Chapter 4: Concepts Flashcards
Why can a network that uses Class II repeaters have more than on repeater in the collision domain while a network that uses Class I repeaters.
A Class I repeater is slower than a Class II. Only one Class I repeater can be used in colllision domain. A network that uses Class II repeaters can have more than one repeater in the collision domain.
What are the advantages and disadvantages of repeaters
Repeaters can be a less expensive way to extend a network, but they can create an excessive amount of traffic on a busy network.
List the tasks that can be performed by a multistation access unit (MAU).
- Connect workstations into a logical ring through a physical star topology
- Move the token and frames around the ring
- Amplify data signals
- Connect in a daisy-chained manner to expand a token ring network
- Provide for orderly movement of data
- Shut down ports to malfunctioning nodes
Hubs can be used in which LAN technologies?
- Ethernet
- Fast Ethernet
- Gigabit Ethernet
- 10 Gigabit Ethernet
- FDDI
- Token ring
- Fast token ring
What components are required for an NIC network connection?
- An appropriate connector for the network medium.
- A transceiver
- A controller to support MAC sublayer of the Data Link layer
- Protocol control information
An MAC controller unit’s role is to work with the firmware to correctly encapsulate what data?
- Source and destination address information.
- Data to be transported?
- CRC error control information
FDDI NICs connect to host systems or files servers to FDDI equipment using _____ number of attachments to attach the network equipment to FDDI cabling through _____ number of attachments.
one, two
Wireless NICs (WNICs) are commonly available in what two modes?
- An ad-hoc peer communication with another WNIC.
2. Communication with an access point.
What are the common types of buses in a workstation or server?
- Industry Standard Architecture (ISA)
- Extended Industry Standard Architecture (EISA)
- Microchannel Architecture (MCA)
- Peripheral Computer Interface (PCI)
- SPARC Bus (SBUS)
- NuBus
- Universal Serial Bus (USB)
- VESA local bus (VL-bus)
What factors should you consider when choosing an NIC?
- For host computer, server, or workstation?
- Network media and network transport methods in use?
- Manufacturer?
- Computer or network equipment bus type?
- Operating system used by the computer?
- Use of half- or full-duplex communications?
- How does it attach to network (for special application)?
What are some additional uses for repeaters?
- Extend cable segment
- Increase number of nodes beyond limit of one segment
- Sense network problem and shut down cable segment (partitioning)
- Connect to components in other network devices
- Connect segments that use different media
- Extend backbone cable segments in LANs and WANs
- Extend long, fiber-optic cable segments
- Increase communications distance of T-carrier lines
An MAU may be a ______ hub or a _______ hub.
passive, active
What can hubs do?
- Provide a central unit from which to connect multiple nodes into one network.
- Permit large numbers of computers to be connected on single or multiple LANs.
- Provide multiprotocol services, such as Ethernet-to-FDDI connectivity
- Consolidate the network backbone
- Provide connections for several different media types
- Enable centralized network management and design
What are the types of network hubs?
- Unmanaged hubs
- Dual-speed hubs
- Workgroup hubs
- Stackable hubs
- Chassis hubs
Unlike repeaters, bridges operate in ________ mode.
promiscuous
Bridges operate at the ______ sublayer of the OSI _________ layer. They are protocol independent an look only at the ________ address.
MAC, Data Link, MAC
What are bridges used for?
- Extend a LAN when maximum connection limit has been reached
- Extend a LAN beyond the length limit
- Segment LANs to reduce data traffic bottlenecks
- Prevent unauthorized access to a LAN
What are a bridges functions?
Learning, filtering and forwarding.
What are the advantages of bridges?
- Limit traffic to certain network segments; enhance performance
- Can use as a firewall to keep intruders out of a network
What are the types of bridges?
Local bridges, remote bridges, and token ring source-route bridges
Routers forward packets to networks by using a decision making process based on:
Routing table data
Discovery of most efficient routes
Preprogrammed information from network administrator
What are routers used for?
- Efficiently direct packets from one network to another, reducing excessive traffic
- Join neighboring or distant networks
- Connect dissimilar networks
- Prevent network bottlenecks by isolating portions of a network
- Secure portions of a network from intruders
What are brouters used for?
- Efficiently direct packets from one network to another, reducing excessive traffic
- Join neighboring or distant networks
- Connect dissimilar networks
- Prevent network bottlenecks by isolating portions of a network
- Secure portions of a network from intruders
A LAN typically uses which two switching techniques?
Cut-through switching and Store-and-forward switching (buffered switching)
What are gateways used for?
- Convert commonly used protocols to a specialized protocol
- Convert message formats
- Translate different addressing schemes
- Link a host computer to a LAN
- Provide terminal emulation
- Direct electronic mail to the right network destination
- Connect networks with different architectures
True of False: Modems can be attached internally and externally.
True