What are the two functions of end devices on a network

The following animation shows an IP packet being sent from one end device to another. Click on the full screen button to view.

Download this video clip.Video player: screen_1_3_2_2.mp4

What are the two functions of end devices on a network

Interactive feature not available in single page view (see it in standard view).

The network devices that people are most familiar with are called end devices. All computers connected to a network that participate directly in network communication are classified as hosts. These devices form the interface between users and the underlying communication network.

Some examples of end devices are:

  • computers (workstations, laptops, file servers, and web servers)
  • nsetwork printers
  • VoIP phones
  • TelePresence endpoints
  • security cameras
  • mobile handheld devices (smartphones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners) sensors such as thermometers, weight scales, and other devices that will be connected to the IoE.

End devices are either the source or destination of data transmitted over the network. In order to distinguish one end device from another, each end device on a network is identified by an address. When an end device initiates communication, it uses the address of the destination end device to specify where the message should be sent.

A server is an end device that has software installed that enables it to provide information, like email or web pages, to other end devices on the network. For example, a server requires web server software to provide web services to the network.

A client is an end device that has software installed to enable it to request and display the information obtained from a server. An example of client software is a web browser, like internet Explorer. Figure 8 provides a brief description of each. Press each plus symbol to view the end device to server interaction.

Interactive feature not available in single page view (see it in standard view).

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Last Updated on March 26, 2018 by Admin

CCNA1 Chapter 1 Exam Answer 2016 (v5.1)

    • better security
    • easy to create
    • better device performance when acting as both client and server
    • lacks centralized administration
    • less cost to implement
    • scalable
      Explanation:

      Because network devices and dedicated servers are not required, peer-to-peer networks are easy to create, less complex, and have lower costs. Peer-to-peer networks also have no centralized administration. They are less secure, not scalable, and those devices acting as both client and server may perform slower.

    • a router
    • a firewall
    • a web server
    • a DSL modem
      Explanation:

      A router is used to determine the path that the messages should take through the network. A firewall is used to filter incoming and outgoing traffic. A DSL modem is used to provide Internet connection for a home or an organization.

    • the types of data that need to be prioritized
    • the cost of the end devices utilized in the network
    • the distance the selected medium can successfully carry a signal
    • the number of intermediary devices installed in the network
    • the environment where the selected medium is to be installed
      Explanation:

      Criteria for choosing a network medium are the distance the selected medium can successfully carry a signal, the environment in which the selected medium is to be installed, the amount of data and the speed at which the data must be transmitted, and the cost of the medium and its installation.

    • Intermediary devices generate data content.
    • Intermediary devices alter data content.
    • Intermediary devices direct the path of the data.
    • Intermediary devices connect individual hosts to the network.
    • Intermediary devices initiate the encapsulation process.
      Explanation:

      Applications on end devices generate data, alter data content, and are responsible for initiating the encapsulation process.

    • They originate the data that flows through the network.
    • They direct data over alternate paths in the event of link failures.
    • They filter the flow of data to enhance security.
    • They are the interface between humans and the communication network.
    • They provide the channel over which the network message travels.
      Explanation:

      End devices originate the data that flows through the network. Intermediary devices direct data over alternate paths in the event of link failures and filter the flow of data to enhance security. Network media provide the channel through which network messages travel.

    • extranet
    • intranet
    • wired LAN
    • wireless LAN
    • wireless WAN
      Explanation:

      An extranet is a network area where people or corporate partners external to the company access data. An intranet simply describes the network area that is normally accessed only by internal personnel. The wired LAN is affected by BYODs (bring your own devices) when the devices attach to the wired network. A college wireless LAN is most likely used by the tablet and smartphone. A wireless WAN would more likely be used by college students to access their cell provider network.

    • an intranet
    • the Internet
    • an extranet
    • a local area network
      Explanation:

      Home users will go online shopping over the Internet because online vendors are accessed through the Internet. An intranet is basically a local area network for internal use only. An extranet is a network for external partners to access certain resources inside an organization. A home user does not necessarily need a LAN to access the Internet. For example, a PC connects directly to the ISP through a modem.

    • an intranet
    • the Internet
    • an extranet
    • a local area network
      Explanation:

      Intranet is a term used to refer to a private connection of LANs and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization’s members, employees, or others with authorization.

    • cellular
    • DSL
    • satellite
    • cable
    • dial-up telephone
      Explanation:

      Cable and DSL both provide high bandwidth, an always on connection, and an Ethernet connection to a host computer or LAN.

    • DSL
    • cellular
    • satellite
    • dialup
    • dedicated leased line
      Explanation:

      Cellular connectivity requires the use of the cell phone network. Satellite connectivity is often used where physical cabling is not available outside the home or business.

    • convergence
    • congestion
    • optimization
    • synchronization
      Explanation:

      When the demand on the network resources exceeds the available capacity, the network becomes congested. A converged network is designed to deliver multiple communication types, such as data, video and voice services, using the same network infrastructure.

    • email
    • on-line purchasing
    • video conferencing
    • wiki
      Explanation:

      Video conferencing utilizes real-time audio and video communications. Both of these are time-sensitive and bandwidth-intensive forms of communication that require quality of service to be active on the network. QoS will ensure an uninterrupted user experience.

    • a method of limiting the impact of a hardware or software failure on the network
    • a measure of the data carrying capacity of the media
    • a state where the demand on the network resources exceeds the available capacity
    • a set of techniques to manage the utilization of network resources
      Explanation:

      A method of limiting the impact of a hardware or software failure is fault tolerance. A measure of the data carrying capacity is bandwidth. A set of techniques to manage the utilization of network resources is QoS. A state where the demand on the network resources exceeds the available capacity is called congestion.

    • data integrity
    • data quality
    • data confidentiality
    • data redundancy
      Explanation:

      A security policy requiring strong, complex passwords contributes to data confidentiality because only authorized users can access the data.

    • A business can connect directly to the Internet without the use of an ISP.
    • Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
    • Devices can connect to the Internet through existing electrical wiring.
    • Investment in new infrastructure is required in order to access the cloud.
      Explanation:

      Cloud computing allows users to access applications, back up and store files, and perform tasks without needing additional software or servers. Cloud users access resources through subscription-based or pay-per-use services, in real time, using nothing more than a web browser.

    • It is a network based on Ethernet technology.
    • It provides network access for mobile devices.
    • It provides connections through interconnected global networks.
    • It is a private network for an organization with LAN and WAN connections.
      Explanation:

      The Internet provides global connections that enable networked devices (workstations and mobile devices) with different network technologies, such as Ethernet, DSL/cable, and serial connections, to communicate. A private network for an organization with LAN and WAN connections is an intranet.

    • New “smart” electrical cabling is used to extend an existing home LAN.
    • A home LAN is installed without the use of physical cabling.
    • A device connects to an existing home LAN using an adapter and an existing electrical outlet.
    • Wireless access points use powerline adapters to distribute data through the home LAN.
      Explanation:

      Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet.​ The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.​

    • denial of service to your email server
    • replication of worms and viruses in your computer
    • capturing of personal data that leads to identity theft
    • spyware that leads to spam emails
      Explanation:

      On a personal PC, denial of service to servers, worms and viruses, and spyware producing spam emails can be annoying, invasive, and frustrating. However, identity theft can be devastating and life altering. Security solutions should be in place on all personal devices to protect against this type of threat.

    • implementing a firewall
    • installing a wireless network
    • installing antivirus software
    • implementing an intrusion detection system
    • adding a dedicated intrusion prevention device
      Explanation:

      Technically complex security measures such as intrusion prevention and intrusion prevention systems are usually associated with business networks rather than home networks. Installing antivirus software, antimalware software, and implementing a firewall will usually be the minimum requirements for home networks. Installing a home wireless network will not improve network security, and will require further security actions to be taken.

    • Question

      What are the two functions of end devices on a network

      CCNA1 Chapter 1 v5.1 001 Question

    • Answer

      What are the two functions of end devices on a network

      CCNA1 Chapter 1 v5.1 001 Answer

      Explanation:

      podcast: an audio-based medium that allows people to deliver their recordings to a wide audience social media: interactive websites where people create and share user-generated content with friends and family wiki: web pages that groups of people can edit and view together

      instant messaging: real-time communication between two or more people