* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Data Transmission Review
Survey
Document related concepts
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Power over Ethernet wikipedia , lookup
Deep packet inspection wikipedia , lookup
Distributed firewall wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Transcript
Data Transmission Review 1. Access methods prevent _______________________ access to the cable. 2. With CSMA/CD, if there is data on the cable, no other computer may _________________ until the data has reached its destination and the cable is clear again. 3. CSMA/CD is known as a _____________________ access method because computers on the network compete for an opportunity to send data. 4. With more traffic on a CSMA/CD network, _______________ tend to increase, slowing the network down. 5. With the token-passing access method, only one computer at a time can use the token; therefore, there are no ___________________ or _____________________. 6. With the demand-priority access method, the __________________ manage network access by doing round-robin searches for requests to send from all nodes. 7. In the demand-priority access method, transmissions are not __________________ to all other computers on the network. 8. A token is a special type of __________________ that circulates around a cable ring. 9. With data masses divided into ______________, individual transmissions occur more frequently so that every computer on the network has more opportunities to transmit and receive data. 10. Packets may contain session-control codes, such as error correction, that indicate the need for a _________________________. 11. A packet's components are grouped into three sections: _____________, data, and trailer. 12. In a packet, the header usually contains an error-checking component called a CRC. True False 13. The structure of the packets is defined by the communication method, known as a protocol, used by the two computers. True False 14. Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet's address matches its individual address. True False 15. The trailer of a packet contains the destination address. True False 16. Typically, Ethernet is a baseband architecture that uses a ________ topology. 17. Ethernet relies on the __________________ access method to regulate traffic on the main cable segment. 18. The maximum length of a 10BaseT segment is ________ meters. 19. The 10BaseT topology is an Ethernet network that uses ______________________________ cable to connect stations. 20. Typically, the hub of a 10BaseT network serves as a _____________________ _____________________. 21. A thinnet network can combine as many as __________ cable segments connected by four repeaters, but only three segments can have stations attached. 22. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, _________________ can be used to join Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet). 23. A 10Base5 topology is also referred to as ___________________. 24. Fast Ethernet is another name for the ________________ topology. 25. Ethernet can use several communication _______________ including TCP/IP. 26. The 100BaseTX topology runs on UTP Category _____ data-grade cable. 27. A 100BaseVG network is built on a __________ topology with all computers attached to a hub. 28. A Token Ring network is an implementation of IEEE standard _____________. 29. In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________. 30. In a Token Ring frame the Access Control field indicates whether the frame is a _______________ frame or a _____________ frame. 31. When a frame reaches the destination computer, that computer copies the frame into its _____________ _____________. 32. Token passing is ___________________ , meaning that a computer cannot force its way onto the network as it can in a CSMA/CD environment. 33. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring. 34. Cables attach the individual clients and servers to the MSAU that works like other ______________ hubs. 35. When an IBM Token Ring network is full, adding another __________ can enlarge the network. 36. MSAUs were designed to sense when a _______________ _______________ _________ fails and to disconnect from it. 37. Each single Token Ring can accommodate ________ computers using STP cable. 38. Most Token Ring networks use IBM Cabling System Type ____ UTP cabling. 39. LocalTalk uses __________________ as an access method in a bus or tree topology. 40. When a device attached to an AppleTalk network comes online, the device broadcasts an ________________ to determine if any other device is using it. 41. A single LocalTalk network supports a maximum of ______ devices. 42. Single LocalTalk networks can be joined together into one larger network through the use of _____________. 43. ArcNet uses a token-passing access method in a ________-_______ topology. 44. An ArcNet token moves from one computer to the next according to the order in which it is connected to the __________________, regardless of how they are placed on the network environment. 45. Each computer in an ArcNet network is connected by cable to a ________.