Chapter Review

[Previous] [Next]

  1. Access methods prevent _______________________ access to the cable.
  2. With CSMA/CD, if there is data on the cable, no other computer may _________________ until the data has reached its destination and the cable is clear again.
  3. CSMA/CD is known as a _____________________ access method because computers on the network compete for an opportunity to send data.
  4. With more traffic on a CSMA/CD network, _______________ tend to increase, slowing the network down.
  5. With the token-passing access method, only one computer at a time can use the token; therefore, there are no ___________________ or _____________________.
  6. With the demand-priority access method, the __________________ manage network access by doing round-robin searches for requests to send from all nodes.
  7. In the demand-priority access method, transmissions are not __________________ to all other computers on the network.
  8. A token is a special type of __________________ that circulates around a cable ring.
  9. With data masses divided into ______________, individual transmissions occur more frequently so that every computer on the network has more opportunities to transmit and receive data.
  10. Packets may contain session-control codes, such as error correction, that indicate the need for a _________________________.
  11. A packet's components are grouped into three sections: _____________, data, and trailer.
  12. In a packet, the header usually contains an error-checking component called a CRC. True False
  13. The structure of the packets is defined by the communication method, known as a protocol, used by the two computers. True False
  14. Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet's address matches its individual address. True False
  15. The trailer of a packet contains the destination address. True False
  16. Typically, Ethernet is a baseband architecture that uses a ________ topology.
  17. Ethernet relies on the __________________ access method to regulate traffic on the main cable segment.
  18. The maximum length of a 10BaseT segment is ________ meters.
  19. The 10BaseT topology is an Ethernet network that uses ______________________________ cable to connect stations.
  20. Typically, the hub of a 10BaseT network serves as a _____________________ _____________________.
  21. A thinnet network can combine as many as __________ cable segments connected by four repeaters, but only three segments can have stations attached.
  22. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, _________________ can be used to join Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet).
  23. A 10Base5 topology is also referred to as ___________________.
  24. Fast Ethernet is another name for the ________________ topology.
  25. Ethernet can use several communication _______________ including TCP/IP.
  26. The 100BaseTX topology runs on UTP Category _____ data-grade cable.
  27. A 100BaseVG network is built on a __________ topology with all computers attached to a hub.
  28. A Token Ring network is an implementation of IEEE standard _____________.
  29. In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________.
  30. In a Token Ring frame the Access Control field indicates whether the frame is a _______________ frame or a _____________ frame.
  31. When a frame reaches the destination computer, that computer copies the frame into its _____________ _____________.
  32. Token passing is ___________________ , meaning that a computer cannot force its way onto the network as it can in a CSMA/CD environment.
  33. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring.
  34. Cables attach the individual clients and servers to the MSAU that works like other ______________ hubs.
  35. When an IBM Token Ring network is full, adding another __________ can enlarge the network.
  36. MSAUs were designed to sense when a _______________ _______________ _________ fails and to disconnect from it.
  37. Each single Token Ring can accommodate ________ computers using STP cable.
  38. Most Token Ring networks use IBM Cabling System Type ____ UTP cabling.
  39. LocalTalk uses __________________ as an access method in a bus or tree topology.
  40. When a device attached to an AppleTalk network comes online, the device broadcasts an ________________ to determine if any other device is using it.
  41. A single LocalTalk network supports a maximum of ______ devices.
  42. Single LocalTalk networks can be joined together into one larger network through the use of _____________.
  43. ArcNet uses a token-passing access method in a ________-_______ topology.
  44. An ArcNet token moves from one computer to the next according to the order in which it is connected to the __________________, regardless of how they are placed on the network environment.
  45. Each computer in an ArcNet network is connected by cable to a ________.

Answers



MCSE Training Kit Networking Essentials Plus 1999
MCSE Training Kit: Networking Essentials Plus, Third Edition (IT Professional)
ISBN: 157231902X
EAN: 2147483647
Year: 2005
Pages: 106

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net