Free Essay

Network Technology and Service Integration

In: Computers and Technology

Submitted By peddler1
Words 946
Pages 4
Answers to Assessment Test
1. A. Network Control Protocol is used to help identify the Network layer protocol used in the packet. See Chapter 16 for more information.
2. B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See Chapter 15 for more information.
3. C. The port roles used within RSTP include discarding, learning, and forwarding. The difference between 802.1d and RSTP is the discarding role. See Chapter 10 for more information.
4. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information. 5. D. An IPv6 address is 128 bits long, whereas an IPv4 address is only 32 bits long. See Chapter 15 for more information.
6. C. Link Control Protocol in the PPP stack provides negotiation of dynamic addressing, authentication, and multilink. See Chapter 16 for more information. 7. B. The show interface command shows the line, protocol, DLCI, and LMI information of an interface. See Chapter 16 for more information.
8. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 4 for more information.
9. B. The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates. See Chapter 8 for more information.
10. C. ICMP is the protocol at the Network layer that is used to send echo requests and replies. See Chapter 3 for more information.
11. D. Layer 2 switching creates individual collision domains per port. See Chapter 1 for more information.
12. C. The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password. See Chapter 6 for more information. 13. B. To see the contents of all access lists, use the show access-lists command. See Chapter 12 for more information.
14. C. VLANs break up broadcast domains at layer 2. See Chapter 11 for more information.
15. A. The command erase startup-config deletes the configuration stored in NVRAM. See Chapter 6 for more information.
16. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 3 for more information.
17. A. Class A addressing provides 24 bits for host addressing. See Chapter 3 for more information.
18. B. Every 2 seconds, BPDUs are sent out from all active bridge ports by default. See Chapter 10 for more information.
19. D. Switches do not propagate VLAN information by default; you must configure the VTP domain for this to occur. VLAN Trunking Protocol
(VTP) is used to propagate VLAN information across a trunk link. See Chapter 11 for more information.
20. C. IEEE 802.11bg is in the 2.4GHz range, with a top speed of 54Mbps. See Chapter 14 for more information.
21. A. By default, switches break up collision domains on a per-port basis but are one large broadcast domain. See Chapter 1 for more information. 22. D. Port Address Translation (PAT) allows a one-to-many approach to network address translation. See Chapter 13 for more information.
23. C, D. VTP is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1Q and ISL encapsulations are used to configure trunking on a port. See Chapter 11 for more information.
24. D. Stub networks have only one connection to an internetwork. Default routes should be set on a stub network or network loops may occur; however, there are exceptions to this rule. See Chapter 9 for more information.
25. B. Hubs regenerate electrical signals, which are specified at the Physical layer. See Chapter 1 for more information.
26. A, C. Standard and extended access control lists (ACLs) are used to configure security on a router. See Chapter 12 for more information.
27. D. The command copy flash tftp will prompt you to back up an existing file in flash to a TFTP host. See Chapter 7 for more information.
28. B. The command to back up the configuration on a router is copy running-config startup-config. See Chapter 7 for more information.
29. C. The primary reason the OSI model was created was so that different networks could interoperate. See Chapter 1 for more information.
30. C. User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service. See Chapter 3 for more information.
31. E. The clock rate command is two words, and the speed of the line is in bps. See Chapter 6 for more information.
32. C. The show ip interface command will show you if any interfaces have an outbound or inbound access list set. See Chapter 12 for more information. 33. D. The copy tftp flash command places a new file in flash memory, which is the default location for the Cisco IOS in Cisco routers. See Chapter
7 for more information.
34. C. The PDU encapsulation method defines how data is encoded as it goes through each layer of the TCP/IP model. Data is segmented at the
Transport later, packets created at the Network layer, frames at the Data Link layer, and finally, the Physical layer encodes the 1s and 0s into a digital signal. See Chapter 2 for more information.

Similar Documents

Premium Essay

Contract Management Course Project 3

...#SP3300-12-R-0007 for the On-Site Support Services project. This proposal assumes that if it is granted, all parties will work together to develop an on-site support service that is both robust and reliable for a lower price than our competitors. We are currently offering a 20% discount for our entire list of services or 10% on the minimal required services to complete this ongoing project. Please keep in mind that this proposal is based on information provided at this time. Any revisions made to the solicitation after today will be subject to a price review. We reserve the right to withdraw this bid if it is not accepted within 45 days. Thank you for giving us this opportunity. I look forward to hearing from you. Sincerely, Diana Brooks Sales Contract Manager I have enclosed a copy of Future Tek, Inc.’s resume, technical capabilities and pricing information. Copyright © 1998 by Ann Poe Future Tek, Inc. has been in the Information Technology for a total of 11 years. During those years we’ve dealt mainly with the integration of new information technology systems into Financial based institutions. We are looking to not only expand our services to other industries outside of banking. After reviewing the bid solicitation information provided, we believe that we will make a good candidate for this opportunity. If awarded this contract, Future Tek, Inc.’s is able to provide all information technology related services that are needed for this project. ......

Words: 2807 - Pages: 12

Premium Essay


...LUDHIANA COLLEGE OF ENGINEERING & TECHNOLOGY 6 Month SYNOPSIS s Training Submitted to: - Submitted by:- Mr. R.K. Aggarwal Nikhil Sharma Head of Deptt. Electronics & Comm. Electronics & Comm. 8TH (B) 80102108050 ACKNOWLEDGEMENT The beatitude, bliss & euphoria that accompany the successful completion of any task would be incomplete without the expression of the appreciation of simple virtues to the people who made it possible. So, reverence, veneration and honours. I acknowledge all those whose guidance and encouragement has made successful in winding up this synopsis. I owe a huge debt of thanks to a large number of people without whom none of this would have been possible. I am thankful to Dr. J.S. Sohal(Director), Dr. Pawan Kumar(Principal), Mr. R.K Aggarwal(Head of Department) for valuable suggestions and enthusiastic interest during the entire process. For my six months industrial......

Words: 3916 - Pages: 16

Free Essay

Outsource vs Insource

...ISTM5010 – Integration of Information Technology and Business -1 Outsource Insource Final Paper Capella University December 14, 2012 ISTM5010 – Integration of Information Technology and Business -2 ABSTRACT The company in topic is BAILEYpc, Inc. ( and their recent organizational structure change for cloud hosting services centered on maintaining a premium service while being agile to industry change for both customer and provider. BAILEYpc offers web hosting as a re-seller through (Site5) rather than owning and maintaining their own server. As a consulting service first the model is not primarily a hardware company. So all services like domain name sales, web hosting services and website development are all outsourced. Web hosting is offered as a compliment service to business development consulting services with servers being leased from a company specializing in hosting rather than inhouse. ISTM5010 – Integration of Information Technology and Business -3 TABLE OF CONTENTS ABSTRACT ......................................................................................................................................... 1 TABLE OF CONTENTS ..................................................................................................................... 3 SUMMARY ......................................................................................................................................... 4 CLOUD COMPUTING TRANSITION .......

Words: 4860 - Pages: 20

Free Essay


...41 42 43 44 45 Integration of EPON and WiMAX Gangxiang Shen and Rodney S. Tucker 14.1 Introduction The Internet today is characterized by a fast growth of bandwidth-intensive services, such as IPTV, video on demand (VoD), and peer-to-peer (P2P) services. To Gangxiang Shen ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), Department Electrical and Electronic Engineering, The University of Melbourne, Melbourne VIC 3010, Australia, e-mail: Rodney S. Tucker ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), Department Electrical and Electronic Engineering, The University of Melbourne, Melbourne VIC 3010, Australia, e-mail: A. Shami et al. (eds.), Broadband Access Networks, Optical Networks, DOI 10.1007/978-0-387-92131-0 14, c Springer Science+Business Media, LLC 2009 UN C OR R Abstract The integration of EPON and WiMAX is a novel research topic that has received extensive interest from both industry and academia. The major motivations behind the integration of EPON and WiMAX involve the potential benefits of fixed mobile convergence (FMC), which uses a single network infrastructure to provide both wired and wireless access services, and a good match of capacity hierarchy between EPON and WiMAX by using EPON as a backhaul (or feeder) to connect multiple disperse WiMAX base stations. This chapter recaps recent progress in the area of integration of EPON and WiMAX...

Words: 8962 - Pages: 36

Free Essay

Asdf relates to network design considerations. It describes the rise of big data and the transition of traditional enterprise data models with the addition of crucial building blocks to handle the dramatic growth of data in the enterprise. According to IDC estimates, the size of the "digital universe" in 2011 will be 1.8 zettabytes (1.8 trillion gigabytes). With information growth exceeding Moore's Law, the average enterprise will need to manage 50 times more information by the year 2020 while increasing IT staff by only 1.5 percent. With this challenge in mind, the integration of big data models into existing enterprise infrastructures is a critical element when considering the addition of new big data building blocks while considering the efficiency, economics and privacy. This document also shows that the Cisco Nexus ® architectures are optimized to handle big data while providing integration into current enterprise infrastructures. In reviewing multiple data models, this document examines the effects of Apache Hadoop as a building block for big data and its effects on the network. Hadoop is an open source software platform for building reliable, scalable clusters in a scaled-out, "shared-nothing" design model for storing, processing, and analyzing enormous volumes of data at very high performance. The information presented in this document is based on the actual network traffic patterns of the Hadoop framework and can help in the design of a scalable network with the......

Words: 1384 - Pages: 6

Free Essay


...needed to keep the people up to date with the latest trends and happenings. People now days get access to the news whenever they want. The main sources of tuning to the news include television, radio, newspapers, magazines and more of late the World Wide Web. Even the cellular services are not far behind as they keep people informed while one is away from the above mediums. Therefore, it is not necessary whether you CURRENT SCENARIO OF INDIAN NEWS CHANNELS Over 100 applications are pending with the information and broadcasting ministry for licence to start new TV channels. Currently, 454 Indian TV channels are on air, according to the list put up by the ministry on its website. Four months ago, the ministry had cleared 22 new TV channels. The additional requirements could include the financial viability of channels, a more rigorous background check of the profile of operators and their commitment to the welfare of employees, ministry sources said. The ministry has written to Telecom Regulatory Authority of India (TRAI) chairman J.S. Sharma on the issue of stricter criteria, and the TRAI response is awaited, the sources said. Introduction With the rapid development of digital technology, new media is gradually replacing traditional media to occupy the position of the main part of our vision, the rise and development of new media...

Words: 3004 - Pages: 13

Premium Essay

It Planning

...Strategic planning of ICT (Information and Communication Technologies)-based services, abbreviated as eServices, is a crucial task for the public as well as private sectors. Given a strategic project (or an initiative), a strategic planning process identifies the main alternatives, the key business/technical issues involved in each alternative, and helps in evaluation and selection of the most viable alternatives before initiating the project. To succeed, the strategic planning process must explore a large number of people, process and technology issues and eliminate surprises. This is not easy because the task of eservices planning in the digital age is considerably complicated due to the changing business and technical landscape and an ever-growing body of knowledge. This short tutorial gives a quick overview of the vast body of knowledge that entails a typical strategic ICT planning process and presents a conceptual framework for further exploration of this important area. 1. An Example – eServices for a City Ms Fran Kuye is mayor of a city with one million inhabitants, located in a developing country.She wants to use the knowledge gained from her MPA (Master of Public Administration) to transform her city to a “Digital City” that heavily relies on eservices to support its citizens. Her overall goal is to develop a 2 year plan that includes the following:    First year, start with informational services on the web that deliver the information to......

Words: 5384 - Pages: 22

Premium Essay

Enterprise System

...Coursework for INMR88 Enterprise Systems Step 8: Feasibility Report of Adopting an ERP2 System The family owned Bandon Group started as a distributor of office equipment. Growing by acquiring additional dealerships, it has already had four divisions in the western U.S. Portland, Phoenix, Salt Lake City and Denver with headquarters in Phoenix. The general objective of Bandon Divisions is to provide office information systems and offer value-added services and technology integration according to the specific needs of their customers in particular markets. Bandon Group targets at mid-market companies by offering mid-tier equipment at reasonable prices and they have earned a good reputation through their quality-manufactured products with at cost-effective prices. With the continuous development of Bandon Group, a commercial off-the shelf package is in need to support administrative information systems of Bandon Group, so Office Machines Dealership (OMD), which supports the meter-based billing application, is adopted. By 2010, the four divisions were connected to the central OMD system, but data migration was hard to achieve due to its lack of flexibility. Under the decentralized sales strategy, divisions begin to adopt different sales tools to boost their sales volume in their respective market. Although Pivotal, a sale prospecting system was introduced to all of the divisions, it was used to a varying degree and worked for various purposes. For example, at Bandon......

Words: 1529 - Pages: 7

Premium Essay

The Bandon Group

...different types of tasks. The company is currently attempting to discover a way where Information Technology can serve as a better support the overall missions, goals and objectives of the organization. Data is not currently integrated across the various divisions, which causes a replication of effort; sub optimized effort and additional expense to the organization. (Sumner, 2005) Bandon Group, Inc. has a fairly small Information Technology department and with the range of various technical solutions that have been applied across each of the divisions, it has become very difficult to provide network & technical support, technical training and data migrations. In order to stay competitive in the industry in which the Bandon group is in, management has discovered that they need to make a few adjustments to their business strategy, and implement technical solutions. Several of their competitors have implemented Enterprise Resource Planning (ERP) with integrated Customer Relationship Management (CRM) solutions, leaving them far behind in the potential of acquiring more profit and maximizing the efficiency of their business. Furthermore, taking a close look at the technology aspect of this, the Bandon group is falling behind in keeping up in their industry, because their competitors have started to incorporate eBusiness solutions, allowing them to do web based supply ordering, service call entry and meter click reporting. The current situation of the technological...

Words: 1790 - Pages: 8

Premium Essay

Benchmarking of Coke

...[pic] Working Paper on future RFID Research Needs September 2007 Participating EU-funded R&D Projects in CERP: |Acronym |Name of Project |Contact / email | |AMI-4-SME |Ambient Intelligence Technology for Systemic Innovation |Harald Sundmaeker, ATB, Germany | | |in Manufacturing SMEs | | |BRIDGE |Building Radio Frequency Identification in the Global |Henri Barthel, GS1 | | |Environment | | |CE-RFID |Coordinating European Efforts for Promoting the European |Dr. Gerd Wolfram, METRO Group, Germany | | |Value Chain | | |CoBIs |Collaborative Business Items |Stephan Haller, SAP, Switzerland | | | | | |Dynamite |Dynamic Decisions in Maintenance ......

Words: 11027 - Pages: 45

Free Essay

How Institutional Settings Matter Tri-Networks Integration and Iptv

...Canadian Economic History Final How Institutional Settings matter Tri-networks integration and IPTV Student ID No. 1310511012 Student Name  Zhang Qiyue (Emily) School Suzhou University Major Field International Finance Advisor Sam Yu Date Janurary 2016 How Institutional Settings matter Tri-networks integration and IPTV Abstracts: This paper will first make a brief introduction on IPTV industry and its present status of development in China. The promotion of IPTV is affected not only by the technology and market demand, but also by the regulatory policy. Policy barriers caused by yield game between telecom operators and State Administration of Radio, Film and Television (SARFT) about profit allocation hindered the development of IPTV. We use the Stackelberg model to analyze the yield game between telecom operators and SARFT. With deep integration between the industry, the traditional regulatory framework should also advance with the times, be replaced by a more flexible integration framework, so as to promote the development of IPTV and other integration of services. However, the pace of development is far below expectations in China. Many experts pointed out that there were few technical problems existing in IPTV, which leaves the main crux to its institutional settings. We will also discuss how institutional settings matter the industry, find out......

Words: 3143 - Pages: 13

Premium Essay


...Alternatives and Options 10-11 Recommendations 12 Implementation 13-14 Monitor and Control 15 Conclusion 16 Ford Motor Company Executive Summary As director of Supply Chain Systems, Teri Takai recommends implementing virtual integration strategies from companies like Dell to portions of Ford’s supply chain strategy. Although there are several key differences between the companies, the restructuring plans of Ford 2000 have set a viable foundation to implement Dell’s virtual integration strategy in inventory management, customer service and support and suppliers’ management. The redesign of the process must include design not only of the supply chain but also of fulfillment, forecasting, purchasing, and a variety of other functions that historically been considered independently within the Ford hierarchy. Teri believes that implementing virtual integration by building on Ford’s key initiatives and projects including Ford Production Systems (FPS), Order to Delivery (OTD) and Ford Retail Network (FRN) that are currently underway will make their supply chain run more smoothly with less bottlenecking, reduced inventory, and better overall performance. Managers could overcome the complex and inaccurate manual process of forecasting and procuring parts which would result in reduced OTD lessen costs and enhance customer satisfaction. Further......

Words: 3148 - Pages: 13

Free Essay

Qualcomm Telecom Strategy

...Why did Bharti outsource its network operations? Bharti was facing a challenge – the customer base was growing explosively (100% per year) but it was not able to keep up with the pace of the market growth. Bharti had challenges with management time, capital costs, and human resources. 1. Faster time to market: There was huge delay between the time when Bharti needed additional capacity and when that additional capacity could be up/running. Bharti was spending from six months to a year in the process of planning, tendering, purchasing, and installing. This took a lot of time from Bharti’s management team too and did not allow them to focus other important priorities in the company. 2. Scalability: Bharti was facing scalability issues both in its IT function and network function. 3. Human resources scarcity: Given the rapid growth in the industry, Bharti was finding it more and more difficult to hire and retain people. It was facing intense competition from other telecom providers as well are other multi-national companies to hire engineers. 4. Lean and predictable cost model: With the rapid changes in technology and also in the requirements for network capacity, Bharti was having a very unpredictable cost model. Instead of huge capital assets on the balance sheet and capital expenditures, Bharti wanted operating expenses which went hand-in-hand with the pace of its growth. 5. Capital Expenditures: With industry consolidation, the focus was switching from......

Words: 1115 - Pages: 5

Premium Essay

Web Application Firewalls controller vendors, cloud service providers and network security vendors. Buyers should evaluate how WAFs can provide high security, minimize false positives and sustain performance. STRATEGIC PLANNING ASSUMPTIONS At the end of 2018, less than 20% of enterprises will rely only on firewalls or intrusion prevention systems to protect their Web applications — down from 40% today. By year-end 2020, more than 50% of public Web applications protected by a WAF will use WAFs delivered as a cloud service or Internet-hosted virtual appliance — up from less than 10% today. Market Definition/Description The Web application firewall (WAF) market is defined by a customer's need to protect internal and public Web applications when they are deployed locally (on-premises) or remotely (hosted, "cloud" or "as a service"). WAFs are deployed in front of Web servers to protect Web applications against hackers' attacks, to monitor access to Web applications, and to collect access logs for compliance/auditing and analytics. WAFs are most often deployed in-line, as a reverse proxy, because historically it was the only way to perform some in-depth inspections. Other deployment modes exist, such as transparent proxy, bridge mode, or the WAF being positioned out of band (OOB) and, therefore, working on a copy of the network traffic. The primary WAF benefit is providing protection for custom Web applications that would otherwise go unprotected by other technologies that guard only against......

Words: 10448 - Pages: 42

Premium Essay


...Voice over Internet Protocol (VoIP) is a rapidly emerging technology for voice communication that uses the ubiquity of IP-based networks to deploy VoIP client devices—such as desktop IP phones, mobile VoIP-enabled handheld devices, and VoIP gateways—in an increasing number of businesses and homes around the world. Windows CE 5.0 is a robust, real-time operating system platform that enables original device manufacturers (ODMs), original equipment manufacturers (OEMs), service providers (such as Internet service providers [ISPs], cable companies, and carriers), and enterprises to rapidly develop and deploy a wide range of devices that are part of an IP network and that have integrated VoIP functionality. The latest version of Windows CE includes an integrated, easy-to-use Telephony User Interface (TUI), a VoIP Application Interface Layer (VAIL) with extensive call control functionality, an interface to access contact and calendar data on Microsoft Exchange servers, advanced provisioning capabilities, and a complete network layer stack that facilitates VoIP-enabled device development and infrastructure integration. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after......

Words: 1932 - Pages: 8