Principles of Computer Network
Principles of Computer Network
Principles of Computer Network
A coaxial cable 2) What are the names of the two common conditions that degrade the signals on c opper-based cables? Crosstal and attenuation 3) Which topology requires the use of terminators? Bus 4) Which of the following topologies is implemented only logically, not physical ly? Ring 5) How many wire pairs are actually used on a typical UTP Ethernet network? Two 6) What is the name of the process of building a frame around network layer info rmation? Data encapsulation 7) Which of the connectors on a network interface adapter transmits data in para llel? The System bus connector 8) Which two of the following hardware resources do network interface adapters a lways require? I/O port address and IRQ 9) What is the name of the process by which a network interface adapter determin es when it should transmit its data over the network? Media Access Control 10) Which bus type is preferred for a NIC that will be connected to a Fast Ether net network? PCI 11) A passive hub does not do which of the following? Transmit management information using SNMP 12) To connect two Ethernet hubs together, you must do which of the following? Connect the uplink port in one hub to a standard port on the other 13) Which term describes a port in a Token Ring MAU that is not part of the ring ? Intelligent 14) A hub that functions as a repeater inhibits the effect of____________? Attenuation 15) You can use which of the following to connect two Ethernet computers togethe r using UTP cable? All of the above 1) What is the name of the protocol that systems use to negotiate options during the PPP connection establishment procedure? LCP 2) What does an Ethernet system generate when it detects a collision? A jam signal 3) Which of the following is not a required component of a 10BaseT Ethernet netw ork? A hub 4) To achieve 100 Mbps speed over Category 3 cable, 100BaseT4 Ethernet uses whic h of the following? All four wire pairs 5) In which of the following standards is Gigabit Ethernet defined? IEEE 802.3z 6) The Frame Check Sequence field in a data-link layer protocol header is used f or ____________? Error Correction 7) List the hardware components that you have to replace when upgrading a ten-ye ar-old 10BaseT network to 100BaseTX? The components are NICs, hubs and cable (because a 10 year old network is most l ikely using Category 3 cable, and Category 5 is required for 100Base TX.)
8) How could you upgrade a ten-year-old 10BaseT network to Fast Ethernet without replacing the cables? Use 100Base T4 and hubs. 9) Which data-link layer protocol is preferred on a network with high levels of traffic, Ethernet or Token Ring? Why? Token Ring is preferable, because it can handle high traffic levels without dimi nished performance. Ethernet experiences more collisions as traffic increase, causing performance to degrade. 10) Which Fast Ethernet physical layer option is best suited for a connection be tween two campus buildings 200 meters apart? Why? 100BaseFX, because fiber optic cable is better suited to outdoor installations a nd because the Fast Ethernet UTP cable options are all restricted to cable segments no longer than 100 meters. 1) Which of the following ITU standards is the basis for NDS and Active Director y? X.500 2) Which types of network clients are included in Windows 2000 Professional? Client Service for NetWare (STP) cable and Client for Microsoft Networks 3) What is the Windows NT and Windows 2000 file system called that enables admin istrators to assign permissions to individual files? NTFS 4) Which of the following services on a Windows NT or Windows 2000 network is re sponsible for configuring TCP/IP clients? DHCP 5) Which of the following network operating systems is generally considered to b e the best application server platform? UNIX 6) What is a program called that runs in the background on a UNIX system? A daemon 7) Which of the following directory services uses multiword names for its domain s? Active Directory 8) What is splitting an NDS tree into pieces and storing those pieces on differe nt servers called? Partitioning 9) What is the Windows NT and Windows 2000 service that maintains a list of shar ed resources on the network called? Computer Browser 10) Which of the following is not a true statement? Containers are composed of objects. 1) Which layer of the OSI reference model is responsible for controlling access to the network medium? The data-link layer 2) On which type of network does each computer maintain its own permissions and security settings? A peer to peer network 3) A language that two computers "speak" while communicatin over a network is ca lled ____________. A protocol 4) A series of LANs connected together by any means is called ____________. An internetwork 5)What kind of network is often used to connect horizontal segments on a large e nterprise internetwork? A backbone 6) Which layer of the OSI model is responsible for translating different syntaxe s?The presentation layer 7) A network in which the medium carries only one signal is called ____________. Baseband 8) An example of full-duplex communications is ____________.
A telephone call 9) The address of a packet's final destination is specified in the ____________ layer. Network 10) TCP is an example of a ____________layer protocol. Transport 11) Electrical voltages, light pulses, and infrared waves are all examples of ty pes of ____________. Signals 12) A technology used to connect LANs at distant locations is called ___________ _. A wide area network 13) The type of network in which data is split into discrete units that are tran smitted over the network individually is callled ____________. A packet switching network 14) The process by which a receiving system sends messages instructing a sending system to slow down its transmission rate is called ____________. Flow control 15) A protocol that uses a handshake to establish a connection before sending da ta is called ____________. Connection oriented 1) Which of the following devices are you most likely to use to connect a LAN to the Internet? A router 2) Which of the following devices does not read the data-link layer protocol hea der in incoming packets? A hub (STP) cable 3) Suppose that you have a 10 MBPS Ethernet LAN that consists of 45 computers co nnected to three standard repeating hubs. Traffic levels are getting too high, causing excessive collisions and reduced performance. Which of the following cou rses of action is the most inexpensive way to reduce the overall traffic level o n the network? Install a transparent bridge between two of the hubs. 4) Using the same scenario as in question 3, which of the following courses of a ction would not increase the bandwidth available to each workstation? Split the network into three LANs and connect them using dedicated hardware rout ers. 5) The spanning tree algorithm is used to prevent which of the following network ing problems? Bridge loops 6) Source route bridging is associated with which of the following protocols? Token Ring 7) On a switched network, virtual LANs are used to create multiples of what? Broadcast domains 8) ICS enables a computer running Windows to function as what? A router 9) Which of the following processes requires manual intervention from a network administrator? Static routing 10) Which of the following devices does not have buffers to store data during pr ocessing? All of the above 1) What does the IP header's protocol field identify? The transport layer protocol that generated the information in the Data field 2) Which of the following IP header elements is never modified during the IP fra gmentation process? The Identification field 3) What does an IP address identify? A computer
4) In the IP header, the IPX equivalent to the TTL field is called what? Transport Control 5) Which of the following statements about IPX is untrue? IPX uses a checksum to verify the proper transmission of data. 6) How many bytes long is the information that IPX uses to identify the datagram 's destination computer on a particular network? 10 7) Specify which network layer protocol you would use on each of the following n etworks, and explain why. 1) A private internetwork with mixed Windows and NetWare systems IPX, because Ne tWare requires it 2)A two-node home Windows-based network with individual dial-up Internet connect ions NETBeui because it is easy to install and configure 3)A ten-node Windows-based network with a router connecting it to the Internet TCP/IP because it needs to connect to internet 8) Which IP header field makes the Traceroute utility possible? Time To Live 9) Which two protocols carried within IP datagrams operate at the transport laye r of the OSI model? TCP and UDP 10) Give two reasons why NetBEUI is not suitable for use on a large internetwork . It is not suitable because it lacks then network indentifiers needed to route pa ckets between networks and because it generates a large amount of broadcast traffic. 11) 12.Place the following phases of a NetBEUI Frame session in the proper order . dcbfae Name resolution LLC session establishment Session Initialize Session Confirm Session End 12) What is the maximum number of routers that an IPX datagram can pass through on the way to its destination? 16 13) Which of the following protocols is capable of providing connection-oriented service? NetBEUI What are the two basic network configurations? The two basic network configurations are peer-to-peer and server-based. A primary reason for implementing a network is to _______ resources. share Name three key resources often shared on a network. There are many resources to be shared on a network; among them are printers, sca nners, applications, files, and network access to the World Wide Web. In a peer-to-peer network, each computer can act as a _________ and a ________. server, client What is the function of a server in a server-based network? A server provides services and resources to the network. A peer-to-peer network is adequate if _____________ is not an issue. security Network professionals use the term _________ to refer to the network's physical layout. topology The four basic topologies are the _______, ________, ________, and _________ top ologies. bus, star, ring, and mesh In a bus topology, all the computers are connected in a series. To stop the sign
als from bouncing, it is important that a ________ be connected to each end of the cable. terminator In a ________ topology all segments are connected to a centralized component cal led a __________. star, hub In a ________ topology, a break anywhere in the cable will cause the entire netw ork to go down. bus The most reliable as well as the most expensive topology to install is the _____ __ topology. mesh A ring topology passes a ________ from one segment to another. In order for a co mputer to place data on the network, the computer must be in possession of the _______. token, token ================================================================================ == Coaxial cable consists of a core made of solid or stranded ____________ ________ ___. wire conductor If the coaxial conducting core and wire mesh touch, the cable will experience a ___________. short The core of coaxial cable is surrounded by an _____________ __________ that sepa rates it from the wire mesh. insulating layer Thicknet cable is sometimes used as a ______________ to connect thinnet segments . BackboneThinnet cable can carry a signal for a distance of about 185 meters (607 feet) before the signal starts to suffer from _____________________. attenuation The electronic signals that make up the data are actually carried by the _______ _ in a coaxial cable. core A flexible coaxial cable that is easily routed but that should not go into crawl spaces is ________. PVC Coaxial cable that contains special materials in its insulation and cable jacket is called ____________ cabling. plenum The most popular type of twisted-pair cable is _______ (10BaseT). UTP UTP cable for data transmissions up to 10 Mbps is category ______. 3 UTP cable for data transmissions up to 100 Mbps is category _____. 5 STP uses a foil wrap for __________________. shielding STP is less susceptible to electrical _______________________ and supports highe r transmission rates over longer distances than does UTP. interference Twisted-pair cabling uses _________ telephone connectors to connect to a compute r. RJ-45 The RJ-45 connection houses _____ cable connections, whereas the RJ-11 houses on ly ____. 8, 4
Optical fibers carry _______________ data signals in the form of light pulses. digital Fiber-optic cable cannot be ____________________, and the data cannot be stolen. tapped Fiber-optic cable is better for very high-speed, high-capacity data transmission than ____________ cable because of the former's lack of attenuation and the purity of the signal it carries. copper Fiber-optic cable transmissions are not subject to electrical __________________ __. interference Baseband systems use _______________ signaling over a single frequency. digital Each device on a _____________________ network can transmit and receive at the s ame time.baseband Broadband systems use _____________ signaling and a range of frequencies. analog With _________________ transmission, the signal flow is unidirectional. broadband Wall-mounted _________________ connected to the wired LAN maintain and manage ra dio contact between portable devices and the cabled LAN. transceivers Broadband optical telepoint transmission is a type of _____________ network capa ble of handling high-quality multimedia requirements. infrared A component called a wireless _______________ offers an easy way to link buildin gs without using cable. bridge Spread-spectrum radio broadcasts signals over a range of ___________________. frequencies Point-to-point transmission involves wireless ___________ data transfer. serial In LANs, a transceiver sometimes called an _____________ ______________ broadcasts and receives signals to and from the surrounding computers. access point Wireless ___________ LANs use telephone carriers and public services to transmit and receive signals. mobile CDPD uses the same technology and some of the same systems as ___________ teleph ones. cellular Currently, the most widely used long-distance transmission method in the United States is _____________________. microwave The network interface card converts serial data from the computer into parallel data for transmission over the network cable. True False False. The reverse is true. The card converts parallel data to serial data. The 16-bit and 32-bit widths are currently the two most popular bus widths. True False True To help move data onto the network cable, the computer assigns all of its memory to the NIC. True False False. The computer can assign some of its memory to the card, but not all of it . Data is temporarily held in the NIC's transceiver, which acts as a buffer. True False
False. Only RAM acts as a buffer. The transceiver transmits and receives data. Both sending and receiving NICs must agree on transmission speeds. True False TrueIn an 80386 computer, COM1 typically uses IRQ ____ and LPT1 typically uses I RQ _____. 4,7 IRQ lines are assigned different levels of _____________ so that the CPU can det ermine how important the request is. priority The recommended setting for a NIC is IRQ _____. 5 Every device on the computer must use a __________________ IRQ line. different or separate Each hardware device needs a default ________ ___/___ ________ number. base I/O port Choosing the appropriate transceiver on a NIC that can use either an external or an on-board transceiver is usually done with ______________. jumpers ISA was the standard bus until Compaq and other manufacturers developed the ____ __ bus. EISA The ____________ ____________ bus functions as either a 16-bit or a 32-bit bus a nd can be driven independently by multiple bus master processors. Micro Channel Telephone wire uses an __________ connector. RJ 11 Plug and Play refers to both a design philosophy and a set of personal-computer _______________________ specifications. architecture ================================================================================ == Access methods prevent _______________________ access to the cable. simultaneous With CSMA/CD, if there is data on the cable, no other computer may _____________ ____ until the data has reached its destination and the cable is clear again. transmit CSMA/CD is known as a _____________________ access method because computers on t he network compete for an opportunity to send data. contention With more traffic on a CSMA/CD network, _______________ tend to increase, slowin g the network down. collisions With the token-passing access method, only one computer at a time can use the to ken; therefore, there are no ___________________ or _____________________.collisions, contention With the demand-priority access method, the __________________ manage network ac cess by doing round-robin searches for requests to send from all nodes. repeaters In the demand-priority access method, transmissions are not __________________ t o all other computers on the network. broadcast A token is a special type of __________________ that circulates around a cable r ing.
packet With data masses divided into ______________, individual transmissions occur mor e frequently so that every computer on the network has more opportunities to transmit and receive data. packets Packets may contain session-control codes, such as error correction, that indica te the need for a _________________________. retransmission A packet's components are grouped into three sections: _____________, data, and trailer. header In a packet, the header usually contains an error-checking component called a CR C. True False False. The trailer contains this component. The structure of the packets is defined by the communication method, known as a protocol, used by the two computers. True False True Every network interface card sees all packets sent on its segment, but it interr upts the computer only if the packet's address matches its individual address. True False True The trailer of a packet contains the destination address. True False False. The header contains the destination address. Typically, Ethernet is a baseband architecture that uses a ________ topology. bus Ethernet relies on the __________________ access method to regulate traffic on t he main cable segment. CSMA/CD The maximum length of a 10BaseT segment is ________ meters. 100 The 10BaseT topology is an Ethernet network that uses __________________________ ____ cable to connect stations. unshielded twisted-pair (UTP) Typically, the hub of a 10BaseT network serves as a _____________________ ______ _______________. multiport repeaterA thinnet network can combine as many as __________ cable segm ents connected by four repeaters, but only three segments can have stations attached. five Because single-segment 10Base2 Ethernet limits would be too confining for a larg e business, _________________ can be used to join Ethernet segments and extend the network to a total length o f 925 meters (about 3035 feet). repeaters A 10Base5 topology is also referred to as ___________________. thicknet (or standard Ethernet) Fast Ethernet is another name for the ________________ topology. 100BaseX Ethernet can use several communication _______________ including TCP/IP. protocols The 100BaseTX topology runs on UTP Category _____ data-grade cable. 5 A 100BaseVG network is built on a __________ topology with all computers attache d to a hub. star A Token Ring network is an implementation of IEEE standard _____________. 802.5
In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________. hub In a Token Ring frame the Access Control field indicates whether the frame is a _______________ frame or a _____________ frame. token, data When a frame reaches the destination computer, that computer copies the frame in to its _____________ _____________. receive buffer Token passing is ___________________ , meaning that a computer cannot force its way onto the network as it can in a CSMA/CD environment. deterministic When a frame returns to its sending computer, that computer ____________ the fra me and puts a new token back on the ring. removes Cables attach the individual clients and servers to the MSAU that works like oth er ______________ hubs. passive When an IBM Token Ring network is full, adding another __________ can enlarge th e network. MSAUMSAUs were designed to sense when a _______________ _______________ ________ _ fails and to disconnect from it. network interface card Each single Token Ring can accommodate ________ computers using STP cable. 260 Most Token Ring networks use IBM Cabling System Type ____ UTP cabling. 3 LocalTalk uses __________________ as an access method in a bus or tree topology. CSMA/CA When a device attached to an AppleTalk network comes online, the device broadcas ts an ________________ to determine if any other device is using it. address A single LocalTalk network supports a maximum of ______ devices. 32 Single LocalTalk networks can be joined together into one larger network through the use of _____________. zones ArcNet uses a token-passing access method in a ________-_______ topology. star-bus An ArcNet token moves from one computer to the next according to the order in wh ich it is connected to the __________________, regardless of how they are placed on the network environment . hub Each computer in an ArcNet network is connected by cable to a ________. hub ============================================================================== A multitasking operating system can run as many tasks simultaneously as there ar e ____________________. processors The network operating system can take control of the processor without the task' s cooperation in a multitasking operating system that uses _________________ multitasking. preemptive
The process of forwarding requests is carried out by a __________________, which is also commonly referred to as a "shell" or a "requester." redirector Redirector activity originates in the _____________ computer when the user issue s a request for a network resource or service. client Redirectors can send requests to either computers or ___________________. peripheralsIn the past, network operating systems were ____________________ that were loaded on top of a stand-alone operating system. applications Novell's NetWare operating system is a _________________-based network. server An advantage of using NetWare is that it works well in a ________________ enviro nment. multivendor A Windows NT computer will not communicate with a NetWare network. True False False Banyan Vines is an NOS that runs on top of another operating system. True False True Your client is a small business, planning to install a small network for the off ice, which includes five computers, running Windows 95, and two printers. Security is not an issue because all emplo yees work on the same projects. Would you recommend upgrading to Windows NT? No Will a Windows 95 or 98 workstation always work on a NetWare network? No ================================================================================ == The OSI reference model divides network activity into ____________ layers. seven The purpose of each layer is to provide services to the next _____________ layer and shield the upper layer from the details of how the services are actually implemented. higher At each layer, the software adds some additional formatting or _________________ to the packet. addressing Each layer on one computer appears to communicate directly with the ___________ layer on another computer. same The top, or ___________________, layer handles general network access, flow cont rol, and error recovery. application At the sending computer, the _____________________ layer translates data from a format sent down from the application layer. presentation The ________________ layer determines the route from the source to the destinati on computer. network The data-link layer is responsible for sending __________ ___________ from the n etwork layer to the physical layer. data framesThe ________________ information in a data frame is used for frame ty pe, routing, and segmentation information. control
The __________________ layer defines how the cable is attached to the NIC. physical Windows NT groups the seven OSI layers into three. The three NT layers are _____ ___ ____________ ___________, ____________ _______________, and ________ _____________. file system drivers, transport protocols, and NIC drivers. An _________ provides the interface between the Windows NT applications and file system drivers layer. API A _________ provides the interface between the Windows NT file system drivers la yer and the transport protocols. TDI An _________ provides the interface between the Windows NT, the transport protoc ols layer, and the NIC drivers. NDIS The Project 802 specifications define the way __________ access and transfer dat a over physical media. NICs The 802 project divided the __________ - __________ layer of the OSI reference m odel into two sublayers, the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. data-link The _________ sublayer communicates directly with the NIC and is responsible for delivering error-free data between two computers on the network. MAC The IEEE category __________ covers LAN standards for Ethernet. 802.3 The IEEE category __________ covers LAN standards for Token Ring. 802.5 A driver is _______________ that enables a computer to work with a device. software NICs work in the _________ sublayer of the __________ -_________ layer of the OS I model. MAC, data-link NDIS defines an interface for communication between the __________ sublayer and the protocol drivers. MAC NDIS was jointly developed by ___________________ and ____________. Microsoft, 3Com ODI works just like NDIS but was developed by ______________ and _______________ _ for interfacing hardware to their protocols. Apple, Novell=================================================================== =============== A sending computer breaks the data into smaller sections, called _______________ , that the protocol can handle. packets Several protocols can work together in what is known as a protocol ____________. stack A receiving computer copies the data from the packets to a ______________ for re assembly. buffer Protocols that support multipath LAN-to-LAN communications are known as ________ _______ protocols. routable The receiving computer passes the reassembled data to the ____________________ i n a usable form. application To avoid conflicts or incomplete operations, protocols are _______________ in an
orderly manner. layered The _______________ order indicates where the protocol sits in the protocol stac k. binding Three protocol types that map roughly to the OSI reference model are application , __________________, and network. transport Application protocols work at the upper layer of the OSI reference model and pro vide __________ _________________ between applications. data exchange A NIC-driver protocol resides in the ______________ _______________ ____________ ____ ( _________ ) sublayer of the OSI reference model. Media Access Control (MAC) Rules for communicating in a particular LAN environment such as Ethernet or Toke n Ring are called _________________ protocols. network To help the network administrator install a protocol after the initial system in stallation, a ______________ is included with the operating system. utility TCP/IP supports routing and is commonly used as an __________________________ pr otocol. internetworking NetBIOS is an IBM session-layer LAN interface that acts as an __________________ ___ interface to the network. application APPC (advanced program-to-program communication) is IBM's ___________________ pr otocol. transport NetBEUI is not a good choice for large networks because it is not ______________ ___. routableX.25 is a protocol used for a ______________ - ________________ network. packet switching X.25 works in the ________________, ___________ - __________, and ______________ ___ layers of the OSI reference model. physical, data-link, and network AppleTalk is a proprietary protocol stack designed for _________________ compute rs. Macintosh EtherTalk allows a Macintosh computer to communicate on an ___________________ n etwork. Ethernet ================================================================================ == An external modem is a small box that is connected to the computer by a ________ ______ cable running from the computer's port to the modem's computer-cable connection. serial The modem at the _______________ end converts digital signals into analog signal s. sending Baud rate refers to the speed of oscillation of the _____________ _____________ on which a bit of data is carried. sound wave
The bps can be greater than the __________ rate. baud Asynchronous transmission occurs over __________________ __________. telephone lines The Microcom Network Protocol (MNP) is a standard for asynchronous __________ _____________ control. data-error In asynchronous communication, it is possible to double throughput by using ____ ________________ without having to pay for a faster channel speed. compression Synchronous communication relies on a _____________ scheme coordinated between t wo devices. timing More advanced, complex repeaters can act as multiport _________ to connect diffe rent types of media. hubs Repeaters do not have a __________________ function and so will pass along all d ata from one segment to the next. filtering A repeater takes a weak signal and ______________________ it. regenerates A repeater functions at the ________________ layer of the OSI reference model. physicalIf the volume of traffic from one or two computers or a single departmen t is flooding the network with data and slowing down the entire operation, a ________________ could isolate those comput ers or that department. bridge The bridge builds a routing table based on the ________________ addresses of com puters that have sent traffic through the bridge. source Bridges work at the OSI __________ - _________ layer and, specifically, the ____ _________ ______________ ________________ sublayer. data-link, Media Access Control Bridges are often used in large networks that have widely dispersed segments joi ned by __________________ ___________. telephone lines Under spanning tree algorithm (STA), software can sense the existence of more th an one _____________, determine which would be the most efficient, and then configure the bridge to use that one . route Bridges connect two segments and regenerate the signal at the ______________ lev el. packet Routers work at the _________________ layer of the OSI reference model. network Because they must perform complex functions on each packet, routers are ________ _________ than most bridges. slower Routers do not look at the destination node address; they look only at the _____ ____________ address. network Unlike bridges, routers can accommodate multiple active ____________ between LAN segments and choose among them. paths
The two major types of routers are ____________ and __________________. static, dynamic A brouter will ______________ nonroutable protocols. bridge Most often, gateways are dedicated ________________ on a network. servers The gateway takes the data from one environment, strips it, and repackages it in the __________________ ___________ from the destination system. protocol stack Gateways are ___________ specific, which means that they are dedicated to a part icular type of transfer. taskWith the exception of ADSL, public telephone lines require users to ________ _______ make a connection for each communication session. manually The three factors an administrator must take into account when considering how b est to implement communication between two modems are __________________, _______________, and __________. throughput, distance, cost Leased lines provide ___________________ connections that do not use a series of switches to complete the connection. dedicated A good remote-access option that offers stable lines for companies that are cons tantly communicating between networks is to use ______________ lines. leased (dedicated) The ____________ - _____ - _____________ _____________________ _ _______________ ___ allows a remote client to establish a secure connection to the corporate LAN over the Internet a nd RAS. Point-to-Point Tunneling Protocol Because the PSTN was designed primarily for voice, _________ - _____ lines do no t have the consistent quality required for secure data communications. dial-up A dedicated line is _______________ and more _______________ than a dial-up conn ection. faster, reliable One advantage that dedicated lines offer over dial-up lines is that the service company implements ____________ _______________________ to improve communication, thereby ensuring line quality. line conditioning Digital lines provide ______________ - ___ - _____________ synchronous communica tion. point-to-point Because DDS uses ________________ communication, it does not require modems. digital T1 uses a technology called ____________________ in which several signals from d ifferent sources are collected into a component and fed into one cable for transmission. multiplexing T1 can accommodate 24 ____________________ data transmissions over each two-wire pair. simultaneous Subscribers who do not need or cannot afford the bandwidth of an entire T1 line can subscribe to one or more T1 _________________. channels
With packet switching, the data is broken down into packets, and each packet is tagged with a _____________________ _________________ and other information. destination address At the destination, the packets are _____________________ into the original mess age.reassembled Two packets from the original data package can arrive out of sequence because th ey followed different ____________ to reach the same destination. paths Virtual circuits are composed of a series of ________________ connections betwee n the sending computer and the receiving computer. logical Because of its extensive ____________ _______________, X.25 can appear to be slo w. error checking X.25 was originally developed for the __________________ environment. mainframe Frame-relay data travels from a network over a ________________ ________________ _ line to a data switch and into the frame-relay network. digital leased Frame-relay networks can also provide subscribers with __________________ as nee ded, which lets the customer make nearly any type of transmission. bandwidth Frame-relay networks are faster at performing basic ________________ - _________ _________ operations than are X.25 networks. packet-switching ATM is an advanced implementation of ______________ ______________ that provides high-speed data transmission rates. packet switching ATM transmits data in 53-byte _________ rather than variable-length frames. cells ATM switches are multiport devices that can act as either ____________ to forwar d data from one computer to another within a network or _________________ to forward data at high speeds to remote networks. hubs, routers ATM uses switches as ___________________________ to permit several computers to put data on a network simultaneously. multiplexers ATM can be used with existing _____________ designed for other communications sy stems. media Basic Rate ISDN divides its available ________________ into three data channels. bandwidth FDDI is a specification that describes a high-speed (100 Mbps) token-ring LAN th at uses ___________ - __________ media. fiber-opticFDDI can be used for __________________ networks to which other, lowcapacity LANs can connect. backbone A computer on an FDDI network can transmit as many frames as it can produce with in a predetermined time before letting the ____________ go.
token Traffic in an FDDI network consists of two similar streams flowing in opposite d irections around two counter-rotating ______________. rings An advantage of the dual-ring topology is ______________________. redundancy To isolate serious failures in the ring, FDDI uses a system called _____________ ____ in which a computer that detects a fault sends a signal onto the network. beaconing ================================================================================ == Using a peer-to-peer network implies that all computers on the network are _____ _______. equal One drawback to using a peer-to-peer network is ________________ _______________ ______. limited performance On a server-based network, resources are ___________________. centralized Before beginning to design a new network, you must take an inventory to determin e what ________________ and _______________ you already have, as well as what you need to acquire. hardware, software Working with a drawing of the _______________ is the place to start when creatin g a map of the new network. facility Circle the letter of the best answer for each of the following sentences: A driver is: hardware. a peripheral device. a NIC. software. d. In the networking environment, a NIC driver is needed to: communicate with other NICs on a network. communicate between the NIC and the computer's operating system. communicate between the file server and the other computers on the network. communicate between different types of computers on a network. b. Select the correct statement about printer drivers. There is no universal printer driver that will ensure full functionality of all printers.Printers made by a specific printer manufacturer can always use the sam e printer driver and have full functionality. There is a specific printer driver designed for every model of printer that can ensure the full functionality of that model of printer on all operating systems. A laser-printer driver from one manufacturer will provide full functionality for all laser printers, regardless of the manufacturer. a. ================================================================================ == Two computers running the MS-DOS operating system can be connected and informati on can be shared. (Yes or No). Yes Connecting two computers with a communications cable is called _____________ - _ ___________ ____________________.
Direct-cable connection Sharing on a peer-to-peer network takes place at the _____________ level. folder The first person to log on to a Windows NT network uses the ____________________ __ account. administrator The user account contains information that defines a user to the network's _____ ______________ system. security Most network account-management utilities offer an account _____________ feature with which an administrator can create a template user with certain characteristics and parameters that are common among multiple users. copying A Windows NT administrator can use a _____________ to configure and maintain a u ser's logon environment. profile Two key pieces of information that should be entered when creating a user accoun t are account name and ___________________. password The ____________ account is for people who do not have a valid user account but need temporary access to the network. Guest An administrator can create a ______________ account in order to simplify admini strative tasks when dealing with a large numbers of users. group A global group is used across an entire ________________. domain Groups are used to give users ______________ to perform system tasks such as bac king up and restoring files. rights The network administrator assigns ____________________ to groups to access resou rces, such as files, directories, and printers. permissionsAfter being deleted, a user can no longer use the network, because th e network __________________ database will contain record or description of the user. security ================================================================================ == The first consideration in keeping data safe is to ensure the security of the ne twork __________________. hardware Another term for access permissions is __________ - _____________ ______________ ___. user-level security Implementing password-protected shares involves assigning a password to each sha red _________________. resource If a share is set up as ___________ - ___________, users can look at the documen ts or copy them to their machines, but they cannot change the original documents. read-only Access permission security involves assigning certain ______________ on a user-b y-user basis. rights The most efficient way to assign permissions is through the use of _____________
_. groups Through auditing, selected types of events are recorded in the _________________ __________ of a server in order to track network activities by user accounts. security logs A data- __________________ utility scrambles data before it goes out onto the ne twork. encryption The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to inc orporate classified ________________ into the communication systems they sell. algorithms Diskless computers communicate with the server and log on through the use of a s pecial ROM boot chip installed on the computer ________________ _________________ ___________. network interface card The two most important environmental conditions to monitor are _________________ ____ and __________________. temperature, humidity Proper ____________________ is required to prevent a computer from overheating. ventilation The potential for ESD increases as the humidity ______________. drops True or False: If network cables are installed in the walls and in the ceilings, they will be safe from all damage. FalseA ___________ atmosphere with high __________ will most certainly destroy a ny computer equipment in a matter of days or months. corrosive, humidity The first line of defense against loss of data is usually a ___________ ________ ________ system. tape backup It is important to have a regular ______________ for backing up data. schedule Maintaining a __________ of all backups is important for later file recovery. log When backing up across a network, network traffic can be reduced by placing the backup computer on an isolated _______________. segment Fault-tolerant systems protect data by duplicating data or placing data in diffe rent _______________ sources. physical RAID level 0, called ____________ _______________, divides data into 64K blocks and spreads it equally in a fixed rate and order among all disks in an array. disk striping Level 0 disk striping does not offer data ___________________. protection Disk __________________ duplicates a partition and moves the duplication onto an other physical disk so that there are always two copies of the data. mirroring Duplexing is intended to protect against disk ___________________ failures, as w ell as media failures. controller Writing complete blocks of data to each disk in the array is known as disk _____ ___________.
striping In Windows NT Server, the ___________ _____________________ program is used to c onfigure Windows NT Server fault tolerance. Disk Administrator In RAID level 10, data that is contained on a physical drive in one array is ___ _______________ on a drive in the second array. mirrored "Clustering" is the term applied to a group of ___________________ systems worki ng together as a single system. independent =============================================================================== When network users want to print data on a shared network printer, the data is s ent to a _____________ that feeds the data to the printer. serverEach network print job must be ________________ away from a computer's loc al printer port and onto the network cable. redirected The memory buffer in the print server's RAM that holds the print job until the p rinter is ready is called a ______________. spooler In order for users to access a shared printer, they must have a way to _________ _______ the printer. identify The printer uses the _________ to construct text and graphics to create the page image. PDL Managing users who access printing over a computer network includes assigning __ _______________, as with any other shared network resource. permissions One task an administrator can accomplish from a remote location is to __________ ____ print jobs in the queue. reorder Most current network operating systems allow an administrator to manage a networ k printer with a ____________ _______________ ______________. print-sharing utility A good fax server service allows an administrator to ________________ incoming f axes and to ____________ the appropriate one to the proper person. monitor, route Fax-server enhancements that allow users to send faxes from ______________, ____ _____________, and ____________ are available. databases, spreadsheets, e-mail ================================================================================ == Monitoring and documenting the network when it is in good working order provide a _______________ against which unusual network performance can be compared. baseline A network ______________ is a tool that captures and filters data packets and an alyzes network activity. monitor __________ and _____________ are utilities that are used to test the network con nections by sending a packet to a
remote host and monitoring its return. ping, tracert During monitoring of network performance, ________________ can indicate areas of poor performance that can benefit from upgrading. bottlenecksMany network vendors provide a ___________ ______________ ___________ _______ software to aid in the monitoring and improvement of network performance. total system management After creating a baseline for a network's performance, you will need to maintain a performance _______________ to aid with future troubleshooting. history To improve the performance of a network, an administrator can upgrade __________ _____, ___________________, __________ and ___________. servers, workstations, NICs, media When working on electronic components, be careful to prevent ___________ _______ _________ _____________ that will do damage to the components. static electrical charges Installing a new NIC is the same as installing any _________________ card. expansion Upgrading routers, brouters, repeaters, and bridges is best carried out by a ___ ____________ ____________________. trained technician The final step in any network upgrade is to ______________ the upgrade. confirm The best tool to use to confirm hardware changes to a network is the _________ u tility. ping How long the network can afford to be ___________ is in important factor in orga nizing and timing a move. down ================================================================================ == To isolate a network problem, the engineer can divide the network into _________ ______. segments A TDR sends ____________ -like pulses along a cable looking for any kind of a br eak, short, or imperfection that might affect network performance. sonar Protocol analyzers look inside the ______________ to determine the cause of a pr oblem. packet Advanced cable testers will tell you if a particular cable or _______ is causing problems. NIC One reason it is important to monitor network performance is to provide essentia l information for ____________________ detection. bottleneck Windows NT Server Performance Monitor helps a network administrator view operati ons in both ___________ time and _________________ time.real, recorded In an SNMP environment, programs called _____________ monitor network traffic. agents A ___________________ monitor is a tool that is used to track network performanc
e. performance Windows NT Performance Monitor has the ability to send an ____________ to the ne twork manager when there is a problem. alert Windows NT Server Network Monitor gives the administrator the ability to _______ _______ and _______________ network data streams to and from the server. capture, analyze The best source of information for Microsoft products is ___________________. TechNet Other useful sources of information for network troubleshooting include ________ _, ___________ _____________, and __________________. BBSs, User Groups, periodicals _________ is used to perform simple file transfers on the Internet. FTP ______________ ___________ ________________ _________________ is an Internet sta ndard protocol defined for distribution, inquiry, retrieval, and posting of news articles. Network News Transfer Protocol You can use _______________ to act as a remote terminal to an Internet host. Telnet In addition to URLs, every computer on the Internet has a unique ______ address. IP