Sie sind auf Seite 1von 4

1.

1.1 Metropolitan Area Network.

1.2 Thicknet.

1.3 Thinnet.

1.4 Logical bus topology.

1.5 Half Duplex.

1.6 64bytes.

1.7 1518 bytes.

1.8 Virtual Local Area Network.

1.9 48-bit binary values.

1.10 12 hexadecimal digits.

1.11 Organizationally Unique Identifier.

1.12 Burned in address.

1.13 The Network layer address enables the packet to be forwarded toward
its destination.

1.14 The Data Link layer address enables the packet to be carried by the
local media across each segment.

1.15 Hexadecimal.

1.16 Hexadecimal.

1.17 Multicast Mac Address.

1.18 Jamming signal is used to notify the other devices of a collision, so that
they will call upon a back off algorithm.

1.19 The back off algorithm causes all devices to stop transmitting for a
random amount of time, which allows the collision signals to subside.

1.20 A collision domain is a physical network segment where data packets


can collide with one another when being sent on a shared medium, in
particular, when using the Ethernet networking protocol.
1.21 Network segment.

1.22 Random back-off time.

1.23 The time it takes for one bit to be ejected from a Network Interface Card
(NIC) operating at some predefined standard speed, such as 10 Mbit/s.

1.24 IEEE 802.3 standards.

1.25 The time it takes for one bit to be transmitted from a NIC operating at some
predefined standard speed.

1.26 802.3

1.27 Ddd

1.28 Switches

1.29 Is a technique used to attack an Ethernet wired or wireless network. ARP


Spoofing may allow an attacker to sniff data frames on a local area network, modify
the traffic, or stop the traffic altogether.

1.30 It is the small time interval between the data frame and its acknowledgment, It
used to measure the last bit of the FCS field of one frame to the first bit of the
Preamble of the next time.

1.31 Logical Link Control handles the communication between the upper layers and
the networking software, and the lower layers, typically the hardware.

1.32 Data encapsulation and Media Access Control

1.33 Frame delimiting, Addressing and Error detection.

1.34 It is because of the following:

a) Simplicity and ease of maintenance

b) Ability to incorporate new technologies

c) Reliability
d) Low cost of installation and upgrade

1.35 Consequences of Internet rapid growth:

a) More devices are being connected to the network.


b) Devices access the network media more frequently.
c) Distances between devices are increasing.

1.36 Dedicated bandwidth to each port, Collision-free environment and Full-duplex


operation.

1.37 Availability, Economics and Requirements

1.38 Five basic operations used by Ethernet LAN switches:


(1). Learning
(2). Aging
(3). Flooding
(4). Selective Forwarding
(5). Filtering

1.39 Two functions provided by ARP:


(1). Resolving Ipv4 addresses to MAC addresses
(2). Maintaining a cache of mappings

1.40 Steps involved in store and forward switching:


(1). Error checking
(2). Automatic Buffering
(3). Access Control Lists

1.41 It is the process of sending frames through all ports that are outgoing.

Das könnte Ihnen auch gefallen