Preview

Ccna4 Ch 1

Powerful Essays
Open Document
Open Document
1265 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna4 Ch 1
CHAPTER 1
INTRIDUCTION TO WAN

1.1.1 Introducing Wide Area Networks (WANs)
Which statement is true about the differences between a WAN and a LAN? ← WANs generally support higher bandwidth than LANs support. ← A WAN link typically traverses shorter geographic distances than a LAN link traverses. ← A WAN often relies on the services of carriers, such as telephone or cable companies, but a LAN does not. ← All WAN implementations generally use the same Layer 2 protocol but there are many accepted LAN Layer 2 protocols in use.
1.1.3 The Evolving Network Model
Which statement is true of the functionality of the layers in the hierarchical network model? ← The purpose of the access layer is to provide very high bandwidth communications between network devices. ← Most security screening to prevent unauthorized entry to the network happens at the core layer. ← Untrusted external connections are segmented from the rest of the network at all three levels. ← The distribution layer aggregates WAN connections at the edge of the campus.
1.2.1 WAN Technology Overview
At which two layers of the OSI model does a WAN operate? (Choose two.) □ Physical Layer □ Data Link Layer □ Network Layer □ Transport Layer □ Presentation Layer □ Application Layer
1.2.1 WAN Technology Overview
Which three WAN devices can be found in the cloud? (Choose three.) □ ATM switches □ core routers □ CSU/DSU □ Ethernet switches □ Frame Relay switches □ repeaters
1.2.2 WAN Physical Layer Concepts
Which networking device is typically used to concentrate the dial-in and dial-out traffic of multiple users to and from a network? ← core router ← access server ← Frame Relay switch ← ATM switch
1.2.2 WAN Physical Layer Concepts
For digital lines, which device is used to establish the communications link between the customer equipment and the local loop? ← CSU/DSU ← Frame

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Assignment 1

    • 1455 Words
    • 6 Pages

    Access Networks – It is part of the network that connects the individual consumer or business to the telecommunications system. It is basically a way for the client to get telephone communications, internet/data, and video from the telecommunications service providers. It is an…

    • 1455 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    LAN: local area network. Small group, usually home or workplace. MAN: Metropolitan area network. City. PAN: Personal area network. WAN: Wide area network. State or country.…

    • 465 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    College Campus

    • 423 Words
    • 2 Pages

    Numbers of students are expected to be doubled every 4 years. There are 4 departments:…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1230 Chapter 7 Questions

    • 1164 Words
    • 5 Pages

    4. An enterprise network has many routers that connect to both a LAN as well as the WAN. Which of the following statements best describe how routers typically use and think about their WAN connections?…

    • 1164 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    LAN – WAN is where the IT infrastructure links to a wide area network and internet.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The private-public network edge is considered particularly vulnerable to intrusions, because the Internet is a publicly accessible network and falls under the management purview of multiple network operators. For these reasons, the Internet is considered an untrusted network. So are wireless LANs, which-without the proper security measures in place-can be hijacked from outside the corporation when radio signals penetrate interior walls and spill outdoors.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1330 Week 3 exercise

    • 251 Words
    • 2 Pages

    Application – A system of transmission method of which is supported by telecommunications cabling such as 100base-Tx Ethernet or digital voice over IP.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch. 16 Solutions

    • 1258 Words
    • 6 Pages

    5. When using DSL to connect to the Internet, the data transmission shares the cabling with what other technology?…

    • 1258 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    WAN stands for “wide area network” this is on a global scale and can connect up to about 1 million computer networks. The areas covered can be as big as a state or a country.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays

Related Topics