- •1 Living in a Network-Centric World
- •1.0 Chapter Introduction
- •1.0.1 Chapter Introduction Page 1:
- •1.1 Communicating in a Network-Centric World
- •1.1.1 Networks Supporting the Way We Live Page 1:
- •1.1.2 Examples of Today's Popular Communication Tools Page 1:
- •Instant Messaging
- •1.1.3 Networks Supporting the Way We Learn Page 1:
- •1.1.4 Networks Supporting the Way We Work Page 1:
- •1.1.5 Networks Supporting the Way We Play Page 1:
- •1.2 Communication - An Essential Part of Our Lives
- •1.2.1 What is Communication? Page 1:
- •1.2.2 Quality of Communications Page 1:
- •Internal Factors
- •1.3 The Network as a Platform
- •1.3.1 Communicating over Networks Page 1:
- •1.3.2 The Elements of a Network Page 1:
- •1.3.3 Converged Networks Page 1:
- •Intelligent Information Networks
- •1.4 The Architecture of the Internet
- •1.4.1 The Network Architecture Page 1:
- •1.4.2 A Fault Tolerant Network Architecture Page 1:
- •1.4.3 A Scalable Network Architecture Page 1:
- •1.4.4 Providing Quality of Service Page 1:
- •1.4.5 Providing Network Security Page 1:
- •1.5 Trends in Networking
- •1.5.1 Where Is It All Going? Page 1:
- •Increased Availability of Services
- •1.5.2 Networking Career Opportunities Page 1:
- •1.6 Chapter Labs
- •1.6.1 Using Collaboration Tools - irc and im Page 1:
- •1.6.2 Using Collaboration Tools - Wikis and Web Logs Page 1:
- •1.7 Summary
- •1.7.1 Summary and Review Page 1:
- •1.8 Chapter Quiz
- •1.8.1 Chapter Quiz Page 1:
1.8 Chapter Quiz
1.8.1 Chapter Quiz Page 1:
1.8.1 - Chapter Quiz 1. Which form of communication is a real-time, text-based communication type used between two or more people who use mostly text to communicate with each other? A. Weblogs B. Wikis C. Instant messaging D. Podcasting E. Collaboration tools 2. Which type of network provides customers limited access to corporate data such as inventory, parts lists and orders? A. intranet B. extranet C. internetwork D. Internet 3. What balances the importance of traffic and its characteristics in order to manage data? A. network administration B. network traffic C. Q o S strategy D. network evaluation 4. Which processes occur to network traffic so that quality of service strategies work correctly? (Choose two.) A. Traffic is classified based on quality of service requirements. B. Priorities are assigned to each classification of application data. C. Web traffic is always assigned to a high priority queue for processing. D. Digital movies are always assigned to the high-priority queue for processing. E. E-mail traffic is always assigned to the low priority queue. 5. What are two components of network architecture? (Choose two.) A. people that comprise the human network. B. programmed services and protocols that move the messages across the network. C. data transferred across the network. D. technologies that support network communications. E. corporations that operate and maintain the data network. 6. For which three reasons were circuit-switched, connection-oriented technologies rejected when the Internet was being developed? (Choose three.) A. Circuit-switched technologies required that a single message be broken up into multiple message blocks that contain addressing information. B. Early circuit-switched networks did not automatically establish alternative circuits in the event of circuit failure. C. Circuit-switched technologies required that an open circuit between network endpoints be established, even if data was not actively being transferred between locations. D. The quality and consistency of messages transmitted across a connection-oriented, circuit-switched network could not be guaranteed. E. The establishment of multiple, simultaneous open circuits for fault tolerance was costly. 7. For which three reasons was a packet-switched, connectionless data communications technology used when developing the Internet? (Choose three.) A. It can rapidly adapt to the loss of data transmission facilities. B. It efficiently utilizes the network infrastructure to transfer data. C. Data packets can travel multiple paths through the network simultaneously. D. It allows for billing of network use by the amount of time a connection is established. E. It requires that a data circuit between the source and destination be established before the data can be transferred. 8. What is the role of Q o S in a converged network? A. Ensures that all traffic above available bandwidth levels is dropped. B. Establishes delivery priorities for different communication types in a network. C. Determines precise priorities for all network communication. D. Allows unused bandwidth to be shared by other organizations within the network. 9. Match the characteristics of a network architecture with their definitions (Not all options are used.) Characteristics: Convergence Scalability Security Fault tolerance Quality of service Definitions: Limits the impact of hardware or software failures and provides failure recovery mechanisms. Supports expansion of the network infrastructure to support new users and applications. Provides a level of consistent and uninterrupted data delivery to support expectations of users. Protects confidential and business critical information from theft or alteration. 10. Network security threats can be classified as relating to either network infrastructure security or content security. Classify the security threats according to the appropriate category. Security threats: A custodian unplugs an essential network device. A disgruntled employee alters information in a customer database. Builders accidentally cut a network cable while digging. A competitor accesses sensitive information through an unsecured wireless network. A secretary sends confidential information in reply to an e-mail that falsely appears to come from her boss. A hacker connects to a network device and changes settings in its management software. Categories: Network infrastructure security Content security