itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After...

42
Name ________________________________________________________ Date __________________ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of networking. Describe types of networks. Describe basic networking concepts and technologies. Describe the physical components of a network. Describe network topologies Identify Ethernet standards. Explain OSI and TCP/IP data models. Describe how to configure a NIC and a modem. Identify names, purposes, and characteristics of other technologies that are used to establish connectivity. Describe and perform preventive maintenance, and troubleshoot networks. 6.1.1.1 – Define Computer Networks 1. What are networks? 2. What are social networking sites? 3. List some of the networks you might use every day. 4. What is a host? Chapter 6: Networks Page 1 of 42 IT Essentials 5.0

Transcript of itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After...

Page 1: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

Name ________________________________________________________ Date __________________

Chapter 6: Networks

After completion of this chapter, students should be able to:

Explain the principles of networking. Describe types of networks. Describe basic networking concepts and technologies. Describe the physical components of a network. Describe network topologies Identify Ethernet standards. Explain OSI and TCP/IP data models. Describe how to configure a NIC and a modem. Identify names, purposes, and characteristics of other technologies that are used to establish

connectivity. Describe and perform preventive maintenance, and troubleshoot networks.

6.1.1.1 – Define Computer Networks1. What are networks?

2. What are social networking sites?

3. List some of the networks you might use every day.

4. What is a host?

5. What is a peripheral?

6. What is the difference between a host and a peripheral?

Chapter 6: Networks Page 1 of 35IT Essentials 5.0

Page 2: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

7. What are some of the different devices that can connect to a network

8. Where are computer networks used?

9. What type of resources can be shared on a network?

10. How are network devices linked together? (give three examples)

6.1.1.2 – Features and Benefits 11. What are the benefits of networking computers?

12. What are online collaboration tools

13. What manages network resources?

14. What can be used to prevent users from overwriting files or changing files that others are accessing at the same time?

15. What allows a group of people or an entire organization to use an application for a single fee?

16. What is centralized administration?

Chapter 6: Networks Page 2 of 35IT Essentials 5.0

Page 3: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.1.1.3 – Activity – Advantages and Disadvantages of Networking Instructor Check__________

6.2.1.1 – LANs17. A computer network is identified by what specific characteristics?

18. What is a LAN? (describe it)

19. What does an administrative control group do?

20. Is it a requirement that devices in a LAN be physically close? (why)

21. How big do LANs have to be?

6.2.1.2 – WLANs22. What is a WLAN?

23. How are devices connected in a traditional LAN?

24. In what conditions is a WLAN preferable to a traditional LAN?

25. What do devices connect to in a WLAN?

Chapter 6: Networks Page 3 of 35IT Essentials 5.0

Page 4: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.2.1.3 – PANs26. What is a PAN?

27. What technology is usually used for PANs?

28. What is Bluetooth?

29. How many devices can Bluetooth device connect?

30. Explain what is AFH and what does it allow?

6.2.1.4 – MANs31. What is a MAN?

6.2.1.5 – WANs32. What is a WAN?

33. What is the most common example of a WAN?

34. What is used to connect LANs in a WAN?

6.2.1.6 – Peer-to-Peer Networks35. Explain a peer-to-peer network.

Chapter 6: Networks Page 4 of 35IT Essentials 5.0

Page 5: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

36. What is the best environment for peer-to-peer networks

37. What are the disadvantages of peer-to-peer networks? A

B

C

D

6.2.1.7 – Client/Server Networks38. Explain a client/server network. (sketch it)

6.2.1.8 – Activity: Matching Network Types Instructor Check__________

6.3.1.1 – Bandwidth39. What is a packet?

40. What is a frame?

41. What is bandwidth?

42. How is bandwidth measured?

Chapter 6: Networks Page 5 of 35IT Essentials 5.0

Page 6: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

43. List the common units of measure for bandwidth.

A

B

C

D

44. What is latency?

45. What type of applications can be affected by latency

6.3.1.2 – Data Transmission46. What is simplex mode?

47. Sketch an example of simplex mode:

48. What is half-duplex mode?

49. Sketch example of half-duplex transmission:

50. What is full-duplex mode?

51. Sketch an example of full-duplex transmission:

Chapter 6: Networks Page 6 of 35IT Essentials 5.0

Page 7: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

52. How does full-duplex increase network performance?

6.3.2.1 – IP Addressing53. What defines the rules computers must follow to communicate with each other over the Internet?

54. What is an IP address?

55. Can two devices on a network share an IP Address

56. What is another name for the physical address?

57. What is another name for a logical address?

58. How are logical addresses assigned?

59. How many bits in an IPv4 address?

60. How many bits in an IPv6 address?

6.3.2.2 – IPv461. What is meant by dotted-decimal notation?

62. What are the two parts of an IP address?

63. What is meant by hierarchical addressing?

Chapter 6: Networks Page 7 of 35IT Essentials 5.0

Page 8: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

64. What are the five classes of IP addresses?

65. Which IP class is used for experimental testing and multicast?

66. What is a private address?

67. What does the subnet mask indicate?

68. What is the default subnet mask for:

Class A –

Class B –

Class C –

69. What is subnetting?

6.3.2.3 – IPv670. What is each field of four hexadecimal values in an IPv6 address called?

71. What are the first three blocks of an IPv6 address called?

72. Who controls both the subnet and interface ID in an IPv6 address?

6.3.2.4 – Static Addressing73. When is it easier to manually configure each device with the proper IP address?

74. What is the difference between an IP address and a MAC address?

75. What is the IP address configuration information you can assign to a host?

Chapter 6: Networks Page 8 of 35IT Essentials 5.0

Page 9: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.3.2.5 – DHCP Addressing76. What does DHCP stand for?

77. How does DHCP simplify the administration of networks?

78. What is leasing?

79. What happens when a lease expires?

80. What happens if a computer cannot communicate with the DHCP server

81. What does it mean if your computer is assigned a link-local IP address

82. What IP address configuration information does a DHCP server automatically assign?

83. What are the benefits of configuring an alternate IP address?

84. What is DNS?

Chapter 6: Networks Page 9 of 35IT Essentials 5.0

Page 10: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

85. What is a DNS cache?

86. What are the benefits of a DNS cache

6.3.2.6 – ICMP87. What is ICMP

88. What is used to test connections between computers?

89. What is the command ipconfig used for

90. How does Ping work?

91. What is another use for ping

6.3.2.7 Lab - Configure a NIC to Use DHCP in Windows 7 6.3.2.8 Lab - Configure a NIC to Use DHCP in Windows Vista 6.3.2.9 Lab - Configure a NIC to Use DHCP in Windows XP

6.3.3.1 – TCP and UDP92. What is a protocol?

93. What are Internet protocols?

Chapter 6: Networks Page 10 of 35IT Essentials 5.0

Page 11: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

94. What do protocol specifications define?

95. What are the main functions of protocols?

96. Devices and computers connected to the Internet use what protocol to communicate with each other?

97. What are the advantages of TCP?

98. What are the advantages of UDP?

6.3.3.2 – Activity – TCP vs. UDP Instructor Check______________

6.3.3.3 – TCP and UDP Protocols and Ports99. What is a port?

Protocol Port DescriptionTCP/IP N/A A suite of protocols used to transport data on the Internet.

A communication protocol that establishes a request/response connection on the Internet

HTTPS

FTP

22 Securely connect to a remote network device.

Telnet

POP3

143

SMTP 25

389 Accesses information directories.

Manages and monitors devices on a network.Provides shared access to files, printers and communication

between points on a network.Resolves host names to IP addresses.

Chapter 6: Networks Page 11 of 35IT Essentials 5.0

Page 12: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.3.3.4 Worksheet - Protocol Definitions and Default Ports

6.4.1.1 – Modems100. What does a modem do?

101. What does the modem at the receiving end do?

102. What is the process of converting analog signals to digital and back again called?

103. What is a Point-to-Point Protocol?

6.4.1.2 – Hubs, Bridges and Switches104. What do hubs do?

105. What is a repeater?

106. What is a disadvantage of a hub?

Chapter 6: Networks Page 12 of 35IT Essentials 5.0

Page 13: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

107. Why are files broken up into packets before they are transmitted over the network?

108. What is a frame?

109. What is a network bridge?

110. How do bridges help improve the flow of traffic?

111. What is another name for a switch?

112. What does a switch do when a frame arrives at a port?

113. What is PoE and what is it used for?

6.4.1.3 – Routers and Wireless Access Points114. What is an ISP?

Chapter 6: Networks Page 13 of 35IT Essentials 5.0

Page 14: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

115. What does a wireless access point do?

116. What do routers do?

117. What is the difference between a router and a switch?

118. What is a multipurpose network device?

6.4.1.4 – NAS119. What is a NAS?

120. What does the NAS do?

6.4.1.5 – VoIP Phones121. What is VoIP and what does it do?

122. What type of connector does a VoIP phone use?

123. What is a disadvantage of VoIP?

Chapter 6: Networks Page 14 of 35IT Essentials 5.0

Page 15: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

124. What are the three ways to use VoIP?

A

B

C

6.4.1.6 – Hardware Firewalls125. What is a hardware firewall?

126. A firewall should be used in addition to what?

127. What are some considerations when selecting a hardware firewall?

6.4.1.7 – Internet Appliances128. An Internet appliance is also called what?

129. What are some examples of internet appliances?

6.4.2.1 – Considerations for Cabling a Network130. What do coaxial and twisted-pair cables use to transmit data?

Chapter 6: Networks Page 15 of 35IT Essentials 5.0

Page 16: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

131. What does fiber optic use to transmit data?

132. Why is a wired network usually more secure than a wireless network?

133. When might a wireless solution be necessary?

6.4.2.2 – Coaxial Cables134. Why can coax carry more data than UTP?

135. Why has twisted-pair replaced coax in LANs?

6.4.2.3 – Twisted-Pair Cables136. What is twisted-pair cable used for?

137. Why is the cable twisted?

138. What is the cancellation effect?

139. What are the two basic types of twisted-pair cable?

140. What is the most commonly used cable in networks?

141. What is the maximum length of UTP?

Chapter 6: Networks Page 16 of 35IT Essentials 5.0

Page 17: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

142. Why is STP more expensive?

143. What are the two factors used when determining the category of cable?

144. What is a plenum? (sketch it)

145. How many pins are in a RJ11 connector?

146. How many pins are in a RJ45 connector?

147. What does the wiring scheme define?

148. Using a sketch, show how a straight through cable differs from a crossover cable?

Chapter 6: Networks Page 17 of 35IT Essentials 5.0

Page 18: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

149. What is the maximum speed of Cat5 UTP cable?

150. What is the maximum speed of Cat 5e, 6 and 6a UTP cable?

151. What is the maximum speed of Cat 7 ScTP cable?

6.4.2.4 Lab - Building Straight-Through and Crossover UTP Cables

6.4.2.6 – Fiber-Optic Cables152. Why is fiber-optic not affected by EMI or RFI?

153. What generates the light used to represent the data transmitted on a fiber-optic cable?

154. What limits the speed of the data transmitted over a fiber-optic cable?

155. What are the common connectors for a fiber-optic cable?

156. What are the two types of fiber-optic cable?

157. What is the maximum length of single-mode fiber-optic cable?

6.5.1.1 – Logical and Physical Topologies158. What does a logical topology describe?

159. What are the two most common logical topologies?

Chapter 6: Networks Page 18 of 35IT Essentials 5.0

Page 19: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

160. What does a physical topology define?

161. Why do you need a terminator in a bus topology?

162. How does a ring topology work? (sketch it)

163. What is the advantage of a star topology? (sketch it)

164. What is a benefit of a mesh topology? (sketch it)

165. What is a hybrid topology?

6.5.1.3 – Determining the Network Topology166. What determines the initial physical and logical topology of a network?

167. What is a site survey?

Chapter 6: Networks Page 19 of 35IT Essentials 5.0

Page 20: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.6.1.1 – Standards Organizations168. What do manufacturers use standards for?

169. What do standards ensure?

170. What is IEEE best known for?

6.6.1.2 – IEEE 802.3171. What is the standard for Ethernet architecture?

172. What does CSMA/CD stand for?

173. What is a backoff algorithm?

6.6.1.3 – Ethernet Technologies174. What is the transfer rate of 100BASE-TX?

175. What is the transfer rate of 1000BASE-T?

176. What is the transfer rate of 10GBASE-T?

6.6.1.4 – IEEE 802.11177. What is the standard for wireless networks?

178. Which wireless standard operates in the 5 GHz radio frequency range with a maximum range of 45.7 m (150 ft)?

179. Which wireless standard operates in the 2.4 GHz radio frequency range with a maximum range of 91m (300ft)?

180. Which wireless standard has the longest range?

Chapter 6: Networks Page 20 of 35IT Essentials 5.0

Page 21: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.7.1.1 – TCP/IP181. What is an architectural model?

182. Who created the TCP/IP model?

183. What are the four layers of the TCP/IP model?

184. Where does a message begin in the TCP/IP model?

185. What is added as the message moves down through each layer?

186. What network services are provided to the user at the application layer? email.

187. What do the transport layer protocols provide?

188. What two protocols are transport layer?

189. What do Internet layer protocols provide

Chapter 6: Networks Page 21 of 35IT Essentials 5.0

Page 22: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

190. What are defined in the Network Access Layer protocols?

6.7.1.2 – OSI191. How many layers are in the OSI model?

192. What is a protocol stack?

193. Where are protocol stacks implemented?

194. Which layer is responsible for providing network access to applications?

195. What happens at the transport layer?

196. At which layer does the segment become a packet?

197. What information is contained in a packet?

198. What information does a frame contain?

199. What are the two mnemonics for the OSI Model?

A

P

S

T

N

D

P

Chapter 6: Networks Page 22 of 35IT Essentials 5.0

Page 23: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.7.1.4 – Activity – Match the OSI Model to the TCP/IP Model Instructor Check_____________

6.8.1.1 – Network Installation Completion List200. What can be used to install a wireless network?

201. What is a cable tester used for?  

202. Where is the best place for a wireless access point? (sketch this)

203. What is the ipconfig/all command used for?

204. What is the ping command used for?

6.8.2.1 – Selecting a NIC205. What is required to connect to the network?

206. Most laptop network interfaces are either _________________ into the motherboard or fit into a

______________________ or _________________________expansion slot.

207. USB network adapters plug into a ______________ and can be used with both

___________________ and _______________________.

Chapter 6: Networks Page 23 of 35IT Essentials 5.0

Page 24: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

208. What should you do before purchasing a NIC?

209. What do you need to connect to a wireless network?

6.8.2.2 Worksheet - Internet Search for NIC Drivers

6.8.2.3 – Installing and Updating a NIC210. What is a best practice when running driver updates?

211. What is the path to the device manager in Windows 7?

212. What is the path to the device manager in Windows XP?

213. How do you uninstall a NIC driver?

6.8.2.4 Lab - Install a Wireless NIC in Windows 76.8.2.5 Lab - Install a Wireless NIC in Windows Vista 6.8.2.6 Lab - Install a Wireless NIC in Windows XP

6.8.2.7 – Configuring a NIC214. What information must every NIC be configured with?

215. Can the MAC address be changed?

216. What is a benefit of setting up an alternate IP address?

Chapter 6: Networks Page 24 of 35IT Essentials 5.0

Page 25: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.8.2.8 – Advanced NIC Settings217. What is the result of improperly setting the advanced features?

218. What is a duplex mismatch?

219. What is Wake on LAN?

220. What is very low power mode?

221. What is a magic packet?

222. What is QoS?

6.8.3.1 – Connecting to the Router223. What can no activity on the link lights of a NIC indicate

Chapter 6: Networks Page 25 of 35IT Essentials 5.0

Page 26: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.8.3.2 – Setting the Network Location224. What are the three network location profiles in Windows 7 and Vista?

225. What is a homegroup?

226. When should you choose a home network location profile?

227. Which network location profile provides the most protection?

228. How do you release and renew an IP address?

6.8.3.4 – Basic Network Setup229. What is Network Address Translation?

6.8.3.5 Lab - Connect to a Router for the First Time

6.8.3.7 – Basic Wireless Settings230. Why might you use a mixed mode wireless network environment?

231. What is the SSID?

232. What must you do when the SSID broadcast is disabled?

233. What radio frequency range do 802.11b and 802.11g transmit in?

Chapter 6: Networks Page 26 of 35IT Essentials 5.0

Page 27: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

234. How does WEP work?

235. What is the improved version of WEP called?

236. What kind of security does WPA2 provide?

6.8.3.8 Lab - Configure Wireless Router in Windows 7 6.8.3.9 Lab - Configure Wireless Router in Windows Vista 6.8.3.10 Lab - Configure Wireless Router in Windows XP

6.8.3.12 – Testing Connectivity with the Windows GUI237. What is the easiest way to test for an internet connection?

238. What are wireless locators?

6.8.3.13 – Testing Connectivity with the Windows CLI239. What does the ipconfig command do?

240. What does the ping command do?

241. What ping command option will give you the hostname of a computer from its IP Address?

242. What do you use the net command for?

243. What protocol do net commands use?

244. What does tracert do?

Chapter 6: Networks Page 27 of 35IT Essentials 5.0

Page 28: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

245. What is the first listing in a tracert result?

246. What is used to test and troubleshoot DNS servers?

6.8.3.14 Lab - Test the Wireless NIC in Windows 7 6.8.3.15 Lab - Test the Wireless NIC in Windows Vista 6.8.3.16 Lab - Test the Wireless NIC in Windows XP

6.8.4.1 – Domain and Workgroup247. What are domain and workgroups?

248. What is a domain?

249. What does a domain controller do?

250. Why should routine backups of all files on a server be performed?

251. What is a workgroup?

6.8.4.2 – Connecting to a Workgroup or a Domain252. What must be done before computers can share resources?

Chapter 6: Networks Page 28 of 35IT Essentials 5.0

Page 29: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

253. What must you do after changing a domain name or workgroup name?.

6.8.4.3 – Windows 7 Homegroup254. How many homegroups can a computer belong to?

255. What network location profile must you apply to use homegroups?

6.8.4.6 – Network Shares and Mapping Drives256. What is useful about mapping a local drive?

257. Mapping a local drive is done by assigning what to the resource on a remote drive?

258. What permissions are available to be assigned to a file or folder?

259. Which permission allows a user to add files and subfolders, change the data in files and delete subfolders and files?

260. What are the maximum simultaneous file sharing connections in Windows 7?

6.8.4.7 Lab - Share a Folder, Create a Homegroup, and Map a Network Drive in Windows 7 6.8.4.8 Lab - Share a Folder and Map a Network Drive in Windows Vista 6.8.4.9 Lab - Share a Folder and Map a Network Drive in Windows XP

6.8.4.10 – VPN261. What is a VPN? (sketch it)

262. What access does a user have when connected to a network through a VPN?

Chapter 6: Networks Page 29 of 35IT Essentials 5.0

Page 30: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

263. VPN connections are also known as what?

6.9.1.1 – Brief History of Connection Technologies264. What was the Internet typically used for in the 1990s?

265. What does POTS stand for?

266. How does dialup work?

267. Which connection type uses telephone wires for analog telephone service, is a standard for sending voice, video and data over normal telephone wires and uses multiple channels to carry different types of service?

268. What is broadband?

269. What is an example of broadband?

270. What are some common broadband network connections?

6.9.1.2 – DSL and ADSL271. What does DSL use to provide high-speed digital data communication?

272. How are ISDN and DSL different?

273. What prevents DSL signals from interfering with phone signals?

274. What is downloading?.

Chapter 6: Networks Page 30 of 35IT Essentials 5.0

Page 31: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

275. What is uploading?

276. ADSL has a fast ____________________rate which is beneficial to users who are downloading

large amounts of data. The _____________________ rate of ADSL is slower than the

_____________________ rate.

6.9.1.3 – Line of Sight Wireless Internet Service277. What is line of sight wireless Internet?

278. What is required between the transmission tower and the customer?

279. How far can lower frequency signals of 900 MHz travel?

280. How far can higher frequency signals of 5.7GHz travel?

281. What can affect signal strength and performance of line of sight wireless Internet?

6.9.1.4 – WiMAX282. What is WiMAX?

283. What is the standard for WiMAX?

284. What two methods are available for transmitting WiMAX?

285. What is Fixed WiMAX?

Chapter 6: Networks Page 31 of 35IT Essentials 5.0

Page 32: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

286. What is Mobile WiMAX?

6.9.1.5 – Other Broadband Technologies287. What is cellular technology?

288. What cellular WAN technology has data speeds between 144Kb/s and 2Mb/s?

289. What are the data speeds of 4G technology?

290. What is GSM?

291. What is EDGE?

292. What is a cable modem?

293. When is broadband satellite used?

294. What are the download and upload speeds of broadband satellite?

295. What is a disadvantage of broadband satellite?

6.9.1.6 Worksheet - Answer Broadband Questions

Chapter 6: Networks Page 32 of 35IT Essentials 5.0

Page 33: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.9.1.7 – Selecting an ISP for the Customer296. What are the four main considerations for an Internet connection?

A

B

C

D

297. What are the major disadvantages of POTS?

298. Where does DSL work better and faster?

Type Advantages Disadvantages Speed

POTS

ISDN

DSL

Cable

Satellite

Cellular

6.9.1.8 Worksheet - ISP Connection Types

Chapter 6: Networks Page 33 of 35IT Essentials 5.0

Page 34: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.10.1.1 – Preventative Maintenance Procedures299. What is one of the biggest problems with network devices?

300. What should you do as part of a regularly scheduled maintenance program?

6.11.1.1 – Identify the Problem301. What should you do to assess how complicated a problem is?

302. Where should you start the troubleshooting process if there is a problem with all the computers on the network?

303. What is the first step in the troubleshooting process?

6.11.1.2 – Establish a Theory of Probable Cause304. What are some common causes of network problems?

6.11.1.3 – Test the Theory to Determine Cause305. What should you do if a quick procedure does correct the problem?

6.11.1.4 – Establish a Plan of Action to Resolve the Problem and Implement the Solution306. What are some sources you can use to gather additional information to resolve a problem?

6.11.1.5 – Verify Full System Functionality and Implement Preventative Measures307. What command can you use to verify network connectivity?

308. What does the tracert command do

Chapter 6: Networks Page 34 of 35IT Essentials 5.0

Page 35: itessentialsresourcejournal.weebly.com · Web viewName _____ Date _____ Chapter 6: Networks After completion of this chapter, students should be able to: Explain the principles of

6.11.2.1 – Identify Common Problems and Solutions309. What is the probable cause if a user cannot telnet into a remote device?

310. What is the probable cause if the computer has an IP address of 169.254.x.x

311. What might be a probable cause if a user can log into the local network but cannot access the Internet?

6.12.1.1 – Summary312. What is a computer network composed of?

313. What does a client/server network use that a peer-to-peer network does not have?

314. What protocol is the dominant standard for the Internet?

315. What CLI tools can be used to test network connectivity?

316. What are the three transmission methods to send signals over data channels?

Chapter 6: Networks Page 35 of 35IT Essentials 5.0