Upgrade to remove ads
Teansmission basics and network media & definitions
Get Quizlet's official A+ Core 2 - 1 term, 1 practice question, 1 full practice test
Terms in this set (50)
What is different about the method used to boost a digital signal's strength, compared
with the method of boosting an analog signal's strength?
c. A digital signal requires a repeater, which retransmits the signal in its original form,
and an analog signal requires an amplifier, which increases the strength of both the
signal and the noise it has accumulated.
Which of the following decimal numbers corresponds to the binary number
A wave with which of the following frequencies would have the longest wavelength
a. 10 MHz
Ethernet relies on which of the following transmission types?
in wavelength division multiplexing, two modulated signals are guaranteed to differ in what characteristic
which of the following can increase latency on a network
d. Adding 50 meters to the length of the network.
what part of cabling protects it against environmental damage?
You are helping to install a cable broadband system in your friend's home. She wants to
bring the signal from where the service provider's cable enters the house to a room on
another floor, which means you have to attach a new cable to the existing one. What
type of cable should this be?
With everything else being equal, a network using which of the following UTP types will
suffer the most cross talk?
Which of the following is not a source of EMI
Which of the following network transmission media offers the highest potential throughput over the longest distances?
in which of the following network links might you use MT-RJ connectors?
d. Fiber-optic connection between server and router
Fiber-optic cable networks can span much longer distances than copper-based networks before requiring repeaters because:
c. they are resistant to noise such as EMI
What is the purpose of cladding in a fiber-optic cable?
a. it reflects the signal back to the core.
which of the following is a potential drawback to using fiber-optic cable for LANs
a. it is expensive
in what part of a structured cabling system would you find users desktop computers?
d, work area
Every user at one location on your company's WAN is unable to reach the Internet.
Your colleague on the network management team suspects a critical router is unable to
connect to the network. Because you're in the building affected by the outage, she asks
you to troubleshoot the router. You confirm that the router is not responding to any
requests over the network. Which of the following do you use to connect directly from
your laptop to the router to diagnose it?
c. serial cable
What is the maximum distance specified in the structured cabling standard for a
horizontal wiring subsystem?
c. 100 m
how many wire pairs can a single 110 block terminate?
d. it depends on the type of 110 block
Your campuswide WAN is experiencing slow Internet response times. When you
call your Internet service provider to ask if they can troubleshoot the problem from
their end, they warn you that their responsibilities end at the demarc. What do they
b. they will not diagnose problems beyond your organizations entrance facilities
Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.
Asynchronous Transfer Mode - Asynchronous Transfer Mode is a networking technology that transfers data in packets or cells of a fixed size.
Ethernet is the most common type of connection computers use in a local area network (LAN). An Ethernet port looks much like a regular phone jack, but it is slightly wider. This port can be used to connect your computer to another computer, a local network, or an external DSL or cable modem.
The OSI (Open Systems Interconnection) model was created by the ISO to help standardize communication between computer systems. It divides communications into seven different layers, which each include multiple hardware standards, protocols, or other types of services.
domain name system - " Domain names serve as memorizable names for websites and other services on the Internet. However, computers access Internet devices by their IP addresses. DNS translates domain names into IP addresses, allowing you to access an Internet location by its domain name.
HyperText Transfer Protocol." This is the protocol used to transfer data over the World Wide Web. That's why all Web site addresses begin with "http://". Whenever you type a URL into your browser and hit Enter, your computer sends an HTTP request to the appropriate Web server. The Web server, which is designed to handle HTTP requests, then sends to you the requested HTML page.
File Transfer Protocol." It is a common method of transferring files via the Internet from one computer to another. Some common FTP programs are "Fetch" for the Mac, and "WS_FTP" for Windows.
This is a program that allows you log in to a Unix computer via a text-based interface. If you have an account on a Telnet server, you can access certain resources on the system such your home directory, your e-mail account, FTP files, etc. The downside of Telnet is that, to use it, you need to use Unix commands, which can be a challenge.
network time protocol - an Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the millisecond of computer clock times in a network of computers. Based on UTC, NTP synchronizes client workstation clocks to the U.S. Naval Observatory Master Clocks in Washington, DC and Colorado Springs CO. Running as a continuous background client program on a computer, NTP sends periodic time requests to servers, obtaining server time stamps and using them to adjust the client's clock.
The Dynamic Host Configuration Protocol (DHCP) is a standardized networking protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services.
Packet Interface Groper - A utility to determine whether a specific IP address is accessible. It works by sending a packet to the specified address and waiting for a reply. PING is used primarily to troubleshoot Internet connections. There are many freeware and sharewarePing utilities available for personal computers.
transmission control protocol - TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple connectionless transmission model with a minimum of protocol mechanism.
IP address is short for Internet Protocol (IP) address.
The Address Resolution Protocol (ARP) is a telecommunication protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982.
The Internet Control Message Protocol (ICMP) is one of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached.
The Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships. IGMP is an integral part of IP multicast.
The Advanced Research Projects Agency Network (ARPANET) was one of the world's first operational packet switching networks, the first network to implement TCP/IP, and the progenitor of what was to become the global Internet.
simple network management protocol - SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321 - which is the protocol in widespread use today. SMTP by default uses TCP port 25
key management protocol - In cryptography, it is the creation, distribution and maintenance of a secret key. It determines how secret keys are generated and made available to both parties; for example, public key systems are widely used for such an exchange. If session keys are used, key management is responsible for generating them and determining when they should be renewed. See QKD, elliptic curve cryptography, Diffie-Hellman, cryptography, session key and security protocol.
Trivial File Transfer Protocol (TFTP) is a file transfer protocol, with the functionality of a very basic form of File Transfer Protocol (FTP); it was first defined in 1980.
Network Interface Card -
A fully qualified domain name (FQDN) is the complete domain name for a specific computer, or host, on the Internet. The FQDN consists of two parts: the hostname and the domain name. For example, an FQDN for a hypothetical mail server might be mymail.somecollege.edu
transistor-to-transistor logic - a common type of digital circuit in which the output is derived from two transistors. The first semiconductors using TTL were developed by Texas Instruments in 1965. The term is commonly used to describe any system based on digital circuitry, as in TTL monitor.
A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet. [ 1] The top-level domain names are installed in the root zone of the name space
(Automatic Private IP Addressing) The Windows function that provides DHCP autoconfiguration addressing. APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is either permanently or temporarily unavailable.
a mode of data transmission in which a message is broken into a number of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.
methodology of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate.
Recommended textbook explanations
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
David A. Patterson, John L. Hennessy
Introduction to the Theory of Computation
John Buck, William Hayt
Introduction to Algorithms
Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
Sets with similar terms
Using Network Communication Protocols
TIA Chapter 12 Exam
Intro to computers Ch 12
Chapter 12 notes