Beruflich Dokumente
Kultur Dokumente
How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?
What type of fiber-optic cable uses lasers to send signals?
Which connector is used for UTP cabling on a network?
Which topology provides fault tolerance?
What is the meaning of the term "capacitance"?
if you provide support for, but do not install, UTP networks, which two tools are most important to use?
What type of expansion slot can you expect to see in most desktop PCs today (excluding laptops)?
What was the original maximum data transfer rate of the first Ethernet developed by Xerox?
Which of the following statements best describes the preamble of an Ethernet frame?
Which of the following is true of an Ethernet hub?
What is the maximum number of nodes that can be attached to a 10BaseT segment or hub?
Which type of cabling does the 10BaseT standard specify?
Which wavelength is used by 1000BaseLX fiber-optic cabling?
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC
function?
Which term refers to the 100-Mbps standards, even though there are now newer versions of Ethernet
available?
What wavelength is used on a 10GBaseSR network?
What is the universal MAC address for broadcast?
A Class C network block uses the __________ octets to define only the network ID.
How many binary digits are in an IPv4 address?
What is the range of decimal values in each of the four groups of an IPv4 address?
When viewed in binary, which value is always on the far left in the first octet of a Class A address?
What is the default subnet mask for a Class C network?
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the
computers?
Which of the following could be a valid Autonomous System Number (ASN)?
What tasks should be performed as soon as an administrator finishes configuring a router?
What is the name of the proprietary cable designed by Cisco for connecting to their routers?
What is the maximum number of hops allowed by RIP?
Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
Which protocol is popular for moving files between computers on the same LAN, where the chances of losing
packets are very small?
Which zone is created on other DNS servers to act as backups to the primary zone?
Which characters are not permitted in a DNS domain or host name?
List and explain 3 different layers from the OSI model. What important processes do these layers do? Do they
have any common protocols.
Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.
Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.
Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.
Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.
Application layer
A/An_________enables multiple machines to connect over a network.
Andalyn says complete 48-bit MAC addresses are allocated to NIC manufacturers from the IEEE. Buster says the
IEEE only assigns the first 24 bits to manufacturers. Carlos says the IEEE assigns only the last 24 bits to
manufacturers. Who is correct?
At which layer of the TCP/IP model are UDP datagrams created?
Every NIC has a hard-coded identifier called a/an _________.
From the options that follow, select the one that best describes the contents of a typical (simplified) network
frame.
How much data can a typical frame contain?
If a sending system does not know the MAC address of the intended recipient system, it sends a broadcast
frame with what MAC address?
Most often, the________provides the physical connection between the PC and the network.
NICs encapsulate data into a/an_________for sending that data over a network.
On a sending machine, data gets broken up at the__________of the OSI seven-layer model.
The term "unshielded twisted pair" describes which of the following network components?
The_________is an example of software that creates packets for moving data across networks.
The_____________provides an excellent tool for conceptualizing how a TCP/IP network works.
The__________provides the key interface between the Physical and Network layers.
Using the___________enables a computer to send a packet that every other PC on the network will process.
What component of Layer 2 of the OSI seven-layer model is responsible for the ordered delivery of frames,
including retransmission of missing or corrupt packets?
Which components work at layer 1 of the OSI seven layer model
Which layer of the OSI model makes sure the data is in a readable format for the Application layer?
Which layer of the TCP/IP model involves routing?
Which of the following best describes an IP address?
Which of the following is most likely to be a MAC address assigned to a NIC?
Which of the following OSI layers converts the ones and zeroes to electrical signals and places these signals on
the cable?
Which protocol creates the final IP packet?
Which TCP/IP layer includes Layers 5-7 from the OSI seven-layer model?
You can connect two very different networks by using a/an __________.
What are topolgies?
Physical Toplology
Logical Topology
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Point-to-Multipoint
Point-to-Point
Coaxial Cable
Shielded Twisted Pair (STP)
Fiber-Optic Cable
Core (Fiber-Optic)
Cladding (Fiber-Optic)
Buffer material (Fiber-Optic)
IEEE 802.3
IEEE 802.3ae
IEEE 802.11
110 Block
Activity Light
Attenuation
Bonding
Cable Certifier
Cable Drop
Cable Tester
Cable Tray
Collision Light
Continuity
Continuity Tester
Crosstalk
Demarc
Demarc Extension
Dispersion
Environment Monitor
Equipment Rack
FEXT (Far End CrossTalk)
Horizontal Cabling
Light Leakage
Link Light
Loopback Plug
Loopback Test
Multiplexer
NEXT (Near End Crosstalk)
NIU (Network Interface Unit)
Patch Panel
Punchdown Tool
Raceway
Run
Smart Jack
Solid Core
Stranded Core
Structured Cabling
Telecommunications Room
Temperature Monitor
TIA/EIA 606
Work Area
The_________is unique to each individual NIC.
When extra "filler" data is needed in a packet, a/an_______is added.
network connection that can send or receive, but not send and receive, a signal is called
a/an________connection.
A NIC that is listening for all packets sent along the wire is said to be in________.
The first item in a data packet is the______.
A hub acts as a/an_________in that it copies all incoming signals to every connected port.
Connecting switches incorrectly can create a/an_________, which can make the whole network stop working.
Hubs can be daisy-chained through their ______, or the use of a/an_______.
______ has a maximum distance between node and hub of 100 meters while ______ has a maximum distance
of 2000 meters.
A/An________can be used to interconnect different Ethernet types.
How are the connectors wired on a crossover cable?
What items make up the CSMA/CD system used in Ethernet networks?
What happens when two computers transmit through a hub simultaneously?
What is a group of nodes that can, at any point, send messages at the same time, causing a collision?
Which committee is responsible for Ethernet standards?
What type of cabling did the first star-bus topology Ethernet networks use?
What is the purpose of a preamble in an Ethernet frame?
What valuable network tool can you use to examine all frames on the network, regardless of their intended
recipient?
For what purpose is a crimping tool used?
Which of the following is not a limitation on 10BaseT cable?
Which of the following is not a limitation on 10BaseFL cable?
Upon looking at the front of a hub, you notice something labeled as MDI-X. What is this for?
In a full-duplex switched network, when can collisions occur?
What feature of switches prevents the problem of bridging loops?
What feature of switches keeps track of which MAC address goes to each port?
100BaseT
full-duplex
Gigabit Ethernet
1000BaseT
1000BaseX
1000BaseCX
1000BaseSX
1000BaseLX
LC connector
MT-RJ connector
10 Gigabit Ethernet
__________has a maximum cable length of two kilometers and uses multimode fiber with ST or SC connectors.
100BaseT is also known as__________.
_____ can use CAT 3, but _____ must use CAT 5 or better.
802.3z and 802.3ab are both_________standards.
_________supports the longest maximum distance for Gigabit Ethernet.
The _____ and _____ IEEE standards support the longest maximum distance for 10 Gigabit Ethernet.
Many fiber experts consider the_______connector to be the predominant fiber connector.
_________is the least expensive and most popular 10 GbE media type.
Routers with_________can accept a variety of 10 GbE media types.
Which of the following are 100BaseT cable types?
When a network device can only send data or receive data, but not both at the same time, it is operating in
what mode?
What important backbone technology is also known as Gigabit Ethernet?
What are the two major UTP variations of Fast Ethernet?
What processes are used to take a single class of IP addresses and chop it up into multiple smaller groups?
In which order are packets created and sent when a client requests an IP address from a DHCP server?
Which of the following is not a valid classful subnet mask?
Which command would you use to force a DHCP request on a Windows computer?
Which of the following IP addresses indicates a computer configured for dynamic addressing was unable to
locate a DHCP server?
A device called a _____________ is also called a Layer 3 switch.
The external routing protocol used on the Internet is __________.
The variety of __________ methods would include RIP, OSPF, BGP, and IGRP.
A __________ is normally entered manually into a router.
A __________ connects one Autonomous System to another Autonomous system.
__________ is a routing protocol that updates routing tables about every 30 seconds, resulting in overloaded
network traffic.
When all routers can communicate with each other efficiently, they are said to have reached __________.
Multiple networks that do not use IP addresses and are governed by a single protocol are known as
__________.
You can use __________ utility to troubleshoot routing problems.
__________ uses IP addresses and port numbers to enable many internal computers to share a single public IP
address.
How many IP addresses should a router have?
Choose the Cisco Systems proprietary routing protocols from the following items.
If specialty accounting software being used at your company requires that packet headers remain unchanged,
which item cannot be used on your network?
How does a router use a routing table to determine over which path to send a packet?
Which version of NAT maps a single routable IP address to a single network node?
What technology enables you to designate a specific local address for various network services?
How is the distance between routers measured?
Distance vector routing protocols include which of the following?
Which of the following are benefits of RIPv2 over RIPv1?
What is one way in which Autonomous Systems differ from typical Ethernet networks?
The quickest way to send to a few coworkers information an upcoming meeting would be to send an ________.
The _________ utility can be used to view the endpoints of your computers sessions.
Telnet has largely been replaced by _____ which provides better security through data encryption.
TCP is _______ in that it requires computers to acknowledge each other, while UDP is _____ in that it provides
no guarantee packets were successfully received.
What port number is the well-known port used by Web servers to distribute Web pages to Web browsers?
What protocol handles large file transfers between Internet users?
How can you tell that a secure Web page transaction is taking place?
Jane has been tasked to find and implement an application that will enable her boss to log into and control a
server remotely and securely. Which of the following applications would work best?
Which of the following Microsoft operating systems limit Web site access from other systems when using
Internet Information Services software?
Which of the following are names of Web server software?
Which of the following are names of Internet browser software?
Which of the following items does the S in HTTPS represent?
When using Windows, which command will show all used ports and the IP addresses using them?
What should you do if you are having difficulty transferring files with your FTP client when your router supports NAT?
The__________command is used to establish connectivity.
The__________protocol originally ran on top of NetBT, but today runs by itself and uses port 445.
The term__________refers to networks that use DNS belonging to the same DNS system.
A helpful command that displays TCP/IP naming information is__________.
A DNS forward lookup zone uses a(n)__________for individual host records.
To connect to systems on the internet using domain names, your network needs the name of at least
one__________.
The__________gets precedence over DNS.
You can use the diagnostic utility called__________to trace the progress of an ICMP packet between your
system and a remote computer.
To avoid having to re-resolve an FQDN that it has already checked, a windows DNS server keeps a list of IP
addresses it has already resolved, called__________.
The single DNS server that has a list of all the host names on the domain and their corresponding IP addresses is
the__________.
Which of the following are needed for e-mail clients to find their e-mail servers, FTP clients to find their file
servers, and Web browsers to find Web servers?
What do DNS servers use to help resolve IP addresses to DNS names?
What do DNS servers use to help resolve DNS names to IP addresses?
What type of DNS servers do not have any forward lookup zones and will resolve names of systems on the
internet for a network but are not responsible for telling other DNS servers the names of any clients?
What command gives you the IP address and the name of your system's default DNS server?
What file can override your DNS server?
Which of the following ports are used by Windows to support pre-DNS naming protocols?
What does adding a caching-only DNS server enable you to accomplish on your network?
Folders with subfolders on a system, like domain names with subdomains, are said to have a structure
resembling what?
Which of the following commands clears the local cache of DNS entries?
What UDP and TCP port does DNS use?
Which of these terms are frequently used interchangeably?
Which of the following are valid DNS record entry types?
Which of the following is an example of a top-level domain?
ANSI/IEEE 802.3
ANSI X3.l35
ANSI X3.92
· ANSI X12
· ANSI X3T9.5
SONET
802.13
802.2
802.3
802.1
802.4
802.5
802.6
802.7
802.8
802.9
802.1
802.11
802.12
SG 2
SG 3
SG 4
SG 5
SG 6
SG 7
SG 8
SG 9
SG 10
SG 11
SG 12
SG 13
SG 15
SG 16
Token Ring
Presentation Layer
Presentation Layer
Presentation Layer
Session Layer
Session Layer
Session Layer
Transport Layer
Transport Layer
Transport Layer
Transport Layer
Transport Layer
Network Layer
Network Layer
Network Layer
Network Layer
Network Layer
Data Link Layer
Data Link Layer
Data Link Layer
Data Link Layer
Data Link Layer
Bus
Ring
Star
Star
Star
Hybrid or Tree
Mesh
What is the first thing a professional cable installer should do when providing an estimate at a site?
How do Web pages get created on the Internet?
What are the main components of fiber-optic cabling? (Select three.)
What is generated by every piece of UTP cable in existence?
Jenny's office building recently had sections renovated, and now some users are complaining that they can't see
the network. She suspects that the workers might have inadvertently broken wires when the did ceiling work.
George suggests she use a toner to figure out which wires go to the complaining users. Erin disagrees, saying
that Jenny should use a Fox and Hound. Who's right?
What is the most popular size fiber-optic cabling?
Your first day on the job, you get a call from the owner complaining that her network connection is down. A
quick check of the central switch verifies that it's in good working order, as is the boss's PC. As luck would have
it, your supervisor calls at just that time and tells you not to worry; she'll be by in a jiffy with her TDR to help
root out the problem. What is she talking about?
How tall is a network router that is 8U?
How does a router use a routing table to determine over which path to send a packet?
When connecting a cable run onto a patch panel, which tool should you use?
Jill needs to run some UTP cable from one office to another. She found a box of cable in the closet and wants to
make sure it's CAT 5 or better. How can she tell the CAT level of the cable? (Select two)
client/server
LAN
Mail servers
1
physical
7
router
Internet
It verifies the data within each frame.
Two
Single-mode fiber (SMF)
RJ-45
Star
How long it takes a wire to get a full charge
It includes a 7-byte series of alternating ones and zeroes followed by a 1-byte Start Frame.
it reads a signal coming in from one port and repeats the signal out to the other ports.
1024
Unshielded Twisted Pair (UTP)
1300 nm
Fast Ethernet
850 nm
FF-FF-FF-FF-FF-FF
last three
32
0 to 255
0
255.255.255.255
Dynamic NAT
1.33457
Document how you configured the router and back up the router configuration.
Yost
15
UDP
TFTP
Secondary
Spaces
1. Application: network proccess to applications. 2. session: interhost communication 3. network:
path determination and IP
Packet: a piece of a message transmitted over a packet-switching network.
TCP: is a standard that defines how to establish and maintain a network conversation via which
application programs can exchange data.
IP: a communication network that uses Internet Protocol (IP) to send and receive messages between
one or more computers
The application layer provides tools for programs to use to access the network (and the lower layers).
HTTP, FTP, SMTP, and POP3 are all examples of protocols that operate at the application layer.
hub
FF-FF-FF-FF-FF-FF
NIC
frame
Transport Layer
Cable
internet protocol
Transmission Control Protocol/ Internet Protocol (TCP/IP) model.
data link layer
Broadcast address
LLC Center
Cables HUB
Presentation Layer
Internet layer
A dotted decimal notation assigned to NIC by software
23.4F.17.8A.4C.10
Physical Layer
IP
Application Layer
router.
Ways of connecting computers together
The actual layout of network devices, wires, and cables.
How the signal travels electronically.
Uses a single line cable that connects all of the computers in a line. Data from each computer goes
out on the whole bus. Most have terminators at each end of the cable. Stops working if cable broken
in any point.
Data moves in a circle from one computer to the next in the same direction. No end to the cable so
no termination. Stops working if cable broken in any point.
A type of WAN in which a single site acts as the central connection point for several other points.
This arrangement provides separate routes for data between any two sites; however, if the central
connection point fails, the entire WAN fails.
A network arranged in such a way that each device is connected to many other devices. Data
traveling on a mesh network can take any of several possible paths.
A single system acts as a common source through which all members of the point-to-multipoint
network converse.
Two computers connect directly connect together with no need of a central device of any kind.
A central conductor wire surrounded by an insulating material which is surrounded by a braided
metal shield. Either RG-6 or RG-59. RG-6 is more predominant one used today.
Consists of twisted pairs of wires surrounding by shielding to protect them from EMI.
Is the most common type of network cabling used today. It is twisted pairs surrounded by a plastic
jacket.
Transmits light rather than electricity. For really long distance transmissions. Up to tens of kilometers.
Glass fiber itself.
Makes the light reflect down the fiber.
Gives strength to the wire.
Ethernet
10 Gigabit Ethernet
Wireless
The most common connection used on the back of an RJ45 jack and patch panels.
An LED on a NIC, hub, or switch that blinks rapidly to show data transfers over the network.
The degradation of signal over distance for a networking cable.
Two or more NICs in a system working together to act as a single NIC to increase performance.
A very powerful cable testing device used by professional installers to test the electrical
characteristics of a cable and then generate a certification report, proving that cable runs pass
standards.
Location where the cable comes out of the wall at the workstation location.
A generic name for a device that tests cables. Some common tests are continuity, electrical shorts,
crossed wires, or other electrical characteristics.
A device for organizing cable runs in a drop ceiling.
A light on some older NICs that flickers when a network collision is detected.
The physical connection of wires in a network.
Inexpensive network tester that can only test for continuity on a line.
Electrical signal interference between two cables that are in close proximity to each other
A device that marks the dividing line of responsibility for the functioning of a network between
internal users and upstream service providers.
Any cabling that runs from the network interface to whatever box is used by the customer as a
demarc.
Diffusion over distance of light propagating down fiber cable.
Device used in telecommunications rooms that keeps track of humidity, temperature, and more.
A metal structure used in equipment rooms to secure network hardware devices and patch panels.
Most racks are 19" wide. Devices designed to fit in such a rack use a height measurement called
units, or simply U.
Crosstalk on the opposite end of a cable from the signal's source.
Cabling that connects the equipment room to the work areas.
The room where all the horizontal runs from all the work areas on a given floor in a building come
together.
The type of interference caused by bending a piece of fiber optic cable past its maximum bend
radius. Light bleeds through the cladding, causing signal distortion and loss.
An LED on NICs, hubs, and switches that lights up to show good connection between the devices.
Network connector that connects back into itself, used to connect loopback tests.
A special test often included in diagnostic software that sends data out of the NIC and checks to see
if it comes back.
The room in a building that stores the demarc, telephone cross connects, and LAN cross connects.
Bracket that acts as a holder for a faceplate in cable installations.
A device that merges information from multiple input channels to a single output channel.
Crosstalk at the same end of a cable from which the signal is being generated.
Another name for a demarc.
Tester for fiber optic cable that determines continuity and reports the location of cable breaks.
Short UTP cables that connect patch panels to the hubs.
A panel containing a row of female connectors that terminate the horizontal cabling in the
equipment room. Patch panels facilitate cabling organization and provide protection to horizontal
cabling.
A specialized tool for connecting UTP wires to a 110-block.
Cable organizing device that adheres to walls, making for a much simpler, though less neat,
installation than running cables in the walls.
A single piece of installed horizontal cabling.
Type of NIU that enables IUSPs or telephone companies to test for faults in a network, such as
disconnections and loopbacks.
A cable that uses a single solid wire to transmit signals.
A cable that uses a bundle of tiny wire strands to transmit signals. Stranded core is not quite as good
a conductor as solid core, but it will stand up to substantial handling without breaking.
A central location for computer or telephone equipment and, most importantly, centralized cabling.
All cables usually run to the telecommunications room from the rest of the installation.
Device for keeping a telecommunications room at an optimal temperature.
Official methodology for labeling patch panels.
Advanced cable tester that tests the length of cables and their continuity or discontinuity, and
identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on.
Official methodology for labeling patch panels.
Advanced cable tester that tests the length of cables and their continuity or discontinuity, and
identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on.
The unique height measurement used with equipment racks 1 U equals 1.75 inches.
Main patch panel in a telecommunications room.
Tracks voltage over time by plugging into a power outlet.
Term that techs use to refer to the proper connectivity of wires in a network.
In a basic structured cabling network, often simply an office or cubicle that potentially contains a PC
attached to the network.
MAC Address
Pad
Halph-Duplex
Promiscous mode
preamble
repeater
Bridg loop
Uplink port/ crossover cable
10BaseT/ 10 BaseFL
Media Converter
One end is TIA/EIA 568A; the other end is TIA/EIA 568B.
Carrier sense, Multiple access, Collision detection
A collision occurs
Collision domain
IEEE 802.3
10BaseT
It gives the receiving NIC time to realize a frame is coming and to know when the frame starts.
sniffer
To attach an RJ-45 connector to a UTP cable.
Maximum distance between hub and node of 100 feet
Minimum CAT 3 or better UTP with RJ-45 connectors
It is an uplink port used to connect the hub to another hub. Correct
A collision will never occur.
STP
SAT
the newest version of Ethernet standard, it is a twister-pair that uses CAT 5.
with this characteristic a NIC can send and receive at the same time.
Ethernet created in the late 1990's by the IEEE, which today is the most common type of Ethernet
found on new NICs.
one of the Ethernet versions created by the IEEE, it uses four-pair UTP or STP cabling to achieve
gigabit performance.
one of the Ethernet versions created by the IEEE, it is broken into three standards: 1000BaseCX,
1000BaseSX, and 1000BaseLX.
one of the standards in the 1000BaseX, it uses a unique cable known as a twinaxial cable. version has
made little progress in the Gigabit Ethernet market.
the most common standard of the 1000BaseX series. It uses multimode fiber-optic cabling to
connect systems, with a generous maximum cable length of 220 to 500 meters
one of the standards in the 1000BaseX series. It is the long distance carrier for Gigabit Ethernet. It
uses single-mode laser cables to shoot data at distances up to 5 kilometers.
considered the most predominant fiber connector.
the first SFF connector, it is still quite common.
the newest LAN speed, it is showing up in high-level LANs. It is a new technology with a large
number of standards in existence.
plugs into your 10GbE equipment, enabling you to convert from one media type to another by
inserting the right transceiver.
Full-Duplex
100BaseFX
100BaseTX
100BaseT4/ 100Base TX
Gigabit Ethernet
1000BaseLX
10GBaseER/ 10GBaseEW
local connecter
10GBaseLR
Multisource agreement
(CAT 3) (CAT 5) (CAT 5e)
Halph-Duplex
1000BaseT
(100BaseTX) (100BaseT4)
Distance is restricted to 100 meters from node to hub. Shielding may be inadequate for some
installations. Intrusion from outsiders may be possible without detection.
100BaseFX
(LC MT)- (RJ) (ST)
Multisource agreements on the router
802.3ab
You can't tell the difference by looking. They look exactly the same.
Only 10- and 100-megabit Ethernet may use a hub. Gigabit Ethernet must use a switch.
The 10BaseT NIC will operate at 10 megabits while connected 100-megabit devices will operate at
their full speed of 100 megabits.
It doubles the bandwidth of the network.
The R and W indicate differences in the circuitry, with the W versions used to connect to SONET
equipment.
Network ID
Host ID
Internet Assigned Numbers Authority (IANA)
Internet Protocol version 4 (IPV4)
ipconfig
ipconfig
Address Resolution Protocol (ARP)
Subnet Mask
240.185.8.103
Internet Assigned Numbers Authority
Uses decimal, periods and four octets
11000000.10101000.00000000.00000001
127.0.0.1/24 and 250.250.250.255/24
22.33.44.55
191.254.254.254
192.168.0.254
Multicast
169.254.1.30
Router
Border Gateway Protocol (BGP-4)
Dynamic routing
Static route
Edge router
RIPv1
Convergence
They forward only changes to individual routes instead of forwarding entire routing tables
It floods the network with Hello packets as it looks for other OSPF routers
0.0.0.0
USB cable, crossover cable and rollover cable
Email
Netstat
Secure Shell (SSH)
Connection Oriented/ Connectionless
Port 80
FTP
The URL in the address bar starts with https.
SSH
Rlogin
Tracert
Cached lookup
DNS servers
Reverse lookup zones
Forward lookup zones
Cacheonly servers
Nslookup
Hosts
TCP port 137
Speeds up DNS resolution
Root
ipconfig/flushdns
53
Domain and Subdomain
(A), (NS), (SOA)
.com
Authoritative DNS servers store IP addresses and FQDNs of systems for a particular domain or
domains, whereas cache-only DNS servers do not store any FQDNs because they are only used to
talk to other DNS servers to resolve IP addresses
Token Ring access, protocols, cabling, and interface.
Coaxial-cable carrier-sense multiple-access with collision detection (CSMA/CD) for Ethernet
networks.
Structured query language (SQL) database query methods for front-end clients and back-end
database services.
A privacy and security encryption algorithm
Electronic data interchange (EDI) defining the exchange of purchase orders, bills of lading, invoices,
and other business forms.
Fiber Distributed Data Interface (FDDI) specification for voice and data transmission over fiber-optic
cable at 100 Mbps.
Synchronous Optical Network, a fiber-optic specification defining a global infrastructure for the
transmission of synchronous and isochronous (time-sensitive data such as real-time video)
information.
Cable TV Access Method and Physical Layer Specification.
Logical Link Control (LLC).
CSMA/CD NETWORK (Ethernet).
Internetworking.
Token Bus NETWORK.
Token Ring NETWORK.
Metropolitan Area Network (MAN)
Broadband Technical Advisory Group.
Fiber-Optic Technical Advisory Group.
Integrated Voice/Data Networks.
Network Security.
Wireless Network.
Demand Priority Access NETWORK (100VG-AnyLAN).
Network and service operation.
Tariff and accounting principles, including related telecommunications economic and policy issues.
TMN and network maintenance.
Protection against electromagnetic effects from the environment.
Outside plant.
Data networks and open system communications.
Characteristics of telematic systems.
Television and sound transmission.
Languages and general software aspects for telecommunication systems.
Signaling requirements and protocols.
End-to-end transmission performance of networks and terminals.
General network aspects.
Transport networks, systems, and equipment.
Multimedia services and systems.
is a data link technology for local area networks (LANs). It operates at layer 2 of the OSI model.
Unlike all other standard forms of LAN interconnects, Token Ring maintains one or more common
data frames that continuously circulates through the network.
a frame (packet) arrives at the next device in the ring sequence
that device checks whether the frame contains a message addressed to it. If so, the device
removes the message from the frame. If not, the frame is empty (called a token frame).
the device holding the frame decides whether to send a message. If so, it inserts message data
into the token frame and issues it back onto the LAN. If not, the device releases the token frame
for the next device in sequence to pick up
the above steps are repeated continuously for all devices in the token ring
Translation of data conforming to cross-platform standards into formats understood by the local
machine.
Encryption and decryption of data for transmission.
Compression at the source host and decompression at the destination host.
Communication with the Presentation layer above.
Organize and manage one or more connections per application, between hosts.
Communication with the Transport layer below.
1. Communicates with the Session layer above.
2. Reassembles transport Protocol Data Units into data streams
3. Reliable protocols operating at this layer will
Detect errors and lost data
Recover lost data
Logical Addressing
Routing
Datagram Encapsulation
Fragmentation and Reassembly
Error Handling and Diagnostics
Logical Link Control (LLC)
Media Access Control (MAC)
Data Framing
Addressing
Error Detecation and Handling
Advantages of the Bus topology include: Easy to install, costs are usually low, Easy to add systems to
network, Great for small networks. Disadvantages include: Out of- date technology, If cable breaks,
whole network is down, can be difficult to troubleshoot, umangeable in a large network.
The ring topology exists when each of the systems is connected to its respective neighbor forming a
ring.
In the star topology, instead of being connected to each other, the systems are now connected to
some central device
Advantages:
Easy to install
Easy to add devices to network
One break does not bring whole network down
Easier to troubleshoot
Widely used
Centralized management
Disadvantages: Costs are usually higher than with bus or ring networks
If you have only one central device and it fails, it brings the network down
The hybrid or tree topology is simply a combination of the other topologies.
62.5/125 µm