Networking

Created by mrod25 

Upgrade to
remove ads

Peripheral device sharing

enables groups of users to take advantage of peripherals and other devices attached directly to a network or to a generally available computer attached to a network.

An Internetwork

is a network of networks or a networked collection of LANs tied together by devices such as routers

In client server Networking environments

certain computers take specialized roles and function mainly as servers, and ordinary users' machines tend to function mainly as clients.

Computers that participate on a network

run a domain that determines what services that computer can offer or request.

Networks fall into two major types

peer-to-peer and client/server (also called server based)

In a peer-to-peer network

every user must also act as a network administrator, controlling access to the resources on their machines

Chaos is the norm for peer-to-peer networks

and security can be a major concern

Most peer-to-peer networks

consist of collections of typical end-user PCs linked by a common network medium.

In the Novell world

one or more NetWare servers provide similar controls over users and the resources they can access by using Novell eDirectory to store and manage the same kind of security information that Windows domain controllers handle.

The WPAN

is a short-range networking technology designed to connect personal devices to exchange information

The emerging standard for WPANs

is the IEEE 802.15 standard

Windows Server 2003 was designed to handle up to

64 CPUs in a single system

Windows Server 2003 was designed to handle as much as

512 GB of RAM in a single system.

fax servers

manage fax traffic for a network.

mail servers

handle e-mail messages for network users; this function might involve simply acting as a clearinghouse for local exchange of messages.

Windows Server 2000/2003 includes a complete Web server called

IIS

A LAN

is recommended if the network use and security factors don't require using a router.

A server-based network makes sense when more than

10 users must share network access

All network designs today are based on

3 simple physical topologies

Because of the single bounce phenomenom

a method to ensure that all signals stop when they reach the end of any segment in a bus topology must be devised.

A Terminator

attached to each end of a cable prevents signals from bouncing on a physical bus

On a bus network

open ends in a cable segment must be terminated to prevent signal bounce

A physical bus topology is almost always implemented as a logical

bus topology

All computers, no matter what their topology, communicate in the same way: They address data to one or more computers and then transmit that data across the cable in the form of

electronic signals

In a active topology network

computers and other devices attached to the network regenerate signals and are responsible for moving data through the network

A physical ring is a

Active topology

At the center of a logical bus implemented as a physical star is a device called a(n

hub

At the center of a logical ring implemented as a physical star is a device called a(n)

concentrator

In the simplest wireless configuration, two computers can communicate directly with one another in a(n

ad hoc topology

When wireless devices are configured to use an access point, they are said to be in

Infrastructure mode

In most situations, wireless LANs use a central device, called a(n)

access point, to control communications

which network topology is the most fault tolerant one

a mesh network topology

The mesh topology formula for determining how many connections are needed for the number of nodes on a network, with n representing the number of nodes on the network is

n(n-1)/2

The majority of hubs installed in networks today are

active hubs

In a passive hub

such as a patch panel or punchdown block, the signal passes through the hub without any amplification or regeneration.

A hub-based bus topology should be considered if a small network

( 10 or fewer computers) is being constructed and keeping costs down is paramount.

which hub based topology might be considered if a few computers are being added to an existing network, and the new computers are grouped in a somewhat remote location.

a hub based bus topology

which central device sits in the middle of the extended star topology.

a switch

Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be read accurately; this phenomenon is called

attenuation

Coaxial cable consists of a single conductor at the core, surrounded by an insulating layer, braided metal shielding, and an outer cover (usually called the

sheath

Shielding works like a form of built-in ____, a type of metal or plastic pipe built specifically to contain cabling

conduit

____ encloses each pair of wires within a foil shield as well as an enclosing insulating sheath.

STP

10BaseT refers to ____.

UTP

Category ____ cable is labeled as voicegrade.

1

Category ____ cable is labeled as datagrade.

4

Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into computer network interfaces or other networked devices.

RJ-45

____ are special RJ-45-terminated TP cables that permit modular cables to stretch between wall plates and equipment.

Jack couplers

The bend radius of fiber-optic cable is ____ degrees per foot.

30

____ is not a fiber-optic connector.

BNC

____ is not a fiber-optic connector.

RJ-45

The TIA/EIA developed the document "____ Commercial Building Wiring Standard", which specifies how network media should be installed to maximize performance and efficiency.

568

With respect to structured cabling, the ____ is where computer workstations and other user devices are located.

Work Area

With respect to structured cabling, the ____ provides connectivity to computer equipment in the nearby work area.

Telecommunications Closet

With respect to structured cabling, the ____ houses servers, routers, switches, and other major network equipment and serves as a connection point for backbone cabling running between TCs.

Equipment Room

With respect to structured cabling, a(n) ____ is the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider.

Entrance Facility

The ____ Worldwide Interoperability for Microwave Access (WiMax) standard, comes in two flavors.

802.16

A(n) ____ allows the computer and adapters to exchange data in chunks equal to the number of lines extending between them.

Computer Bus

The type of data transmission that occurs in a computer bus is called ____ transmission.

Parrallel

Some NICs can operate in what's called "____ mode"—essentially, this mode turns off the gatekeeper functions and enables the NIC to forward any frames it sees to the computer.

Promiscuous

MAC addresses take the form of ____ two-digit hexadecimal numbers separated by colons.

Six

____ cards are credit-card-size expansion cards used primarily to add functionality to laptop computers.

PCMCIA

The ISA bus originally appeared in the first PCs in a(n) ____-bit form.

8

USB comes in ____ versions.

2

FireWire is also known as IEEE ____.

1394

PnP attempts to define a set of configuration protocols so that a computer can communicate with its peripherals during the ____ sequence and negotiate a working configuration without requiring user intervention.

POST

____ means the adapter's buffers map directly into RAM on the computer.

Shared Adapter Memory

____ means a NIC's on-board processor selects a region of RAM on the computer and writes to it as though it were buffer space on the adapter.

Shared system Memory

____ permits a network adapter to take control of the computer's bus to initiate and manage data transfers to and from the computer's memory, independent of the CPU.

BUS Mastering

When purchasing a NIC for a server, you should choose ____-bit PCI-X or PCIe when possible

64

With respect to data transfer speeds of wireless NICs, the most common choices today are 11 Mbps or ____ Mbps.

54

Wireless NICs can operate at speeds faster than 100 Mbps by using the ____ technology.

IEEE 802.11n

The main benefit of the ____ device driver standard is that it allows NICs to use multiple protocols simultaneously.

NDIS

The ____ standard defines a complete NIC driver interface for PCs that run 32-bit Windows operating systems

WDM

Apple Computer and Novell defined the ____ standard to allow a NIC to use multiple protocols and to simplify driver development for NIC manufacturers.

ODI

The name assigned to a WLAN is called the ____.

SSID

In the OSI reference model, the ____ layer is layer 6.

Presentation

In the OSI reference model, the ____ layer is layer 5.

Session

In the OSI reference model, the ____ layer is layer 1.

Physical

In the OSI reference model, the ____ layer is layer 2.

network

In the OSI reference model, the ____ layer is layer 4.

transport

Domain Name System (DNS) and NetBIOS name resolution both work in part at the ____ layer.

Session

____ is the process whereby a device receives a packet destined for another network, determines the best way to get the packet to its destination, and then forwards the packet out of one of its other network interfaces.

Rounting

Access control is handled at the ____ layer during the routing process; the router consults a list of rules before forwarding an incoming packet to determine whether a packet meeting certain criteria (such as source and destination address) should be permitted to reach the intended destination.

Network

The PDU at the Transport layer is called a ____.

segment

The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages.

Physical Layer

A frame is usually addressed to only one computer and is called a ____ frame

unicast

_frames are created for any computers on a network that "listen" to a shared network address.

multicast

The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet).

802.3

The IEEE standard ____ covers error control and flow control over data frames.

802.2

The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and techniques.

802.11

____ functions at the Application layer of the OSI reference model.

HTTP

____ functions at the Transport layer of the OSI reference model.

SPX

____ functions at the Network layer of the OSI reference model.

IPX

____ is Novell's protocol for packet routing and forwarding.

IPX

____ is the TCP/IP protocol responsible for reliable delivery of data.

TCP

____ is a nonroutable protocol.

NetBEUI

____ is Novell's connection-oriented protocol used to guarantee data delivery.

SPX

____ is Apple's remote file-management protocol.

AFP

IP is a ____ protocol.

conectionless

____ uses TCP as its transport protocol.

HTTP

____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model.

DNS

____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems.

TELNET

An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____.

host ID

Class ____ networks are limited to 254 hosts per network.

C

Class ____ addresses are reserved for experimental use and cannot be used for address assignment.

E

The reserved name localhost always corresponds to the IP address ____.

127.0.0.1

A subnet mask is a ____-bit number that's always assigned to a host when the IP address is assigned.

32

The default Class C subnet mask is ____.

255.255.255.0

In an APIPA-enabled operating system, the computer assigns itself an address from the special range of addresses that begin with ____.

169.254

An IPv6 address is ____ bits long.

128

____ is the message format that DOS and Windows use to share files, directories, and devices.

SMB

NWLink is the Microsoft implementation of the ____ protocol suite.

IPX/SPX

AppleTalk divides computers into ____.

zones

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set