23 Jul WHAT INFORMATION COULD CLAIRE LEARN ABOUT INDIVIDUAL ACCESS POINTS?
Please answer the quetions below I have been ill and now I am 3 weeks behind. I cannot drop this Show more Hi Please answer the quetions below I have been ill and now I am 3 weeks behind. I cannot drop this class because it will effect my enrollment status. I have to make up 3 test and do will not have time to focus on the questions below. I need this complete by tomorrow. 1. a) Why do you think wireless is such a big concern today in networking and security? (In this book do you think questions require you to go beyond what is in the text. You may not be able to answer them perfectly but try hard because they are good learning opportunities.) [1-4] b) Distinguish between cloud data storage and synchronization on the one hand and cloud software service on the other. [2-4] c) What do you think are the advantages of each? [2-4] d) What do you think are their disadvantages? [2-4] e) Why do you think the bring your own device (BYOD) revolution has made networking more difficult? List several issues. [1-4] 2. Go to YouTube and watch A Day Made of Glass by the Corning Corporation. List new ways of displaying information shown in the video. [No Page Numbers] 3. a) What information could Claire learn about individual access points? [5-6] b) Distinguish between SSIDs and BSSIDs. [5] c) What is a rogue access point? [6] d) Why do you think rogue access points are dangerous? [6] e) Why is centralized wireless management highly desirable compared to management by walking around as Claire does today? [6] 4. a) List major wireless LAN security issues. [7-9] b) Why is BYOD security so difficult today? [7] 5. Why does this book combine networking and security? [7-8] 6. a) Give the books definition of network. [8] b) What is a networked application? [9] c) What are Web 2.0 applications? [9] d) What are social media applications? [9] e) What is a host? [10] f) Is your laptop PC or desktop PC a host? [9-10] g) Is a smartphone a host? [9-10] h) Why is the network core shown as a cloud? [10] i) Why may the user need to know more about his or her access link than about the network cloud? [10-11] 7. a) Are network speeds usually measured in bits per second or bytes per second? [13] b) How many bits per second (without a metric prefix) is 20 kbps? Use commas. [13] c) How many bits per second (without a metric prefix) is 7 Mbps? Use commas. [13] d) How many bits per second (without a metric prefix) is 320 kbps? Use commas. [13] e) Is the metric prefix for kilo k or K? [13] f) Express 27560 bps with a metric prefix. [13] 8. a) Why is paying for a transmission line by the minute not too bad for voice conversations? [15] b) For what two reasons is paying for a transmission line by the minute bad for data transmissions? [15] 9. a) In packet switching what does the source host do? [16-17] b) About how long is a packet? [16] c) Why is fragmentation done? [17] d) Where is reassembly done? [16] e) What are the two benefits of multiplexing? [17] f) When a packet switch receives a packet what decision does it make? [17] g) Do packet switches know a packets entire path through a network? [18] h) In Figure 1-14 if Packet Switch A receives a packet addressed to Destination Host W where will it send the packet? 10. a) In Figure 1-15 how many physical links are there between the source host and the destination host along the indicated data link? [20] b) How many data links are there between the source host and the destination host? [20] c) If a packet passes through eight switches between the source and destination hosts how many physical links will there be? (Careful!) [19-20] d) How many data links will there be? [19-20] 11. a) On the ARPANET explain the functions of IMPs. [20] b) How is this like what packet switches do today? [20] c) How is it more than packet switches do today? [20] 12. a) What organization sets Internet standards today? [22] b) What does the IETF call its standards? [21] 13. a) How did Ray Tomlinson extend e-mail? [22] b) How did he change e-mail addresses? [22] 14. What problem did Bob Kahn face? [23] 15. a) What device connects different networks into an internet? [23] b) What is the old name for this device? [23] 16. a) Distinguish between internet with a lowercase i and Internet with an uppercase I. [25] b) Why are many networking concepts duplicated in switched networks and internets? [25] c) What are the two levels of addresses? [25] d) How long are IP addresses? [25-26] e) How are IPv4 addresses usually expressed for humans? [25-26] f) Distinguish between packets and frames. [26] g) A host transmits a packet that travels through 47 networks. How many packets will be there along the route? [26] h) How many frames will be there along the route? [26] i) Are frames carried inside packets? [26] j) Distinguish between switches and routers. [27] k) Distinguish between physical links data links and routes. [27] l) Distinguish between what happens at the internet and transport layers. [27-28] m) Do IPv4 IPv6 or both use dotted decimal notation for human reading? [25-26] n) Why are application layer standards needed? [28] o) List the numbers and names of the five layers. [29] 17. a) What are the roles of the Internet Protocol? [30] b) What are the roles of the Transmission Control Protocol? [30] c) What are the limitations of the User Datagram Protocol? [30] d) Why is UDP used sometimes? [30] e) What is TCP/IP? [31] 18. a) In what sense is January 1 1983 the birthday of the Internet? [31] b) In what sense is it not? [31] 19. a) What was the Acceptable Use Policy in place on the Internet before 1995? [31] b) Why did commercial activities on the Internet become acceptable in 1995? [31] c) What do we call the carriers that provide Internet service? [31] d) Why do they need to be interconnected? [31] e) At what locations do ISPs interconnect? [31] 20. a) Why do servers need static IP addresses? [33] b) What protocol provides a client PC with its dynamic IP address? [33] c) What other configuration information does this protocol provide? [33] d) Why should PCs get their configuration information dynamically instead of manually? [34] 21. a) To send packets to a target host what must the source host know? [34] b) If the source host knows the host name of the target host how can it get the target hosts IP address? [34] 22. Both DHCP servers and DNS servers send a host an IP address. These are the IP addresses of what hosts? 23. a) List the hardware elements in the small home network described in this section. [35-37] b) For wired connections what transmission medium is used? [36] c) What is its connector standard? [36] d) What is the standard for wireless PCs and printers to connect to a wireless access point? [36] e) What are the five hardware functions in a wireless access router? [37] f) Why is the DHCP function necessary? [37] g) Why is NAT necessary? [37] h) What three services does this network provide to the desktop PC and the wireless tablet? [37-38] i) Which devices need to be configured? (List them.) [38] 1. a) Give the definition of network standards that this chapter introduced. [48] b) In this book do standards and protocols mean the same thing? [47] 2. a) What three aspects of message exchanges did we see in this section? [51-52] b) Give an example not involving networking in which the order in which you do things can make a big difference. [No page number] c) Distinguish between syntax and semantics. [51-52] 3. a) Describe the simple message ordering in HTTP. [53] b) In HTTP can the server transmit if it has not received a request message from the client? [53] c) Describe the three-step handshake in TCP connection openings. [53-55] d) What kind of message does the destination host send if it does not receive a segment during a TCP connection? [54-55] e) What kind of message does the destination host send if it receives a segment that has an error during a TCP connection? [54-55] f) Under what conditions will a source host TCP process retransmit a segment? [55] g) Describe the four-step handshake in TCP connection closes. [56] h) After a side initiates the close of a connection by sending a FIN segment will it send any more segments? Explain. [56] i) In Figure 2-7 suppose Host A had already sent A6 before it realized that it would need to resend A5. When it then resent A5 A6 would arrive before A5. How would Host B be able to put the information in the two segments back in order? [55-56] 4. a) What are the three general parts of messages? [57-58] b) What does the data field contain? [58] c) What is the definition of a header? [58] d) Is there always a data field in a message? [58] e) What is the definition of a trailer? [58] f) Are trailers common? [58] g) Distinguish between headers and header fields. [58] h) Distinguish between octets and bytes. [58] 5. a) How long are Ethernet MAC addresses? [60] b) What devices read Ethernet destination MAC addresses? [59] c) If the receiver detects an error on the basis of the value in the Frame Check Sequence field what does it do? [60] d) Ethernet does error detection but not error correction. Is Ethernet a reliable protocol? Explain. [60] 6. a) How many octets long is an IPv4 header if there are no options? (Look at Figure 2-10.) [60-61] b) List the first bit number on each IPv4 header row in Figure 2-10 not including options. Remember that the first bit in Row 1 is Bit 0. [61] c) What is the bit number of the first bit in the destination address field in IPv4? (Remember that the first bit in binary counting is Bit 0.) [61] d) How long are IPv4 addresses? [61] e) What device in an internet besides the destination host reads the destination IP address? [60] f) What is this devices purpose in doing so? [60] g) Is IP reliable or unreliable? Explain. [60] 7. a) Why was TCP designed to be complex? [61] b) Why is it important for networking professionals to understand TCP? [61] c) What are TCP messages called? [61] 8. a) Why are sequence numbers good? [62] b) What are 1-bit fields called? [61] c) If someone says that a flag field is set what does this mean? [61] d) If the ACK bit is set what other field must have a value? [61 63] e) What is the purpose of the acknowledgment number field? [61 63] 9. a) What are the four fields in a UDP header? [43] b) Describe the third. [43] c) Describe the fourth. [43] d) Is UDP reliable? Explain. [43] 10. a) What type of port numbers do servers use for common server programs? [64] b) What type of port numbers do clients use when they communicate with server programs? [64] c) What is the range of port numbers for each type of port? [64] d) How are ephemeral port numbers generated? [64] e) Why are they called ephemeral? [64] 11. a) What is the syntax of a socket? [65] b) In Figure 2-13 when the client transmits to the webserver host what is the source port number? [65] c) What is the destination port number? [65] d) What is the source socket? [65] e) What is the destination socket? [65] f) When the SMTP server transmits to the client host what is the source port number? [65] g) What is the destination port number? [65] h) What is the source socket? [65] i) What is the destination socket? [65] 12. a) Is the application layer standard always HTTP? [65-66] b) Which layer has the most standards? [65] c) At which layer would you find standards for voice over IP? (The answer is not explicitly in this section.) [65-66] d) Are all application layer standards simple like HTTP? [67] e) In HTTP response headers what is the syntax of most lines (which are header fields)? [67] f) In HTTP request and response message how is the end of a field indicated? [67] g) Do HTTP request messages have headers data fields and trailers? h) Do HTTP response messages that deliver files have headers data fields and trailers? [67] 13. a) What is encoding? [68] b) At what layer is encoding done? [68] 14. a) Explain how many bytes it will take to transmit Hello World! without the quotation marks. (The correct total is 12.) [68] b) If you go to a search engine you can easily find converters to represent characters in ASCII. What are the 7-bit ASCII codes for Hello world without the quotation marks? (Hint: H is 1001000.) [68] 15. a) Does binary counting usually begin at 0 or 1? [69] b) Give the binary representations for 13 14 15 16 and 17 by adding one to successive numbers (12 is 1100). [69] 16. a) If a field is N bits long how many alternatives can it represent? [70-71] b) How many alternatives can you represent with a 4-bit field? [70-71] c) For each bit you add to an alternatives field how many additional alternatives can you represent? [70-71] d) How many alternatives can you represent with a 10-bit field? (With 8 bits you can represent 256 alternatives). [70-71] e) If you need to represent 128 alternatives in a field how many bits long must the field be? f) If you need to represent 18 alternatives in a field how many bits long must the field be? [70-71] g) Come up with three examples of things that can be encoded with 3 bits. [70-71] 17. a) Why is the electrical signal generated by a microphone called an analog signal? [72] b) What two things does a codec do? [72] c) Is there a single codec standard? [72] 18. a) What is encapsulation? [72] b) Why is encapsulation necessary for there to be communication between processes operating at the same layer but on different hosts routers or switches? [72] c) After the internet layer process in Figure 2-19 receives the TCP segment from the transport layer process what two things does it do? [72-73] d) After the data link layer process in Figure 2-19 receives the IP packet from the internet layer process what two things does it do? [72-73] e) After the physical layer process receives a frame from the data link layer process what does the physical layer process do? [72-73] f) If encapsulation occurs on the source host what analogous process do you think will occur on the destination host? (The answer is not in the text.) [72-73] 19. a) What does a network standards architecture do? [75] b) In what order are standards and standards architectures developed? [75] c) What are the two dominant network standards architectures? [75] d) What is the dominant network standards architecture in most real firms today? [75] e) Are the two network standards architectures competitors? [75] 20. a) What standards agencies are responsible for the OSI standards architecture? Just give the acronyms. [76] b) At which layers do OSI standards dominate usage? [76] 21. a) Which of the following is an architecture: TCP/IP TCP or IP? [78] b) Which of the following are standards: TCP/IP TCP or IP? [78] c) What is the standards agency for TCP/IP? [78] d) Why have this agencys standards been so successful? [78] e) What are most of this agencys documents called? [78] f) At which layers is TCP/IP dominant? [79] 22. a) Is any standards architecture dominant at the application layer? [79] b) Do almost all applications regardless of what standards architecture they come from run over TCP/IP standards at the internet and transport layers? [79] 23. a) Which layers of the hybrid TCP/IPOSI standards architecture use OSI standards? [80] b) Which layers use TCP/IP standards? [80] c) Do wireless LAN standards come from OSI or TCP/IP? Explain. (The answer is not explicitly in this section.) [80] d) Do switched WAN standards come from OSI or TCP/IP? Explain. (Again the answer is not explicitly in this section.) [80] *24. a) At which layers do OSI standards dominate usage? [80] b) Name and describe the functions of OSI Layer 5. [82] c) Name and describe the intended use of OSI Layer 6. [81] d) How is the OSI presentation layer actually used? [81] e) Beginning with the physical layer (Layer 1) give the name and number of the OSI layers. [80-81] Show less
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.