Computer Networks Interactive Summary Unit 3
Section A: Networks can be classified by geographical scope as PANs, ______ and WANs. The cables and signals used to transport data from one network device to another are a communication ______. Wired channels include twisted pair wires, ______ cables used for cable television, and ______ -optic cables used for high-capacity trunk lines. Wireless channels use ______ signals and microwaves. Government agencies regulate some wireless ______. The transmission capacity of a channel is referred to as ______. Channels that are capable of moving at least 2 Mbps are classified as ______. Networks can be configured in various ______, such as star, mesh, point-to-point, or bus. Any device in a network is referred to as a(n) ______. Data ______ equipment includes computers. Data ______ equipment includes modems and routers. Additional DCEs include hubs, switches, bridges, repeaters, and ______ access points. Networks use physical, transport, and arrival communication ______ to set the rules for efficiently transmitting data and handling errors.
Section B: The Internet is based on a U.S. government project called ______. Today, the Internet is a collection of networks, tied together by common ______. Tier 1 networks form the Internet ______, a system of high-capacity routers and fiber-optic communication links arranged in a(n) ______ topology. Networks that form the Internet are maintained by ______ that offer access to consumers. Before data travels over the Internet, it is divided into ______ by a protocol called ______, which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address. ______ addresses are 32 bits long, whereas ______ addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by ______ servers. IP addresses that are temporarily assigned are called ______ addresses, whereas permanent ones are called ______ addresses. ______ IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses, the domain name system allocates easy-to-remember ______ names. ______ level domains include .com and .edu. The servers that track these names are a vulnerable point in Internet security.
Section C: The speed and quality of Internet connections vary. For email and browsing the Web, speeds of ______ Mbps are acceptable, whereas Skype video calls require 1.5 Mbps connections. Your bandwidth ______ is the top speed allowed by your Internet access plan. You can use ______ to check the latency of an Internet connection. You can use online tools to check for packet loss and ______ , which is the variability in packet latency. Another utility called ______ reports the path that your data takes to reach its destination. Options for ______ Internet access include cable, DSL, ISDN, satellite, and fiber- to-the-home. ______ access options include mobile satellite. ______ Internet access is available from cellular services. Internet service offers dependable connections over coaxial and fiber ______. The fastest offering that uses the telephone network is ______ . Satellite Internet service is available in remote areas but suffers from high rates of ______ . Mobile broadband services offered by cell phone companies usually entail separate fees for talk, texting, and data. Public Wi-Fi ______ offer yet another Internet access.
Section D: Local area networks use many of the same network technologies and the Internet, only on a smaller scale. Devices that access LANs are equipped with a network interface ______ that contains circuitry for wireless or wired connections. Devices also have a physical ______ address, in addition to the IP addresses acquired from a DHCP server. The most popular wired technology is ______. The most popular wireless technology is ______ which can be configured as a(n) ______ or star topology. Setting up a LAN and configuring its router is fairly easy. The first step is to change the standard ______ to one that is secure. Next, create a(n) ______ that uniquely identifies the network by name. It is also important to activate wireless ______ to prevent wireless signals from being intercepted during transmission. A limited-access ______ network can be created for visitors to use. By activating ______ the router will be able to assign IP addresses to each device that joins the network. To connect to a secure LAN that is protected by encryption, an encryption ______ , or password, is required. LANs can be used to access data collected by IoT devices and the networks that tie these devices together. Technologies such as RFID, NFC, Bluetooth Smart, ZigBee, and Z-Wave offer ______ power links, essential for battery-powered devices that can’t expend excess amounts of energy transmitting data.
Section E: File sharing allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored. To access files on a network, network ______ allows your computer to see other devices and permits other devices to see your computer. Sharing the files on your computer poses a security risk, but it is possible to specify ______ for how your shared files can be used. File sharing is also possible across networks, as when you download files from Internet servers. One technology used for this purpose is ______ which provides a way to transfer files over any TCP/IP network. Another file sharing protocol called ______ distributes the role of a file server across a collection of dispersed computers.
Please click on Pay Now to get all correct answers at $30 (No Hidden Charges or any Sign Up Fee). In description, please don’t forget to mention the exam name – Computer Networks Interactive Summary Unit 3. We will send the answers to your email id in the next 30 minutes.