You are on page 1of 18

Name _______________________________________________________ Date ________________

Chapter 1
Student Version
Chapter 1 Objectives:

Explain how multiple networks are used in everyday life.


Explain the topologies and devices used in a small to medium-sized business
network.
Explain the basic characteristics of a network that supports communication in a
small to medium-sized business.
Explain trends in networking that will affect the use of networks in small to mediumsized businesses.

Required Materials:
Reading Organizer
Packet Tracer Activities: 1.2.4.4 Packet Tracer - Representing the Network
Instructions
Labs: 1.0.1.2 Class Activity - Draw Your Concept of the Internet Instructions
1.1.1.8 Lab - Researching Network Collaboration Tools
1.2.3.3 Lab - Researching Converged Network Services
1.3.1.3 Lab - Mapping the Internet
1.4.4.3 Lab - Researching IT and Networking Job Opportunities
1.5.1.1 Class Activity - Draw Your Concept of the Internet Now Instructions
Chapter Test

Cisco Semester 1 Introduction to Networks 5.0


1
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

Page intentionally left blank.


2

Points__________ / __198___

Name__________________________________________________________ Date
________________

Chapter 1
Reading Organizer
Student Version

Note: the Reading Organizer has weighted scoring. Any question with the word
explain or define in it is expected to have a longer answer and is worth two
points each.
After completion of this chapter, you should be able to:

Explain how multiple networks are used in everyday life.


Explain the topologies and devices used in a small to medium-sized business
network.
Explain the basic characteristics of a network that supports communication in a
small to medium-sized business.
Explain trends in networking that will affect the use of networks in small to mediumsized businesses.

1.1 Globally Connected


1. What is the IoE or Internet of Everything?
Brings together people, processes, data, and things to make network connections
more relevant.

2. What is the human network?


Centers around the impact of network around people.
Cisco Semester 1 Introduction to Networks 5.0
3
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

3. List some of the forms of communications that can be accessed by a global


audience.
a. Social Media
b. Text Messages
c. Skype
d. Podcasting
e. Peer to Peer
f.
g.
4. What is the purpose of a SOHO or Small Office/Home Office?
Work from home or remote location.

5. What does the term Internet mean?


Collection of private

6. What is the simplest peer-to-peer network?


2 computers connected
7. What are the advantages of peer-to-peer networking?
a. Easy to setup
4

b. not expensive
c.
d.
8. What are the disadvantages of peer-to-peer networking?
a. Not secure
b. no administration
c. slower peformance
d. not scaleable

1.2 LANs, WANs, and the Internet


9. List the three network infrastructure categories of network components?

a. Client
b. Media
c. Services
10. List examples of intermediary network devices.

a. Switches
b. Routers
c. Firewalls
d.
11. Processes running on the intermediary network devices perform what functions?

a.
b.
c.
d.
Cisco Semester 1 Introduction to Networks 5.0
5
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

e.
f.
12. What is network media?

13. What are the three most common types of media?

a.
b.
c.
14. Different types of network media have different features and benefits. Not all network
media has the same characteristics and is appropriate for the same purpose. What are the
criteria for choosing network media?

a.
b.
c.
d.
15. List and explain the two types of topology diagrams.
a. ___________________________________________

b. ___________________________________________

16. Explain the function of each of the device categories listed below.
End Devices

Intermediary Devices

Network Media

Cisco Semester 1 Introduction to Networks 5.0


7
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

17. List the device name and check whether the component icon is an End Device,
Intermediary Device, or Network Media.

18. Explain the two most common types of network infrastructures.


a. ___________________________________________

b. ___________________________________________

19. Explain the other types of networks available.


a. ___________________________________________
8

b. ___________________________________________

c. ___________________________________________

20. Local Area Networks (LANs) are a network infrastructure that spans a small
geographical area. Explain what specific features LANs include:
a.
b.
c.
21. Wide Area Networks (WANs) are a network infrastructure that spans a wide
geographical area. WANs are typically managed by service providers (SP) or Internet
Service Providers (ISP). Explain what specific features WANs include:
a.
b.
c.

22. Explain what the Internet is?

23. Explain the following terms:


Cisco Semester 1 Introduction to Networks 5.0
9
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

a. Intranet

b. Extranet

24. List the most common way home users connect to the internet through an ISP.

a.
b.
c.
d.
e.
25. Business-class internet is typically done through an SP; this may include?

a.
b.
c.
26. What internet connection options are commonly used by SOHOs or Small Office-Home
Office users?

a.
b.
c.
d.
10

e.
27. Out of all the internet connection options which ones do not require a physical cable to
be run to the building?
a.
b.

28. Explain in detail the following common connection options for organizations.
a. Dedicated Leased Line

b. Metro Ethernet

c. DSL

d. Satellite

Cisco Semester 1 Introduction to Networks 5.0


1
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

1.3 The Network as a Platform


29. Explain what a converged network is.

30. There are four basic characteristics that underlying network architectures need to
address in order to meet user expectations. These are:

a.
b.
c.
d.
31. Explain how network architecture that is built to be fault tolerant.

32. What is redundancy?

33. Explain in how a Circuit-Switched Connection works.

34. Explain in detail how a Packet-Switched Connection works.

12

35. What is scalability within a network infrastructure?

36. The point where ISPs interconnect is often called a ___borders_________________ ?


37. What is the purpose of each of the following ISP Tiers?
a. Tier-1 internatonal and national
b. Tier-2
c. Tier-3 local
38. What is Quality of Service?

39. There are two types of network security concerns that must be addressed. List and
explain both.
a. ___________________________________________

b. ___________________________________________

40. In order to achieve the goals of network security, there are three primary
requirements. List and explain each.
a. ___________________________________________
Cisco Semester 1 Introduction to Networks 5.0
1
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

b. ___________________________________________

c. ___________________________________________

14

41. Select the appropriate column to identify the network architecture requirement to
which each characteristic or feature belongs.

Cisco Semester 1 Introduction to Networks 5.0


1
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

1.4 The Changing Network Environment


16

42. Explain Bring Your Own Device (BYOD)?

43. What is cloud computing?

49. What are the four primary types of clouds?

a.
b.
c.
d.
50. What is a data center used for?

51. What is powerline networking?

52. What is a Wireless Internet Service Provider (WISP)?

53. Where are WISPs commonly found?

54. Another wireless solution for the home and small businesses is wireless broadband. Explain this technology.

Cisco Semester 1 Introduction to Networks 5.0


1
Robb Jones
Chapter 1

Frederick County Career & Tech Center, MD

55. Why should network security be implemented in multiple layers?

56. At a minimum, home or small office network security should include what options?
a.
b.
57. What other security options should larger networks include?
a.
b.
c.
d.
58. Draw a line between the correct term and its definition.
Firewall
and programs
Zero-Day Attack

An attack which slows down or crashes equipment

Virus, Worm, or Trojan

Blocks unauthorized access to your network

Filters network access and data traffic

Access Control List (ACL)

Network attack that occurs on the first day that a vulnerability


becomes known

Denial of Service

Arbitrary code running on user devices

18

You might also like