Flylib.com
Chapter Review
Previous page
Table of content
Next page
[Previous] [Next]
A sending computer breaks the data into smaller sections, called _______________, that the protocol can handle.
Several protocols can work together in what is known as a protocol ____________.
A receiving computer copies the data from the packets to a ______________ for reassembly.
Protocols that support multipath LAN-to-LAN communications are known as _______________ protocols.
The receiving computer passes the reassembled data to the ____________________ in a usable form.
To avoid conflicts or incomplete operations, protocols are _______________ in an orderly manner.
The _______________ order indicates where the protocol sits in the protocol stack.
Three protocol types that map roughly to the OSI reference model are application, __________________, and network.
Application protocols work at the upper layer of the OSI reference model and provide __________ _________________ between applications.
A NIC-driver protocol resides in the ______________ _______________ ________________ ( _________ ) sublayer of the OSI reference model.
Rules for communicating in a particular LAN environment such as Ethernet or Token Ring are called _________________ protocols.
To help the network administrator install a protocol after the initial system installation, a ______________ is included with the operating system.
TCP/IP supports routing and is commonly used as an __________________________ protocol.
NetBIOS is an IBM session-layer LAN interface that acts as an _____________________ interface to the network.
APPC (advanced program-to-program communication) is IBM's ___________________ protocol.
NetBEUI is not a good choice for large networks because it is not _________________.
X.25 is a protocol used for a ______________ - ________________ network.
X.25 works in the ________________, ___________ - __________, and _________________ layers of the OSI reference model.
AppleTalk is a proprietary protocol stack designed for _________________ computers.
EtherTalk allows a Macintosh computer to communicate on an ___________________ network.
Answers
Previous page
Table of content
Next page
MCSE Training Kit: Networking Essentials Plus, Third Edition (IT Professional)
ISBN: 157231902X
EAN: 2147483647
Year: 2005
Pages: 106
Authors:
Microsoft Corporation
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Identifying Project Schedule Risk
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
Appendix A Selected Detail From the PERIL Database
Adobe After Effects 7.0 Studio Techniques
Animation Methods
Blending Modes: The Real Deal
Morphing
Conclusion
The Fog, Smoke, or Mist Rolls In
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
What Are Commands?
Links to developerWorks
Compute the Day of the Week
Links to developerWorks
Endnotes
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Automation Executables
Publisher Certificates
Conclusion
Local Machine Deployment Without a Deployment Manifest
Exporting the Mapped XML in the Document to an XML Data File
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Querying WMI
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Security
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
Special Topics in Quantitative Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies