Sie sind auf Seite 1von 24

_____ networks are the most popular type of network for medium- and large-scale organizations.

A _____ network is confined to a relatively small space.


_____ provide a Web-based client for checking e-mail.
Very large peer-to-peer networks have emerged to take advantage of the Internet.
A MAC address is also known as a(n) __________ address.
How many layers does the OSI model contain?
What device do you need to split a large network into smaller ones?
Routers function at which layer of the TCP/IP model?
Select the one function below that a NIC does NOT perform.

How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?
What type of fiber-optic cable uses lasers to send signals?
Which connector is used for UTP cabling on a network?
Which topology provides fault tolerance?
What is the meaning of the term "capacitance"?

if you provide support for, but do not install, UTP networks, which two tools are most important to use?
What type of expansion slot can you expect to see in most desktop PCs today (excluding laptops)?
What was the original maximum data transfer rate of the first Ethernet developed by Xerox?

Which of the following statements best describes the preamble of an Ethernet frame?
Which of the following is true of an Ethernet hub?
What is the maximum number of nodes that can be attached to a 10BaseT segment or hub?
Which type of cabling does the 10BaseT standard specify?
Which wavelength is used by 1000BaseLX fiber-optic cabling?
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC
function?
Which term refers to the 100-Mbps standards, even though there are now newer versions of Ethernet
available?
What wavelength is used on a 10GBaseSR network?
What is the universal MAC address for broadcast?
A Class C network block uses the __________ octets to define only the network ID.
How many binary digits are in an IPv4 address?
What is the range of decimal values in each of the four groups of an IPv4 address?
When viewed in binary, which value is always on the far left in the first octet of a Class A address?
What is the default subnet mask for a Class C network?
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the
computers?
Which of the following could be a valid Autonomous System Number (ASN)?
What tasks should be performed as soon as an administrator finishes configuring a router?
What is the name of the proprietary cable designed by Cisco for connecting to their routers?
What is the maximum number of hops allowed by RIP?
Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
Which protocol is popular for moving files between computers on the same LAN, where the chances of losing
packets are very small?
Which zone is created on other DNS servers to act as backups to the primary zone?
Which characters are not permitted in a DNS domain or host name?
List and explain 3 different layers from the OSI model. What important processes do these layers do? Do they
have any common protocols.
Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.

Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.

Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.

Identify and describe each of the following types of hardware: Packet, TCP/IP, NIC.

Application layer
A/An_________enables multiple machines to connect over a network.

Andalyn says complete 48-bit MAC addresses are allocated to NIC manufacturers from the IEEE. Buster says the
IEEE only assigns the first 24 bits to manufacturers. Carlos says the IEEE assigns only the last 24 bits to
manufacturers. Who is correct?
At which layer of the TCP/IP model are UDP datagrams created?
Every NIC has a hard-coded identifier called a/an _________.
From the options that follow, select the one that best describes the contents of a typical (simplified) network
frame.
How much data can a typical frame contain?
If a sending system does not know the MAC address of the intended recipient system, it sends a broadcast
frame with what MAC address?
Most often, the________provides the physical connection between the PC and the network.
NICs encapsulate data into a/an_________for sending that data over a network.
On a sending machine, data gets broken up at the__________of the OSI seven-layer model.
The term "unshielded twisted pair" describes which of the following network components?
The_________is an example of software that creates packets for moving data across networks.
The_____________provides an excellent tool for conceptualizing how a TCP/IP network works.
The__________provides the key interface between the Physical and Network layers.

Using the___________enables a computer to send a packet that every other PC on the network will process.
What component of Layer 2 of the OSI seven-layer model is responsible for the ordered delivery of frames,
including retransmission of missing or corrupt packets?
Which components work at layer 1 of the OSI seven layer model
Which layer of the OSI model makes sure the data is in a readable format for the Application layer?
Which layer of the TCP/IP model involves routing?
Which of the following best describes an IP address?
Which of the following is most likely to be a MAC address assigned to a NIC?
Which of the following OSI layers converts the ones and zeroes to electrical signals and places these signals on
the cable?
Which protocol creates the final IP packet?
Which TCP/IP layer includes Layers 5-7 from the OSI seven-layer model?
You can connect two very different networks by using a/an __________.
What are topolgies?
Physical Toplology
Logical Topology

Bus Topology

Ring Topology

Star Topology

Mesh Topology

Point-to-Multipoint

Point-to-Point

Coaxial Cable
Shielded Twisted Pair (STP)

Unshielded Twisted Pair (UTP)

Fiber-Optic Cable
Core (Fiber-Optic)
Cladding (Fiber-Optic)
Buffer material (Fiber-Optic)
IEEE 802.3
IEEE 802.3ae
IEEE 802.11
110 Block

Activity Light
Attenuation

Bonding

Cable Certifier
Cable Drop

Cable Tester
Cable Tray
Collision Light
Continuity
Continuity Tester
Crosstalk

Demarc

Demarc Extension
Dispersion

Environment Monitor

Equipment Rack
FEXT (Far End CrossTalk)
Horizontal Cabling

IDF (Intermediate Distribution Frame)

Light Leakage

Link Light
Loopback Plug

Loopback Test

MDF (Main Distribution Frame)


Mounting Bracket

Multiplexer
NEXT (Near End Crosstalk)
NIU (Network Interface Unit)

OTDR (Optical Time Domain Reflectometer)


Patch Cable

Patch Panel
Punchdown Tool

Raceway
Run

Smart Jack
Solid Core
Stranded Core

Structured Cabling

Telecommunications Room
Temperature Monitor
TIA/EIA 606

TDR (Time Domain Reflectometer)


TIA/EIA 606

TDR (Time Domain Reflectometer)


U
Vertical Cross Connect
Voltage Event Recorder
WireMap

Work Area
The_________is unique to each individual NIC.
When extra "filler" data is needed in a packet, a/an_______is added.
network connection that can send or receive, but not send and receive, a signal is called
a/an________connection.
A NIC that is listening for all packets sent along the wire is said to be in________.
The first item in a data packet is the______.
A hub acts as a/an_________in that it copies all incoming signals to every connected port.

Connecting switches incorrectly can create a/an_________, which can make the whole network stop working.
Hubs can be daisy-chained through their ______, or the use of a/an_______.
______ has a maximum distance between node and hub of 100 meters while ______ has a maximum distance
of 2000 meters.
A/An________can be used to interconnect different Ethernet types.
How are the connectors wired on a crossover cable?
What items make up the CSMA/CD system used in Ethernet networks?
What happens when two computers transmit through a hub simultaneously?

What is a group of nodes that can, at any point, send messages at the same time, causing a collision?
Which committee is responsible for Ethernet standards?
What type of cabling did the first star-bus topology Ethernet networks use?
What is the purpose of a preamble in an Ethernet frame?
What valuable network tool can you use to examine all frames on the network, regardless of their intended
recipient?
For what purpose is a crimping tool used?
Which of the following is not a limitation on 10BaseT cable?
Which of the following is not a limitation on 10BaseFL cable?
Upon looking at the front of a hub, you notice something labeled as MDI-X. What is this for?
In a full-duplex switched network, when can collisions occur?
What feature of switches prevents the problem of bridging loops?
What feature of switches keeps track of which MAC address goes to each port?
100BaseT
full-duplex

Gigabit Ethernet

1000BaseT

1000BaseX

1000BaseCX

1000BaseSX

1000BaseLX
LC connector
MT-RJ connector

10 Gigabit Ethernet

Multisource agreements (MSA)


When a network device can both send and receive data at the same time, it is said to be_________.

__________has a maximum cable length of two kilometers and uses multimode fiber with ST or SC connectors.
100BaseT is also known as__________.
_____ can use CAT 3, but _____ must use CAT 5 or better.
802.3z and 802.3ab are both_________standards.
_________supports the longest maximum distance for Gigabit Ethernet.
The _____ and _____ IEEE standards support the longest maximum distance for 10 Gigabit Ethernet.
Many fiber experts consider the_______connector to be the predominant fiber connector.
_________is the least expensive and most popular 10 GbE media type.
Routers with_________can accept a variety of 10 GbE media types.
Which of the following are 100BaseT cable types?
When a network device can only send data or receive data, but not both at the same time, it is operating in
what mode?
What important backbone technology is also known as Gigabit Ethernet?
What are the two major UTP variations of Fast Ethernet?

What are three limitations of Fast Ethernet over UTP?


Which standard defines Fast Ethernet using fiber cabling?
Which of the following are fiber connector types?
What do you need to connect varying 10 GbE cable types to the same router?
Which standard defines Gigabit Ethernet over twisted-pair copper wire?
You've lost the manual to your router. How can you tell the difference between a 1000BaseT port and a
100BaseT port on a router just by looking?
Which statement about Ethernet is correct?

What will happen if you connect a 10BaseT NIC to an auto-sensing switch?


What benefit does full-duplex offer?
What is the difference between the R and W designations in 10GBase standards, such as 10GBaseLR and
10GBaseLW, or 10GBaseER and 10GBaseEW?
The ______ portion of an IP address resembles 192.168.17.0
The _______ portion of an IP address assigned to a host computer consists of from one to three octets, with the
final octet between 1 and 254
The single organization that distributes IP addresses is called
The IP address 10.11.12.13 is a valid _________ address.
The command _________ is a utility that comes with Microsoft Windows to show TCP/IP settings.
The command ______ is a utility for UNIX/Linux/Mac OS X used to show TCP/IP settings.
The _________ is used to translate IP addresses to MAC addresses.
Computers set for dynamic addressing that cannot locate a DHCP server use _________ to assign themselves an
IP address.
The router interface is commonly known as the _________.
The _________ is a 32 bit binary number common to all computers on a network that is used to determine to
which network a computer belongs.
What is the result of converting 11110000.10111001.00001000.01100111 to dotted decimal notation?
What does IANA stand for?
Which of the following decribe IPv4?
What is the result of converting 192.168.0.1 to binary?
Which of the following are not valid IP addresses to assign to a Windows-based system?
Which of the following is a valid assignable Class A IP address?
Which of the following is a valid Class B IP address?
Whcih of the following is a valid Class C IP address?
Which method sends a packet from a single computer to a group of interested computers?

What processes are used to take a single class of IP addresses and chop it up into multiple smaller groups?

Which statements about subnet masks are true?

In which order are packets created and sent when a client requests an IP address from a DHCP server?
Which of the following is not a valid classful subnet mask?
Which command would you use to force a DHCP request on a Windows computer?
Which of the following IP addresses indicates a computer configured for dynamic addressing was unable to
locate a DHCP server?
A device called a _____________ is also called a Layer 3 switch.
The external routing protocol used on the Internet is __________.
The variety of __________ methods would include RIP, OSPF, BGP, and IGRP.
A __________ is normally entered manually into a router.
A __________ connects one Autonomous System to another Autonomous system.
__________ is a routing protocol that updates routing tables about every 30 seconds, resulting in overloaded
network traffic.

When all routers can communicate with each other efficiently, they are said to have reached __________.
Multiple networks that do not use IP addresses and are governed by a single protocol are known as
__________.
You can use __________ utility to troubleshoot routing problems.
__________ uses IP addresses and port numbers to enable many internal computers to share a single public IP
address.
How many IP addresses should a router have?
Choose the Cisco Systems proprietary routing protocols from the following items.
If specialty accounting software being used at your company requires that packet headers remain unchanged,
which item cannot be used on your network?

How does a router use a routing table to determine over which path to send a packet?
Which version of NAT maps a single routable IP address to a single network node?
What technology enables you to designate a specific local address for various network services?
How is the distance between routers measured?
Distance vector routing protocols include which of the following?
Which of the following are benefits of RIPv2 over RIPv1?
What is one way in which Autonomous Systems differ from typical Ethernet networks?

Why are link state protocols more efficient than RIP?


What happens when you first connect and turn on an OSPF router?
Which of the following is a valid Area ID for an Area 0 backbone?
How can you connect directly to a router for configuration purposes?
Once you have made a physical direct connection to a router, what utility/program can you use to issue
commands and instructions?
The TCP port numbers ranging from 0-1023 are called _____.
The TCP port numbers ranging fom 1024-49151 are called _____.
The protocol that is not as popular as POP3 is called _____.
Port 23 is used by ______ to emulate terminals on TCP/IP networks.
When you send out an email message it uses ______.

The quickest way to send to a few coworkers information an upcoming meeting would be to send an ________.
The _________ utility can be used to view the endpoints of your computers sessions.
Telnet has largely been replaced by _____ which provides better security through data encryption.
TCP is _______ in that it requires computers to acknowledge each other, while UDP is _____ in that it provides
no guarantee packets were successfully received.

What port number is the well-known port used by Web servers to distribute Web pages to Web browsers?
What protocol handles large file transfers between Internet users?
How can you tell that a secure Web page transaction is taking place?
Jane has been tasked to find and implement an application that will enable her boss to log into and control a
server remotely and securely. Which of the following applications would work best?
Which of the following Microsoft operating systems limit Web site access from other systems when using
Internet Information Services software?
Which of the following are names of Web server software?
Which of the following are names of Internet browser software?
Which of the following items does the S in HTTPS represent?
When using Windows, which command will show all used ports and the IP addresses using them?

What is the main difference between TCP and UDP?


Which connectionless protocol handles mundane chores like disconnect messages?
Which of the following provide Web services?
Which Linux/UNIX utility enables you to connect to a server automatically and run commands without entering
a user name and password every time?

What should you do if you are having difficulty transferring files with your FTP client when your router supports NAT?
The__________command is used to establish connectivity.
The__________protocol originally ran on top of NetBT, but today runs by itself and uses port 445.
The term__________refers to networks that use DNS belonging to the same DNS system.
A helpful command that displays TCP/IP naming information is__________.
A DNS forward lookup zone uses a(n)__________for individual host records.
To connect to systems on the internet using domain names, your network needs the name of at least
one__________.
The__________gets precedence over DNS.
You can use the diagnostic utility called__________to trace the progress of an ICMP packet between your
system and a remote computer.
To avoid having to re-resolve an FQDN that it has already checked, a windows DNS server keeps a list of IP
addresses it has already resolved, called__________.
The single DNS server that has a list of all the host names on the domain and their corresponding IP addresses is
the__________.
Which of the following are needed for e-mail clients to find their e-mail servers, FTP clients to find their file
servers, and Web browsers to find Web servers?
What do DNS servers use to help resolve IP addresses to DNS names?
What do DNS servers use to help resolve DNS names to IP addresses?

What type of DNS servers do not have any forward lookup zones and will resolve names of systems on the
internet for a network but are not responsible for telling other DNS servers the names of any clients?
What command gives you the IP address and the name of your system's default DNS server?
What file can override your DNS server?
Which of the following ports are used by Windows to support pre-DNS naming protocols?
What does adding a caching-only DNS server enable you to accomplish on your network?
Folders with subfolders on a system, like domain names with subdomains, are said to have a structure
resembling what?
Which of the following commands clears the local cache of DNS entries?
What UDP and TCP port does DNS use?
Which of these terms are frequently used interchangeably?
Which of the following are valid DNS record entry types?
Which of the following is an example of a top-level domain?

How do Authoritative DNS servers and cache-only DNS servers differ?


ANSI 802.1-1985/IEEE 802.5

ANSI/IEEE 802.3

ANSI X3.l35
ANSI X3.92

· ANSI X12

· ANSI X3T9.5

SONET
802.13
802.2
802.3
802.1
802.4
802.5
802.6
802.7
802.8
802.9
802.1
802.11
802.12
SG 2

SG 3
SG 4
SG 5
SG 6
SG 7
SG 8
SG 9
SG 10
SG 11
SG 12
SG 13
SG 15
SG 16

Token Ring

How Token Ring Works


How Token Ring Works

How Token Ring Works

How Token Ring Works


How Token Ring Works

Presentation Layer
Presentation Layer
Presentation Layer
Session Layer
Session Layer
Session Layer
Transport Layer
Transport Layer
Transport Layer
Transport Layer
Transport Layer
Network Layer
Network Layer
Network Layer
Network Layer
Network Layer
Data Link Layer
Data Link Layer
Data Link Layer
Data Link Layer
Data Link Layer
Bus

Ring

Star

Star

Star
Hybrid or Tree

Mesh
What is the first thing a professional cable installer should do when providing an estimate at a site?
How do Web pages get created on the Internet?
What are the main components of fiber-optic cabling? (Select three.)
What is generated by every piece of UTP cable in existence?

Jenny's office building recently had sections renovated, and now some users are complaining that they can't see
the network. She suspects that the workers might have inadvertently broken wires when the did ceiling work.
George suggests she use a toner to figure out which wires go to the complaining users. Erin disagrees, saying
that Jenny should use a Fox and Hound. Who's right?
What is the most popular size fiber-optic cabling?

Your first day on the job, you get a call from the owner complaining that her network connection is down. A
quick check of the central switch verifies that it's in good working order, as is the boss's PC. As luck would have
it, your supervisor calls at just that time and tells you not to worry; she'll be by in a jiffy with her TDR to help
root out the problem. What is she talking about?
How tall is a network router that is 8U?

How does a router use a routing table to determine over which path to send a packet?
When connecting a cable run onto a patch panel, which tool should you use?

Jill needs to run some UTP cable from one office to another. She found a box of cable in the closet and wants to
make sure it's CAT 5 or better. How can she tell the CAT level of the cable? (Select two)
client/server
LAN
Mail servers
1
physical
7
router
Internet
It verifies the data within each frame.

Two
Single-mode fiber (SMF)
RJ-45
Star
How long it takes a wire to get a full charge

Good, medium-priced toner and a good, medium-priced cable tester


LED
Mbps

It includes a 7-byte series of alternating ones and zeroes followed by a 1-byte Start Frame.
it reads a signal coming in from one port and repeats the signal out to the other ports.
1024
Unshielded Twisted Pair (UTP)
1300 nm

100 Mbps sending, 10 Mbps receiving

Fast Ethernet
850 nm
FF-FF-FF-FF-FF-FF
last three
32
0 to 255
0
255.255.255.255

Dynamic NAT
1.33457
Document how you configured the router and back up the router configuration.
Yost
15
UDP

TFTP
Secondary
Spaces
1. Application: network proccess to applications. 2. session: interhost communication 3. network:
path determination and IP
Packet: a piece of a message transmitted over a packet-switching network.
TCP: is a standard that defines how to establish and maintain a network conversation via which
application programs can exchange data.
IP: a communication network that uses Internet Protocol (IP) to send and receive messages between
one or more computers

NIC: is a computer hardware component that connects a computer to a computer network.

The application layer provides tools for programs to use to access the network (and the lower layers).
HTTP, FTP, SMTP, and POP3 are all examples of protocols that operate at the application layer.
hub

only Buster is correct


Transport
MAC Address

Recipient's MAC address, sender's MAC address, data FCS.


1500 bytes

FF-FF-FF-FF-FF-FF
NIC
frame
Transport Layer
Cable
internet protocol
Transmission Control Protocol/ Internet Protocol (TCP/IP) model.
data link layer

Broadcast address

LLC Center
Cables HUB
Presentation Layer
Internet layer
A dotted decimal notation assigned to NIC by software
23.4F.17.8A.4C.10

Physical Layer
IP
Application Layer
router.
Ways of connecting computers together
The actual layout of network devices, wires, and cables.
How the signal travels electronically.

Uses a single line cable that connects all of the computers in a line. Data from each computer goes
out on the whole bus. Most have terminators at each end of the cable. Stops working if cable broken
in any point.
Data moves in a circle from one computer to the next in the same direction. No end to the cable so
no termination. Stops working if cable broken in any point.

A type of WAN in which a single site acts as the central connection point for several other points.
This arrangement provides separate routes for data between any two sites; however, if the central
connection point fails, the entire WAN fails.
A network arranged in such a way that each device is connected to many other devices. Data
traveling on a mesh network can take any of several possible paths.
A single system acts as a common source through which all members of the point-to-multipoint
network converse.

Two computers connect directly connect together with no need of a central device of any kind.
A central conductor wire surrounded by an insulating material which is surrounded by a braided
metal shield. Either RG-6 or RG-59. RG-6 is more predominant one used today.
Consists of twisted pairs of wires surrounding by shielding to protect them from EMI.
Is the most common type of network cabling used today. It is twisted pairs surrounded by a plastic
jacket.

Transmits light rather than electricity. For really long distance transmissions. Up to tens of kilometers.
Glass fiber itself.
Makes the light reflect down the fiber.
Gives strength to the wire.
Ethernet
10 Gigabit Ethernet
Wireless
The most common connection used on the back of an RJ45 jack and patch panels.

An LED on a NIC, hub, or switch that blinks rapidly to show data transfers over the network.
The degradation of signal over distance for a networking cable.

Two or more NICs in a system working together to act as a single NIC to increase performance.

A very powerful cable testing device used by professional installers to test the electrical
characteristics of a cable and then generate a certification report, proving that cable runs pass
standards.
Location where the cable comes out of the wall at the workstation location.
A generic name for a device that tests cables. Some common tests are continuity, electrical shorts,
crossed wires, or other electrical characteristics.
A device for organizing cable runs in a drop ceiling.
A light on some older NICs that flickers when a network collision is detected.
The physical connection of wires in a network.
Inexpensive network tester that can only test for continuity on a line.
Electrical signal interference between two cables that are in close proximity to each other
A device that marks the dividing line of responsibility for the functioning of a network between
internal users and upstream service providers.
Any cabling that runs from the network interface to whatever box is used by the customer as a
demarc.
Diffusion over distance of light propagating down fiber cable.

Device used in telecommunications rooms that keeps track of humidity, temperature, and more.

A metal structure used in equipment rooms to secure network hardware devices and patch panels.
Most racks are 19" wide. Devices designed to fit in such a rack use a height measurement called
units, or simply U.
Crosstalk on the opposite end of a cable from the signal's source.
Cabling that connects the equipment room to the work areas.
The room where all the horizontal runs from all the work areas on a given floor in a building come
together.
The type of interference caused by bending a piece of fiber optic cable past its maximum bend
radius. Light bleeds through the cladding, causing signal distortion and loss.

An LED on NICs, hubs, and switches that lights up to show good connection between the devices.
Network connector that connects back into itself, used to connect loopback tests.
A special test often included in diagnostic software that sends data out of the NIC and checks to see
if it comes back.

The room in a building that stores the demarc, telephone cross connects, and LAN cross connects.
Bracket that acts as a holder for a faceplate in cable installations.

A device that merges information from multiple input channels to a single output channel.
Crosstalk at the same end of a cable from which the signal is being generated.
Another name for a demarc.

Tester for fiber optic cable that determines continuity and reports the location of cable breaks.
Short UTP cables that connect patch panels to the hubs.

A panel containing a row of female connectors that terminate the horizontal cabling in the
equipment room. Patch panels facilitate cabling organization and provide protection to horizontal
cabling.
A specialized tool for connecting UTP wires to a 110-block.
Cable organizing device that adheres to walls, making for a much simpler, though less neat,
installation than running cables in the walls.
A single piece of installed horizontal cabling.
Type of NIU that enables IUSPs or telephone companies to test for faults in a network, such as
disconnections and loopbacks.
A cable that uses a single solid wire to transmit signals.
A cable that uses a bundle of tiny wire strands to transmit signals. Stranded core is not quite as good
a conductor as solid core, but it will stand up to substantial handling without breaking.

Standards defined by the Telecommunications Industry Association/Electronics Industries Alliance


that define methods of organizing the cables in a network for ease of repair and replacement.

A central location for computer or telephone equipment and, most importantly, centralized cabling.
All cables usually run to the telecommunications room from the rest of the installation.
Device for keeping a telecommunications room at an optimal temperature.
Official methodology for labeling patch panels.

Advanced cable tester that tests the length of cables and their continuity or discontinuity, and
identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on.
Official methodology for labeling patch panels.

Advanced cable tester that tests the length of cables and their continuity or discontinuity, and
identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on.
The unique height measurement used with equipment racks 1 U equals 1.75 inches.
Main patch panel in a telecommunications room.
Tracks voltage over time by plugging into a power outlet.
Term that techs use to refer to the proper connectivity of wires in a network.
In a basic structured cabling network, often simply an office or cubicle that potentially contains a PC
attached to the network.
MAC Address
Pad

Halph-Duplex
Promiscous mode
preamble
repeater

Bridg loop
Uplink port/ crossover cable

10BaseT/ 10 BaseFL
Media Converter
One end is TIA/EIA 568A; the other end is TIA/EIA 568B.
Carrier sense, Multiple access, Collision detection
A collision occurs

Collision domain
IEEE 802.3
10BaseT
It gives the receiving NIC time to realize a frame is coming and to know when the frame starts.

sniffer
To attach an RJ-45 connector to a UTP cable.
Maximum distance between hub and node of 100 feet
Minimum CAT 3 or better UTP with RJ-45 connectors
It is an uplink port used to connect the hub to another hub. Correct
A collision will never occur.
STP
SAT
the newest version of Ethernet standard, it is a twister-pair that uses CAT 5.
with this characteristic a NIC can send and receive at the same time.
Ethernet created in the late 1990's by the IEEE, which today is the most common type of Ethernet
found on new NICs.
one of the Ethernet versions created by the IEEE, it uses four-pair UTP or STP cabling to achieve
gigabit performance.
one of the Ethernet versions created by the IEEE, it is broken into three standards: 1000BaseCX,
1000BaseSX, and 1000BaseLX.
one of the standards in the 1000BaseX, it uses a unique cable known as a twinaxial cable. version has
made little progress in the Gigabit Ethernet market.
the most common standard of the 1000BaseX series. It uses multimode fiber-optic cabling to
connect systems, with a generous maximum cable length of 220 to 500 meters
one of the standards in the 1000BaseX series. It is the long distance carrier for Gigabit Ethernet. It
uses single-mode laser cables to shoot data at distances up to 5 kilometers.
considered the most predominant fiber connector.
the first SFF connector, it is still quite common.
the newest LAN speed, it is showing up in high-level LANs. It is a new technology with a large
number of standards in existence.
plugs into your 10GbE equipment, enabling you to convert from one media type to another by
inserting the right transceiver.
Full-Duplex

100BaseFX
100BaseTX
100BaseT4/ 100Base TX
Gigabit Ethernet
1000BaseLX
10GBaseER/ 10GBaseEW
local connecter
10GBaseLR
Multisource agreement
(CAT 3) (CAT 5) (CAT 5e)

Halph-Duplex
1000BaseT
(100BaseTX) (100BaseT4)
Distance is restricted to 100 meters from node to hub. Shielding may be inadequate for some
installations. Intrusion from outsiders may be possible without detection.
100BaseFX
(LC MT)- (RJ) (ST)
Multisource agreements on the router
802.3ab

You can't tell the difference by looking. They look exactly the same.
Only 10- and 100-megabit Ethernet may use a hub. Gigabit Ethernet must use a switch.
The 10BaseT NIC will operate at 10 megabits while connected 100-megabit devices will operate at
their full speed of 100 megabits.
It doubles the bandwidth of the network.
The R and W indicate differences in the circuitry, with the W versions used to connect to SONET
equipment.
Network ID

Host ID
Internet Assigned Numbers Authority (IANA)
Internet Protocol version 4 (IPV4)
ipconfig
ipconfig
Address Resolution Protocol (ARP)

Automatic Private IP Addressing (APIPA)


Default gateway

Subnet Mask
240.185.8.103
Internet Assigned Numbers Authority
Uses decimal, periods and four octets
11000000.10101000.00000000.00000001
127.0.0.1/24 and 250.250.250.255/24
22.33.44.55
191.254.254.254
192.168.0.254
Multicast

CIDR and Subnetting


Every client on a network shares the same subnet mask. A subnet mask consists of a string of ones
followed by a string of zeroes.

DHCP Discover, DHCP Offer, DHCP Request, DHCP Acknowledge


255.255.255.255
ipconfig/renew

169.254.1.30
Router
Border Gateway Protocol (BGP-4)
Dynamic routing
Static route
Edge router

RIPv1

Convergence

Autonomous Systems (AS)


Traceroute

Port Address Translation (PAT)


Two or more
EIGRP and IGRP

Network Address Translation (NAT)


After examining all rows in the routing table, the router sends the packet along the path with the
lowest metric.
Static NAT
Port forwarding
In hops
RIP and BGP
Support for authentication and support for VLSM
They do not use IP addresses

They forward only changes to individual routes instead of forwarding entire routing tables
It floods the network with Hello packets as it looks for other OSPF routers
0.0.0.0
USB cable, crossover cable and rollover cable

PuTTY, HyperTerminal and Internet Explorer


well known port numbers
registered port numbers
IMAP4
Telnet
Simple Mail Transfer Protocol (SMTP)

Email
Netstat
Secure Shell (SSH)
Connection Oriented/ Connectionless

Port 80
FTP
The URL in the address bar starts with https.

SSH

(Windows XP) (Windows Vista) (Windows 7)


Apache IIS
(Internet Explore) (FireFox)
Secure Socket Layer
Netstat-an
TCP is connection-oriented, whereas UDP is connectionless? TCP sessions can be encrypted, whereas
UDP sessions cannot.
ICMP
Apache IIS GWS

Rlogin

Configure your FTP client to use passive FTP.


Ping
Server Message Block (SMB)
DNS Tree
IPCONFIG
A Record

DNS Root Server


Host file

Tracert

Cached lookup

Authoritative Name Server

DNS servers
Reverse lookup zones
Forward lookup zones

Cacheonly servers
Nslookup
Hosts
TCP port 137
Speeds up DNS resolution

Root
ipconfig/flushdns
53
Domain and Subdomain
(A), (NS), (SOA)
.com

Authoritative DNS servers store IP addresses and FQDNs of systems for a particular domain or
domains, whereas cache-only DNS servers do not store any FQDNs because they are only used to
talk to other DNS servers to resolve IP addresses
Token Ring access, protocols, cabling, and interface.
Coaxial-cable carrier-sense multiple-access with collision detection (CSMA/CD) for Ethernet
networks.
Structured query language (SQL) database query methods for front-end clients and back-end
database services.
A privacy and security encryption algorithm
Electronic data interchange (EDI) defining the exchange of purchase orders, bills of lading, invoices,
and other business forms.
Fiber Distributed Data Interface (FDDI) specification for voice and data transmission over fiber-optic
cable at 100 Mbps.

Synchronous Optical Network, a fiber-optic specification defining a global infrastructure for the
transmission of synchronous and isochronous (time-sensitive data such as real-time video)
information.
Cable TV Access Method and Physical Layer Specification.
Logical Link Control (LLC).
CSMA/CD NETWORK (Ethernet).
Internetworking.
Token Bus NETWORK.
Token Ring NETWORK.
Metropolitan Area Network (MAN)
Broadband Technical Advisory Group.
Fiber-Optic Technical Advisory Group.
Integrated Voice/Data Networks.
Network Security.
Wireless Network.
Demand Priority Access NETWORK (100VG-AnyLAN).
Network and service operation.

Tariff and accounting principles, including related telecommunications economic and policy issues.
TMN and network maintenance.
Protection against electromagnetic effects from the environment.
Outside plant.
Data networks and open system communications.
Characteristics of telematic systems.
Television and sound transmission.
Languages and general software aspects for telecommunication systems.
Signaling requirements and protocols.
End-to-end transmission performance of networks and terminals.
General network aspects.
Transport networks, systems, and equipment.
Multimedia services and systems.

is a data link technology for local area networks (LANs). It operates at layer 2 of the OSI model.
Unlike all other standard forms of LAN interconnects, Token Ring maintains one or more common
data frames that continuously circulates through the network.
a frame (packet) arrives at the next device in the ring sequence

that device checks whether the frame contains a message addressed to it. If so, the device
removes the message from the frame. If not, the frame is empty (called a token frame).

the device holding the frame decides whether to send a message. If so, it inserts message data
into the token frame and issues it back onto the LAN. If not, the device releases the token frame
for the next device in sequence to pick up
the above steps are repeated continuously for all devices in the token ring
Translation of data conforming to cross-platform standards into formats understood by the local
machine.
Encryption and decryption of data for transmission.
Compression at the source host and decompression at the destination host.
Communication with the Presentation layer above.
Organize and manage one or more connections per application, between hosts.
Communication with the Transport layer below.
1. Communicates with the Session layer above.
2. Reassembles transport Protocol Data Units into data streams
3. Reliable protocols operating at this layer will
Detect errors and lost data
Recover lost data
Logical Addressing
Routing
Datagram Encapsulation
Fragmentation and Reassembly
Error Handling and Diagnostics
Logical Link Control (LLC)
Media Access Control (MAC)
Data Framing
Addressing
Error Detecation and Handling
Advantages of the Bus topology include: Easy to install, costs are usually low, Easy to add systems to
network, Great for small networks. Disadvantages include: Out of- date technology, If cable breaks,
whole network is down, can be difficult to troubleshoot, umangeable in a large network.
The ring topology exists when each of the systems is connected to its respective neighbor forming a
ring.
In the star topology, instead of being connected to each other, the systems are now connected to
some central device

Advantages:
Easy to install
Easy to add devices to network
One break does not bring whole network down
Easier to troubleshoot
Widely used
Centralized management

Disadvantages: Costs are usually higher than with bus or ring networks
If you have only one central device and it fails, it brings the network down
The hybrid or tree topology is simply a combination of the other topologies.

The main advantage of this topology is high availability.


The main disadvantage of this topology is cost, both administrative and physical. Because
each system is connected to each other, the amount of cabling and maintenance necessary can be
prohibitive, especially in larger networks.
Request a floor plan
By publishing them
Cladding, insulating jacket, Fiber
Crosstalk

Both George and Erin are right

62.5/125 µm

Time domain reflectometer, her network tester


14 in
After examining all rows in the routing table, the router sends the packet along the path with the
lowest metric.
110-punchdown tool

Check the box/ Scan for markings on the cable

Das könnte Ihnen auch gefallen