Peripheral device sharing
enables groups of users to take advantage of peripherals and other devices attached directly to a network or to a generally available computer attached to a network.
is a network of networks or a networked collection of LANs tied together by devices such as routers
In client server Networking environments
certain computers take specialized roles and function mainly as servers, and ordinary users' machines tend to function mainly as clients.
Computers that participate on a network
run a domain that determines what services that computer can offer or request.
In a peer-to-peer network
every user must also act as a network administrator, controlling access to the resources on their machines
Most peer-to-peer networks
consist of collections of typical end-user PCs linked by a common network medium.
In the Novell world
one or more NetWare servers provide similar controls over users and the resources they can access by using Novell eDirectory to store and manage the same kind of security information that Windows domain controllers handle.
is a short-range networking technology designed to connect personal devices to exchange information
handle e-mail messages for network users; this function might involve simply acting as a clearinghouse for local exchange of messages.
Because of the single bounce phenomenom
a method to ensure that all signals stop when they reach the end of any segment in a bus topology must be devised.
All computers, no matter what their topology, communicate in the same way: They address data to one or more computers and then transmit that data across the cable in the form of
In a active topology network
computers and other devices attached to the network regenerate signals and are responsible for moving data through the network
In the simplest wireless configuration, two computers can communicate directly with one another in a(n
ad hoc topology
When wireless devices are configured to use an access point, they are said to be in
In most situations, wireless LANs use a central device, called a(n)
access point, to control communications
The mesh topology formula for determining how many connections are needed for the number of nodes on a network, with n representing the number of nodes on the network is
In a passive hub
such as a patch panel or punchdown block, the signal passes through the hub without any amplification or regeneration.
A hub-based bus topology should be considered if a small network
( 10 or fewer computers) is being constructed and keeping costs down is paramount.
which hub based topology might be considered if a few computers are being added to an existing network, and the new computers are grouped in a somewhat remote location.
a hub based bus topology
Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be read accurately; this phenomenon is called
Coaxial cable consists of a single conductor at the core, surrounded by an insulating layer, braided metal shielding, and an outer cover (usually called the
Shielding works like a form of built-in ____, a type of metal or plastic pipe built specifically to contain cabling
____ encloses each pair of wires within a foil shield as well as an enclosing insulating sheath.
Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into computer network interfaces or other networked devices.
____ are special RJ-45-terminated TP cables that permit modular cables to stretch between wall plates and equipment.
The TIA/EIA developed the document "____ Commercial Building Wiring Standard", which specifies how network media should be installed to maximize performance and efficiency.
With respect to structured cabling, the ____ is where computer workstations and other user devices are located.
With respect to structured cabling, the ____ provides connectivity to computer equipment in the nearby work area.
With respect to structured cabling, the ____ houses servers, routers, switches, and other major network equipment and serves as a connection point for backbone cabling running between TCs.
With respect to structured cabling, a(n) ____ is the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider.
The ____ Worldwide Interoperability for Microwave Access (WiMax) standard, comes in two flavors.
A(n) ____ allows the computer and adapters to exchange data in chunks equal to the number of lines extending between them.
Some NICs can operate in what's called "____ mode"—essentially, this mode turns off the gatekeeper functions and enables the NIC to forward any frames it sees to the computer.
____ cards are credit-card-size expansion cards used primarily to add functionality to laptop computers.
PnP attempts to define a set of configuration protocols so that a computer can communicate with its peripherals during the ____ sequence and negotiate a working configuration without requiring user intervention.
____ means a NIC's on-board processor selects a region of RAM on the computer and writes to it as though it were buffer space on the adapter.
Shared system Memory
____ permits a network adapter to take control of the computer's bus to initiate and manage data transfers to and from the computer's memory, independent of the CPU.
With respect to data transfer speeds of wireless NICs, the most common choices today are 11 Mbps or ____ Mbps.
The main benefit of the ____ device driver standard is that it allows NICs to use multiple protocols simultaneously.
The ____ standard defines a complete NIC driver interface for PCs that run 32-bit Windows operating systems
Apple Computer and Novell defined the ____ standard to allow a NIC to use multiple protocols and to simplify driver development for NIC manufacturers.
____ is the process whereby a device receives a packet destined for another network, determines the best way to get the packet to its destination, and then forwards the packet out of one of its other network interfaces.
Access control is handled at the ____ layer during the routing process; the router consults a list of rules before forwarding an incoming packet to determine whether a packet meeting certain criteria (such as source and destination address) should be permitted to reach the intended destination.
The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages.
_frames are created for any computers on a network that "listen" to a shared network address.
The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet).
The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and techniques.
____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model.
____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems.
An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____.
A subnet mask is a ____-bit number that's always assigned to a host when the IP address is assigned.
In an APIPA-enabled operating system, the computer assigns itself an address from the special range of addresses that begin with ____.