Selasa, 03 Juli 2012

POWERLINK BUDGETING ..


 
 
PERHITUNGAN PEMBUATAN :

1. Router linksys WRT             Rp 475.000,00
2. satu Antena Helix              Rp 250.000,00 
3. kabel  LAN UTP                 Rp 5000,00
4. Reflektor Antena parabola TV   Rp 215.000,00
5. Pipa paralon 0,5" + Tutup      Rp 30.000,00
6. Kotak plastik                  Rp 1.500,00


total  : Rp 926.500,00

Senin, 04 Juni 2012

Chapter 4 - Connecting to the Internet Through an ISP


Risky Falahiyah, 11.240.0208, 2p46, Jarkom teori



1. Which definition describes the term Internet?

a group of PCs connected together on a LAN
a group of PCs connected together by an ISP
a network of networks that connects countries around the world
a worldwide collection of networks controlled by a single organization

2. What type of connection point is a point of presence (POP)?

between a client and a host
between two local networks
between a computer and a switch
between an ISP and a home-based LAN

3. What is the term for the group of high-speed data links that interconnect ISPs?

Internet LAN
ISP backbone
Internet gateways
Internet providers
Internet backbone

4. Which device can act as a router, switch, and wireless access point in one package?

hub
bridge
modem
repeater
ISR

5. What are three characteristics of business class ISP service? (Choose three.)

  • fast connections
  • extra web space
  • free Windows upgrade
  • fast connections
  • cheapest cost available to all users
  • free Windows upgrade
  • fast connections
  • extra web space
  • cheapest cost available to all users
  • fast connections
  • cheapest cost available to all users
  • additional e-mail accounts
  • replacement hardware at no cost
  • additional e-mail accounts
  • cheapest cost available to all users
  • fast connections
  • extra web space
  • additional e-mail accounts

6. What is a major characteristic of asymmetric Internet service?

Download speeds and upload speeds are equal.
Download speeds are slower than upload speeds.
Upload speeds and download speeds are different.
Upload speeds and download speeds are irrelevant.

7. Which three elements are required to successfully connect to the Internet? (Choose three.)

  • an IP address
  • file sharing enabled
  • a network connection
  • a network connection
  • server services enabled
  • access to an Internet service provider
  • access to an Internet service provider
  • an address obtained directly from the RIR
  • server services enabled
  • an IP address
  • a network connection
  • access to an Internet service provider
  • file sharing enabled
  • server services enabled
  • an address obtained directly from the RIR

8. What term describes each router through which a packet travels when moving between source and destination networks?

NOC
ISP
hop
segment

9. What does the tracert command test?

NIC functionality
the ISP bandwidth
the network path to a destination
the destination application functionality

10. What type of end-user connectivity requires that an ISP have a DSLAM device in their network?

analog technology
cable modem technology
digital subscriber line technology
wireless technology

11. Why would an ISP require a CMTS device on their network?

to connect end users using cable technology
to connect end users using analog technology
to connect end users using wireless technology
to connect end users using digital subscriber line technology

12.

Refer to the graphic. What type of cabling is shown?
 

STP
UTP
coax
fiber

13.

Refer to the graphic. What type of cabling is shown?

STP
UTP
coax
fiber

14. Which two places are most appropriate to use UTP cabling? (Choose two.)

  • between buildings
  • in a home office network
  • in a home office network
  • where EMI is an issue
  • where EMI is an issue
  • in a cable TV network
  • in a cable TV network
  • inside a school building
  • inside a school building
  • in a manufacturing environment with hundreds of electrical devices
  • in a home office network
  • inside a school building

15. What does adherence to cabling standards ensure?

data security
no loss of signal
no electromagnetic interference
reliable data communications

16.

Refer to the graphic. What type of cable is shown?

crossover
eight coax channels
multimode fiber
single-mode fiber
straight-through

17. What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling?

ST
BNC
RJ-11
RJ-45

18. Which two characteristics describe copper patch panels? (Choose two.)

  • uses RJ-11 jacks
  • uses RJ-45 jacks
  • uses RJ-45 jacks
  • supports only data transmissions
  • supports only data transmissions
  • allows quick rearrangements of network connections
  • allows quick rearrangements of network connections
  • uses RJ-45 jacks
  • supports only data transmissions
  • forwards transmissions based on MAC addresses

19. What are two advantages of cable management? (Choose two.)

  • requires no preplanning
  • aids in isolation of cabling problems
  • aids in isolation of cabling problems
  • protects cables from physical damage
  • protects cables from physical damage
  • provides compliance with future standards
  • provides compliance with future standards
  • provides a short-term solution for cable installation

20. What are two common causes of signal degradation when using UTP cabling? (Choose two.)

  • installing cables in conduit
  • having improper termination
  • having improper termination
  • losing light over long distances
  • losing light over long distances
  • installing low quality cable shielding
  • installing low quality cable shielding
  • using low quality cables or connectors
  • having improper termination
  • using low quality cables or connectors

21. What are three commonly followed standards for constructing and installing cabling? (Choose three.)

  • pinouts
  • cable lengths
  • connector color
  • connector color
  • connector types
  • cost per meter (foot)
  • pinouts
  • cable lengths
  • connector types
  • cable lengths
  • connector types
  • tensile strength of plastic insulator
  • tensile strength of plastic insulator
  • pinouts
  • connector color












Chapter 3 - Connecting to the Network



Nama           : Risky Falahiyah
Nim               : 11.240.0208
Kelas            : 2p46
Makul          : Jarkom teori







1. Which term is used to describe the process of placing one message format into another format so that the message can be delivered across the appropriate medium?

flow control
encapsulation
encoding
multicasting
access method


2. Refer to the graphic. Five PCs are connected through a hub. If host H1 wants to reply to a message from host H2, which statement is true?

H1 sends a unicast message to H2, but the hub forwards it to all devices.
H1 sends a unicast message to H2, and the hub forwards it directly to H2.
H1 sends a broadcast message to H2, and the hub forwards it to all devices.
H1 sends a multicast message to H2, and the hub forwards it directly to H2.

3. Which two statements concerning networking standards are true?

  • adds complexity to networks
  • encourages vendors to create proprietary protocols
  • encourages vendors to create proprietary protocols
  • provides consistent interconnections across networks
  • provides consistent interconnections across networks
  • ensures that communications work best in a single-vendor environment
  • ensures that communications work best in a single-vendor environment
  • simplifies new product development
  • provides consistent interconnections across networks
  • simplifies new product development

4. What does the 100 mean when referencing the 100BASE-T Ethernet standard?

type of cable used
type of data transmission
speed of transmission
type of connector required
maximum length of cable allowed

5. Which address does an NIC use when deciding whether to accept a frame?

source IP address
source MAC address
destination IP address
destination MAC address
source Ethernet address

6. Which type of address is used in an Ethernet frame header?

logical addresses only
IP addresses only
MAC addresses only
broadcast addresses only

7. What is the function of the FCS field in an Ethernet frame?

detects transmission errors
provides timing for transmission
contains the start of frame delimiter
indicates which protocol will receive the frame

8. What is the purpose of logical addresses in an IP network?

They identify a specific NIC on a host device.
They are used to determine which host device accepts the frame.
They provide vendor-specific information about the host.
They are used to determine the network that the host is located on.
They are used by switches to make forwarding decisions.

9. Which device accepts a message on one port and always forwards the message to all other ports?

modem
switch
router
hub

10. Which two networking devices are used to connect hosts to the access layer?

hub and switch
switch and router
hub and router
switch and computer
client and server

11. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?

ARP
DHCP
DNS
WINS

12. A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?

It drops the frame.
It sends out an ARP request looking for the MAC address.
It floods the frame out of all active ports, except the origination port.
It returns the frame to the sender.

13. What is a benefit of having a router within the distribution layer?

prevents collisions on a local network
keeps broadcasts contained within a local network
controls which hosts have access to the network
controls host-to-host traffic within a single local network

14.

Refer to the graphic. What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2?

It sends the data packet as it was received.
It reassembles the frame with different MAC addresses than the original frame.
It reassembles the data packet with different IP addresses than the original data packet.
It reassembles both the packet and the frame with different destination IP and MAC addresses.

15. Which table does a router use to make decisions about the interface through which a data packet is to be sent?

ARP table
routing table
network table
forwarding table

16. If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host is unable to communicate on the local network.
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
There is no impact on communications.

17. What device is typically used as the default gateway for a computer?

a server hosted by the ISP
the router interface closest to the computer
a server managed by a central IT department
the switch interface that connects to the computer

18. What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?

dynamic route
default route
destination route
generic route

19. Which two items are included in a network logical map?

  • naming scheme
  • IP addressing scheme
  • IP addressing scheme
  • length of cable runs
  • length of cable runs
  • physical location of networking devices
  • physical location of networking devices
  • specific layout of interconnections between networking devices and hosts

20. An integrated router can normally perform the functions of which two other network devices?

  • NIC
  • Switch
  • Switch
  • e-mail Server
  • Switch
  • Wireless Access Point
  • e-mail server
  • application server

21. What is a reason for disabling simple file sharing?

It enables the user to map a remote resource with a local drive.
It enables the user to share all files with all users and groups.
It enables the user to share printers.
It enables the user to set more specific security access levels.









weLcome in my bLog ^_^"

mampir sebentaar yyaa......di bLog ssaiaa......mkaseeeh.....
S.E.L.A.M.A.T__D.A.T.A.N.G