical layer specifications.

100BASE-FX—A Physical layer standard for networks that specifies baseband transmission, multimode fiber cabling, and 100-Mbps throughput. 100BASE-FX networks have a maximum segment length of 2000 meters. 100BASE-FX may also be called Fast Ethernet.

100BASE-T—A Physical layer standard for networks that specifies baseband transmission, twisted-pair cabling, and 100-Mbps throughput. 100BASE-T networks have a maximum segment length of 100 meters and use the star topology. 100BASE-T is also known as Fast Ethernet.

100BASE-TX—A type of 100BASE-T network that uses two wire pairs in a twisted-pair cable, but uses faster signaling to achieve 100-Mbps throughput. It is capable of full-duplex transmission and requires CAT 5 or higher twisted-pair media.

10BASE-2—See Thinnet.

10BASE-5—See Thicknet.

10BASE-F—A Physical layer standard for achieving 10-Mbps throughput over multimode fiber-optic cable. Three different kinds of 10BASE-F exist. All require two strands of multimode fiber, in which one strand is used for data transmission and one strand is used for reception, making 10BASE-F a full-duplex technology.

758 Glossary

10BASE-FL—The most popular version of the 10BASE-F standard. 10BASE-FL is designed to connect workstations to a LAN or two repeaters and can take advantage of fiber-optic repeating technology to reach its maximum segment length of 2000 meters. 10BASE-FL makes use of the star topology, with its repeaters connected through a bus.

10BASE-T—A Physical layer standard for networks that specifies baseband transmission, twisted-pair media, and 10-Mbps throughput. 10BASE-T networks have a maximum segment length of 100 meters and rely on a star topology.

10GBASE-ER—A Physical layer standard for achieving 10-Gbps data transmission over _single-mode, fiber-optic cable. In 10GBASE-ER the “ER” stands for “extended reach.” This standard specifies a star topology and segment lengths up to 40 kilometers.

10GBASE-LR—A Physical layer standard for achieving 10-Gbps data transmission over _single-mode, fiber-optic cable using wavelengths of 1310 nanometers. In 10GBASE-LR, the “LR” stands for “long reach.” This standard specifies a star topology and segment lengths up to 10 kilometers.

10GBASE-SR—A Physical layer standard for achieving 10-Gbps data transmission over multimode fiber using wavelengths of 850 nanometers. The maximum segment length for 10GBASE-SR can reach up to 300 meters, depending on the fiber core diameter and modal bandwidth used.

2.4-GHz band—The range of radiofrequencies from 2.4- to 2.4835-GHz. The 2.4-GHz band is often used for wireless network transmissions.

3DES—See Triple DES.

3-tier architecture—A client/server environment that uses middleware to translate requests between the client and server.

5-4-3 rule—A guideline for 10-Mbps Ethernet networks stating that between two communicating nodes, the network cannot contain more than five network segments connected by four repeating devices, and no more than three of the segments may be populated.

802.11a—The IEEE standard for a wireless networking technique that uses multiple frequency bands in the 5-GHz frequency range and provides a theoretical maximum throughput of 54 Mbps. 802.11a’s high throughput, compared with 802.11b, is attributable to its use of higher frequencies, its unique method of encoding data, and more available bandwidth.

802.11b—The IEEE standard for a wireless networking technique that uses DSSS (direct sequence spread spectrum) signaling in the 2.4–2.4835-GHz frequency range (also called the 2.4-GHz band). 802.11b separates the 2.4-GHz band into 14 overlapping 22-MHz channels and provides a theoretical maximum of 11-Mbps throughput. 802.11b is also known as Wi-Fi.

802.11g—The IEEE standard for a wireless networking technique designed to be compatible with 802.11b while using different encoding techniques that allow it to reach a theoretical maximum capacity of 54 Mbps. 802.11g, like 802.11b, uses the 2.4-GHz frequency band.

802.11i—The IEEE standard for wireless network encryption and authentication that uses the EAP authentication method, strong encryption, and dynamically assigned keys, which are different for every transmission. 802.11i specifies AES encryption and weaves a key into each packet.

802.11—The IEEE standard for wireless networking.

802.15.1—The IEEE standard for wireless personal area network (WPAN) technology, including Bluetooth.

Glossary 759

802.16a—An IEEE standard for wireless MANs that specifies the use of the frequency ranges between 2 and 11 GHz. In IEEE 802.16a, antennas do not require a line-of-sight path between them and can exchange signals with multiple stations at once. 802.16a is capable of achieving up to 70-Mbps throughput and its range is 50 kilometers (or approximately 30 miles).

802.16—An IEEE standard for wireless MANs that specifies the use of frequency ranges between 10 and 66 GHz and requires line-of-sight paths between antennas. 802.16 antennas can cover 50 kilometers (or approximately 30 miles) and connections can achieve a maximum throughput of 70 Mbps.

802.2—The IEEE standard for error and flow control in data frames.

802.3ab—The IEEE standard that describes 1000BASE-T, a 1-Gigabit Ethernet technology that runs over four pairs of CAT 5 or better cable.

802.3ae—The IEEE standard that describes 10-Gigabit Ethernet technologies, including 10GBASESR, 10GBASE-ER, and 10GBASE-LR.

802.3af—The IEEE standard that specifies a way of supplying electrical power over Ethernet (PoE). 802.3af requires CAT 5 or better UTP or STP cabling and uses power sourcing equipment to supply current over a wire pair to powered devices. PoE is compatible with existing 10BASE-T, 100BASE-TX, and 1000BASE-T implementations.

802.3—The IEEE standard for Ethernet networking devices and data handling.

802.3u—The IEEE standard that describes Fast Ethernet technologies, including 100BASE-TX, 100BASE-T4, and 100BASE-FX.

802.3z—The IEEE standard that describes 1000Base (or 1-Gigabit) Ethernet technologies, including 1000BASE-LX, 1000BASE-SX, and 1000BASE-CX.

802.5—The IEEE standard for Token Ring networking devices and data handling.

A+—The professional certification established by CompTIA that verifies knowledge about PC operation, repair, and management.

access method—A network’s method of controlling how nodes access the communications channel. CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the access method specified in the IEEE 802.3 (Ethernet) standard. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is the access method specified by IEEE 802.11 (wireless LAN) standards.

access point—See AP.

access server—See remote access server.

account—A record of a user that contains all of her properties, including rights to resources, password, user name, and so on.

ACK (acknowledgment)—A response generated at the Transport layer of the OSI Model that confirms to a sender that its frame was received. The ACK packet is the third of three in the three-step process of establishing a connection.

acknowledgment—See ACK.

Active Directory—The Windows Server 2003 method for organizing and managing objects associated with the network.

760 Glossary

active monitor—On a Token Ring network, the workstation that maintains timing for token passing, monitors token and frame transmission, detects lost tokens, and corrects problems when a timing error or other disruption occurs. Only one workstation on the ring can act as the active monitor at any given time.

active scanning—A method used by wireless stations to detect the presence of an access point. In active scanning, the station issues a probe to each channel in its frequency range and waits for the access point to respond.

active topology—A topology in which each workstation participates in transmitting data over the network.

ad hoc—A type of wireless LAN in which stations communicate directly with each other (rather than using an access point).

address—A number that uniquely identifies each workstation and device on a network. Without unique addresses, computers on the network could not reliably communicate.

address management—The process of centrally administering a finite number of network addresses for an entire LAN. Usually this task can be accomplished without touching the client workstations.

Address Resolution Protocol—See ARP.

address resource record—A type of DNS data record that maps the IP address of an Internet-connected device to its domain name.

addressing—The scheme for assigning a unique identifying number to every workstation and device on the network. The type of addressing used on a network depends on its protocols and network operating system.

Administrator—A user account that has unlimited privileges to resources and objects managed by a server or domain. The Administrator account is created during NOS installation.

Advanced Encryption Standard—See AES.

AES (Advanced Encryption Standard)—A private key encryption algorithm that weaves keys of 128, 160, 192, or 256 bits through data multiple times. The algorithm used in the most popular form of AES is known as Rijndael. AES has replaced DES in situations such as military communications, which require the highest level of security.

AFP (AppleTalk Filing Protocol or Apple File Protocol)—The native file access protocol used by Macintosh computers.

agent—A software routine that collects data about a managed device’s operation and provides it to the network management application running on the console.

AH (authentication header)—In the context of IPSec, a type of encryption that provides authentication of the IP packet’s data payload through public key techniques.

AIX—A proprietary implementation of the UNIX system distributed by IBM.

alias—A nickname for a node’s host name. Aliases can be specified in a local host file.

AM (amplitude modulation)—A modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal.

American National Standards Institute—See ANSI.

Glossary 761

amplifier—A device that boosts, or strengthens, an analog signal.

amplitude—A measure of a signal’s strength.

amplitude modulation—See AM.

analog—A signal that uses variable voltage to create continuous waves, resulting in an inexact transmission.

ANDing—A logical process of combining bits. In ANDing, a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0.

ANSI (American National Standards Institute)—An organization composed of more than 1000 representatives from industry and government who together determine standards for the electronics industry in addition to other fields, such as chemical and nuclear engineering, health and safety, and construction.

anycast address—A type of address specified in IPv6 that represents a group of interfaces, any one of which (and usually the first available of which) can accept a transmission. At this time, anycast addresses are not designed to be assigned to hosts, such as servers or workstations, but rather to routers.

AP (access point)—A device used on wireless LANs that transmits and receives wireless signals to and from multiple nodes and retransmits them to the rest of the network segment. Access points can connect a group of nodes with a network or two networks with each other. They may use directional or omnidirectional antennas.

API (application program interface)—A set of routines that make up part of a software _application.

Apple File Protocol—See AFP.

AppleShare IP—A proprietary network operating system from Apple Computer that offers file, print, Web, DNS, and mail services. AppleShare IP was the predecessor to Mac OS X Server.

AppleTalk—The protocol suite used to interconnect Macintosh computers. Although AppleTalk was originally designed to support peer-to-peer networking among Macintoshes, it can now be routed between network segments and integrated with NetWareor Microsoft-based networks.

AppleTalk Filing Protocol—See AFP.

AppleTalk network number—A unique 16-bit number that identifies the network to which an AppleTalk node is connected.

AppleTalk node ID—A unique 8-bit or 16-bit number that identifies a computer on an AppleTalk network.

AppleTalk zone—A logically defined group of computers on an AppleTalk network. application gateway—See proxy server.

Application layer—The seventh layer of the OSI Model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.

Application layer gateway—See proxy server.

application program interface—See API.

application switch—Another term for a Layer 3 or Layer 4 switch.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]