Preview

it104 Assignment 1

Satisfactory Essays
Open Document
Open Document
721 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
it104 Assignment 1
How many bits are in a gigabyte? | 1 billion |
How many bits are in a megabyte? | 1 million |
Convert 00101010 to decimal. | 42 |
What is the difference between a sector and a track? | A sector is part of a track |
How many bits are in one hexadecimal digit? | 4 |
How are voice communications converted to digital signals? | Audio is sampled at a high rate which is converted to binary numbers |
What does it mean to compress a video file? | To decrease file size |
In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? | web page: page2 server: www.example.com protocol: http |
What makes up the internet core? | Many separate small and large networks |
What manages computer peripherals devices? | Device Drivers |
What physical network topology has the inherent weakness of a single point failure? | Star Network |
What is a networking standard? | Details of what a networking technology does, and how it does it |
What is a de facto standard and what stanards-setting body creates them? | An informal standard, no company governs them |
What are some reasons TCP/IP model is divided into layers? | Troubleshooting, Creation of network standards and protocols |
Why is the TCP/IP model considered an "open" networking model? | It's not owned by any specific organization | what do routers in a network do? | Mave data between LANs by linking them to WANs |
What is encapsulation? | A way to cross data over a any network link |
In a TCP/IP network, what is the difference between an IP address and a MAC address? | IP is assigned to a node, MAC is permanent |
What does and IP address look like? | ##.##.##.## |
What is the purpose of the physical layer of the TCP/IP model? | Anything used to transmit bits over a single, physical connection |
What is the result of the Wi-Fi Alliances input on wireless devices? | Devices from different vendors are more likely to be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The hierarchical star is the most common one used in modern networks. It allows many pieces of equipment to be connected to the network via a hub or more commonly a switch. It allows for one continuous connection from the telecom room to the user end equipment. If the cable fails it means only that piece connected will not be on the network and that only that cable need be replaced, leaving all other components connected to function normally. The biggest disadvantage to this type of network is that there is only a single point where all the cabling is terminated and if that piece, be it hub or switch, goes bad the entire network goes down, however once that piece is replaced it brings the entire network back up.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Hell, Hans. (2010). LAN, MAN,WAN: An Overview of the Three Basic Types of Networks. http://voices.yahoo.com/lan-man-wan-overview…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A ring network is a network topology in which each node connects exactly to two other nodes, forming a single continual pathway for each node - a ring” (Conjecture Corporation, 2003). In a ring network data travels from each node to the other node/s with each node handling every packet. A ring network provides only a pathway between any two nodes at one time. Ring networks may be disrupted by the failure of a link. A node failure or cable break will isolate every node attached…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Assignment 1

    • 1455 Words
    • 6 Pages

    Data Over Telephone Lines – Telephone was originally invented to transfer voice. However, now you can transmit data over the telephone. The fixed-line telephone is on analog systems capable of transmitting only a narrow range of audio frequencies. Because it only transmits a small portion of the audio spectrum, it may not seem like a good choice for transmitting data.…

    • 1455 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    HTTP: Hypertext Transfer Protocol, The protocol used by web browsers and web servers to define the format of URLs (web addresses) and the messages used to exchange web objects.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IPv4 exhaustion

    • 976 Words
    • 4 Pages

    Arkko and Townsley in (2011) indicated that IP (internet protocol) is a standardized set of communication mechanisms used to establish connections amongst devices over the internet by exchanging packet datagrams developed over the past 40 years by DARPA (Defence Advanced Research Projects Agency) in US. Moreover, IP enables every single devices to communicate with each other by assigning unique numbers to them which is called IP addresses. The internet IP address is governed by IANA (Internet Assigned Numbers Authority), and it is a responsible department of ICANN which possesses the internet run efficiently (Huston, 2014).…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Tcp/Ip

    • 1116 Words
    • 5 Pages

    An IP address is composed of a network number and a computer number. Your computer can distinguish those two numbers because of something called the subnet mask. The subnet mask is located in a field directly below the IP address on the TCP/IP properties sheet. A simple subnet mask would be something like 255.255.0.0. The numbers that make up the subnet mask…

    • 1116 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    paradigm shift

    • 323 Words
    • 1 Page

    The network components and there primary functions are that its build into layer and they all work with each other. There primary functions are that this that connects you to the network and it allows you to connect you to the network. The difference between WAN and LAN is that LAN primarily Ethernet and Token Ring and WAN uses technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances. Basic security for data in networks is back up important files and making sure your computer is secure. Installing networks wireless it takes some configurations so it can work.…

    • 323 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    * Rules or agreements: protocols or how the message is semt, directed, received and interpreted.…

    • 1776 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Introduction to Networking

    • 1575 Words
    • 7 Pages

    The idea of networking has been around for a long time and has taken on many meanings. If you were to look up "network" in your dictionary, you might find any of the following definitions:…

    • 1575 Words
    • 7 Pages
    Powerful Essays