[Previous] [Next]
Chapter Review
- Access methods prevent _______________________ access to the cable.
- With CSMA/CD, if there is data on the cable, no other computer may _________________ until the data has reached its destination and the cable is�clear again.
- CSMA/CD is known as a _____________________ access method because computers on the network compete for an opportunity to send data.
- With more traffic on a CSMA/CD network, _______________ tend to increase, slowing the network down.
- With the token-passing access method, only one computer at a time can use the token; therefore, there are no ___________________ or _____________________.
- With the demand-priority access method, the __________________ manage network access by doing round-robin searches for requests to send from all nodes.
- In the demand-priority access method, transmissions are not __________________ to all other computers on the network.
- A token is a special type of __________________ that circulates around a cable ring.
- With data masses divided into ______________, individual transmissions occur more
frequently so that every computer on the network has more opportunities to transmit and receive
data.
- Packets may contain session-control codes, such as error correction, that indicate the need for a _________________________.
- A packet's components are grouped into three sections: _____________, data, and trailer.
- In a packet, the header usually contains an error-checking component called a CRC. True False
- The structure of the packets is defined by the communication method, known as a protocol, used by the two computers. True False
- Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet's address matches its individual address. True False
- The trailer of a packet contains the destination address. True False
- Typically, Ethernet is a baseband architecture that uses a ________ topology.
- Ethernet relies on the __________________ access method to regulate traffic on the main cable segment.
- The maximum length of a 10BaseT segment is ________ meters.
- The 10BaseT topology is an Ethernet network that uses ______________________________ cable to connect stations.
- Typically, the hub of a 10BaseT network serves as a _____________________ _____________________.
- A thinnet network can combine as many as __________ cable segments connected by four repeaters, but only three segments can have stations attached.
- Because single-segment 10Base2 Ethernet limits would be too confining for a large
business, _________________ can be used to join Ethernet segments and extend the network to a
total length of 925 meters (about 3035 feet).
- A 10Base5 topology is also referred to as ___________________.
- Fast Ethernet is another name for the ________________ topology.
- Ethernet can use several communication _______________ including TCP/IP.
- The 100BaseTX topology runs on UTP Category _____ data-grade cable.
- A 100BaseVG network is built on a __________ topology with all computers attached to a hub.
- A Token Ring network is an implementation of IEEE standard _____________.
- In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________.
- In a Token Ring frame the Access Control field indicates whether the frame is�a _______________ frame or a _____________ frame.
- When a frame reaches the destination computer, that computer copies the frame into its _____________ _____________.
- Token passing is ___________________ , meaning that a computer cannot force its way onto the network as it can in a CSMA/CD environment.
- When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring.
- Cables attach the individual clients and servers to the MSAU that works like other ______________ hubs.
- When an IBM Token Ring network is full, adding another __________ can enlarge the network.
- MSAUs were designed to sense when a _______________ _______________ _________ fails and to disconnect from it.
- Each single Token Ring can accommodate ________ computers using STP cable.
- Most Token Ring networks use IBM Cabling System Type ____ UTP cabling.
- LocalTalk uses __________________ as an access method in a bus or tree topology.
- When a device attached to an AppleTalk network comes online, the device broadcasts an ________________ to determine if any other device is using it.
- A single LocalTalk network supports a maximum of ______ devices.
- Single LocalTalk networks can be joined together into one larger network through the use of _____________.
- ArcNet uses a token-passing access method in a ________-_______ topology.
- An ArcNet token moves from one computer to the next according to the order in which it
is connected to the __________________, regardless of how they are placed on the network
environment.
- Each computer in an ArcNet network is connected by cable to a ________.
Answers