analaysis on christianity

Upload: sherif-gaballa

Post on 07-Jul-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 analaysis on christianity

    1/26

    Name _______________________________________________________ Date ________________

    Chapter 3Student Version

    Chapter 3 Objectives:

    Explain how rules are used to facilitate communication.

    Explain the role of protocols and standards organizations in facilitatinginteroperability in network communications.Explain how devices on a L N access resources in a small to medium!sizedbusiness network.

    Required Materials:

    "eading #rganizer

    $acket %racer ctivities& '.(.).* $acket %racer ! +nvestigating the %,$!+$ and #-+ odels inction +nstructions

    '.'.'.' $acket %racer ! Explore a Network +nstructions

    Labs& './.0.( ,lass ctivity ! Let1s 2ust talk about this... +nstructions'.(.'.* Lab ! "esearching Networking -tandards'.(.).3 Lab ! "esearching "4,s'.'.'.) Lab ! 5sing 6ireshark to 7iew Network %ra8c

    '.).0.0 ,lass ctivity 9 :uaranteed to 6ork +nstructor $lanning Document,hapter %est

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    2/26

    $age intentionally left blank.(

  • 8/18/2019 analaysis on christianity

    3/26

    Name__________________________________________________________ Date ________________

    Chapter 3Reading Organizer

    Student Version

    Note & the "eading #rganizer has weighted scoring. ny ?uestion with the wordexplain or de ne in it is expected to have a longer answer and is worth twopoints each.

    !"ter co#pletion o" this chapter$ %ou should be able to:

    Explain how rules are used to facilitate communication.

    Explain the role of protocols and standards organizations in facilitatinginteroperability in network communications.Explain how devices on a L N access resources in a small to medium!sizedbusiness network.

    3&' Rules o" Co##unication

    0. ll communication methods have three elements in common> these are@

    a. senderb. source

    c. edia

    (. List the common computer protocols.

    a. essage ecoding

    b. essage formatting and ecapalation

    c. size

    d.timing

    e.encoding

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    4/26

    '. %he Brst step to sending a message is encoding it. 6hat is encoding@

    ). Cow is decoding di erent from encoding@

    ;. 6hat is encapsulation@

    %aking the letter and putting it into an envelope

    *. Explain how long messages or large frames are handled in a network to ensuredelivery@

    3. Explain the following terms.a. essage %iming 9

    b. ccess ethod 9determines a person can send a message

    c. ,ollision 9when people talk in the same time>

    d. 4low ,ontrol 9a ects the timing and speed of determined

    )

  • 8/18/2019 analaysis on christianity

    5/26

    e. "esponse %imeout 9Costs on the network have rules that specify theresponse time and what to do when there is no response

    . Explain the following terms.

    a. 5nicast 9-ending from one 9 to ! one

    b. ulticast 9 Cost uses #ne! %o ! any

    c. Froadcast 9+f everyone needs to know

    3&( Net)or* +rotocols and Standards

    G. Explain what a protocol suite is and what devices implement or use them@

    :roup of related protocol thatHs necessary to commit a protocol functionimplemented by hosts

    0/. 6hat is a protocol stack@+ndividual protocols in the suite is implemented

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    6/26

    00. +n a protocol stack the protocols are viewed in terms of layers. Cow do theselayers interact with each other@ %he ones on the top are depended on the oneson the bottom in a stack

    0(. 6hat do the lower layers in the protocol stack focus on@

    a. moving data over the network

    b. $roviding serves to the upper layers

    0(. 6hat do the upper layers in the protocol stack focus on@

    %he contents of the message being sent

    0'. 6hat are the three layers in the protocol stack@

    a. $hysical

    b. content

    c. rules

    0). 4or devices to successfully communicate> a network protocol suite mustdescribe precise re?uirements and interactions. 6hat do networking protocolsdeBne@

    common format with a set of rules for devices to communicate

    0;. List some common networking protocols.

    a. +$

    b. %C,$*

  • 8/18/2019 analaysis on christianity

    7/26

    c. C%%$

    0*. Describe some of the processes networking protocols are responsible for.

    a. Cow the message is formatted

    b. the process of which the devices share information of pathways with othernetworks

    c.Cow and when error messages are shared between devices ta pass bet

    d. set up and terminations of the data transfor sessions

    03. Explain in detail how the following protocols operate. Iin detail means more thanone sentenceJ

    pplication $rotocol ! Cypertext %ransfer $rotocol IC%%$J 9

    %ransport $rotocol ! %ransmission ,ontrol $rotocol I%,$J 9

    +nternet $rotocol 9 +$ 9

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    8/26

    Network ccess $rotocols 9

    0 . %he protocols +$> C%%$> and DC,$ are all part of the +nternet protocol suiteknown as&

    0G. %he %,$A+$ protocol suite is an open standard. Explain what that means.

    (/. Explain what a standards!based protocol is.

    (0. Explain in detail why itHs important to have standard based protocols.

  • 8/18/2019 analaysis on christianity

    9/26

    ((. Explain in detail what proprietary protocols are.

    ('. +s ,iscoHs E+:"$ routing protocol proprietary or non!proprietary@

    (). %he +$ suite is a suite of protocols re?uired for transmitting and receivinginformation using the +nternet. +t is commonly known as ___________________.

    (;. 6hat year was the %,$ and +$ protocols formalized@

    (*. 6hat year did ,isco launch its Brst routing innovation@

    (3. Explain the protocol steps involved in during the communication process aftera remote computer re?uests a webpage from a web server.

    a.

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    10/26

    b.

    c.

    d.

    e.

    f.0/

  • 8/18/2019 analaysis on christianity

    11/26

    g.

    h.

    ( . 4ill in the correct protocols.

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    12/26

    (G. -tandards organizations are usually __________________________>

    _________________________ established to develop and promote the concept of openstandards.

    '/. Explain the function and responsibility of each of the following standardsorganizations.

    a. %he +nternet -ociety I+-#,J 9

    b. %he +nternet rchitecture Foard I+ FJ 9

    0(

  • 8/18/2019 analaysis on christianity

    13/26

    c. %he +nternet Engineering %ask 4orce I+E%4J 9

    d. %he +nstitute of Electrical and Electronics Engineers I+EEEJ pronounced K+!

    triple!E 9

    e. %he +nternational #rganization for -tandardization I+-#J 9

    f. %he Electronic +ndustries lliance IE+ J 9

    g. %he %elecommunications +ndustry ssociation I%+ J 9

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    14/26

    h. %he +nternational %elecommunications 5nion!%elecommunication -tandardization-ector I+%5!%J 9

    i. %he +nternet ,orporation for ssigned Names and Numbers I+, NNJ 9

    2. %he +nternet ssigned Numbers uthority I+ N J 9

    '0. %he +EEE /(.' and +EEE /(.00 standards are signiBcant +EEE standards incomputer networking. Explain why.

    a. /(.' 9

    0)

  • 8/18/2019 analaysis on christianity

    15/26

    b. /(.00 9

    '(. atch the standards organization to its correct description.

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    16/26

    ''. Explain the beneBts to using a layered model to describe network protocolsand operations.0*

  • 8/18/2019 analaysis on christianity

    17/26

    a.

    b.

    c.

    d.

    '). %here are two basic types of networking models. Explain both&

    a. $rotocol model 9

    b. "eference model 9

    ';. 6hat are the two most commonly used network models when discussingnetwork functionality@

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    18/26

    a.

    b.

    '*. 4ill in the correct information to complete the two network models.

    '3. Explain what happens at each of the #-+ model layers.

    a. pplication Layer 9

    b. $resentation Layer 9

    c. -ession Layer 9

    0

  • 8/18/2019 analaysis on christianity

    19/26

    d. %ransport Layer 9the transport di ence segments and reassembles themin between end devices

    e. Network Layer 9

    $rovides services that exchange the indivisual pieces of data over thenetwork

    f. Data Link Layer 9$rotocal describe methods for data frams over a device of common media

    g. $hysical Layer 9

    describe nechanical and eleconical and procedional means to activate

    ' . Explain what happens at each of the %,$A+$ model layers.

    a. pplication Layer 9

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    20/26

    resoesent data to the user plus encoding

    b. %ransport Layer 9

    supports communicate between diverse networks

    c. +nternet Layer 9

    determines the best path through the network

    d. Network ccess Layer 9control hardware device and media

    'G. atch the following terms to their deBnitions.

    Data Link anages data exchange

    $resentation Fit %ransmission

    (/

  • 8/18/2019 analaysis on christianity

    21/26

    -ession Data "epresentation

    Network Exchanges frames between devices

    $hysical $rovides a data path or route

    pplication Exchanges frames between devices

    Network ccess -egments> transfers> and reassembles data

    %ransport Determines the best path through a network

    +nternet #rganizes dialog 9 manages data exchange

    3&3 Moving ,ata in the Net)or*

    )/. 6hat is segmentation@Freaking more data in smaller pieces

    )0. 6hat are two primary beneBts to segmenting data over a network@

    a.-ending smaller pieces many convo can go on at a time

    b. increase the liability

    )(. %he process used to interleave the pieces of separate conversations togetheron the network is called@ ulti!$lexing

    )'. 6hat is the downside to using segmentation and multiplexing to transmitmessages across a network@ Extra layer of complicaty

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    22/26

    )). s application data is passed down the protocol stack on its way to betransmitted across the network media> various protocols add information to it ateach level. %his is commonly known as@

    +n caplsulation

    );. Explain what data encapsulation is.

    dds additional header to data before transmittion

    )*. Cow does de!encapsulation di er from encapsulation@

    De!encapulation detaches the header while encapsulation adds a header

    )3. 4ill in the blanks on the graphic with the correct $D5 name.

    ((

  • 8/18/2019 analaysis on christianity

    23/26

    ) . #-+ model describes the processes of encoding> formatting> segmenting> andencapsulating data for transmission over the network. 6hat happens at thenetwork layer and data link layer@

    %heyre responsible the data resource to the reciver

    )G. Layer ' or Network layer +$ address has two parts> list and explain both.

    a. _______preBx used by router__________________________ !

    b. ___________________host delivers the packet________________ !

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    24/26

    ;/. n +$ packet contains two +$ addresses> list and explain both.

    $hysical

    logicalb. ___________________________________ !

    ;0. 6hat is the purpose of a data link address@

    Dns#r matbe aMentered in the thing manually

    ;(. 6hat are other names for a data link address@

    a.

    b.

    c.

    ;'. 6hich two addresses are re?uired to send data to another host on the samenetwork@

    a.

    b.

    ;). Cow can a source host can learn the numeric destination +$ address of anotherhost@

    a.

    b.

    ;;. 6hat is ddress "esolution $rotocol or "$ used for@()

  • 8/18/2019 analaysis on christianity

    25/26

    %o descover mac adress

    ;*. Explain in detail how ddress "esolution $rotocol or "$ works@

    ;3. Explain how a host sends a message to another host located on the samenetwork@

    ; . Explain how a host sends a message to a remote network@

    ,isco -emester 0 9 +ntroduction to Networks ;./"obb

  • 8/18/2019 analaysis on christianity

    26/26

    ;G. +f no default gateway address is conBgured in the host %,$A+$ settings> or if thewrong default gateway is speciBed> what happens to messages addressed to hostson remote networks@

    */. Cow does a local host learn the , address of its default gateway router@