Guide To Networking Essentials, 7th Edition Solution Manual

Solve textbook problems faster with Guide To Networking Essentials, 7th Edition Solution Manual, a must-have for every student.

Sebastian Lopez
Contributor
4.2
139
9 months ago
Preview (15 of 48 Pages)
100%
Purchase to unlock

Page 1

Guide To Networking Essentials, 7th Edition Solution Manual - Page 1 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 1Solutions-1Chapter1SolutionsReview Questions1.Whichof the following isone ofthe three basic functions a computer performs?(Choose all that apply.)a.Processingc.Inpute.Output2.The __________ executes instructions provided by computer programs.a.CPU3.When a CPU is composed of two or more processors, each one is referred to as a(n)________.b.Core4.Whichof the following is considered long-term storage? (Choose all that apply.)a.Flash drived.Hard drive5.Whichmotherboard component controls data transfers between memory, expansionslots, I/O devices, and the CPU?c.Chipset6.You want to purchase a new high-performance graphics card for your computer.Whichtype of connector should it have?d.PCI-Express7.The time it takes for read/write heads to move to the correct spot on the platter is the____________.b.Seek time8.Whichof the following is a task usually performed by the BIOS? (Choose all thatapply.)a.Perform a POST.d.Begin the boot procedure.9.Place the following steps of the boot procedure in order.a.The OS is loaded into RAM.b.CPU starts.c.OS services are started.d.Power is applied.e.The POST is executed.f.Boot devices are searched.Answer: d, b, e, f, a, c

Page 2

Guide To Networking Essentials, 7th Edition Solution Manual - Page 2 preview image

Loading page image...

Page 3

Guide To Networking Essentials, 7th Edition Solution Manual - Page 3 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 1Solutions-210.Whichof the following is a critical service provided by the OS? (Choose all thatapply.)b.Memory managementd.File system11.An OSs capability to run more than oneapplicationor process at the same time isreferred to which of the following?c.Multitasking12.You have just installed a new NIC in your PC to replace the old one that had startedmalfunctioning. What additional software must beinstalledto allow the OS tocommunicate with the new NIC?b.Device driver13.Whichof the following requests information stored onanothercomputer?b.Network client14.Choose the correct order for the process of a user attempting to access networkresources:1.Network protocol2.Application3.Network client4.NIC driverd.2, 3, 1, 415.TCP/IP is an example ofwhichof the following?d.Network protocol16.In network communication, the ______________ address is used to deliver aframeto the correct computer on the network. (Choose all that apply.)a.MACd.Physical17.A(n) ______________ message is used to determine whether a computer is listeningon the network.b.Ping18.TCP/IP uses _________ to look up a computers IP address, given its name.a.DNS19.The unit of information containing MAC addresses and an error-checking codethats processed by the network interface layer is referred to as a_______________.c.Frame20.Data is processed from the time an application creates it to the time it reaches thenetwork medium. This processincludes adding information such as addresses and iscalled which of the following?b.Encapsulation21.Youre the network administrator for a company that has just expanded from onefloor to two floors of a large building, and the number of workstations you need has

Page 4

Guide To Networking Essentials, 7th Edition Solution Manual - Page 4 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 1Solutions-3doubled from 50 to 100. You're concerned that network performance will suffer ifyou add computers to your existing LAN. In addition, new users will be working in aseparate business unit, and there are reasons to logically separate the two groups ofcomputers. What type of network should you configure?c.Internetwork22.Whichof the following best describes a client?b.A computers primary role in the network is to run user applications and access networkresources.23.You work for a small company with four users who need to share information ontheir computers. The budget is tight, so the network must be as inexpensive aspossible. What type of network should you install?b.Peer-to-peer network24.Which of the following characteristics is associated with a peer-to-peer network?(Choose all that apply.)a.Decentralized data storageb.Inexpensivec.User-managed resources25.A device interconnects five computers and a printer in a single office so that userscan share the printer. This configuration is an example of which of the following?a.LAN26.At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) haveLANs connected via the local phone company. This configuration is an example ofwhich of the following? (Choose the best answer.)a.MAN27.You have installedWindows Server 2008on a new server and want to centralize userlogons and security policies. What type of software should you install and configureon this server?d.Directory services28.Peer-to-peer networks arent suitable in which of the following situations?a.Tight security is required.29.Whichof the following best describes a storage area network?b.Uses high-speed networking technologies to give servers fast access to large amounts ofdisk storage30.Why might Windows 7 or Windows Vista require more RAM or disk space thanWindows Server 2008?d.They support a graphics-intensive user interface.Hands-OnProjectsHands-OnProject 1-1Step 2:Steps of the boot procedure:1.Powerisapplied to the motherboard.

Page 5

Guide To Networking Essentials, 7th Edition Solution Manual - Page 5 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 1Solutions-42.CPU starts.3.CPU carries out BIOS startup routines, include the POST.Step 5:Final steps of the boot procedure:4.Boot devices are searched for an OS.5.The OS is loaded into RAM.6.OS services are started.Hands-On Project1-3Step 5:Word-processing program:User applicationNIC displayed in the Connect using text box:Network interfaceClient for Microsoft Networks:Network softwareFile and Printer Sharing for Microsoft Networks:Network softwareInternet Protocol Version 4:Network protocolHands-On Project1-5Step 2:workgroup, peer-to-peerHands-On Project1-6Step 10:File sharing, peer-to-peerCaseProjectsCaseProject1-1A server-based network is the best choice. A peer-to-peer network might work for now,butwhen new employees are hired, a peer-to-peer network would be too difficult to manage. Thekey isthateasy backup and centralized storage for files point to a server-based network.Case Project1-2Becauseemployees must be able to control access to their own resources, a peer-to-peermodel works best.Supplies will likely include NICs, cabling, and a switch.Students shouldstate theyneed to configure file shares and possibly create user accounts on the computers toallow access by other users.Theymightalso need to configure IP address settings,althoughself-configuring addresses could be used.Case Project1-3An internetwork is called for becauseLANs in the same buildingare being connected.Arouter isprobablyneededforcommunication between LANs on the two floors.Case Project 1-4Apersonal area network(PAN)Case Project 1-5

Page 6

Guide To Networking Essentials, 7th Edition Solution Manual - Page 6 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 1Solutions-5Answers will vary.

Page 7

Guide To Networking Essentials, 7th Edition Solution Manual - Page 7 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN1111312524Ch. 2Solutions-1Chapter 2 SolutionsReview Questions1.Whichof the following is a limitation of early networks that used a daisy-chain method ofconnecting computers? (Choose all that apply.)a.Total number of computers that could be connectedc.Cable length2.Whichof the following is true of a repeater?c.Receives bit signals and strengthens them3.Whichof the following is true of a hub? (Choose all that apply.)b.Transmits regenerated signals to all connected portsc.Usually has four or more ports4.Whichof the following is the unit of measurement bywhicha hub's bandwidth is usuallyspecified?b.Bits per second5.Whichof the following describes how devices connected to a hub use the speed atwhichthehub can transmit data?c.Bandwidth sharing6.Whichof the following is a likely indicator light on a hub? (Choose all that apply.)b.Link statusc.Connection speedd.Activity7.Whichof the following describes how devices connected to a switch use the speed atwhichthe switch can transmit data?a.Dedicated bandwidth8.What does a switch use to create its switching table?d.Source MAC addresses9.What purpose does the timestamp serve in a switching table?c.Tells the switch when to delete an entry10.What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100Mbps switch?b.Full-duplex mode11.To whichdevice is a wireless access point most similar in how it operates?a.Hub12.Whats the purpose of an RTS signal in wireless networking?c.It allows a client to notify the AP that it's ready to send data.13.Whichof the following is a common operational speed of a wireless network?d.11 Mbps

Page 8

Guide To Networking Essentials, 7th Edition Solution Manual - Page 8 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN1111312524Ch. 2Solutions-214.Whichof the following is a task performed by a NIC and its driver? (Choose all that apply.)a.Provides a connection to the network mediumc.Receives packets from the network protocol and creates framese.Adds error-checking data to the frame15.Whichof the following best describes a MAC address?b.Two 24-bit numbers, inwhichone is the OUI16.Underwhichcircumstances does a NIC allow inbound communications to pass through theinterface? (Choose all that apply.)b.The destination MAC address matches the built-in MAC address.c.The destination MAC address is all binary 1s.17.How does a protocol analyzer capture all frames?c.It configures the NIC to operate in promiscuous mode.18.In Windows 7,whichof the following displays information about currently installed NICs?a.Network Connections19.Whichof the following is the purpose of an SSID?d.Identifies a wireless network20.Whichof the following describe the function of routers? (Choose all that apply.)b.Connect LANSd.Work with packets and IP addresses21.What information is found in a routing table?b.Network addresses and interfaces22.You currently have 15 switches with an average of 20 stations connected to each switch. Theswitches are connected to oneanotherso that all 300 computers can communicate with eachother in a single LAN. You have been detecting a high percentage of broadcast frames on thisLAN. You think the number of broadcasts might be having an impact on networkperformance. What should you do?c.Reorganize the network into smaller groups and connect each group to a router.23.Review the routing table in Figure 2-29. Based on this figure, where will the router send apacket with the source network number 1.0 and the destination network number 3.0?c.WAN B24.If a router receives a packet with a destination network address unknown to the router, whatwill the router do?b.Discard the packet.25.Which of the following is true about routers? (Choose all that apply.)b.Use default routes for unknown network addressesc.Forward unicastsChallenge LabsChallenge Lab 2-1

Page 9

Guide To Networking Essentials, 7th Edition Solution Manual - Page 9 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN1111312524Ch. 2Solutions-3What filter options (if any) did you configurein Wireshark?Students should have created an ICMP filter for Wireshark.What commands did you use to generate packets on the network?Students should ping each other to create traffic.What IP addresses did you attempt to communicate with?Students should use IP addresses so that some ping traffic is directed to their computers and other pings aregoing to other computers on the network.What was your result? Is your computer attached to a hub or switch? Why did you come to thisconclusion?If all traffic was captured by Wireshark,including ping packets that werent sent tothe students computer,a hub is being used. If only packets addressed to the student’s computer were captured, a switch is beingused.Challenge Lab 2-2What type of packets doesTrace Routeuse?Tracert in Windows uses ICMP packets; some Trace Route programs use UDP packets.What is the response each router sends back to your computer?Each router sends aTTL expiredmessage.How does your computer get a response from each router between your computer and the destination?The TTL starts with a value of 1 and is incremented by 1 for each set of packets that’s sent. The packet’sTTL is decremented by each router encountering it. When the TTL reaches 0, the router that has the packetsends a "TTL expired" message back to the sending machine. In this way, the first set of packets withTTL=1 get to the first router,whichdecrements the TTL to 0 and sends aTTL expiredmessage backtothesender. The second set of packets has a TTL of 2, so it gets to the second router before expiring and soon, until the destination device is reached. Chapter 5 covers more on TTL and ICMP.Case ProjectsCase Project2-1Because themainproblem is caused by collisions, replacing some or all hubs with 10/100 Mbps switchesshould solve the problem. Switches would prevent most collisions, and the faster speedwouldalso helpwith overall network response times. In addition, a switch can operate in full-duplex mode, allowingmachines to send and receive data at the same time. NICs might have to be upgraded to take advantage ofthe faster speed and full-duplex mode. Cabling might need to be upgraded if it’s not at least Category 5.A router could also be added to divide the LAN into two smaller LANs, but this extra expense might beoverkill to solve theproblem. The problem doesn’t seem to be excessive broadcast traffic, which is one ofthe key problems routers solve. Adding a router to this network wouldn’t be incorrectperhaps justunnecessary.Case Project2-2Because broadcast traffic is a key problem, a router should be configured to divide the LAN into two ormore smaller LANs. In addition, the routermust be configuredcorrectly with IP addresses andtheworkstationsconfiguredwith default gateways. Also, the workstations and servers on each IP network needto be configured with IP addresses suitable for the network they’re on.Chapter 5 covers moreonIPaddressing.

Page 10

Guide To Networking Essentials, 7th Edition Solution Manual - Page 10 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN1111312524Ch. 2Solutions-4Case Project2-3Answers will vary.Students should write a two-to three-sentence description of each term.

Page 11

Guide To Networking Essentials, 7th Edition Solution Manual - Page 11 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 3Solutions-1Chapter3SolutionsReview Questions1.Whichof the following describes the arrangement of network cabling betweendevices?c. Physical topology2.Whichof the following is an advantage of a star topology? (Choose all that apply.)a. Allows faster technologies than a bus doesc. Centralized monitoring of network traffic3.Whichof the following is an example of a technology using a physical ringtopology?b. FDDI4.Whichtechnology is likely to be implemented as a point-to-point physical topology?d. Wireless bridge5.Whichof the following describes a hub-based Ethernet network?b. Logical bus6.Whichof the following is a characteristic of a logical ring topology? (Choose all thatapply.)b. One technology uses anMAU.c. It’s used by FDDI.d. Some technologies use a token.7.Whichbest describes a typical wireless LAN?c. Logical bus topology8.Whichof the following is a characteristic of a switched logical topology? (Choose allthat apply.)b. Creates dynamic connectionsd. Uses a physical star topology9.Whichof the following is a characteristic of unshielded twisted-pair cabling?(Choose all that apply.)c. Has a distance limitation of 100 metersd. Susceptible to electrical interference10.Whichof the following is a characteristic of fiber-optic cabling? (Choose all thatapply.)a. Can be used in electrically noisy environmentsc. Carries data over longer distances than UTP does11.Whichtopology most likely uses coaxial cabling?c. Physical bus12.Whichof the following is true of a MAC address?

Page 12

Guide To Networking Essentials, 7th Edition Solution Manual - Page 12 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 3Solutions-2c. A destination address of 12 hexadecimal Fs is a broadcast.13.Whichof the following is the most commonly used Ethernet frame type?a. Ethernet II14.Whichof the following is a field of the most common Ethernet frame type? (Chooseall that apply.)b. FCSc. Destination MAC Addressd. Data15.Whichaccess method uses alisten before sendingstrategy?b. CSMA/CD16.Whichof the following is true about full-duplex Ethernet? (Choose all that apply.)b. Collision detection is turned off.c. It’s possible only with switches.17.Which of the following is defined by the extent to which signals in an Ethernet bustopology network are propagated?b. Collision domain18.Whichof the following is considered a property of Ethernet? (Choose all that apply.)a. Scalableb. Best-effort delivery system19.Whichof the following is true of IEEE 802.3an?d. Operates only in full-duplex mode20.Whichof the following is a feature of 100BaseFX? (Choose all that apply.)a. Often used as backbone cablingd. Uses two strands of fiber21.WhichWi-Fi standard can provide the highest bandwidth?c. 802.11n22.Which of the following is true about infrastructure mode in wireless networks?(Choose all that apply.)b. Uses a central deviced. Most like a logical bus and physical star23.How many channels can be used on an 802.11b network in North America?c. 1124.Whichmedia access method does Wi-Fi use?d. CSMA/CA25.Which of the following is true about the token ring technology? (Choose all thatapply.)b. All computers have equal access to the media.d. Only the computer with the token can transmit data.

Page 13

Guide To Networking Essentials, 7th Edition Solution Manual - Page 13 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 3Solutions-3Challenge LabsChallenge Lab3-1Example:What type of device are the computers attached to?The computers are attached to alogical bus topology device,whichis a hub.What type of device is at the center of the extended star?The center of the extended starshould be a switch because each switch port makes a collision domain.How many collision domains are in this network?There's one collision domain for eachconnected switch port. In the sample drawing, there are four collision domains.Challenge Lab3-2Which device in your extended star did you connect the AP to and why? To provide thebest access for your wireless devices, the AP should be connected to the switch in the centerof the extended star.Which wireless mode are you using: ad hoc or infrastructure? Because youre using anAP or wireless router, youre using infrastructure mode.What logical and physical topology does adding wireless bring to this network? Thelogical topology is a bus, and the physical topology is a star.Challenge Lab3-3Approximately how many wireless networks did inSSIDer find? Answers will vary.Which wireless channels are the most heavily used? Answers will vary.If you were to set up a new wireless LAN based on what inSSIDer found, what channelwould you use for the network? Answers will vary but should correlate withtheanswertoQuestion2,in which studentsshould choose one of the less heavily used channels.Case ProjectsCase Project3-1What changes in equipment are required to bring this company’s network up to date tosolve the shared-bandwidth problem?A switch, possibly working at a faster rate, such as 100Mbps or 1 Gbps.

Page 14

Guide To Networking Essentials, 7th Edition Solution Manual - Page 14 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN 1111312524Ch. 3Solutions-4What topology and which type of device can be used in the manufacturing area to solvethe cabling difficulties?Use a wirelessAPin a star topology, and equip computers withwireless NICs, assuming there’snot substantial radio frequency interferencetointerfere withwireless signals.Case Project3-2What type of topology should be used in this network?An extended star should be used,with a switch as the central device.Will the network be peer to peer or server based?The discussion of EBiz.com’srequirements mentions five existing servers, without requiring the introduction of newservers, so this implementation obviously involves a server-based network.How many computers will be attached to the network?Counting the servers, 255computers (5 existing servers, 250 employee workstations).What kind of networking device is easiest to reconfigure? What kind offers the bestaccess to the network medium’s bandwidth between pairs of devices?These questions are adead giveaway that the required solution must be built around a switch for the overallnetwork.Case Project3-3Will the network be peer to peer or server based?The discussion of ENorm, Inc.’srequirements mentions access to two separate centralized databases, so this network must beserver based.How many computers will be attached to the network?Counting the servers, andassuming all 20 workstations are attached in each factory floor work cell, a total of 92computers (2 servers, 50 front-office employee workstations, and 40 factory floor employeeworkstations).What topology works best for the offices, given the availability of wiring closets? Whattopology works best for the factory floor, given its need for constant reconfiguration?Theavailability of wiring closets for office workstations indicates that a physical star topologywill work (the most commonly used in that kind of office situation); the need for constantreconfiguration on the factory floor indicates that a flexible solution is required. Normally,this requirement dictates wireless or bus topology solutions. Although a physical bus topologycan be flexible, it’s not nearly as flexible as a wireless topology, and physical bus topologiesare obsolete. Wireless is probably the best way to go, assuming the manufacturing spacedoesn’t use devices that emit radio frequency interference, such as microwave ovens, cordlesshandsets, and so forth.

Page 15

Guide To Networking Essentials, 7th Edition Solution Manual - Page 15 preview image

Loading page image...

Guide to Networking Essentials, 6th ed., ISBN1111312524Ch. 4Solutions-1Chapter4SolutionsReview Questions1.Which of the following is a common characteristic of a networking medium?(Choose all that apply.)a. Bandwidth ratingb. Interference susceptibilityd. Maximum segment length2.Which of the following types of fiber-optic connectors provides high density andrequires only one connector for two cables?c. MT-RJ3.Which of the following conditions requires cables not to exceed a recommendedmaximum length?d. Attenuation4.Whichof the following is the process for representing bit signals on the medium?b. Encoding5.Whathappens to signals as they travel the length of the medium?c. They attenuate.6.Whichof the following is UTP susceptible to? (Choose all that apply.)a. EMIb. Crosstalk7.The space between a false ceiling and the true ceiling where heating and cooling aircirculates is called the ______________.d. Plenum8.What type of connector is used most commonly with TP network wiring?b. RJ-459.9.You have been hired to install a network at a large government agency thatwants to reduce the likelihood of electronic eavesdropping on its network. What typeof cable is most resistant to eavesdropping?d. Fiber optic10.Whichof the following is a characteristic of unshielded twisted-pair cable? (Chooseall that apply.)c. Has a distance limitation of 100 metersd. Is susceptible to electrical interference11.Whichof the following is a characteristic of fiber-optic cabling? (Choose all thatapply.)a. Can be used in electrically noisy environmentsc. Carries data over longer distances than UTP
Preview Mode

This document has 48 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Related Documents

View all