Vous êtes sur la page 1sur 7

Hardware and Software Systems Networks 2 Page 1 of 7

Introduction of Networks
SECTION A
Review Questions
1. Identify the five comonents of a data communications system.
2. !hat are the advantages of distri"uted rocessing#
$. !hat are the three criteria necessary for an effective and efficient network#
%. !hat are the advantages of a mu&tioint connection over a oint'to'oint connection#
(. !hat are the two tyes of &ine configuration#
). *ategori+e the four "asic too&ogies in terms of &ine configuration.
7. !hat is the difference "etween ha&f'du&e, and fu&&'du&e, transmission modes#
-. Name the four "asic network too&ogies. and cite an advantage of each tye.
/. 0or n devices in a network. what is the num"er of ca"&e &inks re1uired for a mesh. ring.
"us. and star too&ogy#
12. !hat are some of the factors that determine whether a communication system is a 34N
or !4N#
11. !hat is an internet# !hat is the Internet#
12. !hy are rotoco&s needed#
1$. !hy are standards needed#
1%. !hat are the key e&ements of a rotoco&#
1(. !hat is the difference "etween a de facto standard and a de 5ure standard#
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&
Hardware and Software Systems Networks 2 Page 2 of 7
SECTION B
7u&ti&e *hoice Questions
1). 6he 888888888 is the hysica& ath over which a message trave&s.
a9 rotoco&
"9 medium
c9 signa&
d9 a&& the a"ove
17. 6he information to "e communicated in a data communications system is the 888888.
a9 medium
"9 rotoco&
c9 message
d9 transmission
1-. 0re1uency of fai&ure and network recovery time after a fai&ure is measures of the
888888888 of a network.
a9 erformance.
"9 re&ia"i&ity
c9 security
d9 feasi"i&ity
1/. 4n unauthori+ed user is a network 888888 issue.
a9 erformance
"9 re&ia"i&ity
c9 security
d9 a&& the a"ove
22. !hich too&ogy re1uires a centra& contro&&er or hu"#
a9 7esh
"9 Star
c9 :us
d9 Ring
21. !hich too&ogy re1uires a mu&tioint connection#
a9 7esh
"9 Star
c9 :us
d9 Ring
22. *onnection "etween a comuter and a key"oard invo&ves 8888888888 transmission.
a9 sim&e,
"9 ha&f'du&e,
c9 fu&&'du&e,
d9 automatic
2$. In a network with 2( comuters. which too&ogy wou&d re1uire the most e,tensive
ca"&ing#
a9 mesh
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&
Hardware and Software Systems Networks 2 Page $ of 7
"9 star
c9 "us
d9 ring
2%. 4 te&evision "roadcast is an e,am&e of 888888888888 transmission.
a9 sim&e,
"9 ha&f'du&e,
c9 fu&&'du&e,
d9 automatic
2(. 4 88888888888 connection rovides a dedicated &ink "etween two devices.
a9 oint'to'oint
"9 mu&tioint
c9 rimary
d9 secondary
2). In a 88888888888 connection. more than two devices can share a sing&e &ink.
a9 oint'to'oint
"9 mu&tioint
c9 rimary
d9 secondary
27. In 8888888888 transmission. the channe& caacity is shared "y "oth communicating
devices at a&& times.
a9 sim&e,
"9 ha&f'du&e,
c9 fu&&'du&e,
d9 ha&f'sim&e,
2-. 4 ca"&e "reak in a 8888888888 too&ogy stos a&& transmission.
a9 mesh
"9 "us
c9 star
d9 rimary
2/. 8888888888 are ru&es that govern a communication e,change.
a9 7edia
"9 *riteria
c9 Protoco&s
d9 4&& of the a"ove
$2. 6he Performance of a data communications network deends on 8888888888.
a9 the num"er of users
"9 the transmission media
c9 the hardware and software
d9 a&& of the a"ove
$1. ;iruses are a network 888888888888 issue.
a9 erformance
"9 re&ia"i&ity
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&
Hardware and Software Systems Networks 2 Page % of 7
c9 security
d9 a&& of the a"ove
$2. Protection of data from a natura& disaster such as tornado is a network 888888888
issue.
a9 Performance
"9 re&ia"i&ity
c9 security
d9 management
$$. 888888888888 are secia&'interest grous that 1uick&y test. eva&uate. and standardi+e
new techno&ogies.
a9 0orums
"9 Regu&atory agencies
c9 Standards <rgani+ations
d9 4&& of the a"ove
$%. 4 tree too&ogy is a variation of a 888888888888 too&ogy.
a9 mesh
"9 star
c9 "us
d9 ring
$(. In a 88888888888 too&ogy. if there are n devices in a network. each device has n'1
ort for ca"&es.
a9 mesh
"9 star
c9 "us
d9 ring
$). 6he Star Pu"&ishing. with head1uarters in 7a&aysia and "ranch offices through out
4sia. =uroe. and South 4merica. is ro"a"&y connected "y 8888888888.
a9 a 34N
"9 a 74N
c9 a !4N
d9 none of the a"ove
$7. ;enture P&um"ing has a network consisting of two workstations and one rinter. 6his
is most ro"a"&y a 888888888.
a9 a 34N
"9 a 74N
c9 a !4N
d9 none of the a"ove
$-. 8888888 is the division of one task among mu&ti&e comuters.
a9 >istri"uted rocessing
"9 >istri"uted messaging
c9 >istri"uted te&ehone
d9 =&ectronic messaging
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&
Hardware and Software Systems Networks 2 Page ( of 7
$/. If a rotoco& secifies that data shou&d "e sent at 122 7"s. this is a 888888888 issue.
a9 synta,
"9 semantics
c9 timing
d9 none of the a"ove
%2. !hen a rotoco& secifies that the address of the sender must occuy the first four
"ytes of a message. this is a 8888888888 issue.
a9 synta,
"9 semantics
c9 timing
d9 none of the a"ove
%1. !hen a rotoco& secifies that the address of the sender means the most recent sender
and not the origina& source. this is a 88888888888 issue.
a9 synta,
"9 semantics
c9 timing
d9 none of the a"ove
%2. !hat is the main difference "etween a de facto standard and a de 5ure standard#
a9 4 de facto standard has "een &egis&ated "y an officia&&y recogni+ed "ody? a de
5ure standard has not.
"9 4 de 5ure standard has "een &egis&ated "y an officia&&y recogni+e "ody? a de
facto standard has not.
c9 6he inventing comany can who&&y own a de 5ure standard and not a de facto
standard.
d9 4 de 5ure standard is rorietary? a de facto standards is not.
%$. In a 888888888 &ink. the on&y traffic is "etween the two connected devices.
a9 secondary
"9 rimary
c9 dedicated
d9 none of the a"ove
%%. In a mesh too&ogy. the re&ationshi "etween one device and anther is 888888888.
a9 rimary'to'eer
"9 eer'to'rimary
c9 rimary'to'secondary
d9 eer'to'eer
%(. 4 ca"&e "reak in a 8888888 too&ogy stos a&& transmission.
a9 mesh
"9 "us
c9 star
d9 rimary
%). 4 network that contains mu&ti&e hu"s is most &ike&y configured in a 888888888
too&ogy.
a9 mesh
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&
Hardware and Software Systems Networks 2 Page ) of 7
"9 tree
c9 "us
d9 star
%7. Security and rivacy are &ess of an issue for devices in a 8888888 too&ogy.
a9 mesh
"9 tree
c9 "us
d9 star
%-. !hich organi+ation consists of comuter scientists and engineers is known for its
deve&oment of 34N standards#
a9 =I4
"9 I6@'6
c9 4NSI
d9 I===
%/. !hich agency deve&oed standards for e&ectrica& connections and the hysica& transfer
of data "etween devices#
a9 =I4
"9 I6@'6
c9 4NSI
d9 IS<
(2. !hich agency created standards for te&ehone communications A; Series9 and
standards for network interfaces and u"&ic networks AB series9#
a9 466
"9 I6@'6
c9 4NSI
d9 IS<
(1. !hich organi+ation has authority over interstate and internationa& commerce in the
communications fie&ds#
a9 I6@'6
"9 I===
c9 0**
d9 IS<
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&
Hardware and Software Systems Networks 2 Page 7 of 7
SECTION C
Exercises
(2. !hat is the ma,imum num"er of characters or sym"o&s that can "e reresented "y
@nicode#
($. 4 co&or image uses 1) "its to reresent a i,e&. !hat is the ma,imum num"er of different
co&ors that can "e reresented#
(%. 4ssume si, devices are arranged in mesh too&ogy. How many ca"&es are needed#
How many orts are needed for each device#
((. 0or each of the fo&&owing four networks. discuss the conse1uences if a connection
fai&s.
a9 0ive devices arranged in a mesh too&ogy
"9 0ive devices arranged in a star too&ogy Anot counting the hu"9
c9 0ive devices arranged in a "us too&ogy
d9 0ive devices arrange in a ring too&ogy
(). Cou have two comuters connected "y an =thernet hu" at home. Is this a 34N. a
74N. or a !4N# =,&ain your reason.
(7. In the ring too&ogy. what haens if one of the stations is un&ugged#
(-. In the "us too&ogy. what haens if one of the stations is un&ugged#
(/. >raw a hy"rid too&ogy with a star "ack"one and three ring networks.
)2. >raw a hy"rid too&ogy with a ring "ack"one and two "us networks.
)1. >raw a hy"rid too&ogy with a "us "ack"one connecting two ring "ack"ones. =ach
ring "ack"one connections three star networks.
)2. >raw a hy"rid too&ogy with a star "ack"one connecting two "us "ack"ones. =ach
"us "ack"one connects three ring networks.
)$. Dive five instances of how networks are a art of your &ife today.
)%. !hen a arty makes a &oca& te&ehone ca&& to another arty. is this a oint'to'oint or
mu&tioint connection# =,&ain your answer.
)(. 7atch the fo&&owing to a too&ogy tye Aeach can a&y to more than one too&ogy9?
a9 New device can "e added easi&y
"9 *ontro& is through a centra& device.
c9 0ai&ure of a device does not cause system fai&ure.
d9 6ransmission time is sent re&aying data through non destination nodes.
)). *omare the te&ehone network and the Internet. !hat are the simi&arities# !hat are
the differences#
3eve& 2 4sia Pacific Institute of Information 6echno&ogy 6utoria&

Vous aimerez peut-être aussi