Term
| Access control is handled at the __layer during the routing process; the router consults a list of rules before forwarding an incoming packet to determine whether a packet meeting certa |
|
Definition
network souce and destination |
|
|
Term
| In the OSI reference model the presentation layer is layer __, the application layer is layer __, the network layer is layer__, and the transport layer is layer__. |
|
Definition
|
|
Term
| The __at the Data Link Layer is called a __. |
|
Definition
|
|
Term
| __frames are created for any computer on a network that “__” to a shared network address. |
|
Definition
|
|
Term
| The IEEE standard __covers error control and flow control over data frames. |
|
Definition
|
|
Term
__functions at the application layer of the OSI reference model. __functions at the transport layer of the OSI reference model. |
|
Definition
|
|
Term
| The Ring based technologies as a physical star include __a token ring. |
|
Definition
|
|
Term
| network designs today are based on 3 simple physical topologies because of the______ _______ ______, a method to ensure that all signals stop when they reach the end of a |
|
Definition
|
|
Term
| __ in a cable segment must be terminated to prevent signal bounce. |
|
Definition
|
|
Term
| All computers, no matter what their topology, communicate in the same way, they address data to one or more computera and then transmit that data across the cable in the form of __ __.< |
|
Definition
|
|
Term
| In an active _____ ______, computers and other devices attached to the network regenerate and are responsible for moving data through the network. |
|
Definition
|
|
Term
| The mesh topology formula for determining how many connections are needed for the number of nodes on a network with n representing the number of nodes on the network is:__________ |
|
Definition
|
|
Term
| The majority of hubs installed in networks today are __hubs. |
|
Definition
|
|
Term
| Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be read accurately, this phenomenon is called ________. |
|
Definition
|
|
Term
| Net BEUI is what type of protocol? |
|
Definition
|
|
Term
| SPX is Movell’s ________ _______ protocol used to guarantee data delivery. |
|
Definition
|
|
Term
| __is a connectionless protocol. |
|
Definition
|
|
Term
| __is a connection oriented protocol. |
|
Definition
|
|
Term
| ______is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems. |
|
Definition
|
|
Term
| Class B addresses begin with network ID’s between ___and ___. |
|
Definition
|
|
Term
| Class C networks are limited to ____hosts per network. |
|
Definition
|
|
Term
| Class __addresses are reserved for experimental use and cannot be used for address arrangement. |
|
Definition
|
|
Term
| The default class C subnet mask is ____.____.____.____ |
|
Definition
|
|
Term
Apple talk divides computers into _______. |
|
Definition
|
|