Preview

Ccna4 Ch 1

Powerful Essays
Open Document
Open Document
1265 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna4 Ch 1
CHAPTER 1
INTRIDUCTION TO WAN

1.1.1 Introducing Wide Area Networks (WANs)
Which statement is true about the differences between a WAN and a LAN? ← WANs generally support higher bandwidth than LANs support. ← A WAN link typically traverses shorter geographic distances than a LAN link traverses. ← A WAN often relies on the services of carriers, such as telephone or cable companies, but a LAN does not. ← All WAN implementations generally use the same Layer 2 protocol but there are many accepted LAN Layer 2 protocols in use.
1.1.3 The Evolving Network Model
Which statement is true of the functionality of the layers in the hierarchical network model? ← The purpose of the access layer is to provide very high bandwidth communications between network devices. ← Most security screening to prevent unauthorized entry to the network happens at the core layer. ← Untrusted external connections are segmented from the rest of the network at all three levels. ← The distribution layer aggregates WAN connections at the edge of the campus.
1.2.1 WAN Technology Overview
At which two layers of the OSI model does a WAN operate? (Choose two.) □ Physical Layer □ Data Link Layer □ Network Layer □ Transport Layer □ Presentation Layer □ Application Layer
1.2.1 WAN Technology Overview
Which three WAN devices can be found in the cloud? (Choose three.) □ ATM switches □ core routers □ CSU/DSU □ Ethernet switches □ Frame Relay switches □ repeaters
1.2.2 WAN Physical Layer Concepts
Which networking device is typically used to concentrate the dial-in and dial-out traffic of multiple users to and from a network? ← core router ← access server ← Frame Relay switch ← ATM switch
1.2.2 WAN Physical Layer Concepts
For digital lines, which device is used to establish the communications link between the customer equipment and the local loop? ← CSU/DSU ← Frame

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1230 Chapter 7 Questions

    • 1164 Words
    • 5 Pages

    4. An enterprise network has many routers that connect to both a LAN as well as the WAN. Which of the following statements best describe how routers typically use and think about their WAN connections?…

    • 1164 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    - to provide a means of connecting devices to the network and controlling which ones are allowed.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    There are many different types of network topologies, but the three most common types are Local Area Networks (LAN), Metropolitan Area Networks (MAN), and Wide Area Networks (WAN). The LAN topology is probably the recognized and the most commonly used of the three topologies. The MAN and WAN topologies are used but not nearly as much as the LAN topology is, although the WAN is starting to be used more and more because of the growing population of networks.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The lower nodes can be LANs, making the whole network a WAN; tree networks are a common topology for a WAN.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Nt1310 Assignment 1

    • 1455 Words
    • 6 Pages

    Access Networks – It is part of the network that connects the individual consumer or business to the telecommunications system. It is basically a way for the client to get telephone communications, internet/data, and video from the telecommunications service providers. It is an…

    • 1455 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    5. When using a cable modem to connect to the Internet, the data transmission shares the cabling with what other technology?…

    • 1262 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    WAN stands for “wide area network” this is on a global scale and can connect up to about 1 million computer networks. The areas covered can be as big as a state or a country.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Connection security rules require that network traffic allowed through the firewall use which of the following security mechanism?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays

Related Topics