Chapter 1 Review

Network+ Guide to Networks, Chapter 1 Review
An Introduction to Networking

Loosely defined, a network is a group of computers and other devices (such as printers) that are connected by some type of transmission media. Variations on the elements of a network and the way it is designed, however, are nearly infinite. A network can be as small as two computers connected by a cable in a home office or as large as several thousand computers connected across the world via a combination of cable, phone lines, and cellular links. In addition to connecting personal computers, networks might link mainframe computers, printers, plotters, fax machines, and phone systems. They might communicate through copper wires, fiber-optic cable, or radio waves. This chapter introduces you to the fundamental characteristics of networks.

Why Use Networks?

Using networks offers advantages relative to using a stand-alone computerthat is, a computer that is not connected to other computers and that uses software applications and data stored on its local disks. Most important, networks enable multiple users to share devices (for example, printers) and data (such as spreadsheet files), which are collectively known as the network’s resources. Sharing devices saves money. For example, rather than buying 20 printers for 20 staff members, a company can buy one printer and have those 20 staff members share it over a network. Sharing devices also saves time. For example, it’s faster for coworkers to share data over a network than to copy data to a removable storage device and physically transport the storage device from one computer to another—an outdated file-sharing method commonly referred to as a sneakernet (presumably because people wore sneakers when walking from computer to computer). Before networks, transferring data via floppy disks was the only possible way to share data. Networks also allow you to manage, or administer, resources on multiple computers from a central location. Imagine you work in the Information Technology (IT) Department of a multinational bank and must verify that each of 5000 employees around the globe uses the same version of a database program. Without a network, you would have to visit every employee’s machine to check and install the proper software. With a network, however, you could provide employees with access to the database program on a single computer using a Web page. Because they allow you to share devices and administer computers centrally, networks increase productivity. It’s not surprising, then, that virtually all organizations depend on their networks to stay competitive.

Types of Networks

Peer-to-Peer Networks
The simplest form of a network is a peer-to-peer network. In a peer-to-peer network, every computer can communicate directly with every other computer. By default, no computer on a peer-to-peer network has more authority than another. However, each computer can be configured to share only some of its resources and prevent access to other resources. Traditional peer-to-peer networks typically consist of two or more general-purpose personal computers, with modest processing capabilities. Every computer is capable of sending and receiving information to and from every other computer.
                                                                                                                                        
The following are advantages of using traditional peer-to-peer networks:
·         They are simple to configure. For this reason, they may be used in environments in which time or technical expertise is scarce.
·         They are often less expensive to set up and maintain than other types of networks.
·         This fact makes them suitable for environments in which saving money is critical.

The following are disadvantages of using traditional peer-to-peer networks:
·         They are not very flexible. As a peer-to-peer network grows larger, adding or changing significant elements of the network may be difficult.
·         They are also not necessarily secure—meaning that in simple installations, data and other resources shared by network users can be easily discovered and used by unauthorized people.
·         They are not practical for connecting more than a handful of computers because they do not always centralize resources.

For example, if your computer is part of a peer-to-peer network that includes five other computers, and computer users store their spreadsheets and word-processing files on their own hard disks, whenever your colleagues want to edit your files, they must access your machine on the network. If one colleague saves a changed version of one of your spreadsheets on her hard disk, you’ll find it difficult to keep track of which version is the most current. As you can imagine, the more computers you add to a peer-to-peer network, the more difficult it becomes to find and manage resources. A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system. For example, you could choose to create a directory on your computer’s hard disk called “SharedDocs” and then configure the directory to allow all networked computers to read its files. On a peer-to-peer network, each user is responsible for configuring her computer to allow access to certain resources and prevent access to others. In other words, resource sharing is not controlled by a central computer or authority. Because access depends on many different users, it might not be uniform or secure.Although traditional peer-to-peer networks are typically small and contained within a home or office, examples of very large peer-to-peer networks have emerged to take advantage of the Internet. These newer types of peer-to-peer networks (commonly called P2P networks) link computers from around the world to share files between each other’s’ hard disks. Unlike the older style of peer-to-peer network, they require specialized software (besides the computer’s operating system) to allow resource sharing.
Examples of these networks include Gnutella, Bitcoin, and the original Napster. In 2001, Napster, which allowed users around the globe to share music files, was forced to cease operation due to charges of copyright infringement from musicians and music producers. Later, the service was redesigned to provide legitimate music file-sharing services. A company called BitTorrent has made a unique high-speed peer-to-peer communications method (also called BitTorrent) the foundation of its business. The company specializes in allowing companies and individuals to share video, audio, software, and games over the Internet. Although BitTorrent’s peer-to-peer technology is legal, its use for distributing illegal or

Client/Server Networks
Another way of designing a network is to use a central computer, known as a server, to facilitate communication and resource sharing between other computers on the network, which are known as clients. Clients take the form of personal computers, also known as workstations, or mobile devices, such as smartphones. A network that uses a server to enable clients to share data, data storage space, and devices is known as a client/server network.The term client/server architecture is sometimes used to refer to the design of a network in which clients rely on servers for resource sharing and processing. In terms of resource sharing and control, you can compare the client/server network with a public library. Just as a librarian manages the use of books and other media by patrons, a server manages the use of shared resources by clients. For example, if a patron does not have the credentials to check out books, the librarian prevents the patron from doing so. Similarly, a server allows only authorized clients to access its resources. Every computer on a client/server network acts as a client or a server. (It is possible, but uncommon, for some computers to act as both.) Clients on a network can still run applications from and save data to their local hard disk. But by connecting to a server, they also have the option of using shared applications, data, and devices. Clients on a client/server network do not share their resources directly with each other, but rather use the server as an intermediary. Clients and servers communicate through connectivity devices such as switches or routers. 

To function as a server, a computer must be running an NOS (network operating system).
An NOS is a special type of software designed to do the following:
·         Manage data and other resources for a number of clients.
·         Ensure that only authorized users access the network.
·         Control which type of files a user can open and read.
·         Restrict when and from where users can access the network.
·         Dictate which rules computers will use to communicate.
·         Supply applications to clients.

Examples of popular network operating systems include various forms of UNIX and Linux, Microsoft Windows Server 2008 R2, and Mac OS X Server. By contrast, a stand-alone computer, or a client computer, uses an operating system, such as Windows 7 or a version of Linux, UNIX, or Mac OS, and has authority for managing resources on other computers. Usually, servers have more memory, processing, and storage capacity than clients. They may even be equipped with special hardware designed to provide network management functions beyond that provided by the network operating system. For example, a server might contain an extra hard disk and specialized software so that if the primary hard disk fails, the secondary hard disk automatically takes its place.

Although client/server networks are typically more complex in their design and maintenance than peer-to-peer networks, they offer many advantages over peer-to-peer networks, such as:
·         User logon accounts and passwords for anyone on a server-based network can be assigned in one place.
·         Access to multiple shared resources (such as data files or printers) can be centrally granted to a single user or groups of users.
·         Problems on the network can be monitored, diagnosed, and often fixed from one location.
·         Servers are optimized to handle heavy processing loads and dedicated to handling requests from clients, enabling faster response time.
·         Because of their efficient processing and larger disk storage, servers can connect more than a handful of computers on a network.
Together, these advantages make client/server networks easier to manage, more secure, and more powerful than peer-to-peer networks. They are also more scalable than peer-to-peer networks. In other words, it is easier to add computers and other devices to a client/server network.

LANs, MANs, and WANs
A LAN (local area network) is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office. Small LANs first became popular in the early 1980s. At that time, LANs might have consisted of a handful of computers connected in a peer-to-peer fashion. Today’s LANs are typically much larger and more complex client/server networks.  Often, separate LANs are interconnected and rely on several servers running many different applications and managing resources other than data. For example, imagine an office building in which each of a company’s departments runs its own LAN and all the LANs are connected. This network may contain dozens of servers, hundreds of workstations, and several shared storage devices, printers, plotters, fax machines, and even telephone interfaces. Networks may extend beyond the boundaries of a building. A network that is larger than a LAN and connects clients and servers from multiple buildings—for example, a handful of government offices surrounding a state capitol building—is known as a MAN (metropolitan area network). Because of the distance it covers, a MAN may use different transmission technology and media than a LAN. A network that connects two or more geographically distinct LANs or MANs is called a WAN (wide area network). Because such networks carry data over longer distances than LANs, WANs may use different transmission methods and media than LANs. Most MANs can also be described as WANs; in fact, network engineers are more likely to refer to all networks that cover a broad geographical range as WANs. WANs commonly connect separate offices in the same organization, whether they are across town or across the world from each other. For example, imagine you work for a nationwide plumbing supply company that keeps its inventory in warehouses in Topeka, Kansas, and Panama City, Florida. Suppose also that the company’s headquarters is located in New York. When a customer calls and asks whether you have five faucets of a certain type available to ship overnight, you need to check the inventory databases for both the Topeka and Panama City warehouses. Thanks to your WAN, the data are accessible from your New York desktop. Twice a day, the warehouses’ inventory software automatically updates a database located on central server in New York via WAN links that connect the locations. WANs are also used to connect LANs that belong to different organizations. For example, all the public universities within a state might combine and share their resources via a WAN. The largest and most varied WAN in the world is the Internet.

Elements Common to Client/Server Networks

You have learned that networks, no matter how simple or complex, provide some benefits over stand-alone computers. They also share terminology and common building blocks, some of which you have already encountered.  The following list provides a more complete rundown of basic elements common to all client/server networks:

Clienta computer on the network that requests resources or services from another computer on a network; in some cases, a client could also act as a server. The term client may also refer to the human user of a client workstation or to client software installed on the workstation.

Servera computer on the network that manages shared resources; servers usually have more processing power, memory, and hard disk space than clients. They run network operating software that can manage not only data, but also users, groups, security, and applications on the network.

Workstation—A personal computer (such as a desktop or laptop), which may or may not be connected to a network; most clients are workstation computers.
 
NIC (network interface card)—the device (pronounced nick) inside a computer that connects a computer to the network media, thus allowing it to communicate with other computers; many companies (such as Intel, Linksys, and Netgear) manufacture NICs, which come with a variety of specifications that are tailored to the requirements of the workstation and the network. Some connect to the motherboard, which is the main circuit that controls the computer, some are integrated as part of the motherboard, and others connect via an external port. NICs are also known as network adapters.

NOS (network operating system)—the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. Examples include various types of UNIX and Linux operating systems, Microsoft Windows Server 2008 R2, and Mac OS X Server.

Host—a computer that enables resource sharing by other computers on the same network.

Node—a client, server, or other device that can communicate over a network and that is identified by a unique number, known as its network address.

Connectivity device—a specialized device that allows multiple networks or multiple parts of one network to connect and exchange data. A small client/server network can operate without connectivity devices. However, medium- and large-sized LANs use them to extend the network and to connect with WANs. WANs use them to connect with the Internet and with other WANs.

Segment—a part of a network. Usually, a segment is composed of a group of nodes that use the same communications channel for all their traffic.

Backbone—the part of a network to which segments and significant shared devices (such as routers, switches, and servers) connect. A backbone is sometimes referred to as “a network of networks” because of its role in interconnecting smaller parts of a LAN or WAN. Figure 1-6 shows a LAN with its backbone highlighted in yellow.

Topology—the physical layout of a computer network. Topologies vary according to the needs of the organization and available hardware and expertise. Networks can be arranged in a ring, bus, or star formation, and the star formation is the most common. Hybrid combinations of these patterns are also possible.

Protocol—a standard method or format for communication between networked devices. For example, some protocols ensure that data are transferred in sequence and without error from one node on the network to another. Other protocols ensure that data belonging to a Web page are formatted to appear correctly in a Web browser window. Still others encode passwords and keep data transmissions secure.

Packet—a distinct unit of data exchanged between nodes on a network. Breaking a large stream of data into many packets allows a network to deliver that data more efficiently and reliably.

Addressing—the scheme for assigning a unique identifying number to every node on the network. The type of addressing used depends on the network’s protocols and network operating system. Each network device must have a unique address so that data can be transmitted reliably to and from that device.

Transmission media—the means through which data are transmitted and received. Transmission media may be physical, such as wire or cable, or atmospheric (wireless), such as radio waves.

How Networks Are Used

The functions provided by a network are usually referred to as network services. Any network manager will tell you that the network service with the highest visibility is e-mail. If your company’s e-mail system fails, users will notice within minutes—and they will not be shy about informing you of the failure. Although e-mail may be the most visible network service, other services can be just as vital. Printer sharing, file sharing, Internet access and Web site delivery, remote access capabilities, the provision of voice (telephone) and video services, and network management are all critical business functions provided through networks. In large organizations, separate servers may be dedicated to performing each of these functions. In offices with only a few users and little network traffic, one server may perform all functions.

File and Print Services
The term file services refers to a server’s ability to share data files, applications (such as word-processing or spreadsheet programs), and disk storage space. A server that provides file services is called a file server. File services accounted for the first use of networks and remain the foundation of networking today, for a number of reasons. As mentioned earlier, it is easier and faster to store shared data at a central location than to copy files to disks and then pass the disks around. Data stored at a central location is typically more secure because a network administrator can take charge of backing up this data, rather than relying on individual users to make their own copies. In addition, using a file server to run applications for multiple users requires the purchase of fewer copies of the application and less maintenance work for the network administrator. Using print services to share printers across a network also saves time and money. A high capacity printer can cost thousands of dollars, but can handle the printing tasks of an entire department, thereby eliminating the need to buy a desktop printer for each worker. With one printer, less time is spent on maintenance and management. If a shared printer fails, the network administrator can diagnose the problem from a workstation anywhere on the network using the network operating system’s printer control functions. Often, the administrator can solve the problem without even visiting the printer.

Access Services
A network’s access services allow remote users to connect to the network. (The term remote user refers to a person working on a computer on a different network or in a different geographical location from the LAN’s server.) Less frequently, access services allow network users to connect to machines outside the network. Most network operating systems include built-in access services that enable users to dial in to a remote access server, log on to the network, and take advantage of the network just as if they were logged on to a workstation on the office LAN. A remote access server may also be known as simply an access server. Organizations might use access services to provide LAN connectivity for workers at home, workers on the road, and workers at small satellite offices where dedicated WAN connections are not cost effective. In addition, access services can allow staff from other organizations (such as a software or hardware vendor) to help diagnose a network problem. For example, suppose you work for a clothing manufacturer that uses embroidery software to control the machines that sew insignias on shirts and hats. You are an expert on networking, but less adept with the automated embroidery software. When the software causes problems, you turn to the software vendor for help.But suppose the vendor’s technician can’t solve the problem except by logging on to your network. In that case, it is much more efficient and less expensive to allow the technician to dial in to your network through a remote access server than to fly the technician to your office.It is important to remember that remote access servers—no matter which platform (hardware or operating system software) they run on—allow external users to use network resources and devices just as if they were logged on to a workstation in the office. From a remote location, users can print files to shared printers, log on to hosts, retrieve mail from an internal messaging system, or run queries on internal databases. Because they can be accessed by the world outside the local network, remote access servers necessitate strict security measures.

Communications Services
Today’s networks can help users communicate in many ways: e-mail, telephone, video, fax, cell phone, smartphone (for example, an iPhone), and personal digital assistant (for example, a BlackBerry). Using the same network to deliver multiple types of communications services is known as convergence. A similar term, unified communications, refers to the centralized management of multiple network-based communications. For example, your company might use one software program to manage intraoffice phone calls, long-distance phone calls, cell phone calls, voice mail, faxes, and text messaging for all the users on your network. The oldest network communications services are mail services, which coordinate the storage and transfer of e-mail between users on a network. The computer responsible for mail services is called a mail server. Mail servers are usually connected to the Internet, but when clients only need to exchange e-mail within their organization, their mail server may be isolated on their LAN.

In addition to simply sending, receiving, and storing mail, mail servers can do the following:
·         Intercept or filter unsolicited e-mail, known as spam.
·         Find objectionable content in e-mails and do something about that content, such as flagging it to make the recipient aware of it.
·         Route messages according to particular rules. For example, if a technical support representative has not opened a customer’s message within 15 minutes of delivery, a mail server could automatically forward the message to a supervisor.
·         Provide a Web-based client for checking e-mail.
·         Notify administrators or users if certain events occur, such as a user’s mailbox exceeding its maximum amount of space on a server.
·         Schedule e-mail transmission, retrieval, storage, and maintenance functions.
·         Communicate with mail servers on other networks so that mail can be exchanged between users who do not connect to the same LAN.

To supply these services, a mail server runs specialized mail server software, examples of which include Sendmail and Microsoft Exchange Server. Because of their critical nature and heavy use, maintaining a mail server in any sizable organization requires a significant commitment of technical support and administration resources.

Internet Services
You have probably connected to the Internet without knowing or caring about all of the services running behind the scenes. But in fact, many servers are working together to bring Web pages to your desktop. For example, a Web server is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. The most popular Web server software is Apache. It’s used to deliver more than 60 percent of Web pages on the Internet. Supplying Web pages is only one type of Internet service.Other Internet services include file transfer capabilities, Internet addressing schemes, security filters, and a means for directly logging on to other computers on the Internet.

Management Services
When networks were small and simple, a single network administrator could manage the entire network. For instance, suppose a user called to report a problem logging on to the network and that the administrator diagnosed the problem as an addressing conflict (that is, two workstations having the same network address). In a very small network, the conflicting workstations might be located right around the corner from each other, and one address could be changed quickly. In another example, if a manager needed to report the number of copies of Adobe Photoshop in use in a certain department, the network administrator could probably get the desired information by just walking through the department and checking the various workstations. As networks grow larger and more complex, however, they become more difficult to manage. Using network management services can help you keep track of a large network. Network management services centrally administer management tasks on the network, such as ensuring that no more than 20 workstations are using Adobe Photoshop at one time in an organization that purchased a 20-user license for the software. Some organizations dedicate a number of servers to network management functions, with each server performing only one or two unique services. Numerous services fall under the category of network management. Some of the most important ones include the following:

Traffic monitoring and control—Determining how much traffic, or data transmission activity, is taking place on a network and notifying administrators when the network becomes overloaded. In general, the larger the network, the more critical it is to monitor traffic.

Load balancing—Distributing data transfer activity evenly so that no single device becomes overwhelmed. Load balancing is especially important for networks in which it’s difficult to predict the number of requests that will be issued to a server, as is the case with Web servers.

Hardware diagnosis and failure alert—Determining when a network component fails and automatically notifying the network administrator through an e-mail or text message.

Asset management— Collecting and storing data on the number and types of software and hardware assets in an organization’s network. With asset management software, a server can electronically examine each client’s software and hardware and automatically save the data in a database. Other types of assets might be identified and tracked using RFID (Radio Frequency Identification) tags, which emit a wireless signal at all times. Wireless detection devices connected to a network can track the locations of RFID-tagged devices. For example, a hospital might use RFID tags to keep track of the wheelchairs, beds, and IV pumps that circulate throughout its campus. Before asset management services, inventory data had to be gathered manually and typed into spreadsheets.

License tracking— Determining how many copies of a single application are currently in use on the network and ensuring that number does not exceed the number of licenses purchased. This information is important for legal reasons, as software companies are vigilant about illegally copying software or using more than the authorized number of copies.

Security auditing— Evaluating what security measures are currently in force and notifying the network administrator if a security breach occurs.

Software distribution— Automatically transferring a file or installing an application from the server to a client on the network. The installation process can be started from either the server or the client. Several options are available when distributing software, such as warning users about updates, writing changes to a workstation’s system files, and restarting the workstation after the update.

Address management— Centrally managing a finite number of network addresses for an entire network. Usually this task can be accomplished without manually modifying the client workstation configurations.

Backup and restoration of data— Backing up critical data files to a secure storage area and then restoring data if the original files are lost or deleted. Often backups are performed according to a formulaic schedule. Backup and data restoration services provide centralized management of data backup on multiple servers and on-demand restoration of files and directories.

Becoming a Networking Professional

If you search online employment services, you’ll probably find hundreds of postings for computer professionals. Of course, the level of expertise required for each of these jobs differs. Some companies simply need “warm bodies” to ensure that a higher-level engineer is notified if a critical network segment fails; other companies are looking for people to plan their global information technology strategies. Needless to say, the more extensive your skills, the better your chances for landing a lucrative and interesting job in networking. To prepare yourself to enter this job market, master a number of general networking technologies. Only then should you pick a few areas that interest you and study those specialties. Hone your communication and teamwork skills, and stay abreast of emerging technologies. Consider the tremendous advantages of attaining professional certification and getting to know others in your field. The following sections offer suggestions on how to approach a career in networking.

Mastering the Technical Challenges
Although computer networking is a varied field, some general technical skills will serve you well no matter which specialty you choose. Because you are already interested in computers, you probably enjoy an aptitude for logical and analytical thinking.

You probably also want to acquire these skills:
·         Installing, configuring, and troubleshooting network server software and hardware
·         Installing, configuring, and troubleshooting network client software and hardware
·         Understanding the characteristics of different transmission media
·         Understanding network design
·         Understanding network protocols
·         Understanding how users interact with the network
·         Constructing a network with clients, servers, media, and connectivity devices

Because you can expand your networking knowledge in almost any direction, you should pay attention to the general skills that interest you most, then pick one or two of those areas and concentrate on them.

The following specialties are currently in high demand:
·         Network security
·         Convergence (the delivery of voice, video, and data over a single network)
·         In-depth knowledge about one or more NOSs: UNIX, Linux, Mac OS X Server, or
·         Microsoft Windows Server 2008 R2
·         Network management
·         Wireless network design
·         Configuration and optimization of routers and switches
·         Centralized data storage and management for large-scale environments

Determine which method of learning works best for you. A small classroom with an experienced instructor and a hands-on projects lab is an excellent learning environment because there you can ask questions and learn by doing. There is no substitute for hands-on experience when it comes to improving your networking hardware and software skills. If you don’t already work in an IT department, try to find a position that puts you in that environment, even if it isn’t your dream job. Volunteer a few hours a week if necessary. After you are surrounded with other information technology professionals and encounter real-life situations, you will have the opportunity to expand your skills by practicing and asking questions of more experienced staff. On the Web, you can find a number of searchable online job boards and recruiter sites. The placement office at your local college or university can also connect you with job opportunities.

Developing Your Soft Skills
Knowing how to configure a router or install UNIX will serve you well, but advanced soft skills will help you stand out. The term soft skills refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities. Some soft skills might appear to be advantages in any profession, but they are especially important when you must work in teams, in challenging technical circumstances, and under tight deadlines—requirements that apply to most networking projects.

For this reason, soft skills merit closer examination:
·         Customer relations—Perhaps one of the most important soft skills, customer relations involve an ability to listen to customers’ frustrations and desires and then empathize, respond, and guide customers to their goals without acting arrogant. Bear in mind that some of your customers will not appreciate or enjoy technology as much as you do, and they will value your patience as you help them. The better your customer relations, the more respected and popular you will be as a network professional.
·         Oral and written communications—You may understand the most complicated technical details about a network, but if you cannot communicate them to colleagues and clients, the significance of your knowledge is diminished. Imagine that you are a networking consultant who is competing with several other firms to overhaul a metropolitan hospital’s network, a project that could generate millions of dollars for your company. You may have designed the best solution and have it clearly mapped out in your head, but your plan is useless if you can’t describe it clearly. The hospital’s planning committee will accept whichever proposal makes the most sense to them—that is, the proposal whose suggestions and justifications are plainly communicated.

·         Dependability—This characteristic will help you in any career. However, in the field of networking, where breakdowns or glitches can occur at any time of day or night and only a limited number of individuals have the expertise to fix them, being dependable is critical. Your career will benefit when you are the one who is available to address a problem, even if you don’t always know the answer immediately.
·         Teamwork—Individual computer professionals often have strong preferences for a certain type of hardware or software. Some technical people like to think that they have all of the answers. For these and other reasons, teamwork in IT departments is sometimes lacking. To be the best networking professional in your department, you must be open to new ideas, encourage cooperation among your colleagues, and allow others to help you and make suggestions.
·         Leadership abilities—As a networking professional, you will sometimes need to make difficult or unpopular decisions under pressure. You may need to persuade opinionated colleagues to try a new product, tell a group of angry users that what they want is not possible, or manage a project with nearly impossible budgetary and time restrictions. In all of these situations, you will benefit from having strong leadership skills.

After your career in networking begins, you will discover which soft skills you already possess and which ones you need to cultivate. The important thing is that you realize the importance of these attributes and are willing to devote the time necessary to develop them.

Pursuing Certification
Certification is the process of mastering material pertaining to a particular hardware system, operating system, programming language, or software application, then proving your mastery by passing a series of exams. Certification programs are developed and administered either by a manufacturer or a professional organization such as CompTIA (Computing Technology Industry Association). You can pursue a number of different certifications, depending on your specialty interest. For example, if you want to become a PC technician, you should attain A+ certification. If you want to specialize in Microsoft product support and development, pursue MCITP (Microsoft Certified IT Professional) certification. To specialize in the configuration and management of Cisco Systems’ switches and routers, work toward Cisco’s CCNA (Cisco Certified Network Associate) or go for their most difficult and prestigious distinction, CCIE (Cisco Certified Internetwork Expert) certification, which requires candidates to pass lab exams. To prove a mastery of many aspects of networking, you can choose to become Network+ certified.

Network+ (Net+) is a professional certification established by CompTIA that verifies broad, vendor-independent networking technology skills, such as an understanding of protocols, topologies, networking hardware, and network troubleshooting. Network+ may also be a stepping stone to more advanced certifications. Certification is a popular career development tool for job seekers and a measure of an employee’s qualifications for employers.

Following are a list of benefits to becoming certified:
·         Better salary—Professionals with certification can usually ask for higher salaries than those who aren’t certified. Employers will also want to retain certified employees, especially if they helped pay for their training, and will offer incentives to keep certified professionals at the company.
·         Greater opportunities—Certification may qualify you for additional degrees or more advanced technical positions.
·         Professional respect—After you have proven your skills with a product or system, your colleagues and clients will gain great respect for your ability to solve problems with that system or product. They will therefore feel confident asking you for help.
·         Access to better support—Many manufacturers reward certified professionals with less-expensive, more detailed, and more direct access to their technical support.

Finding a Job in Networking
With the proper credentials and demonstrated technical knowledge, you will qualify for a multitude of positions in networking. For this reason, you can and must be selective when searching for a job. Following are some ways to research your possibilities:

Search the Web—Because your job will deal directly with technology, it makes sense to use technology to find it. Companies in the computer industry recruit intensively on the Web, either through searchable job databases or through links on their company Web sites. Most job database Web sites do not charge for their services, but may require you to register with them. One popular general Web job database is Monster at www.monster.com. IT-specific job sites include Dice at www.dice.com, Slashdot Jobs at jobs.slashdot.org, and computerjobs.com. A simple Web search could yield dozens more.

Check your local newspaper’s Web site—Although many employers list job openings through national online services, some with specific, local opportunities might advertise only in a local or regional newspaper’s online classifieds. It’s worth checking the Web site of your newspaper for these types of listings.

Visit a career center—Regardless of whether you are a registered university or college student, you can use career center services to find a list of job openings in your area. Companies that are hiring pay much attention to the collegiate career centers because of the number of job seekers served by these centers. Visit the college or university campus nearest you and search through its career center listings.

Network—Find like-minded professionals with whom you can discuss job possibilities. You may meet these individuals through training classes, conferences, professional organizations, or career fairs. Let them know that you are looking for a job, and specify exactly what kind of job you want. If they can’t suggest any leads for you, ask these people if they have other colleagues who might.

Attend career fairs—Most metropolitan areas host career fairs for job seekers in the information technology field, and some large companies host their own job fairs. Even if you aren’t sure you want to work for any of the companies represented at a job fair, attend the job fair to research the market. You can find out which skills are in high demand in your area and which types of companies are hiring the most networking professionals. You can also meet other people in your field who may offer valuable advice based on their employment experience.

Enlist a recruiter—Many recruiting agencies deal strictly with clients in the technical fields. By signing up with such a recruiting agency, you may have access to job opportunities that you didn’t know existed.
You might also take advantage of a temporary assignment, to see if the fit between you and an employer is mutually beneficial, before accepting a permanent job with that employer.

Joining Professional Associations
Joining an organization can connect you with people who have similar interests, provide new opportunities for learning, allow you to access specialized information, and give you more tangible assets such as free goods. Specifically, a networking professional organization might offer its own publications, technical workshops and conferences, free software, prerelease software, and access to expensive hardware labs. You can choose from several prominent professional organizations in the field of networking. Because the field has grown so quickly, with so many areas in which to specialize, no single professional organization stands out as the most advantageous or highly respected. You will have to decide whether an organization is appropriate for you. Among other things, you will want to consider the organization’s total membership, membership benefits, membership dues, technical emphasis, and whether it hosts a local chapter. Many organizations host student chapters on university campuses. You may also want to find a professional association that caters to your demographic group (such as Women in Technology International, if you are female).

Chapter Summary
■ a network is a group of computers and other devices (such as printers) that are connected by some type of transmission media, such as copper or fiber-optic cable or radio waves, in the case of wireless transmission.
■ all networks offer advantages relative to using a stand-alone computer. Networks enable multiple users to share devices and data. Sharing resources saves time and money. Networks also allow you to manage, or administer, resources on multiple computers from a central location.
■ in a peer-to-peer network, every computer can communicate directly with every other computer. By default, no computer on a peer-to-peer network has more authority than another. However, each computer can be configured to share only some of its resources and keep other resources inaccessible.
■ Traditional peer-to-peer networks are usually simple and inexpensive to set up. However, they are not necessarily flexible or secure.
■ Client/server networks rely on a centrally administered server (or servers) to manage shared resources for multiple clients. In this scheme, the server has greater authority than the clients, which may be desktop, or laptop workstations or mobile devices, such as cell phones.
■ Client/server networks are more complex and expensive to install than peer-to-peer networks. However, they are more easily managed, more scalable, and typically more secure. They are by far the most popular type of network in use today.
■ Servers typically possess more processing power, hard disk space, and memory than client computers. To manage access to and use of shared resources, among other centralized functions, a server requires a network operating system.
■ A LAN (local area network) is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office.
■ LANs can be interconnected to form WANs (wide area networks), which traverse longer distances and may use different transmission methods and media than LANs. The Internet is the largest example of a WAN.
■ Client/server networks share some common elements, including clients, servers, workstations, transmission media, connectivity devices, protocols, addressing, topology, NICs, packets, network operating systems, hosts, backbones, segments, and nodes.
■ Networks provide a wide range of services, including printing, file sharing, Internet access, remote access, communicating in multiple forms, and network management.
■ File and print services provide the foundation for networking. They enable multiple users to share data, applications, storage areas, and printers.
■ Networks use access services to allow remote users to connect to the network or network users to connect to machines outside the network.
■ Communications services provided by networks include e-mail, telephone, video, fax, messaging, and voice mail.
■ Mail services (running on mail servers) allow users on a network to exchange and store e-mail. Most mail packages also provide filtering, routing, scheduling, notification, and connectivity with other mail systems.
■ Internet services such as Web servers and browsers, file transfer capabilities, addressing schemes, and security filters enable organizations to connect to and use the global Internet.
■ Network management services centrally administer and simplify complicated management tasks on the network, such as asset management, security auditing, and hardware problem diagnosis, backup and restore services, license tracking, load balancing, and data traffic control.
■ to prepare yourself for a networking career, master a number of broad networking skills, such as installing and configuring client and server hardware and software. Then pick a few areas that interest you, such as network security or voice/data integration, and study those specialties.
■ Certification is the process of mastering material pertaining to a particular hardware system, operating system, programming language, or other software program, then proving your mastery by passing a series of exams. The benefits of certification can include a better salary, more job opportunities, greater professional respect, and better access to technical support.
■ To excel in the field of networking, hone your soft skills, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.
■ Joining an association for networking professionals can connect you with likeminded people, give you access to workshops and technical publications, allow you to receive discounted or free software, and perhaps even help you find a job in the field.
Key Terms
A+ - The professional certification established by CompTIA that verifies knowledge about PC operation, repair, and management.
Access server - See remote access server.
Address - A number that uniquely identifies each workstation and device on a network. Without unique addresses, computers on the network could not reliably communicate.
Address management - The process of centrally administering a finite number of network addresses for an entire LAN. Usually this task can be accomplished without touching the client workstations.
Addressing - The scheme for assigning a unique identifying number to every workstation and device on the network. The type of addressing used on a network depends on its protocols and network operating system.
Asset management - The process of collecting and storing data on the number and types of software and hardware assets in an organization’s network. The data collection is automated by electronically examining each network client from a server.
Backbone - The part of a network to which segments and significant shared devices (such as routers, switches, and servers) connect. A backbone is sometimes referred to as “a network of networks” because of its role in interconnecting smaller parts of a LAN or WAN.
Backing up - The process of copying critical data files to a secure storage area. Often, backups are performed according to a formulaic schedule.
CCIE (Cisco Certified Internetwork Expert) - An elite certification that recognizes expert-level installation, configuration, management, and troubleshooting skills on networks that use a range of Cisco Systems’ devices.
CCNA (Cisco Certified Network Associate) - A professional certification that attests to one’s skills in installing, configuring, maintaining, and troubleshooting medium-sized networks that use Cisco Systems’ switches and routers.
Certification - The process of mastering material pertaining to a particular hardware system, operating system, programming language, or other software program, then proving your mastery by passing a series of exams.
Cisco Certified Internetwork Expert - See CCIE.
Cisco Certified Network Associate - See CCNA.
Client - A computer on the network that requests resources or services from another computer on a network. In some cases, a client could also act as a server. The term client may also refer to the user of a client workstation or a client software application installed on the workstation.
Client/server architecture - A network design in which client computers use a centrally administered server to share data, data storage space, and devices.
Client/server network - A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.
CompTIA (Computing Technology Industry Association) - An association of computer resellers, manufacturers, and training companies that sets industry-wide standards for computer professionals. CompTIA established and sponsors the A+ and Network+ (Net+) certifications.
Computing Technology Industry Association - See CompTIA.
Connectivity device - One of several types of specialized devices that allows two or more networks or multiple parts of one network to connect and exchange data.
Convergence - The use of data networks to carry voice (or telephone), video, and other communications services in addition to data.
File server - A specialized server that enables clients to share applications and data across the network.
File services - The functions of a file server that allow users to share data files, applications, and storage areas.
Host - A computer that enables resource sharing by other computers on the same network.
Internet - A complex WAN that connects LANs and clients around the globe.
Internet services - The services that enable a network to communicate with the Internet, including Web servers and browsers, file transfer capabilities, Internet addressing schemes, security filters, and a means for directly logging on to other computers.
LAN (local area network) - A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.
License tracking -The process of determining the number of copies of a single application that are currently in use on the network and whether the number in use exceeds the authorized number of licenses.
Load balancing - The process of distributing data transfer activity evenly so that no single device is overwhelmed.
Local area network - See LAN.
Mail server - A server that manages the storage and transfer of e-mail messages.
Mail services - The network services that manage the storage and transfer of e-mail between users on a network. In addition to sending, receiving, and storing mail, mail services can include filtering, routing, notification, scheduling, and data exchange with other mail servers.
MAN (metropolitan area network) - A network that is larger than a LAN, typically connecting clients and servers from multiple buildings, but within a limited geographic area. For example, a MAN could connect multiple city government buildings around a city’s center.
Management services - The network services that centrally administer and simplify complicated management tasks on the network. Examples of management services include license tracking, security auditing, asset management, address management, software distribution, traffic monitoring, load balancing, and hardware diagnosis.
MCITP (Microsoft Certified IT Professional) - A professional certification established by Microsoft that demonstrates in-depth knowledge about Microsoft products.
Metropolitan area network - See MAN.
Microsoft Certified IT Professional - See MCITP.
Motherboard - The main circuit board that controls a computer.
Network - A group of computers and other devices (such as printers) that are connected by and can exchange data via some type of transmission media, such as a cable, a wire, or the atmosphere.
Network adapter - See NIC.
Network+ (Net+) - The professional certification established by CompTIA that verifies broad, vendor-independent networking technology skills, such as an understanding of protocols, topologies, networking hardware, and network troubleshooting.
Network interface card - See NIC.
Network operating system - See NOS.
Network services - The functions provided by a network.
NIC (network interface card) - The device that enables a workstation to connect to the network and communicate with other computers. NICs are manufactured by several different companies and come with a variety of specifications that are tailored to the workstation’s and the network’s requirements. NICs are also called network adapters.
Node - A computer or other device connected to a network, which has a unique address and is capable of sending or receiving data.
NOS (network operating system) - The software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. The most popular network operating systems are UNIX, Linux, and Microsoft Windows Server 2008 R2.
P2P network - See peer-to-peer network.
Packet - A discrete unit of information sent from one node on a network to another.
Peer-to-peer network - A network in which every computer can communicate directly with every other computer. By default, no computer on a peer-to-peer network has more authority than another. However, each computer can be configured to share only some of its resources and keep other resources inaccessible to other nodes on the network.
Print services - The network service that allows printers to be shared by several users on a network.
Protocol - A standard method or format for communication between network devices. For example, some protocols ensure that data are transferred in sequence and without error from one node on the network to another. Other protocols ensure that data belonging to a Web page are formatted to appear correctly in a Web browser window. Still others encode passwords and keep data transmissions secure.
Remote access server - A server that runs communications services that enable remote users to log on to a network. Also known as an access server.
Remote user - A person working on a computer on a different network or in a different geographical location from the LAN’s server.
Resources - The devices, data, and data storage space provided by a computer, whether stand-alone or shared.
Restoring - The process of retrieving files from a backup. It is necessary to restore files if the original files are lost or deleted.
Scalable - The property of a network that allows you to add nodes or increase its size easily.
Security auditing - The process of evaluating security measures currently in place on a network and notifying the network administrator if a security breach occurs.
Segment - A part of a network. Usually, a segment is composed of a group of nodes that share the same communications channel for all their traffic.
Server - A computer on the network that manages shared resources. Servers usually have more processing power, memory, and hard disk space than clients. They run network operating software that can manage not only data, but also users, groups, security, and applications on the network.
Sneakernet - A way of exchanging data between computers that are not connected on a network. The term “sneakernet” was coined before the widespread use of networks, when data was copied from a computer to a removable storage device such as a floppy disk, carried (presumably by someone wearing sneakers) to another computer, then copied from the storage device onto the second computer.
Soft skills - The skills such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities, which are not easily measured, but are nevertheless important in a networking career.
Software distribution - The process of automatically transferring a data file or installing a software application from the server to a client on the network.
Spam - Unsolicited, unwanted e-mail.
Stand-alone computer - A computer that uses applications and data only from its local disks and that is not connected to a network.
Topology - The physical layout of computers on a network.
Traffic - The data transmission and processing activity taking place on a computer network at any given time.
traffic monitoring - The process of determining how much data transfer activity is taking place on a network or network segment and notifying administrators when a segment becomes overloaded.
Transmission media - The means through which data are transmitted and received. Transmission media may be physical, such as wire or cable, or wireless, such as radio waves.
Unified communications - The centralized management of multiple types of network-based communications, such as voice, video, fax, and messaging services.
WAN (wide area network) - A network that spans a long distance and connects two or more LANs.
Web server - A computer that manages Web site services, such as supplying a Web page to multiple users on demand.
Workstation - A computer that runs a desktop operating system and connects to a network.

Review Questions


1. Which of the following is an advantage of using a client/server network over using a peer to-peer network?
a. A client/server network is simpler to set up.
b. A client/server network allows resources to be managed centrally.
c. A client/server network does not require a network operating system.
d. A client/server network is less expensive to set up.

2. What is the primary function of a file server on a client/server network?
a. It monitors how many users are logged on to a WAN.
b. It manages access and use of shared applications and data.
c. It prevents unauthorized remote users from connecting to a LAN.
d. It routes traffic between two or more LANs.

3. Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software?
a. Word-processing software
b. Remote authentication software
c. Mail client software
d. Operating system software

4. The first services widely used by networks were:
a. Fax services
b. Network management services
c. Mail services
d. File and print services

5. On a client/server network, clients and servers usually require what to communicate?
a. A connectivity device
b. A Web site
c. A remote access server
d. A mail server

6. Your colleague, in describing the benefits of a client/server network, mentions that its more scalable than a peer-to-peer network. What does she mean by this?
a. The client/server network can be more easily expanded.
b. The client/server network is simpler to set up.
c. The client/server network can be run on free software.
d. The client/server network allows more users to log on at one time.

7. In which of the following environments would a WAN be most appropriate?
a. A large data center in which each employees access is centrally controlled
b. A global hotel chain connecting its reservation desks to a central call center
c. A home office connecting its personal computers between the den, living room, and bedroom d. A local newspaper connecting to a global news agency's Web site

8. Which of the following refers to the combination of voice (such as telephone), video, and data signals sent over the same network?
a. Switching
b. Remote access
c. Convergence
d. Network management

9. In networking, what does a packet refer to?
a. An electrical signal
b. A unit of data
c. An alarm
d. A way to connect a node with a network

10. How can a server distinguish between many clients on a network?
a. Each client is identified by a unique network address.
b. Each client regularly transmits a signal that indicates its network location and unique client characteristics.
c. Each client has a different electromagnetic characteristic to its signal, similar to differences in human voices.
d. Each client uses uniquely modified versions of the same network protocol.

11. What device connects a client computer to a network's medium, such as a wire?
a. Network line extender
b. Network terminator
c. Network junction clip
d. Network interface card

12.  What elements of a network ensure that data arrive at their intended destination in the correct sequence?
a. Rings
b. Backbones
c. Protocols
d. File servers

13. The physical layout of nodes on a network is known as the network's:
a. Topology
b. Schematic
c. Formation
d. Grid

14.  Which of the following is an example of a mail service?
a. Preventing unauthorized users from gaining access to the network and, in particular, to its mail server
b. Ensuring that users are not running more copies of an e-mail client than have been purchased
c. Exchanging messages between mail servers on different networks
d. Enabling users to print messages from their e-mail client software

15. Which of the following network topologies is most common on today's networks?
a. Ring
b. Fan
c. Star
d. Bus

16. Security is a concern when using remote access servers on a network because:
a. Access servers enable computers to connect to a network and obtain access to its resources, thereby exposing the network to the outside world.
b. Access servers have poor password enforcement capabilities and rely on users to choose good passwords.
c. Access servers cannot accept encoded data transfers, requiring users to transmit plain text to and from the network.
d. Access servers are difficult to understand and support, and so many networks are using them incorrectly and perhaps insecurely.

17. Which of the following is an example of asset management on a client/server network?
a. Ensuring that sensitive data is secured from unauthorized access
b. Assessing the peak activity times on a server and ensuring extra processing power is available at those times
c. Backing up critical data files on a regular basis
d. Determining how many handheld computers are in a company’s warehouse

18. Distributing data transfer activity equally over several devices or components belongs to which category of network management services?
a. Traffic monitoring
b. Load balancing
c. Address management
d. File and print services

19. Apache is a popular example of what type of networking software?
a. License tracking
b. Web server
c. Backup
d. Mail server

20. What organization sponsors the CCNA and CCIE certifications?
a. Cisco
b. CompTIA
c. IEEE
d. WITI

Sample Quiz

1. What type of computer is not connected to other computers and uses software applications and data stored on its local disks?
a. Client computer      
b. Remote computer   
c. Single-server computer       
d. Stand-alone computer         

2. What describes the ease with which one can add computers and other devices to a client/server network?
a. Segmentation          
b. Latency       
c. Capacity      
d. Scalability   

3. The simplest form of a network is a client/server network.
a. True
b. False           

4. Usually, a segment is composed of a group of ________ that use the same communications channel for all their traffic.
a. nodes          
b. hosts           
c. adapters      
d. protocols     

5.  Devices and data are collectively known as the network's ________ .
a. peripheral devices   
b. nodes          
c. resources     
d. hosts

6. The most popular Web server software is Apache.
a. True
b. False           

7. What is the centralized management of multiple network-based communications?
a. Closed topology      
b. Segment convergence         
c. Unified communications     
d. Hierarchical management

8. If you want to become a PC technician, you should attain ________ certification.
a. CCNA         
b. A+  
c. CCIE           
d. MCITP        

9. What is an advantage of peer-to-peer networks?
a. They are practical for connecting many computers.            
b. They are secure.     
c. They are very flexible.        
d. They are simple to configure.         

10. A NIC that works in one workstation will always work in another.
a. True
b. False           

11. With a network, you could provide employees with access to a database program on a single computer using a Web page.
a. True
b. False           

12. Soft skills are those skills that are easily measurable.
a. True
b. False           

13. What enables a server to share data files, application, and disk storage space?
a. Multiplexing            
b. File services            
c. Unified communications     
d. Scalability

14. What type of computer runs network operating system software?
a. Server         
b. Workstation            
c. Node           
d. Client

15. The Internet is the largest and most varied ________ in the world.
a. MAN           
b. LAN           
c. WAN          
d. P2P

PRACTICE QUIZ

1. Before networks, transferring data via floppy disks was the only possible way to share data.
True
False

2. A common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system.
True
False

3. In the field of networking, where breakdowns or glitches can occur at any time of day or night and only a limited number of individuals have the expertise to fix them, being ____ is critical.
dependable

4. To function as a server, a computer must be running a(n) ____.
            A) LAN
            B) WAN
C) MAN
D) NOS                       

5. The term ____ is used to describe the physical layout of a computer network.
            A) backbone
            B) topology
C) addressing  
D) segment
                       
6. The term ____ refers to a person working on a computer on a different network or in a different geographical location from the LAN’s server.
remote user
 
7. Peer-to-peer networks are not practical for connecting more than a handful of computers, because they do not always centralize resources.
            True
            False

8. The term ____ refers to a method of exchanging data between computers that are not connected on a network.
            sneakernet
 
9.  ____ is a popular career development tool for job seekers and a measure of an employee's qualifications for employers.
            A) Internet services
            B) Certification
            C) License tracking
D) File services           
                       
10. Using print services to share printers across a network saves time and money.
 True
 False

11. The oldest and still most frequently used network communications services are ____, which coordinate the storage and transfer of e-mail between users on a network.
            A) mail services
            B) network management services
            C) Internet services
            D) asset management services

12. A ____ computer is a computer that is not connected to other computers and that uses software applications and data stored on its local disks.
            A) server
            B) peer                        
            C) networked
            D) stand-alone

13. The better your customer relations, the more respected and in demand you will be as a network professional.
 True
 False

14. To prepare yourself to enter the networking job market, you should master a number of general networking technologies.
            True
            False

15. Perhaps one of the most important soft skills, ____, involve an ability to listen to customers' frustrations and desires and then empathize, respond, and guide customers to their goals without acting arrogant.
customer relations

16. Knowing how to configure a router or install UNIX will serve you well, but advanced ____ will help you stand out.
            A) addressing techniques
            B) data packet knowledge
            C) soft skills
            D) file services skills
                       
17. The term host is used to describe a client, server, or other device that can communicate over a network and that is identified by a unique number, known as its network address
  True
  False

18. Clients usually take the form of personal computers, also known as ____.
            workstations
 
19. Which term identifies a computer that enables resource sharing by other computers on the same network?
            A) Subnode
            B) Host
            C) NIC
            D) Node                      
   
20. Each network device must have a unique ____ so that data can be transmitted reliably to and from that device.
            address
 
21. A client/server network is the simplest network model.
 True
 False

22. The oldest and still most frequently used network communications services are print services.
  True
  False

23. Configuration and optimization of routers and switches is a skill currently in high demand.
True
            False

24. A network that is larger than a LAN and connects clients and servers from multiple buildings is known as a______________________.
MAN (metropolitan area network)
  
CHAPTER QUIZ

1. In a ____________________ network, every computer can communicate directly with every other computer.
a)      client\server          
b)      peer-to-peer
c)      local area (LAN)
d)      wide area (WAN)

2. ____ provide a Web-based client for checking e-mail.
a)      Web Servers
b)      File Servers
c)      Access servers
d)      Mail servers

3. To function as a server, a computer must be running a____________________.
a)      NIC
b)      NOS
c)      P2P
d)      Mail server
           
4. A ____ facilitates communication and resource sharing between other computers on the network.
a)      server
b)      client
c)      workstation
d)      router

5. A ____ network is confined to a relatively small space.
a)      WAN
b)      MAN
c)      LAN
d)      P2P

6. A ____ network connects clients and servers from multiple buildings.
a)      LAN
b)      MAN
c)      WAN
d)      Client\server
           
7. ____ services allow remote users to connect to the network.
a)      File
b)      Management
c)      Remote
d)      Access
8. Very large peer-to-peer networks have emerged to take advantage of the Internet.
a)      True
b)      False

9. Hardware diagnosis and failure alert are handled by ____.
a)      network management services
b)      Internet services
c)      asset management services
d)      access services
                       
10. ____ services refer to the capability of a server to share data files, applications, and disk storage space.
a)      File
b)      Access
c)      Web
d)      Remote

11. Clients on a client/server network share their resources directly with each other.
a)      True
b)      False

12. Which type of service supports e-mail?
a)      Web services
b)      Communications
c)      File Services
d)      Print services

13. A ____ is a specialized device that allows multiple networks or multiple parts of one network to connect and exchange data.
a)      connectivity device
b)      access services
c)      file server
d)      peripheral devices

14. ____________________ refers to the centralized management of multiple network-based communications.
a)      Multi-communication
b)      Unified communications
c)      Topology
d)      Resource-sharing
                       
15. The phenomenon of offering multiple types of communications services on the same network is known as ____.
a)      convergence
b)      unified communications
c)      divergence
d)      multi-communication

16. Dependability is a characteristic of ____.
a)      network communications
b)      network services
c)      soft skills
d)      technical skills

17. A common way of sharing resources on a peer-to-peer network is by modifying the ____ controls using the computer’s operating system.
a)      resource-sharing
b)      file-sharing
c)      resource-monitoring
d)      file-serving

18. Which statement describes an advantage of networks?
a)      Networks require decentralized management.
b)      Isolating network devices decreases costs.
c)      Isolating network devices allows implementation of the sneakernet file sharing method
d)      Networks enable multiple users to share resources.

19. Hands-on experience to improve networking hardware and software skills is important when attempting to enter the networking field.
a)      True
b)      False
           
22. Which network model ensures that no computer on the network has more authority than another?
a)      peer-to-peer
b)      client\server
c)      WAN
d)      MAN
           
23. Often, separate LANs are interconnected and rely on several ____ running many different applications and managing resources other than data.
a)      servers
b)      clients
c)      workstations
d)      backbones
           
24. Security auditing is handled by ____.
a)      network management services
b)      access management services
c)      access services
d)      file services

25. ____ are the distinct units of data that are exchanged between nodes on a network.
a)      Packets
b)      Segments
c)      Protocols
d)      Cookies