Download Data Transmission Review

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

Net bias wikipedia , lookup

Computer security wikipedia , lookup

Power over Ethernet wikipedia , lookup

Deep packet inspection wikipedia , lookup

Distributed firewall wikipedia , lookup

AppleTalk wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Data Transmission Review
1. Access methods prevent _______________________ access to the cable.
2. With CSMA/CD, if there is data on the cable, no other computer may
_________________ until the data has reached its destination and the cable is
clear again.
3. CSMA/CD is known as a _____________________ access method because
computers on the network compete for an opportunity to send data.
4. With more traffic on a CSMA/CD network, _______________ tend to increase,
slowing the network down.
5. With the token-passing access method, only one computer at a time can use the
token; therefore, there are no ___________________ or
_____________________.
6. With the demand-priority access method, the __________________ manage
network access by doing round-robin searches for requests to send from all
nodes.
7. In the demand-priority access method, transmissions are not
__________________ to all other computers on the network.
8. A token is a special type of __________________ that circulates around a
cable ring.
9. With data masses divided into ______________, individual transmissions
occur more frequently so that every computer on the network has more
opportunities to transmit and receive data.
10. Packets may contain session-control codes, such as error correction, that
indicate the need for a _________________________.
11. A packet's components are grouped into three sections: _____________, data,
and trailer.
12. In a packet, the header usually contains an error-checking component called a
CRC. True False
13. The structure of the packets is defined by the communication method, known
as a protocol, used by the two computers. True False
14. Every network interface card sees all packets sent on its segment, but it
interrupts the computer only if the packet's address matches its individual
address. True False
15. The trailer of a packet contains the destination address. True False
16. Typically, Ethernet is a baseband architecture that uses a ________ topology.
17. Ethernet relies on the __________________ access method to regulate traffic
on the main cable segment.
18. The maximum length of a 10BaseT segment is ________ meters.
19. The 10BaseT topology is an Ethernet network that uses
______________________________ cable to connect stations.
20. Typically, the hub of a 10BaseT network serves as a _____________________
_____________________.
21. A thinnet network can combine as many as __________ cable segments
connected by four repeaters, but only three segments can have stations
attached.
22. Because single-segment 10Base2 Ethernet limits would be too confining for a
large business, _________________ can be used to join Ethernet segments and
extend the network to a total length of 925 meters (about 3035 feet).
23. A 10Base5 topology is also referred to as ___________________.
24. Fast Ethernet is another name for the ________________ topology.
25. Ethernet can use several communication _______________ including TCP/IP.
26. The 100BaseTX topology runs on UTP Category _____ data-grade cable.
27. A 100BaseVG network is built on a __________ topology with all computers
attached to a hub.
28. A Token Ring network is an implementation of IEEE standard
_____________.
29. In the IBM implementation of Token Ring, a star-wired ring, the actual
physical ring of cable is in the ________.
30. In a Token Ring frame the Access Control field indicates whether the frame is a
_______________ frame or a _____________ frame.
31. When a frame reaches the destination computer, that computer copies the frame
into its _____________ _____________.
32. Token passing is ___________________ , meaning that a computer cannot
force its way onto the network as it can in a CSMA/CD environment.
33. When a frame returns to its sending computer, that computer ____________
the frame and puts a new token back on the ring.
34. Cables attach the individual clients and servers to the MSAU that works like
other ______________ hubs.
35. When an IBM Token Ring network is full, adding another __________ can
enlarge the network.
36. MSAUs were designed to sense when a _______________ _______________
_________ fails and to disconnect from it.
37. Each single Token Ring can accommodate ________ computers using STP
cable.
38. Most Token Ring networks use IBM Cabling System Type ____ UTP cabling.
39. LocalTalk uses __________________ as an access method in a bus or tree
topology.
40. When a device attached to an AppleTalk network comes online, the device
broadcasts an ________________ to determine if any other device is using it.
41. A single LocalTalk network supports a maximum of ______ devices.
42. Single LocalTalk networks can be joined together into one larger network
through the use of _____________.
43. ArcNet uses a token-passing access method in a ________-_______ topology.
44. An ArcNet token moves from one computer to the next according to the order
in which it is connected to the __________________, regardless of how they
are placed on the network environment.
45. Each computer in an ArcNet network is connected by cable to a ________.