Premium Essay

Is589

In:

Submitted By appkeedost
Words 421
Pages 2
Time Remaining:

1. (TCO C) A peer-to-peer LAN: (Points: 5) has more capability than a dedicated server supports a higher number of computers than a dedicated server is generally cheaper in hardware and software than a dedicated server is not appropriate for sharing resources in a small LAN is often much faster than dedicated server networks

2. (TCO C) When a computer transmit at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: (Points: 5) out of range problem collision problem hidden node problem controlled access problem media access problem

3. (TCO E) With ANI security control, the network manager: (Points: 5) uses the Authorization Notation Investigation protocol to trace only authorized user passwords allows the Asynchronous NetWare Interface to act as a firewall can define several remote telephone numbers authorized to access each account assigns selected Access Network Invitations to users cleared for various levels of network access can only define one remote telephone number authorized to access each account

4. (TCO E) A symmetric encryption system has two parts: the key and the ____________. (Points: 5) algorithm spamming method IP spoofer clearance code smart card bits

5. (TCO F) Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. (Points: 5) backplane baseline turnpike document wish list RFP

6. (TCO F) Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. (Points: 5) much

Similar Documents

Premium Essay

Is589 Wk 2 Txt Questions

...IS589 Ch3 TXT Question 1, 3, and 6 1. How does a multipoint circuit differ from a point-to-point circuit? Multiport circuit, in this configuration many computers are connected to the same circuit. This means that each must share the circuit with the others. The disadvantage is that only one computer can use the circuit at a time. In order words when one computer is sending or receiving data all others must wait. The advantage is in the reduction of cable needed, thus reducing cost. Point to point circuit, also called dedicated circuits, are dedicated to the use of the two computers (one on each point). This type of configuration is used when the computers generate enough data to fill the capacity of the communication circuit. When this type of circuit is used each computer has its own circuit running from itself to the other computer. This is very expensive. 3. Describe the 3 types of guided media? Twisted Pair is a pair of wires used in standard telephone wiring. They are twisted to reduce interference cause by the other twisted pairs in the same cable bundle. Twisted pair wires go from homes and offices to the telephone company end office. The LAN used twisted pair cables pack four sets of pairs. Some types of twisted pair cables commonly used in LANs are, CAT5, CAT5e, and CAT6. Coax is a type of guided media which has a copper core with an outer cylindrical shell for isolation. The outer shield just under the shell is the second conductor. Because they have additional...

Words: 701 - Pages: 3

Premium Essay

Is589 Week 2 Texbook Questions

...IS589 Week 2 Texbook QuestionsIS589 Week 2 – Text Book Questions Greg Wilson Chapter 3: Questions 1, 3, and 6 Question 1: How does a multipoint circuit differ from a point-to-point circuit? From the Course Text (Fitzgerald & Dennis, 2009): In this configuration, many computers are connected on the same circuit. This means that each must share the circuit with the others. The disadvantage is that only one computer can use the circuit at a time. When one computer is sending or receiving data, all others must wait. The advantage of multipoint circuits is that they reduce the amount of cable required and typically use the available communication circuit more efficiently. Imagine the number of circuits that would be required if the network in Figure 3.2 was designed with separate point-to-point circuits. For this reason, multipoint configurations are cheaper than point-to-point circuits. Thus, multipoint circuits typically are used when each computer does not need to continuously use the entire capacity of the circuit or when building point-to-point circuits is too expensive. Wireless circuits are almost always multipoint circuits because multiple computers use the same radio frequencies and must take turns transmitting. Question 3: Describe three types of guided media. Twisted-Pair Cable (Fitzgerald & Dennis, 2009): One of the most commonly used types of guided media is twisted-pair cable, insulated pairs of wires that can be packed quite close together (Figure 3...

Words: 787 - Pages: 4

Free Essay

Is589 Mini Case Chapter 11

...MIS589 James Young Professor Gray Assessment of Belmont State Bank (mini case) 10/18/2012 The following document is a risk assessment on the financial institution Belmont State Bank. It will cover some of the findings and suggested solutions to remedy many of the security issues that were observed. Please review the associated cost of the suggestions/ recommendations to that should improve and correct issues with your current network. This report will cover network antivirus solution and pattern updates, desktop security, VPN, wireless access, network monitoring software, router restrictions and vendor access. In compliance with network overall security from malicious code, and to maintain the integrity of the network, listed are two tools to that will perform inventory of all company computers and network peripherals, that will ensure not only updated versions are installed but that all systems are compliant with software licensing: a. Manageengine ServiceDesk Enterprise edition, based on the number of technicians you have on staff of 250, I am recommending the 250 technician licenses that will cover over 3000 nodes, cost $2,995.00 this will scan all devices on your network, push all updates so that all systems are current, and only the updates that are required, these can be performed remotely to various machines, based on region/time zone during non-peak hours or if an emergency upgrade is required. b. Microsoft’s SSCM asset configuration software, much...

Words: 704 - Pages: 3

Free Essay

Is589 Week 1 Hw Devry

...Chapter 1 R3. Why are standards important for protocols? Standards are important because everyone should have a strong foundation on what and how each protocol operates so that people can create systems and products that can be integrated with each other. R4. List six access technologies. Classify each one as home access, enterprise access, or wide-area wireless access. Six access technologies are: Ethernet Access Networks – Home Access/Enterprise Access WiFi Access Networks – Home Access/Enterprise Access Broadband Access – Home Access 3G Wireless Access – Wide-area Wireless Access LTE Access – Wide-area Wireless Access 4G Access Networks – Wide-area Wireless Access R18. How long does it take a packet of length 1,000 bytes to propagate over a link of distance 2,500 km, propagation speed 2.5 · 108 m/s, and transmission rate 2 Mbps? More generally, how long does it take a packet of length L to propagate over a link of distance d, propagation speed s, and transmission rate R bps? Does this delay depend on packet length? Does this delay depend on transmission rate? It would take the packet 10m/s to propagate over the link. It would take the packet (distance d/propagation speed s) to propagate over a link. No the delay does not depend on the packet length. No the delay does not depend on the transmission rate. Chapter 2 R1. List five nonproprietary Internet applications and the application-layer protocols that they use. Five nonproprietary...

Words: 268 - Pages: 2

Free Essay

Is589 Week 2 - You Decide

...Helen Ross, Network Technician Currently concerned with upgrading the schools printing scheme. They have over 50 printers and wants to consolidate them. The network also is experiencing latency due to collision and filled print queues. For this issue I would recommend the use of a Print Server, and RAID. The addition of a print server will allow the school to consolidate to using a smaller amount of printers. Utilizing a print server will allow a centralized location to manage all print jobs. Once the server receives the job, it will then forward the job to the corresponding printer. Helen also mentioned there was a significant amount of collisions being detected within the network. Each device will be mapped to an assigned printer within its quadrant. However, when its time to print instead of the message going directly to its assigned printer, the printer server will receive the request. Then it will make sure there aren’t any other request or jobs waiting before new job prints. Using a print server will greatly reduce the amount of congestion on the network and will also allow your organization to consolidate from 50 computers to just a few. John Fischer, HVAC Tech, Laptop is operating at 10mbps either hard-wired or wireless. John was advised that it is a network issue as he was able to rule out the network card when he contacted the HVAC Tech Support Team. In order for him to be able to monitor the HVAC equipment he will need to have a connection to the LAN with at...

Words: 672 - Pages: 3

Premium Essay

Is589 Chapter 1: Questions 7, 14, and 17

...Chapter 1: Questions 7, 14, and 17 Question 7 How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)? Answer: A Local Area Network (LAN) is a group of microcomputers or terminals located in the same general area. A Backbone Network (BN) is a large central network that connects most everything on a single company site. A Metropolitan Area Network (MAN) encompasses a city or county area. A Wide Area Network (WAN) spans cities, states, or national boundaries. Question 14 Explain how a message is transmitted from one computer to another using layers. Answer: - When a message is transmitted from one computer to another through these seven layer protocols are wrapped around the data, the layers in the network use a formal language or protocol that is a set of instructions of what the layer will do to the message, these protocols are labeled or encapsulated onto the data. Think of the protocols as layers of paper with a message that only the individual layer understands. The application layer is the application software used by the network user. The transport layer is responsible for obtaining the address of the end user (if needed), breaking a large data transmission into smaller packets (if needed), ensuring that all the packets have been received, eliminating duplicate packets, and performing flow control to ensure that no computer is overwhelmed by the number of messages it receives...

Words: 570 - Pages: 3

Premium Essay

None

...Anissa Murdaugh IS589 Wk 5 Chapter Questions * 3. What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP? * TCP/IP's robust set of protocols provided complete networking support to connect all hosts and sites and rapidly became the standard for such activities. Over time, the TCP/IP suite of protocols and utilities has become much more than just a standard–it has helped us usher in a new era of computing. We can now configure machines around the world and monitor events on distant computers. Although local area networking standards remained in the realm of proprietary vendor standards until the mid 1980's, they have changed so much since then that today there is nearly total interoperability in the TCP/IP world. With TCP/IP, we can connect to the world. TCP performs packetizing: breaking the data into smaller packets, numbering them, ensuring each packet is reliably delivered, and putting them in the proper order at the destination. IP performs routing and addressing. IP software is used at each of the intervening computers through which the message passes; it is IP that routes the message to the final destination. The TCP software only needs to be active at the sender and the receiver, because TCP is only involved when data comes from or goes to the application layer. TCP/IP is the network layer protocol now used on the Internet. It is also the world’s most popular network...

Words: 577 - Pages: 3

Premium Essay

Is 589 You Decide

...NETWORKING CONCEPTS AND APPLICATIONS: IS589 Week 2 Assignment You Decide John Doe 9/11/2011 Abstract: This paper is a suggested proposal on how to upgrade a computer network located at Leonard Cooper Charter School. Through interviewing the stakeholders of the organization, I will assess and determine the issues with their current network. Then, I will explain the problems and offer the best solution to their computer networking needs.   Computer Network Upgrade Proposal for Leonard Cooper Charter School Current Issues After carefully interviewing the Stake holders of the Leonard Cooper Charter School, several issues were observed. The first noticeable concern was the print server. Their management of print jobs on the print server are called into question because of the many collisions on the print server. They are presently using a half duplex system for their print jobs. A half-duplex system provides signal communication in both directions, however only one direction at a time. A good example of this technology might be two-way radios. The person listening must wait until the transmitter concludes the signal transmission before responding to the call otherwise a collision will occur and the entire message won't get received. In a half duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data simultaneously. In the event of a network "collision", both transmitted packets are...

Words: 1272 - Pages: 6