Term
Access control is handled at the __layer during the routing process; the router consults a list of rules before forwarding an incoming packet to determine whether a packet meeting certa |
|
Definition
network souce and destination |
|
|
Term
In the OSI reference model the presentation layer is layer __, the application layer is layer __, the network layer is layer__, and the transport layer is layer__. |
|
Definition
|
|
Term
The __at the Data Link Layer is called a __. |
|
Definition
|
|
Term
__frames are created for any computer on a network that “__” to a shared network address. |
|
Definition
|
|
Term
The IEEE standard __covers error control and flow control over data frames. |
|
Definition
|
|
Term
__functions at the application layer of the OSI reference model. __functions at the transport layer of the OSI reference model. |
|
Definition
|
|
Term
The Ring based technologies as a physical star include __a token ring. |
|
Definition
|
|
Term
network designs today are based on 3 simple physical topologies because of the______ _______ ______, a method to ensure that all signals stop when they reach the end of a |
|
Definition
|
|
Term
__ in a cable segment must be terminated to prevent signal bounce. |
|
Definition
|
|
Term
All computers, no matter what their topology, communicate in the same way, they address data to one or more computera and then transmit that data across the cable in the form of __ __.< |
|
Definition
|
|
Term
In an active _____ ______, computers and other devices attached to the network regenerate and are responsible for moving data through the network. |
|
Definition
|
|
Term
The mesh topology formula for determining how many connections are needed for the number of nodes on a network with n representing the number of nodes on the network is:__________ |
|
Definition
|
|
Term
The majority of hubs installed in networks today are __hubs. |
|
Definition
|
|
Term
Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be read accurately, this phenomenon is called ________. |
|
Definition
|
|
Term
Net BEUI is what type of protocol? |
|
Definition
|
|
Term
SPX is Movell’s ________ _______ protocol used to guarantee data delivery. |
|
Definition
|
|
Term
__is a connectionless protocol. |
|
Definition
|
|
Term
__is a connection oriented protocol. |
|
Definition
|
|
Term
______is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems. |
|
Definition
|
|
Term
Class B addresses begin with network ID’s between ___and ___. |
|
Definition
|
|
Term
Class C networks are limited to ____hosts per network. |
|
Definition
|
|
Term
Class __addresses are reserved for experimental use and cannot be used for address arrangement. |
|
Definition
|
|
Term
The default class C subnet mask is ____.____.____.____ |
|
Definition
|
|
Term
Apple talk divides computers into _______. |
|
Definition
|
|