Module 2 Flashcards

1
Q

Q: What is a LAN?

A

A: A LAN (Local Area Network) is a network of devices, such as computers, laptops, and servers, that are connected together in a limited geographical area, such as a home, office, or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What is the purpose of a LAN?

A

A: The purpose of a LAN is to allow devices to share resources and communicate with one another, allowing for the sharing of files, printers, and internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What type of technology is used to connect devices in a LAN?

A

A: LANs typically use wired or wireless technology to connect devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What are some examples of resources that can be shared on a LAN?

A

A: Examples of resources that can be shared on a LAN include files, printers, and internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: What is the geographical area of a LAN?

A

A: A LAN is a network of devices that are connected together in a limited geographical area, such as a home, office, or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What are Network Interface Cards (NICs)?

A

A: Network Interface Cards (NICs) are hardware components that allow devices to connect to the LAN and communicate with other devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: What is the main function of a hub in a LAN?

A

A: A hub is a basic networking device that connects multiple devices together and broadcasts data to all connected devices in a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: How does a switch differ from a hub in a LAN?

A

A: A switch is a more advanced device that directs data to specific devices based on their addresses, whereas a hub broadcast data to all connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is the main function of a router in a LAN?

A

A: A router is used to connect the LAN to other networks, such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What are some examples of servers that can be used in a LAN?

A

A: Examples of servers that can be used in a LAN include file servers, print servers, and web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: What are some examples of clients that can be used in a LAN?

A

A: Examples of clients that can be used in a LAN include desktop computers, laptops, and mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What type of software is used in a LAN?

A

A: LANs rely on software such as operating systems, device drivers, and network management tools to control and monitor the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: What is a perimeter network?

A

A: A perimeter network, also known as a DMZ (Demilitarized Zone), is a separate network segment that sits between the internal network and the external network (such as the internet), created to provide an extra layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What is the main function of a firewall in a perimeter network?

A

A: The main function of a firewall in a perimeter network is to act as the boundary between the internal network and the perimeter network, blocking all incoming traffic to the internal network and only allowing traffic to the perimeter network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: What are some examples of servers and services that should be placed in the perimeter network?

A

A: Examples of servers and services that should be placed in the perimeter network include web servers, email servers, and other public-facing services that need to be accessible from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: What is the purpose of access controls in a perimeter network?

A

A: The purpose of access controls in a perimeter network is to ensure that only authorized traffic is allowed to enter the perimeter network, and that traffic is logged and monitored for security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q: What are some steps that should be taken to test and monitor a perimeter network?

A

A: To test and monitor a perimeter network, steps that should be taken include: testing the network to ensure that it is functioning properly, and monitoring the network for any security breaches or other issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q: What is back-to-back configuration?

A

A: Back-to-back configuration refers to a type of network topology in which two routers are connected directly to each other, with no other devices or networks in between, typically used in situations where two separate networks need to be connected together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q: What is the main advantage of back-to-back configuration?

A

A: The main advantage of back-to-back configuration is that it is simple to set up and does not require any additional hardware or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q: What is the main disadvantage of back-to-back configuration?

A

A: The main disadvantage of back-to-back configuration is that it can be less secure than other topologies, as there is no firewall or other security device to protect the networks from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Q: In what kind of scenarios back-to-back configuration is used?

A

A: Back-to-back configuration is typically used in situations where two separate networks need to be connected together, such as when connecting a branch office to a main office, or connecting two different service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Q: Is back-to-back configuration a long-term solution?

A

A: Back-to-back configuration is not a good idea to use as a long-term solution due to its lack of security, and a more robust security solution such as VPN is more commonly used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Q: What is three-part configuration?

A

A: Three-part configuration refers to a type of network topology in which there are three main components: the internal network, the perimeter network and a firewall that separates the two, typically used as a security measure to protect internal networks from external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Q: What is the main function of the internal network in a three-part configuration?

A

A: In a three-part configuration, the internal network is where sensitive data and internal resources are located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Q: What is the main function of the perimeter network in a three-part configuration?

A

A: In a three-part configuration, the perimeter network is the DMZ, which contains servers and services that are available to external users, such as web servers and email servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Q: What is the main function of the firewall in a three-part configuration?

A

A: In a three-part configuration, the firewall is placed between the internal and perimeter networks to control the flow of traffic between them, and to protect the internal network from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Q: What are the advantages of three-part configuration?

A

A: The main advantage of three-part configuration is that it provides a high level of security for the internal network, by separating the internal resources from the external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Q: What are the disadvantages of three-part configuration?

A

A: The main disadvantage of three-part configuration is that it can be complex to set up and maintain, and requires careful planning and ongoing monitoring to ensure that it remains secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Q: What is a wired LAN?

A

A: A wired LAN is a network of devices that are connected together using wired connections, such as Ethernet cables, that transmit data between devices using a variety of technologies, such as copper cables, fiber-optic cables, and coaxial cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Q: What are the advantages of using a wired LAN?

A

A: Advantages of using a wired LAN include high-speed data transfer, typically faster than wireless LANs, and more reliable and secure than wireless LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Q: What is the most common topology used in wired LANs?

A

A: The most common topology used in wired LANs is the star topology, which connects devices to a central hub or switch, allowing for easy expansion and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Q: What is the most common technology used for wired LANs?

A

A: Ethernet is the most common technology used for wired LANs, and it supports a variety of speeds, such as 10 Mbps, 100 Mbps, and 1 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Q: What are some security measures that can be used in wired LANs?

A

A: Security measures that can be used in wired LANs include VLANs, Access Control Lists and Firewalls to prevent unauthorized access and protect the network from external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Q: What are the disadvantages of wired LANs?

A

A: Disadvantages of wired LANs include that they can be more difficult and expensive to install, especially if running new cables is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Q: What is a wireless LAN?

A

A: A wireless LAN is a network of devices that are connected together using wireless connections, such as Wi-Fi, that use radio waves to transmit data between devices, allowing for greater flexibility and mobility compared to wired LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Q: What are the advantages of using a wireless LAN?

A

A: Advantages of using a wireless LAN include easy and quick installation, as there are no cables to run, and can be easily expanded by adding additional access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Q: What is the most common topology used in wireless LANs?

A

A: The most common topology used in wireless LANs is the infrastructure topology, which connects devices to a central access point, allowing for easy expansion and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Q: What is the most common technology used for wireless LANs?

A

A: Wi-Fi is the most common technology used for wireless LANs, and it supports a variety of standards, such as 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Q: What are some security measures that can be used in wireless LANs?

A

A: Security measures that can be used in wireless LANs include encryption, authentication, and access control to prevent unauthorized access and protect the network from external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Q: What are the disadvantages of wireless LANs?

A

A: Disadvantages of wireless LANs include that they are generally considered less stable and less secure than wired LANs and can be affected by interference from other electronic devices and physical obstacles, such as walls, that can reduce the range and speed of the wireless signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Q: What are the advantages of wired LANs?

A

A: Advantages of wired LANs include high-speed data transfer, reliability, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Q: In what situations are wired LANs better suited?

A

A: Wired LANs are better suited for environments where high-speed data transfer and low latency are required, such as in data centers and server rooms, and in environments where security is a major concern, such as in financial institutions and government agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Q: What are the advantages of wireless LANs?

A

A: Advantages of wireless LANs include flexibility, convenience, and mobility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Q: In what situations are wireless LANs better suited?

A

A: Wireless LANs are better suited for environments where devices need to be mobile and easily connected and disconnected, such as in conference rooms and classrooms, and in environments where it is not practical or possible to run cables, such as in historic buildings or outdoor environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Q: What is a WAN?

A

A: A WAN (Wide Area Network) is a network that connects devices over a wide geographical area, such as across cities, states, or even countries, it can be used to connect LANs (Local Area Networks) together, and can also be used to connect remote devices to a central location.

46
Q

Q: What are some technologies used to connect devices in WANs?

A

A: Technologies used to connect devices in WANs include leased lines, satellite links, and VPN (Virtual Private Network) connections.

47
Q

Q: What are some common applications of WANs?

A

A: Common applications of WANs include connecting branch offices to a central office, connecting remote workers to a company’s network, and connecting devices in a large enterprise network.

48
Q

Q: What are the advantages of WANs?

A

A: Advantages of WANs include allowing for communication and collaboration between devices in different locations, regardless of their physical distance.

49
Q

Q: What are the disadvantages of WANs?

A

A: Disadvantages of WANs include being more complex to set up and maintain than LANs, and being more expensive due to the need for leased lines or satellite links.

50
Q

Q: What are leased lines?

A

A: Leased lines are dedicated circuits that are leased from a telecommunications provider and are used to connect devices over long distances, providing a private, dedicated connection between two or more locations.

51
Q

Q: What are the two main types of leased lines?

A

A: The two main types of leased lines are point-to-point and multipoint. Point-to-point leased lines connect two locations together, while multipoint leased lines connect multiple locations together.

52
Q

Q: What are some common applications of leased lines?

A

A: Common applications of leased lines include connecting LANs (Local Area Networks) together, connecting remote devices to a central location, connecting remote workers to a company’s network, and connecting branch offices to a central office.

53
Q

Q: What are the advantages of leased lines?

A

A: Advantages of leased lines include providing a private and dedicated connection that is not shared with other users, providing high level of security and reliability, making them well suited for applications where data integrity and availability are critical.

54
Q

Q: What are the disadvantages of leased lines?

A

Q: What are the disadvantages of leased lines?

55
Q

Q: What is one of the most important practical considerations when implementing a WAN?

A

A: Network design, which should take into account factors such as the number of locations, the types of devices that need to be connected, and the expected traffic patterns.

56
Q

Q: What are some options for WAN connectivity?

A

A: Some options for WAN connectivity include leased lines, satellite links, and VPN connections.

57
Q

Q: Why is security important in WAN implementation?

A

A: Security is important in WAN implementation to protect the WAN from unauthorized access and external threats.

58
Q

Q: How can bandwidth be determined for a WAN?

A

A: The amount of bandwidth required for a WAN can be determined by considering the expected traffic and the types of applications that will be running on the network.

59
Q

Q: What is Quality of Service (QoS) and why is it important in WAN implementation?

A

A: Quality of Service (QoS) controls are used to ensure that mission-critical applications receive the necessary bandwidth and priority over other traffic. It’s important in WAN implementation to ensure that the network is running efficiently.

60
Q

Q: What is the importance of Network Management and monitoring in WAN implementation?

A

A: Network Management and monitoring are important in WAN implementation to ensure that the network is functioning correctly, and to detect and troubleshoot any issues.

61
Q

Q: Why is scalability important in WAN implementation?

A

A: Scalability is important in WAN implementation to accommodate future growth and changes in the organization’s needs, allowing the network to adapt and grow as the organization’s requirements change over time.

62
Q

Q: How should cost be considered during WAN implementation?

A

A: Cost should be considered during WAN implementation and budgeted for, including the costs of the initial implementation and the ongoing maintenance costs of the network.

63
Q

Q: What is a bus topology?

A

A: A bus topology is a network where all devices are connected to a single cable, called a bus. The bus functions as a backbone to which all devices connect. Data is transmitted along the bus in one direction.

64
Q

Q: What are the advantages and disadvantages of bus topology?

A

A: Advantages of bus topology are it’s simple to implement and extend, disadvantages are that if the bus cable fails, the whole network goes down.

65
Q

Q: What is a star topology?

A

A: A star topology is a network where all devices are connected to a central hub, which acts as a central point of communication. Data is transmitted from one device to the hub and then on to the destination device.

66
Q

Q: What are the advantages and disadvantages of star topology?

A

A: Advantages of star topology are it’s easy to install and manage, disadvantages are that if the hub fails, the whole network goes down.

67
Q

Q: What is a mesh topology?

A

A: A mesh topology is a network where each device is connected to every other device in the network, allowing for multiple paths for data to travel.

68
Q

Q: What are the advantages and disadvantages of mesh topology?

A

A: Advantages of mesh topology are that it provides a high degree of fault tolerance, disadvantages are that it’s complex and costly to implement.

69
Q

Q: What is a ring topology?

A

A: A ring topology is a network where all devices are connected to one another in a circular shape, forming a ring. Data travels around the ring in one direction, with each device acting as a repeater to pass the data along to the next device.

70
Q

Q: What are the advantages and disadvantages of ring topology?

A

A: Advantages of ring topology are that it’s easy to install and manage, disadvantages are that if one device fails, the whole network can be affected.

71
Q

Q: What is the logical topology of Ethernet?

A

A: Ethernet uses a logical topology known as a broadcast topology, in which all devices on the network share a common communication channel, and all devices can transmit and receive data simultaneously.

72
Q

Q: What is a MAC address?

A

A: In Ethernet networks, each device has a unique address called a MAC (Media Access Control) address, which is used to identify the source and destination of each frame.

73
Q

Q: What is the protocol used by Ethernet to prevent collisions between frames?

A

A: Ethernet uses a protocol called CSMA/CD (Carrier Sense Multiple Access with Collision Detection) to prevent collisions between frames transmitted by different devices.

74
Q

Q: What are some physical topologies used with Ethernet?

A

A: Some physical topologies used with Ethernet include star and bus topologies.

75
Q

Q: What are some different speeds Ethernet networks can run at?

A

A: Ethernet networks can run at different speeds such as 10Mbps, 100Mbps, and 1Gbps.

76
Q

Q: What are some types of cables that can be used with Ethernet networks?

A

A: Types of cables that can be used with Ethernet networks include twisted pair and fiber optic cables.

77
Q

Q: What is the logical topology of Token Ring?

A

A: Token Ring is a logical topology for local area networks (LANs) in which all devices are connected in a ring or star configuration, and a token, which is a special data packet, is passed from device to device around the ring.

78
Q

Q: What is a MAC address in Token Ring networks?

A

A: In Token Ring networks, each device has a unique address called a MAC address, which is used to identify the source and destination of each data packet.

79
Q

Q: How does a device transmit data in Token Ring network?

A

A: When a device wants to transmit data, it waits for the token to be passed to it. Once the token is received, the device attaches its data and the destination MAC address to the token and sends it on its way.

80
Q

Q: What are the advantages of Token Ring networks?

A

A: One of the advantages of Token Ring networks is that they are less prone to collisions than other types of networks, such as Ethernet networks, because only one device can transmit data at a time, and all devices must wait for the token before transmitting.

81
Q

Q: What are the speeds that Token Ring networks can run at?

A

A: Token Ring networks can run at different speeds such as 4Mbps and 16Mbps.

82
Q

Q: What are the types of cables that can be used with Token Ring networks?

A

A: Types of cables that can be used with Token Ring networks include twisted pair and fiber optic cables.

83
Q

Q: What is Ethernet?

A

A: Ethernet is a widely-used technology for local area networks (LANs) that provides a way to connect computers and other devices together to form a network, it was first developed in the 1970s by Bob Metcalfe at Xerox Corporation and is now an industry standard for LANs.

84
Q

Q: What is the logical topology of Ethernet?

A

A: Ethernet uses a logical topology known as a broadcast topology, in which all devices on the network share a common communication channel, and all devices can transmit and receive data simultaneously.

85
Q

Q: What are some physical topologies used with Ethernet?

A

A: Some physical topologies used with Ethernet include star and bus topologies.

86
Q

Q: What are some different speeds Ethernet networks can run at?

A

A: Ethernet networks can run at different speeds such as 10Mbps, 100Mbps, and 1Gbps.

87
Q

Q: What are some types of cables that can be used with Ethernet networks?

A

A: Types of cables that can be used with Ethernet networks include twisted pair and fiber optic cables.

88
Q

Q: What is the protocol used by Ethernet to prevent collisions between frames?

A

A: Ethernet uses a protocol called CSMA/CD (Carrier Sense Multiple Access with Collision Detection) to prevent collisions between frames transmitted by different devices.

89
Q

Q: What is the role of MAC address in Ethernet?

A

A: In Ethernet networks, each device has a unique address called a MAC (Media Access Control) address, which is used to identify the source and destination of each frame.

90
Q

Q: Who maintains the Ethernet standard?

A

A: The Ethernet standard is maintained by the IEEE (Institute of Electrical and Electronics Engineers) and is known as IEEE 802.3.

91
Q

Q: What are Ethernet wiring standards?

A

A: Ethernet wiring standards refer to the specifications and guidelines for installing and maintaining Ethernet cabling, ensuring that cables and connections are reliable, compatible, and capable of supporting the desired data transfer rates.

92
Q

Q: What is the most common Ethernet wiring standard?

A

A: The most common Ethernet wiring standard is twisted pair, which uses copper wires that are twisted together in pairs to reduce interference from external sources.

93
Q

Q: What are some different types of twisted pair cables?

A

A: Different types of twisted pair cables include Category 3 (CAT3), Category 5 (CAT5), Category 5e (CAT5e), Category 6 (CAT6), and Category 6a (CAT6a).

94
Q

Q: What are some other types of Ethernet cables?

A

A: Other types of Ethernet cables include fiber-optic cables, which use thin fibers of glass or plastic to transmit data and are not affected by electromagnetic interference.

95
Q

Q: What is the most widely used wiring standard for Ethernet?

A

A: The most widely used wiring standard for Ethernet is TIA/EIA-568-B, which defines the pin assignments, cable specifications, and maximum cable lengths for twisted-pair cables.

96
Q

Q: What is ISO/IEC 11801?

A

A: ISO/IEC 11801 is an international standard that defines the requirements for cabling in commercial and residential buildings.

97
Q

Q: What are the IEEE 802.3 standards?

A

A: The IEEE 802.3 standards are a set of standards for Ethernet networks developed by the Institute of Electrical and Electronics Engineers (IEEE), that define the physical and data link layers of the OSI (Open Systems Interconnection) model for Ethernet networks.

98
Q

Q: What are the characteristics of the cabling, connectors and signaling defined by the 802.3 standards?

A

A: The 802.3 standards specify the characteristics of the cabling, connectors and signaling used in Ethernet networks.

99
Q

Q: What is the original 802.3 standard?

A

A: The original 802.3 standard, published in 1980, defined the 10BASE-5 and 10BASE-2 specifications for 10 Mbps Ethernet networks using thick and thin coaxial cables.

100
Q

Q: What are some of the other specifications that were added to the 802.3 standard?

A

A: Some other specifications that were added to the 802.3 standard include 10BASE-T and 100BASE-TX for 10Mbps and 100Mbps Ethernet networks using twisted-pair cables, 1000BASE-T and 10GBASE-T for 1Gbps and 10Gbps Ethernet networks using twisted-pair cables, 10GBASE-SR, 10GBASE-LRM and 40GBASE-SR4 for 10Gbps and 40Gbps Ethernet networks using fiber-optic cables.

101
Q

Q: What is the medium access control (MAC) protocol used in Ethernet networks?

A

A: The medium access control (MAC) protocol used in Ethernet networks is based on the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol.

102
Q

Q: Does the 802.3 standard cover higher-layer protocols such as IP?

A

A: No, the 802.3 standard only covers the physical and data link layers of the OSI model and does not cover higher-layer protocols such as IP. Ethernet networks can be used in conjunction with other protocols such as TCP/IP to provide a complete networking solution.

103
Q

Q: What is a repeater and how does it extend an Ethernet network?

A

A: A repeater is a device that amplifies and retransmits signals on a network. It can be used to extend the distance between devices on an Ethernet network by regenerating the signal. However, it does not provide any mechanism for filtering or directing traffic.

104
Q

Q: What is a bridge and how does it extend an Ethernet network?

A

A: A bridge is a device that connects two or more LANs together, allowing them to communicate as if they were a single LAN. Bridges use filters to direct traffic between LANs based on the MAC addresses of the devices, which can increase network performance by reducing the amount of unnecessary traffic on the network.

105
Q

Q: What is a router and how does it extend an Ethernet network?

A

A: A router is a device that connects multiple networks together and directs traffic between them. Routers use routing tables to determine the best path for data to take as it travels between networks. They can also provide network address translation (NAT) to allow devices on a private network to access the internet. Routers can be used to connect an Ethernet network to a wide area network (WAN) such as the internet, or to connect multiple Ethernet networks together.

106
Q

Q: What are the different capabilities of repeaters, bridges, and routers and how do you choose which one to use?

A

A: Each of these devices have different capabilities and the choice of which device to use depends on the specific requirements of the network. For example, a network that needs to connect multiple LANs together would likely use a bridge, while a network that needs to connect to the internet would likely use a router.

107
Q

Q: What are the steps in planning a LAN?

A

A: The steps in planning a LAN include assessing the network requirements, determining the network topology, selecting the network hardware and software, creating a network diagram and addressing scheme, and testing and documenting the network.

108
Q

Q: What is the first step in planning a LAN?

A

A: The first step in planning a LAN is to assess the network requirements, which includes determining the number of users, the types of devices that will be connected, the data transfer rates required, and the security and management requirements.

109
Q

Q: What is the purpose of determining the network topology in planning a LAN?

A

A: The purpose of determining the network topology in planning a LAN is to choose the most appropriate physical and logical layout of the network that meets the network requirements.

110
Q

Q: What is the role of network hardware and software in planning a LAN?

A

A: In planning a LAN, the role of network hardware and software is to select the appropriate network devices, cabling, connectors and other physical components, as well as the operating system, network management software, and security software that will be used on the network.

111
Q

Q: What is the importance of creating a network diagram and addressing scheme in planning a LAN?

A

A: Creating a network diagram and addressing scheme in planning a LAN is important because it helps to visually represent the network, including the location of devices and the type of cabling used, and it also helps in assigning IP addresses to devices and configuring subnet masks.

112
Q

Q: Why is testing and documenting the network important in planning a LAN?

A

A: Testing and documenting the network is important in planning a LAN because it ensures that the network is functioning properly and meets the network requirements before deployment and it also helps to keep track of the network’s configuration and layout for future reference.