Network+ Guide to Networks, Chapter 1 Review
An Introduction to
Networking
Loosely
defined, a network is
a group of computers and other devices (such as printers) that are connected by
some type of transmission media.
Variations on the elements of a network and the way it is designed, however,
are nearly infinite. A network can be as small as two computers connected by a
cable in a home office or as large as several thousand computers connected
across the world via a combination of cable, phone lines, and cellular links.
In addition to connecting personal computers, networks might link mainframe
computers, printers, plotters, fax machines, and phone systems. They might
communicate through copper wires, fiber-optic cable, or radio waves. This
chapter introduces you to the fundamental characteristics of networks.
Why
Use Networks?
Using
networks offers advantages relative to using a stand-alone
computer—that is, a computer
that is not connected to other computers and that uses software applications
and data stored on its local disks. Most important, networks enable multiple users to share devices (for example, printers) and data (such as
spreadsheet files), which are collectively known as the network’s resources. Sharing devices saves money. For example,
rather than buying 20 printers for 20 staff members, a company can buy one
printer and have those 20 staff members share it over a network. Sharing
devices also saves time. For example, it’s faster for coworkers to share data
over a network than to copy data to a removable storage device and physically
transport the storage device from one computer to another—an outdated
file-sharing method commonly referred to as a sneakernet (presumably because people wore sneakers when
walking from computer to computer). Before
networks, transferring data via floppy disks was the only possible way
to share data. Networks also allow you to manage, or administer, resources
on multiple computers from a central location. Imagine you work in the
Information Technology (IT) Department of a multinational bank and must verify
that each of 5000 employees around the globe uses the same version of a
database program. Without a network, you would have to visit every employee’s
machine to check and install the proper software. With a network, however, you
could provide employees with access to
the database program on a single computer using a Web page. Because
they allow you to share devices and administer computers centrally, networks
increase productivity. It’s not surprising, then, that virtually all
organizations depend on their networks to stay competitive.
Types
of Networks
Peer-to-Peer Networks
The simplest form of a network is a peer-to-peer network. In a
peer-to-peer network, every computer can communicate directly with every other
computer. By default, no computer on a peer-to-peer network has more authority
than another. However, each computer can be configured to share only some of
its resources and prevent access to other resources. Traditional peer-to-peer
networks typically consist of two or more general-purpose personal computers,
with modest processing capabilities. Every computer is capable of sending and
receiving information to and from every other computer.
The following are advantages of using
traditional peer-to-peer networks:
·
They are simple to
configure. For this reason, they may be used in environments in which time or
technical expertise is scarce.
·
They are often less
expensive to set up and maintain than other types of networks.
·
This fact makes
them suitable for environments in which saving money is critical.
The following are disadvantages of
using traditional peer-to-peer networks:
·
They
are not very flexible. As a peer-to-peer network grows larger, adding or
changing significant elements of
the network may be difficult.
·
They are also not
necessarily secure—meaning that in simple installations, data and other
resources shared by network users can be easily discovered and used by
unauthorized people.
·
They are not
practical for connecting more than a handful of computers because they do not
always centralize resources.
For example, if your computer is part of a peer-to-peer network
that includes five other computers, and computer users store their spreadsheets
and word-processing files on their own hard disks, whenever your colleagues
want to edit your files, they must access your machine on the network. If one
colleague saves a changed version of one of your spreadsheets on her hard disk,
you’ll find it difficult to keep track of which version is the most current. As
you can imagine, the more computers you add to a peer-to-peer network, the more
difficult it becomes to find and manage resources. A common way to share resources on a peer-to-peer network is by
modifying the file-sharing controls via the computer’s operating system.
For example, you could choose to create a directory on your computer’s hard
disk called “SharedDocs” and then configure the directory to allow all
networked computers to read its files. On a peer-to-peer network, each user is
responsible for configuring her computer to allow access to certain resources
and prevent access to others. In other words, resource sharing is not
controlled by a central computer or authority. Because access depends on many
different users, it might not be uniform or secure.Although traditional peer-to-peer networks are typically small
and contained within a home or office, examples
of very large peer-to-peer networks have
emerged to take advantage of the Internet.
These newer types of peer-to-peer networks (commonly called P2P networks) link
computers from around the world to share files between each other’s’ hard
disks. Unlike the older style of peer-to-peer network, they require specialized
software (besides the computer’s operating system) to allow resource sharing.
Examples of these networks include Gnutella, Bitcoin, and the
original Napster. In 2001, Napster, which allowed users around the globe to
share music files, was forced to cease operation due to charges of copyright
infringement from musicians and music producers. Later, the service was
redesigned to provide legitimate music file-sharing services. A company called
BitTorrent has made a unique high-speed peer-to-peer communications method
(also called BitTorrent) the foundation of its business. The company specializes
in allowing companies and individuals to share video, audio, software, and
games over the Internet. Although BitTorrent’s peer-to-peer technology is
legal, its use for distributing illegal or
Client/Server Networks
Another way of designing a network is
to use a central computer, known as a server, to facilitate communication and resource sharing between other computers
on the network, which are known as
clients. Clients take the form of personal computers, also known as workstations,
or mobile devices, such as smartphones. A network that uses a server to enable
clients to share data, data storage space, and devices is known as a
client/server network.The term client/server architecture is sometimes used to refer
to the design of a network in which clients rely on servers for resource
sharing and processing. In terms of resource sharing and control, you can
compare the client/server network with a public library. Just as a librarian
manages the use of books and other media by patrons, a server manages the use
of shared resources by clients. For example, if a patron does not have the
credentials to check out books, the librarian prevents the patron from doing
so. Similarly, a server allows only authorized clients to access its resources.
Every computer on a client/server network acts as a client or a server. (It is
possible, but uncommon, for some computers to act as both.) Clients on a
network can still run applications from and save data to their local hard disk.
But by connecting to a server, they also have the option of using shared
applications, data, and devices. Clients on a client/server network do not
share their resources directly with each other, but rather use the
server as an intermediary. Clients and servers communicate through connectivity
devices such as switches or routers.
To function as a server, a computer
must be running an NOS (network operating system).
An NOS is a special type of software designed to do the
following:
·
Manage data and
other resources for a number of clients.
·
Ensure that only
authorized users access the network.
·
Control which type
of files a user can open and read.
·
Restrict when and
from where users can access the network.
·
Dictate which rules
computers will use to communicate.
·
Supply applications
to clients.
Examples of popular network operating systems include various
forms of UNIX and Linux, Microsoft Windows Server 2008 R2, and Mac OS X Server.
By contrast, a stand-alone computer, or a client computer, uses an operating
system, such as Windows 7 or a version of Linux, UNIX, or Mac OS, and has
authority for managing resources on other computers. Usually, servers have more
memory, processing, and storage capacity than clients. They may even be
equipped with special hardware designed to provide network management functions
beyond that provided by the network operating system. For example, a server
might contain an extra hard disk and specialized software so that if the
primary hard disk fails, the secondary hard disk automatically takes its place.
Although client/server networks are typically more complex in
their design and maintenance than peer-to-peer networks, they offer many
advantages over peer-to-peer networks, such as:
·
User logon accounts
and passwords for anyone on a server-based network can be assigned in one
place.
·
Access to multiple
shared resources (such as data files or printers) can be centrally granted to a
single user or groups of users.
·
Problems on the
network can be monitored, diagnosed, and often fixed from one location.
·
Servers are
optimized to handle heavy processing loads and dedicated to handling requests
from clients, enabling faster response time.
·
Because of their
efficient processing and larger disk storage, servers can connect more than a
handful of computers on a network.
Together, these
advantages make client/server networks easier to manage, more secure, and more
powerful than peer-to-peer networks. They are also more scalable than
peer-to-peer networks. In other words, it is easier to add computers and other
devices to a client/server network.
LANs, MANs, and WANs
A LAN
(local area network) is a network
of computers and other devices that is confined to a relatively small space,
such as one building or even one office. Small LANs first became popular in the
early 1980s. At that time, LANs might have consisted of a handful of computers
connected in a peer-to-peer fashion. Today’s LANs are typically much larger and
more complex client/server networks. Often,
separate LANs are interconnected and rely on several servers running many different
applications and managing resources other than data. For example, imagine an
office building in which each of a company’s departments runs its own LAN and
all the LANs are connected. This network may contain dozens of servers,
hundreds of workstations, and several shared storage devices, printers,
plotters, fax machines, and even telephone interfaces. Networks may extend
beyond the boundaries of a building. A network that is larger than a LAN and
connects clients and servers from multiple buildings—for example, a
handful of government offices surrounding a state capitol building—is known as
a MAN
(metropolitan area network). Because of the distance it covers, a MAN
may use different transmission technology and media than a LAN. A network
that connects two or more geographically distinct LANs or MANs is called a WAN (wide area network). Because
such networks carry data over longer distances than LANs, WANs may use
different transmission methods and media than LANs. Most MANs can also be
described as WANs; in fact, network engineers are more likely to refer to all
networks that cover a broad geographical range as WANs. WANs commonly connect
separate offices in the same organization, whether they are across town or
across the world from each other. For example, imagine you work for a
nationwide plumbing supply company that keeps its inventory in warehouses in
Topeka, Kansas, and Panama City, Florida. Suppose also that the company’s
headquarters is located in New York. When a customer calls and asks whether you
have five faucets of a certain type available to ship overnight, you need to
check the inventory databases for both the Topeka and Panama City warehouses.
Thanks to your WAN, the data are accessible from your New York desktop. Twice a
day, the warehouses’ inventory software automatically updates a database
located on central server in New York via WAN links that connect the locations.
WANs are also used to connect LANs that belong to different organizations. For
example, all the public universities within a state might combine and share
their resources via a WAN. The largest and most varied WAN in the world is the
Internet.
Elements Common to
Client/Server Networks
You have learned that networks, no matter how simple or complex,
provide some benefits over stand-alone computers. They also share terminology
and common building blocks, some of which you have already encountered. The following list provides a more complete
rundown of basic elements common to all client/server networks:
Client—a computer on the
network that requests resources or services from another computer on a network;
in some cases, a client could also act as a server. The term client may also
refer to the human user of a client workstation or to client software installed
on the workstation.
Server—a computer on the
network that manages shared resources;
servers usually have more processing power, memory, and hard disk space than
clients. They run network operating software that can manage not only data, but
also users, groups, security, and applications on the network.
Workstation—A personal computer
(such as a desktop or laptop),
which may or may not be connected to a network; most clients are workstation
computers.
NIC (network interface
card)—the
device (pronounced nick) inside a computer that connects a computer to the
network media, thus allowing it to communicate with other computers;
many companies (such as Intel, Linksys, and Netgear) manufacture NICs, which
come with a variety of specifications that are tailored to the requirements of
the workstation and the network. Some connect to the motherboard, which is the
main circuit that controls the computer, some are integrated as part of the
motherboard, and others connect via an external port. NICs are also known as
network adapters.
NOS (network operating
system)—the
software that runs on a server and enables the server to manage data, users,
groups, security, applications, and other networking functions.
Examples include various types of UNIX and Linux operating systems, Microsoft
Windows Server 2008 R2, and Mac OS X Server.
Host—a computer that enables resource
sharing by other computers on the same network.
Node—a client, server, or other device that
can communicate over a network and that is identified by a unique number, known
as its network
address.
Connectivity device—a
specialized device that allows multiple networks or multiple parts of one
network to connect and exchange data. A small client/server network can operate without connectivity
devices. However, medium- and large-sized LANs use them to extend the network
and to connect with WANs. WANs use them to connect with the Internet and with
other WANs.
Segment—a
part of a network. Usually, a segment is
composed of a group of nodes that use the same communications channel for all
their traffic.
Backbone—the part of a network to which
segments and significant shared devices (such as routers, switches, and
servers) connect. A backbone is sometimes referred to as “a network of networks”
because of its role in interconnecting smaller parts of a LAN or WAN. Figure
1-6 shows a LAN with its backbone highlighted in yellow.
Topology—the physical layout of a computer
network. Topologies vary according to the needs of the organization and
available hardware and expertise. Networks can be arranged in a ring, bus, or
star formation, and the star formation is the most common. Hybrid combinations
of these patterns are also possible.
Protocol—a standard method or format for
communication between networked devices. For example, some protocols ensure that data are transferred in
sequence and without error from one node on the network to another. Other
protocols ensure that data belonging to a Web page are formatted to appear
correctly in a Web browser window. Still others encode passwords and keep data
transmissions secure.
Packet—a distinct unit of data exchanged
between nodes on a network. Breaking a large stream of data into
many packets allows a network to deliver that data more efficiently and
reliably.
Addressing—the scheme for assigning a unique
identifying number to every node on the network.
The type of addressing used depends on the network’s protocols and network
operating system. Each network device
must have a unique address so
that data can be transmitted reliably to and from that device.
Transmission media—the means through which data are
transmitted and received. Transmission media may be physical,
such as wire or cable, or atmospheric (wireless), such as radio waves.
How Networks Are
Used
The functions provided by a network
are usually referred to as network
services. Any network manager will
tell you that the network service with the highest visibility is e-mail. If
your company’s e-mail system fails, users will notice within minutes—and they
will not be shy about informing you of the failure. Although e-mail may be the
most visible network service, other services can be just as vital. Printer
sharing, file sharing, Internet access and Web site delivery, remote access
capabilities, the provision of voice (telephone) and video services, and
network management are all critical business functions provided through
networks. In large organizations, separate servers may be dedicated to
performing each of these functions. In offices with only a few users and little
network traffic, one server may perform all functions.
File and Print Services
The term file services refers to a server’s ability to share data files, applications
(such as word-processing or spreadsheet programs), and disk storage space. A server that provides file services is called a file server. File services accounted for the first use
of networks and remain the foundation of networking today, for a number of
reasons. As mentioned earlier, it is easier and faster to store shared data at
a central location than to copy files to disks and then pass the disks around.
Data stored at a central location is typically more secure because a network
administrator can take charge of backing up this data, rather than relying on
individual users to make their own copies. In addition, using a file server to
run applications for multiple users requires the purchase of fewer copies of
the application and less maintenance work for the network administrator. Using
print services to share printers across a network also saves time and money. A
high capacity printer can cost thousands of dollars, but can handle the
printing tasks of an entire department, thereby eliminating the need to buy a desktop
printer for each worker. With one printer, less time is spent on maintenance
and management. If a shared printer fails, the network administrator can
diagnose the problem from a workstation anywhere on the network using the
network operating system’s printer control functions. Often, the administrator
can solve the problem without even visiting the printer.
Access Services
A network’s access services allow remote users to connect to the network. (The term remote user refers to a person
working on a computer on a different network or in a different geographical
location from the LAN’s server.)
Less frequently, access services allow
network users to connect to machines outside the network. Most network
operating systems include built-in access services that enable users to dial in
to a remote access server, log on to the network, and take advantage of the
network just as if they were logged on to a workstation on the office LAN. A
remote access server may also be known as simply an access
server. Organizations might use access services to provide LAN
connectivity for workers at home, workers on the road, and workers at small
satellite offices where dedicated WAN connections are not cost effective. In
addition, access services can allow staff from other organizations (such as a
software or hardware vendor) to help diagnose a network problem. For example,
suppose you work for a clothing manufacturer that uses embroidery software to control
the machines that sew insignias on shirts and hats. You are an expert on
networking, but less adept with the automated embroidery software. When the
software causes problems, you turn to the software vendor for help.But suppose the vendor’s technician can’t solve the problem
except by logging on to your network. In that case, it is much more efficient
and less expensive to allow the technician to dial in to your network through a
remote access server than to fly the technician to your office.It is important to remember that remote access servers—no matter
which platform (hardware or operating system software) they run on—allow
external users to use network resources and devices just as if they were logged
on to a workstation in the office. From a remote location, users can print
files to shared printers, log on to hosts, retrieve mail from an internal messaging
system, or run queries on internal databases. Because they can be accessed by
the world outside the local network, remote
access servers necessitate strict security measures.
Communications Services
Today’s networks can help users communicate in many ways:
e-mail, telephone, video, fax, cell phone, smartphone (for example, an iPhone),
and personal digital assistant (for example, a BlackBerry). Using the same network to deliver multiple
types of communications services is known as convergence. A similar term, unified communications, refers to the centralized
management of multiple network-based communications. For example, your
company might use one software program to manage intraoffice phone calls,
long-distance phone calls, cell phone calls, voice mail, faxes, and text
messaging for all the users on your network. The oldest network communications services are mail services, which coordinate the storage and transfer of e-mail between
users on a network. The computer responsible for mail services is called a mail server. Mail servers are usually connected to the Internet, but when
clients only need to exchange e-mail within their organization, their mail
server may be isolated on their LAN.
In addition to simply sending,
receiving, and storing mail, mail servers can do the following:
·
Intercept or filter
unsolicited e-mail, known as spam.
·
Find objectionable
content in e-mails and do something about that content, such as flagging it to
make the recipient aware of it.
·
Route messages
according to particular rules. For example, if a technical support representative
has not opened a customer’s message within 15 minutes of delivery, a mail
server could automatically forward the message to a supervisor.
·
Provide a Web-based
client for checking e-mail.
·
Notify
administrators or users if certain events occur, such as a user’s mailbox
exceeding its maximum amount of space on a server.
·
Schedule e-mail
transmission, retrieval, storage, and maintenance functions.
·
Communicate with
mail servers on other networks so that mail can be exchanged between users who
do not connect to the same LAN.
To supply these services, a mail server runs specialized mail
server software, examples of which include Sendmail and Microsoft Exchange
Server. Because of their critical nature and heavy use, maintaining a mail
server in any sizable organization requires a significant commitment of
technical support and administration resources.
Internet Services
You have probably connected to the Internet without knowing or
caring about all of the services running behind the scenes. But in fact, many servers
are working together to bring Web pages to your desktop. For example, a Web server is a computer installed with the appropriate software to supply
Web pages to many different clients upon demand. The most popular Web server software is Apache. It’s used to deliver more than 60 percent of Web pages on the
Internet. Supplying Web pages is only one type of Internet
service.Other Internet services include file transfer capabilities,
Internet addressing schemes, security filters, and a means for directly logging
on to other computers on the Internet.
Management Services
When networks were small and simple, a single network
administrator could manage the entire network. For instance, suppose a user
called to report a problem logging on to the network and that the administrator
diagnosed the problem as an addressing conflict (that is, two workstations
having the same network address). In a very small network, the conflicting
workstations might be located right around the corner from each other, and one address
could be changed quickly. In another example, if a manager needed to report the
number of copies of Adobe Photoshop in use in a certain department, the network
administrator could probably get the desired information by just walking
through the department and checking the various workstations. As networks grow
larger and more complex, however, they become more difficult to manage. Using network management services can help you keep track of
a large network. Network management
services centrally administer
management tasks on the network, such as ensuring that no more than 20
workstations are using Adobe Photoshop at one time in an organization that
purchased a 20-user license for the software. Some organizations dedicate a
number of servers to network management functions, with each server performing
only one or two unique services. Numerous services fall under the category of
network management. Some of the most
important ones include the following:
Traffic monitoring and control—Determining how much traffic, or data transmission activity, is
taking place on a network and notifying administrators when the network becomes
overloaded. In general, the larger the network, the more critical it is to
monitor traffic.
Load balancing—Distributing data transfer activity evenly so that no single
device becomes overwhelmed. Load balancing is especially important for networks
in which it’s difficult to predict the number of requests that will be issued
to a server, as is the case with Web servers.
Hardware diagnosis and failure alert—Determining when a network component fails and automatically
notifying the network administrator through an e-mail or text message.
Asset
management— Collecting and storing
data on the number and types of software and hardware assets in an
organization’s network. With asset management software, a server can
electronically examine each client’s software and hardware and automatically
save the data in a database. Other types of assets might be identified and
tracked using RFID (Radio Frequency Identification) tags, which emit a wireless
signal at all times. Wireless detection devices connected to a network can
track the locations of RFID-tagged devices. For example, a hospital might use
RFID tags to keep track of the wheelchairs, beds, and IV pumps that circulate
throughout its campus. Before asset management services, inventory data had to
be gathered manually and typed into spreadsheets.
License tracking— Determining how many copies of a single application are
currently in use on the network and ensuring that number does not exceed the
number of licenses purchased. This information is important for legal reasons,
as software companies are vigilant about illegally copying software or using
more than the authorized number of copies.
Security auditing— Evaluating what security measures are currently in force and
notifying the network administrator if a security breach occurs.
Software distribution— Automatically transferring a file or installing an application
from the server to a client on the network. The installation process can be
started from either the server or the client. Several options are available
when distributing software, such as warning users about updates, writing
changes to a workstation’s system files, and restarting the workstation after
the update.
Address management— Centrally managing a finite number of network addresses for an
entire network. Usually this task can be accomplished without manually
modifying the client workstation configurations.
Backup and restoration of data— Backing up critical data files to a secure storage area and
then restoring data if the original files are lost or deleted. Often backups
are performed according to a formulaic schedule. Backup and data restoration
services provide centralized management of data backup on multiple servers and
on-demand restoration of files and directories.
Becoming a Networking Professional
If you search online employment services, you’ll probably find
hundreds of postings for computer professionals. Of course, the level of
expertise required for each of these jobs differs. Some companies simply need
“warm bodies” to ensure that a higher-level engineer is notified if a critical
network segment fails; other companies are looking for people to plan their
global information technology strategies. Needless to say, the more extensive
your skills, the better your chances for landing a lucrative and interesting
job in networking. To prepare yourself to enter this job market, master a
number of general networking technologies. Only then should you pick a few
areas that interest you and study those specialties. Hone your communication
and teamwork skills, and stay abreast of emerging technologies. Consider the
tremendous advantages of attaining professional certification and getting to
know others in your field. The following sections offer suggestions on how to
approach a career in networking.
Mastering the Technical Challenges
Although computer networking is a varied field, some general
technical skills will serve you well no matter which specialty you choose.
Because you are already interested in computers, you probably enjoy an aptitude
for logical and analytical thinking.
You probably also want to acquire
these skills:
·
Installing,
configuring, and troubleshooting network server software and hardware
·
Installing,
configuring, and troubleshooting network client software and hardware
·
Understanding the
characteristics of different transmission media
·
Understanding
network design
·
Understanding
network protocols
·
Understanding how
users interact with the network
·
Constructing a
network with clients, servers, media, and connectivity devices
Because you can expand your networking knowledge in almost any
direction, you should pay attention to the general skills that interest you most,
then pick one or two of those areas and concentrate on them.
The following specialties are
currently in high demand:
·
Network security
·
Convergence (the
delivery of voice, video, and data over a single network)
·
In-depth knowledge
about one or more NOSs: UNIX, Linux, Mac OS X Server, or
·
Microsoft Windows
Server 2008 R2
·
Network management
·
Wireless network
design
·
Configuration and
optimization of routers and switches
·
Centralized data
storage and management for large-scale environments
Determine which method of learning works best for you. A small
classroom with an experienced instructor and a hands-on projects lab is an
excellent learning environment because there you can ask questions and learn by
doing. There is no substitute for hands-on experience when it comes to
improving your networking hardware and software skills. If you don’t already
work in an IT department, try to find a position that puts you in that
environment, even if it isn’t your dream job. Volunteer a few hours a week if
necessary. After you are surrounded with other information technology
professionals and encounter real-life situations, you will have the opportunity
to expand your skills by practicing and asking questions of more experienced
staff. On the Web, you can find a number of searchable online job boards and
recruiter sites. The placement office at your local college or university can
also connect you with job opportunities.
Developing Your Soft Skills
Knowing how to configure a router or install UNIX will serve you
well, but advanced soft skills will help you stand out. The term soft skills refers to those skills that are not easily measurable, such as customer relations, oral and written communications,
dependability, teamwork, and leadership abilities. Some soft skills might
appear to be advantages in any profession, but they are especially important
when you must work in teams, in challenging technical circumstances, and under
tight deadlines—requirements that apply to most networking projects.
For this reason, soft skills merit closer examination:
·
Customer relations—Perhaps
one of the most important soft skills, customer relations involve an ability to
listen to customers’ frustrations and desires and then empathize, respond, and
guide customers to their goals without acting arrogant. Bear in mind that some
of your customers will not appreciate or enjoy technology as much as you do,
and they will value your patience as you help them. The better your customer
relations, the more respected and popular you will be as a network professional.
·
Oral and written
communications—You may understand
the most complicated technical details about a network, but if you cannot
communicate them to colleagues and clients, the significance of your knowledge
is diminished. Imagine that you are a networking consultant who is competing
with several other firms to overhaul a metropolitan hospital’s network, a
project that could generate millions of dollars for your company. You may have
designed the best solution and have it clearly mapped out in your head, but
your plan is useless if you can’t describe it clearly. The hospital’s planning
committee will accept whichever proposal makes the most sense to them—that is,
the proposal whose suggestions and justifications are plainly communicated.
·
Dependability—This characteristic will help you in any career. However, in the
field of networking, where breakdowns or glitches can occur at any time of day
or night and only a limited number of individuals have the expertise to fix
them, being dependable is critical. Your career will benefit when you are the
one who is available to address a problem, even if you don’t always know the
answer immediately.
·
Teamwork—Individual computer professionals often have strong preferences
for a certain type of hardware or software. Some technical people like to think
that they have all of the answers. For these and other reasons, teamwork in IT
departments is sometimes lacking. To be the best networking professional in
your department, you must be open to new ideas, encourage cooperation among
your colleagues, and allow others to help you and make suggestions.
·
Leadership
abilities—As a networking
professional, you will sometimes need to make difficult or unpopular decisions
under pressure. You may need to persuade opinionated colleagues to try a new
product, tell a group of angry users that what they want is not possible, or
manage a project with nearly impossible budgetary and time restrictions. In all
of these situations, you will benefit from having strong leadership skills.
After your career
in networking begins, you will discover which soft skills you already possess
and which ones you need to cultivate. The important thing is that you realize
the importance of these attributes and are willing to devote the time necessary
to develop them.
Pursuing Certification
Certification is the process of
mastering material pertaining to a particular hardware system, operating
system, programming language, or software application, then proving your
mastery by passing a series of exams. Certification programs are developed
and administered either by a manufacturer or a professional organization such
as CompTIA
(Computing Technology Industry Association). You can pursue a number of
different certifications, depending on your specialty interest. For example, if you want to become a PC technician, you
should attain A+ certification. If you want to specialize in Microsoft
product support and development, pursue MCITP (Microsoft Certified IT Professional)
certification. To specialize in the configuration and management of
Cisco Systems’ switches and routers, work toward Cisco’s CCNA (Cisco Certified
Network Associate) or go for their most difficult and prestigious
distinction, CCIE (Cisco Certified Internetwork Expert) certification, which
requires candidates to pass lab exams. To prove a mastery of many aspects of
networking, you can choose to become Network+ certified.
Network+ (Net+) is a professional certification established by CompTIA that
verifies broad, vendor-independent networking technology skills, such as an
understanding of protocols, topologies, networking hardware, and network troubleshooting.
Network+ may also be a stepping stone to more advanced certifications. Certification
is a popular career development
tool for job seekers and a measure of an employee’s qualifications for
employers.
Following are a list of benefits to becoming certified:
·
Better salary—Professionals with certification can usually ask for higher
salaries than those who aren’t certified. Employers will also want to retain
certified employees, especially if they helped pay for their training, and will
offer incentives to keep certified professionals at the company.
·
Greater opportunities—Certification
may qualify you for additional degrees or more advanced technical positions.
·
Professional
respect—After you have proven your
skills with a product or system, your colleagues and clients will gain great
respect for your ability to solve problems with that system or product. They
will therefore feel confident asking you for help.
·
Access to better
support—Many manufacturers reward
certified professionals with less-expensive, more detailed, and more direct
access to their technical support.
Finding a Job in Networking
With the proper credentials and demonstrated technical
knowledge, you will qualify for a multitude of positions in networking. For
this reason, you can and must be selective when searching for a job. Following are some ways to research your
possibilities:
Search
the Web—Because your job will deal
directly with technology, it makes sense to use technology to find it.
Companies in the computer industry recruit intensively on the Web, either
through searchable job databases or through links on their company Web sites.
Most job database Web sites do not charge for their services, but may require
you to register with them. One popular general Web job database is Monster at
www.monster.com. IT-specific job sites include Dice at www.dice.com, Slashdot
Jobs at jobs.slashdot.org, and computerjobs.com. A simple Web search could
yield dozens more.
Check
your local newspaper’s Web site—Although
many employers list job openings through national online services, some with
specific, local opportunities might advertise only in a local or regional
newspaper’s online classifieds. It’s worth checking the Web site of your
newspaper for these types of listings.
Visit
a career center—Regardless of
whether you are a registered university or college student, you can use career
center services to find a list of job openings in your area. Companies that are
hiring pay much attention to the collegiate career centers because of the
number of job seekers served by these centers. Visit the college or university
campus nearest you and search through its career center listings.
Network—Find like-minded professionals with whom you can discuss job
possibilities. You may meet these individuals through training classes,
conferences, professional organizations, or career fairs. Let them know that
you are looking for a job, and specify exactly what kind of job you want. If
they can’t suggest any leads for you, ask these people if they have other
colleagues who might.
Attend
career fairs—Most metropolitan
areas host career fairs for job seekers in the information technology field,
and some large companies host their own job fairs. Even if you aren’t sure you
want to work for any of the companies represented at a job fair, attend the job
fair to research the market. You can find out which skills are in high demand
in your area and which types of companies are hiring the most networking
professionals. You can also meet other people in your field who may offer
valuable advice based on their employment experience.
Enlist
a recruiter—Many recruiting
agencies deal strictly with clients in the technical fields. By signing up with
such a recruiting agency, you may have access to job opportunities that you
didn’t know existed.
You might also take advantage of a temporary assignment, to see
if the fit between you and an employer is mutually beneficial, before accepting
a permanent job with that employer.
Joining Professional Associations
Joining an organization can connect you with people who have
similar interests, provide new opportunities for learning, allow you to access
specialized information, and give you more tangible assets such as free goods.
Specifically, a networking professional organization might offer its own
publications, technical workshops and conferences, free software, prerelease
software, and access to expensive hardware labs. You can choose from several
prominent professional organizations in the field of networking. Because the
field has grown so quickly, with so many areas in which to specialize, no
single professional organization stands out as the most advantageous or highly
respected. You will have to decide whether an organization is appropriate for
you. Among other things, you will want to consider the organization’s total
membership, membership benefits, membership dues, technical emphasis, and
whether it hosts a local chapter. Many organizations host student chapters on
university campuses. You may also want to find a professional association that
caters to your demographic group (such as Women in Technology International, if
you are female).
Chapter Summary
■
a network is a group of computers and other devices (such as printers) that are
connected by some type of transmission media, such as copper or fiber-optic
cable or radio waves, in the case of wireless transmission.
■
all networks offer advantages relative to using a stand-alone computer.
Networks enable multiple users to share devices and data. Sharing resources
saves time and money. Networks also allow you to manage, or administer,
resources on multiple computers from a central location.
■
in a peer-to-peer network, every computer can communicate directly with every
other computer. By default, no computer on a peer-to-peer network has more
authority than another. However, each computer can be configured to share only
some of its resources and keep other resources inaccessible.
■
Traditional peer-to-peer networks are usually simple and inexpensive to set up.
However, they are not necessarily flexible or secure.
■
Client/server networks rely on a centrally administered server (or servers) to
manage shared resources for multiple clients. In this scheme, the server has
greater authority than the clients, which may be desktop, or laptop
workstations or mobile devices, such as cell phones.
■
Client/server networks are more complex and expensive to install than
peer-to-peer networks. However, they are more easily managed, more scalable,
and typically more secure. They are by far the most popular type of network in
use today.
■
Servers typically possess more processing power, hard disk space, and memory
than client computers. To manage access to and use of shared resources, among
other centralized functions, a server requires a network operating system.
■
A LAN (local area network) is a network of computers and other devices that is
confined to a relatively small space, such as one building or even one office.
■
LANs can be interconnected to form WANs (wide area networks), which traverse
longer distances and may use different transmission methods and media than
LANs. The Internet is the largest example of a WAN.
■
Client/server networks share some common elements, including clients, servers,
workstations, transmission media, connectivity devices, protocols, addressing,
topology, NICs, packets, network operating systems, hosts, backbones, segments,
and nodes.
■
Networks provide a wide range of services, including printing, file sharing,
Internet access, remote access, communicating in multiple forms, and network
management.
■
File and print services provide the foundation for networking. They enable
multiple users to share data, applications, storage areas, and printers.
■
Networks use access services to allow remote users to connect to the network or
network users to connect to machines outside the network.
■
Communications services provided by networks include e-mail, telephone, video,
fax, messaging, and voice mail.
■
Mail services (running on mail servers) allow users on a network to exchange
and store e-mail. Most mail packages also provide filtering, routing,
scheduling, notification, and connectivity with other mail systems.
■
Internet services such as Web servers and browsers, file transfer capabilities,
addressing schemes, and security filters enable organizations to connect to and
use the global Internet.
■
Network management services centrally administer and simplify complicated management
tasks on the network, such as asset management, security auditing, and hardware
problem diagnosis, backup and restore services, license tracking, load
balancing, and data traffic control.
■
to prepare yourself for a networking career, master a number of broad
networking skills, such as installing and configuring client and server
hardware and software. Then pick a few areas that interest you, such as network
security or voice/data integration, and study those specialties.
■
Certification is the process of mastering material pertaining to a particular
hardware system, operating system, programming language, or other software
program, then proving your mastery by passing a series of exams. The benefits
of certification can include a better salary, more job opportunities, greater
professional respect, and better access to technical support.
■
To excel in the field of networking, hone your soft skills, such as customer
relations, oral and written communications, dependability, teamwork, and
leadership abilities.
■
Joining an association for networking professionals can connect you with
likeminded people, give you access to workshops and technical publications,
allow you to receive discounted or free software, and perhaps even help you
find a job in the field.
Key Terms
A+ - The professional certification
established by CompTIA that verifies knowledge about PC operation, repair, and
management.
Access server - See remote access server.
Address - A number that uniquely
identifies each workstation and device on a network. Without unique addresses,
computers on the network could not reliably communicate.
Address management
- The
process of centrally administering a finite number of network addresses for an
entire LAN. Usually this task can be accomplished without touching the client
workstations.
Addressing - The scheme for assigning a
unique identifying number to every workstation and device on the network. The
type of addressing used on a network depends on its protocols and network
operating system.
Asset management - The process of collecting and
storing data on the number and types of software and hardware assets in an
organization’s network. The data collection is automated by electronically
examining each network client from a server.
Backbone - The part of a network to which
segments and significant shared devices (such as routers, switches, and
servers) connect. A backbone is sometimes referred to as “a network of
networks” because of its role in interconnecting smaller parts of a LAN or WAN.
Backing up - The process of copying critical
data files to a secure storage area. Often, backups are performed according to
a formulaic schedule.
CCIE (Cisco
Certified Internetwork Expert) -
An elite certification that recognizes expert-level installation,
configuration, management, and troubleshooting skills on networks that use a
range of Cisco Systems’ devices.
CCNA (Cisco
Certified Network Associate) -
A professional certification that attests to one’s skills in installing,
configuring, maintaining, and troubleshooting medium-sized networks that use
Cisco Systems’ switches and routers.
Certification - The process of mastering
material pertaining to a particular hardware system, operating system,
programming language, or other software program, then proving your mastery by
passing a series of exams.
Cisco Certified
Internetwork Expert - See
CCIE.
Cisco Certified
Network Associate -
See CCNA.
Client - A computer on the network that
requests resources or services from another computer on a network. In some
cases, a client could also act as a server. The term client may also refer to
the user of a client workstation or a client software application installed on
the workstation.
Client/server
architecture - A
network design in which client computers use a centrally administered server to
share data, data storage space, and devices.
Client/server
network - A
network that uses centrally administered computers, known as servers, to enable
resource sharing for and to facilitate communication between the other
computers on the network.
CompTIA (Computing
Technology Industry Association) -
An association of computer resellers, manufacturers, and training companies
that sets industry-wide standards for computer professionals. CompTIA
established and sponsors the A+ and Network+ (Net+) certifications.
Computing
Technology Industry Association -
See CompTIA.
Connectivity device
- One of
several types of specialized devices that allows two or more networks or
multiple parts of one network to connect and exchange data.
Convergence - The use of data networks to
carry voice (or telephone), video, and other communications services in
addition to data.
File server - A specialized server that
enables clients to share applications and data across the network.
File services - The functions of a file server
that allow users to share data files, applications, and storage areas.
Host - A computer that enables resource
sharing by other computers on the same network.
Internet - A complex WAN that connects LANs
and clients around the globe.
Internet services - The services that enable a
network to communicate with the Internet, including Web servers and browsers,
file transfer capabilities, Internet addressing schemes, security filters, and
a means for directly logging on to other computers.
LAN (local area
network) - A
network of computers and other devices that is confined to a relatively small
space, such as one building or even one office.
License tracking -The process of determining the
number of copies of a single application that are currently in use on the
network and whether the number in use exceeds the authorized number of licenses.
Load balancing - The process of distributing data
transfer activity evenly so that no single device is overwhelmed.
Local area network
- See LAN.
Mail server - A server that manages the
storage and transfer of e-mail messages.
Mail services - The network services that manage
the storage and transfer of e-mail between users on a network. In addition to
sending, receiving, and storing mail, mail services can include filtering,
routing, notification, scheduling, and data exchange with other mail servers.
MAN (metropolitan
area network) -
A network that is larger than a LAN, typically connecting clients and servers
from multiple buildings, but within a limited geographic area. For example, a
MAN could connect multiple city government buildings around a city’s center.
Management services
- The
network services that centrally administer and simplify complicated management
tasks on the network. Examples of management services include license tracking,
security auditing, asset management, address management, software distribution,
traffic monitoring, load balancing, and hardware diagnosis.
MCITP (Microsoft
Certified IT Professional) -
A professional certification established by Microsoft that demonstrates
in-depth knowledge about Microsoft products.
Metropolitan area
network -
See MAN.
Microsoft Certified
IT Professional -
See MCITP.
Motherboard - The main circuit board that
controls a computer.
Network - A group of computers and other
devices (such as printers) that are connected by and can exchange data via some
type of transmission media, such as a cable, a wire, or the atmosphere.
Network adapter - See NIC.
Network+ (Net+) - The professional certification
established by CompTIA that verifies broad, vendor-independent networking
technology skills, such as an understanding of protocols, topologies,
networking hardware, and network troubleshooting.
Network interface
card - See
NIC.
Network operating
system - See
NOS.
Network services - The functions provided by a
network.
NIC (network
interface card) -
The device that enables a workstation to connect to the network and communicate
with other computers. NICs are manufactured by several different companies and
come with a variety of specifications that are tailored to the workstation’s
and the network’s requirements. NICs are also called network adapters.
Node - A computer or other device
connected to a network, which has a unique address and is capable of sending or
receiving data.
NOS (network
operating system) -
The software that runs on a server and enables the server to manage data,
users, groups, security, applications, and other networking functions. The most
popular network operating systems are UNIX, Linux, and Microsoft Windows Server
2008 R2.
P2P network - See peer-to-peer network.
Packet - A discrete unit of information
sent from one node on a network to another.
Peer-to-peer
network - A
network in which every computer can communicate directly with every other
computer. By default, no computer on a peer-to-peer network has more authority
than another. However, each computer can be configured to share only some of
its resources and keep other resources inaccessible to other nodes on the
network.
Print services - The network service that allows
printers to be shared by several users on a network.
Protocol - A standard method or format for
communication between network devices. For example, some protocols ensure that
data are transferred in sequence and without error from one node on the network
to another. Other protocols ensure that data belonging to a Web page are
formatted to appear correctly in a Web browser window. Still others encode
passwords and keep data transmissions secure.
Remote access server - A server that runs
communications services that enable remote users to log on to a network. Also
known as an access server.
Remote user - A person working on a computer
on a different network or in a different geographical location from the LAN’s
server.
Resources - The devices, data, and data
storage space provided by a computer, whether stand-alone or shared.
Restoring - The process of retrieving files
from a backup. It is necessary to restore files if the original files are lost
or deleted.
Scalable - The property of a network that
allows you to add nodes or increase its size easily.
Security auditing - The process of evaluating
security measures currently in place on a network and notifying the network
administrator if a security breach occurs.
Segment - A part of a network. Usually, a
segment is composed of a group of nodes that share the same communications channel
for all their traffic.
Server - A computer on the network that
manages shared resources. Servers usually have more processing power, memory,
and hard disk space than clients. They run network operating software that can
manage not only data, but also users, groups, security, and applications on the
network.
Sneakernet - A way of exchanging data between
computers that are not connected on a network. The term “sneakernet” was coined
before the widespread use of networks, when data was copied from a computer to
a removable storage device such as a floppy disk, carried (presumably by
someone wearing sneakers) to another computer, then copied from the storage
device onto the second computer.
Soft skills - The skills such as customer
relations, oral and written communications, dependability, teamwork, and
leadership abilities, which are not easily measured, but are nevertheless
important in a networking career.
Software
distribution -
The process of automatically transferring a data file or installing a software
application from the server to a client on the network.
Spam - Unsolicited, unwanted e-mail.
Stand-alone
computer - A
computer that uses applications and data only from its local disks and that is
not connected to a network.
Topology - The physical layout of computers
on a network.
Traffic - The data transmission and
processing activity taking place on a computer network at any given time.
traffic monitoring
- The
process of determining how much data transfer activity is taking place on a
network or network segment and notifying administrators when a segment becomes
overloaded.
Transmission media
- The means
through which data are transmitted and received. Transmission media may be
physical, such as wire or cable, or wireless, such as radio waves.
Unified
communications -
The centralized management of multiple types of network-based communications,
such as voice, video, fax, and messaging services.
WAN (wide area
network) - A
network that spans a long distance and connects two or more LANs.
Web server - A computer that manages Web site
services, such as supplying a Web page to multiple users on demand.
Workstation - A computer that runs a desktop
operating system and connects to a network.
Review Questions
1. Which of the following is an advantage of using a
client/server network over using a peer to-peer network?
a. A client/server network is simpler to set up.
b. A client/server network allows resources to be managed centrally.
c. A client/server network does not require a
network operating system.
d. A client/server network is less expensive to set up.
2. What is the primary function of a
file
server on a client/server network?
a. It monitors how many users are logged on to a
WAN.
b. It manages access and use of shared applications and data.
c. It prevents unauthorized remote users from connecting to a LAN.
d. It routes traffic between two or more LANs.
3. Suppose you wanted to share documents among several computers in your household in a
peer-to-peer fashion. You could do that by properly configuring which of the following types of software?
a. Word-processing software
b. Remote authentication software
c. Mail client software
d. Operating system software
4. The first services widely used by networks were:
a. Fax services
b. Network management services
c. Mail services
d. File and print services
5. On a
client/server network, clients and servers usually require what to communicate?
a. A connectivity device
b. A Web site
c. A remote access server
d. A mail server
6. Your colleague, in describing the benefits of a client/server network, mentions that it’s more scalable than a
peer-to-peer network. What does she mean by this?
a. The client/server network can be more easily expanded.
b. The client/server network is simpler to set up.
c. The client/server network can be run on free software.
d. The client/server network allows more users to log on at one
time.
7. In which of the following environments would a WAN be most appropriate?
a. A large data center in which each employee’s access is centrally controlled
b. A global hotel chain connecting its reservation desks to a central call center
c. A home office connecting its personal computers between the den, living room, and bedroom d. A local newspaper connecting to a global news agency's Web site
8. Which of the following refers to the combination of voice (such as telephone), video, and data signals sent over the same network?
a. Switching
b. Remote access
c. Convergence
d. Network management
9. In networking, what does a
packet refer to?
a. An electrical
signal
b. A unit of data
c. An alarm
d. A way to connect a node with a
network
10. How can a
server distinguish between many clients on a network?
a. Each client is identified by a unique network address.
b. Each client regularly transmits a signal that indicates its
network location and unique client characteristics.
c. Each client has a different electromagnetic characteristic to its signal, similar to differences in human voices.
d. Each client uses uniquely modified versions of the same network protocol.
11. What device connects a client computer to a
network's medium, such as a wire?
a. Network line extender
b. Network terminator
c. Network junction clip
d. Network interface card
12. What elements of a network ensure that data arrive at their intended destination in the correct
sequence?
a. Rings
b. Backbones
c. Protocols
d. File servers
13. The physical
layout of nodes on a network is known as the network's:
a. Topology
b. Schematic
c. Formation
d. Grid
14. Which of the following is an example of a mail service?
a. Preventing unauthorized users from gaining access to the network and, in particular, to its mail
server
b. Ensuring that users are not running more copies of an e-mail client than have been purchased
c. Exchanging messages between mail servers on different networks
d. Enabling users to print messages from their e-mail client software
15. Which of the following network topologies is most common on today's networks?
a. Ring
b. Fan
c. Star
d. Bus
16. Security is a concern when using remote access servers on a network because:
a. Access servers enable computers to connect to a network and obtain access to its resources,
thereby exposing the network to the outside world.
b. Access servers have poor password enforcement capabilities and rely on users to choose good passwords.
c. Access servers cannot accept encoded data transfers, requiring users to transmit plain text to and from the network.
d. Access servers are difficult to understand and support, and so many networks are using them
incorrectly and perhaps insecurely.
17. Which of the following is an example of asset management on a
client/server network?
a. Ensuring that sensitive data is secured from unauthorized access
b. Assessing the peak activity times on a server and ensuring extra processing power is available at those times
c. Backing up critical data files on a regular basis
d. Determining how many handheld computers are in a company’s warehouse
18. Distributing data transfer activity equally over several devices or components belongs to which category of
network management services?
a. Traffic monitoring
b. Load balancing
c. Address management
d. File and print services
19. Apache is a
popular example of what type of networking software?
a. License tracking
b. Web server
c. Backup
d. Mail server
20. What organization sponsors the CCNA and CCIE certifications?
a. Cisco
b. CompTIA
c. IEEE
d. WITI
Sample Quiz
1.
What type of computer is not connected to other computers and uses software
applications and data stored on its local disks?
a. Client computer
b. Remote computer
c. Single-server computer
d. Stand-alone computer
2.
What describes the ease with which one can add computers and other devices to a
client/server network?
a. Segmentation
b. Latency
c. Capacity
d. Scalability
3.
The simplest form of a network is a client/server network.
a. True
b. False
4.
Usually, a segment is composed of a group of ________ that use the same
communications channel for all their traffic.
a. nodes
b. hosts
c. adapters
d. protocols
5. Devices and data are collectively known as
the network's ________ .
a. peripheral devices
b. nodes
c. resources
d. hosts
6.
The most popular Web server software is Apache.
a. True
b. False
7.
What is the centralized management of multiple network-based communications?
a. Closed topology
b. Segment convergence
c. Unified communications
d. Hierarchical management
8.
If you want to become a PC technician, you should attain ________
certification.
a. CCNA
b. A+
c. CCIE
d. MCITP
9.
What is an advantage of peer-to-peer networks?
a. They are practical for
connecting many computers.
b. They are secure.
c. They are very flexible.
d. They are simple to configure.
10.
A NIC that works in one workstation will always work in another.
a. True
b. False
11.
With a network, you could provide employees with access to a database program
on a single computer using a Web page.
a. True
b. False
12.
Soft skills are those skills that are easily measurable.
a. True
b. False
13.
What enables a server to share data files, application, and disk storage space?
a. Multiplexing
b. File services
c. Unified communications
d. Scalability
14.
What type of computer runs network operating system software?
a. Server
b. Workstation
c. Node
d. Client
15.
The Internet is the largest and most varied ________ in the world.
a. MAN
b. LAN
c. WAN
d. P2P
PRACTICE QUIZ
1.
Before networks, transferring data via floppy disks was the only possible way
to share data.
True
False
2.
A common way to share resources on a client/server network is by modifying the
file-sharing controls via the computer’s operating system.
True
False
3.
In the field of networking, where breakdowns or glitches can occur at any time
of day or night and only a limited number of individuals have the expertise to
fix them, being ____ is critical.
dependable
4.
To function as a server, a computer must be running a(n) ____.
A)
LAN
B)
WAN
C)
MAN
D) NOS
5.
The term ____ is used to describe the physical layout of a computer network.
A)
backbone
B) topology
C)
addressing
D)
segment
6.
The term ____ refers to a person working on a computer on a different network
or in a different geographical location from the LAN’s server.
remote user
7.
Peer-to-peer networks are not practical for connecting more than a handful of
computers, because they do not always centralize resources.
True
False
8.
The term ____ refers to a method of exchanging data between computers that are
not connected on a network.
sneakernet
9. ____ is a popular career development tool for
job seekers and a measure of an employee's qualifications for employers.
A) Internet services
B) Certification
C) License tracking
D)
File services
10.
Using print services to share printers across a network saves time and money.
True
False
11.
The oldest and still most frequently used network communications services are ____,
which coordinate the storage and transfer of e-mail between users on a network.
A) mail services
B) network management services
C)
Internet services
D) asset management services
12.
A ____ computer is a computer that is not connected to other computers and that
uses software applications and data stored on its local disks.
A)
server
B)
peer
C)
networked
D) stand-alone
13.
The better your customer relations, the more respected and in demand you will
be as a network professional.
True
False
14.
To prepare yourself to enter the networking job market, you should master a
number of general networking technologies.
True
False
15.
Perhaps one of the most important soft skills, ____, involve an ability to
listen to customers' frustrations and desires and then empathize, respond, and
guide customers to their goals without acting arrogant.
customer relations
16.
Knowing how to configure a router or install UNIX will serve you well, but
advanced ____ will help you stand out.
A)
addressing techniques
B) data packet knowledge
C) soft skills
D) file services skills
17.
The term host is used to describe a client, server, or other device that can
communicate over a network and that is identified by a unique number, known as
its network address
True
False
18.
Clients usually take the form of personal computers, also known as ____.
workstations
19.
Which term identifies a computer that enables resource sharing by other
computers on the same network?
A)
Subnode
B) Host
C) NIC
C) NIC
D) Node
20.
Each network device must have a unique ____ so that data can be transmitted
reliably to and from that device.
address
21.
A client/server network is the simplest network model.
True
False
22.
The oldest and still most frequently used network communications services are
print services.
True
False
23.
Configuration and optimization of routers and switches is a skill currently in
high demand.
True
False
24.
A network that is larger than a LAN and connects clients and servers from
multiple buildings is known as a______________________.
MAN (metropolitan area network)
CHAPTER QUIZ
1.
In a ____________________ network, every computer can communicate directly with
every other computer.
a)
client\server
b) peer-to-peer
c)
local
area (LAN)
d)
wide
area (WAN)
2.
____ provide a Web-based client for checking e-mail.
a)
Web
Servers
b)
File
Servers
c)
Access
servers
d) Mail servers
3.
To function as a server, a computer must be running a____________________.
a)
NIC
b) NOS
c)
P2P
d)
Mail
server
4.
A ____ facilitates communication and resource sharing between other computers
on the network.
a) server
b)
client
c)
workstation
d)
router
5.
A ____ network is confined to a relatively small space.
a)
WAN
b)
MAN
c) LAN
d)
P2P
6.
A ____ network connects clients and servers from multiple buildings.
a)
LAN
b) MAN
c)
WAN
d)
Client\server
7.
____ services allow remote users to connect to the network.
a)
File
b)
Management
c)
Remote
d) Access
8.
Very large peer-to-peer networks have emerged to take advantage of the
Internet.
a) True
b)
False
9.
Hardware diagnosis and failure alert are handled by ____.
a) network management services
b)
Internet
services
c)
asset
management services
d)
access
services
10.
____ services refer to the capability of a server to share data files,
applications, and disk storage space.
a) File
b)
Access
c)
Web
d)
Remote
11.
Clients on a client/server network share their resources directly with each
other.
a)
True
b) False
12.
Which type of service supports e-mail?
a)
Web
services
b) Communications
c)
File
Services
d)
Print
services
13.
A ____ is a specialized device that allows multiple networks or multiple parts
of one network to connect and exchange data.
a) connectivity device
b)
access
services
c)
file
server
d)
peripheral
devices
14.
____________________ refers to the centralized management of multiple
network-based communications.
a)
Multi-communication
b) Unified communications
c)
Topology
d)
Resource-sharing
15.
The phenomenon of offering multiple types of communications services on the
same network is known as ____.
a) convergence
b)
unified
communications
c)
divergence
d)
multi-communication
16.
Dependability is a characteristic of ____.
a)
network
communications
b)
network services
c) soft skills
d)
technical
skills
17.
A common way of sharing resources on a peer-to-peer network is by modifying the
____ controls using the computer’s operating system.
a)
resource-sharing
b) file-sharing
c)
resource-monitoring
d)
file-serving
18.
Which statement describes an advantage of networks?
a)
Networks
require decentralized management.
b)
Isolating
network devices decreases costs.
c)
Isolating
network devices allows implementation of the sneakernet file sharing method
d) Networks enable multiple users to share resources.
19.
Hands-on experience to improve networking hardware and software skills is
important when attempting to enter the networking field.
a) True
b)
False
22.
Which network model ensures that no computer on the network has more authority
than another?
a) peer-to-peer
b)
client\server
c)
WAN
d)
MAN
23.
Often, separate LANs are interconnected and rely on several ____ running many
different applications and managing resources other than data.
a) servers
b)
clients
c)
workstations
d)
backbones
24.
Security auditing is handled by ____.
a) network management services
b)
access
management services
c)
access
services
d)
file
services
25.
____ are the distinct units of data that are exchanged between nodes on a
network.
a) Packets
b)
Segments
c)
Protocols
d)
Cookies