Peripheral device sharing
enables groups of users to take advantage of peripherals and other devices attached directly to a network or to a generally available computer attached to a network.
is a network of networks or a networked collection of LANs tied together by devices such as routers
In client server Networking environments
certain computers take specialized roles and function mainly as servers, and ordinary users' machines tend to function mainly as clients.
Computers that participate on a network
run a domain that determines what services that computer can offer or request.
Networks fall into two major types
peer-to-peer and client/server (also called server based)
In a peer-to-peer network
every user must also act as a network administrator, controlling access to the resources on their machines
Chaos is the norm for peer-to-peer networks
and security can be a major concern
Most peer-to-peer networks
consist of collections of typical end-user PCs linked by a common network medium.
In the Novell world
one or more NetWare servers provide similar controls over users and the resources they can access by using Novell eDirectory to store and manage the same kind of security information that Windows domain controllers handle.
is a short-range networking technology designed to connect personal devices to exchange information
The emerging standard for WPANs
is the IEEE 802.15 standard
Windows Server 2003 was designed to handle up to
64 CPUs in a single system
Windows Server 2003 was designed to handle as much as
512 GB of RAM in a single system.
manage fax traffic for a network.
handle e-mail messages for network users; this function might involve simply acting as a clearinghouse for local exchange of messages.
Windows Server 2000/2003 includes a complete Web server called
is recommended if the network use and security factors don't require using a router.
A server-based network makes sense when more than
10 users must share network access
All network designs today are based on
3 simple physical topologies
Because of the single bounce phenomenom
a method to ensure that all signals stop when they reach the end of any segment in a bus topology must be devised.
attached to each end of a cable prevents signals from bouncing on a physical bus
On a bus network
open ends in a cable segment must be terminated to prevent signal bounce
A physical bus topology is almost always implemented as a logical
All computers, no matter what their topology, communicate in the same way: They address data to one or more computers and then transmit that data across the cable in the form of
In a active topology network
computers and other devices attached to the network regenerate signals and are responsible for moving data through the network
A physical ring is a
At the center of a logical bus implemented as a physical star is a device called a(n
At the center of a logical ring implemented as a physical star is a device called a(n)
In the simplest wireless configuration, two computers can communicate directly with one another in a(n
ad hoc topology
When wireless devices are configured to use an access point, they are said to be in
In most situations, wireless LANs use a central device, called a(n)
access point, to control communications
which network topology is the most fault tolerant one
a mesh network topology
The mesh topology formula for determining how many connections are needed for the number of nodes on a network, with n representing the number of nodes on the network is
The majority of hubs installed in networks today are
In a passive hub
such as a patch panel or punchdown block, the signal passes through the hub without any amplification or regeneration.
A hub-based bus topology should be considered if a small network
( 10 or fewer computers) is being constructed and keeping costs down is paramount.
which hub based topology might be considered if a few computers are being added to an existing network, and the new computers are grouped in a somewhat remote location.
a hub based bus topology
which central device sits in the middle of the extended star topology.
Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be read accurately; this phenomenon is called
Coaxial cable consists of a single conductor at the core, surrounded by an insulating layer, braided metal shielding, and an outer cover (usually called the
Shielding works like a form of built-in ____, a type of metal or plastic pipe built specifically to contain cabling
____ encloses each pair of wires within a foil shield as well as an enclosing insulating sheath.
10BaseT refers to ____.
Category ____ cable is labeled as voicegrade.
Category ____ cable is labeled as datagrade.
Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into computer network interfaces or other networked devices.
____ are special RJ-45-terminated TP cables that permit modular cables to stretch between wall plates and equipment.
The bend radius of fiber-optic cable is ____ degrees per foot.
____ is not a fiber-optic connector.
____ is not a fiber-optic connector.
The TIA/EIA developed the document "____ Commercial Building Wiring Standard", which specifies how network media should be installed to maximize performance and efficiency.
With respect to structured cabling, the ____ is where computer workstations and other user devices are located.
With respect to structured cabling, the ____ provides connectivity to computer equipment in the nearby work area.
With respect to structured cabling, the ____ houses servers, routers, switches, and other major network equipment and serves as a connection point for backbone cabling running between TCs.
With respect to structured cabling, a(n) ____ is the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider.
The ____ Worldwide Interoperability for Microwave Access (WiMax) standard, comes in two flavors.
A(n) ____ allows the computer and adapters to exchange data in chunks equal to the number of lines extending between them.
The type of data transmission that occurs in a computer bus is called ____ transmission.
Some NICs can operate in what's called "____ mode"—essentially, this mode turns off the gatekeeper functions and enables the NIC to forward any frames it sees to the computer.
MAC addresses take the form of ____ two-digit hexadecimal numbers separated by colons.
____ cards are credit-card-size expansion cards used primarily to add functionality to laptop computers.
The ISA bus originally appeared in the first PCs in a(n) ____-bit form.
USB comes in ____ versions.
FireWire is also known as IEEE ____.
PnP attempts to define a set of configuration protocols so that a computer can communicate with its peripherals during the ____ sequence and negotiate a working configuration without requiring user intervention.
____ means the adapter's buffers map directly into RAM on the computer.
Shared Adapter Memory
____ means a NIC's on-board processor selects a region of RAM on the computer and writes to it as though it were buffer space on the adapter.
Shared system Memory
____ permits a network adapter to take control of the computer's bus to initiate and manage data transfers to and from the computer's memory, independent of the CPU.
When purchasing a NIC for a server, you should choose ____-bit PCI-X or PCIe when possible
With respect to data transfer speeds of wireless NICs, the most common choices today are 11 Mbps or ____ Mbps.
Wireless NICs can operate at speeds faster than 100 Mbps by using the ____ technology.
The main benefit of the ____ device driver standard is that it allows NICs to use multiple protocols simultaneously.
The ____ standard defines a complete NIC driver interface for PCs that run 32-bit Windows operating systems
Apple Computer and Novell defined the ____ standard to allow a NIC to use multiple protocols and to simplify driver development for NIC manufacturers.
The name assigned to a WLAN is called the ____.
In the OSI reference model, the ____ layer is layer 6.
In the OSI reference model, the ____ layer is layer 5.
In the OSI reference model, the ____ layer is layer 1.
In the OSI reference model, the ____ layer is layer 2.
In the OSI reference model, the ____ layer is layer 4.
Domain Name System (DNS) and NetBIOS name resolution both work in part at the ____ layer.
____ is the process whereby a device receives a packet destined for another network, determines the best way to get the packet to its destination, and then forwards the packet out of one of its other network interfaces.
Access control is handled at the ____ layer during the routing process; the router consults a list of rules before forwarding an incoming packet to determine whether a packet meeting certain criteria (such as source and destination address) should be permitted to reach the intended destination.
The PDU at the Transport layer is called a ____.
The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages.
A frame is usually addressed to only one computer and is called a ____ frame
_frames are created for any computers on a network that "listen" to a shared network address.
The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet).
The IEEE standard ____ covers error control and flow control over data frames.
The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and techniques.
____ functions at the Application layer of the OSI reference model.
____ functions at the Transport layer of the OSI reference model.
____ functions at the Network layer of the OSI reference model.
____ is Novell's protocol for packet routing and forwarding.
____ is the TCP/IP protocol responsible for reliable delivery of data.
____ is a nonroutable protocol.
____ is Novell's connection-oriented protocol used to guarantee data delivery.
____ is Apple's remote file-management protocol.
IP is a ____ protocol.
____ uses TCP as its transport protocol.
____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model.
____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems.
An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____.
Class ____ networks are limited to 254 hosts per network.
Class ____ addresses are reserved for experimental use and cannot be used for address assignment.
The reserved name localhost always corresponds to the IP address ____.
A subnet mask is a ____-bit number that's always assigned to a host when the IP address is assigned.
The default Class C subnet mask is ____.
In an APIPA-enabled operating system, the computer assigns itself an address from the special range of addresses that begin with ____.
An IPv6 address is ____ bits long.
____ is the message format that DOS and Windows use to share files, directories, and devices.
NWLink is the Microsoft implementation of the ____ protocol suite.
AppleTalk divides computers into ____.