Introduction to Networks 6.0 Chapter 4Name Click here to enter text.

Network Access

4.1.1.2

Click here to enter text.connect a device to a network.

A wireless device will experience degradation in performance based on its Click here to enter text.from a wireless access point.

4.1.2.1

The OSI physical layer provides the means to transport the Click here to enter text.that make up a data link layer frame across the network media.

The process that data undergoes from a source node to a destination node is:

  • The user data is Click here to enter text. by the transport layer, placed into Click here to enter text.by the network layer, and further encapsulated into Click here to enter text.by the data link layer.
  • The physical layer encodes the frames and creates the electrical, optical, or radio wave signals that represent the Click here to enter text.in each frame.
  • These signals are then sent on the Click here to enter text., one at a time.
  • The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete Click here to enter text..

4.1.2.2

What are the signals for each of the following:

  • Copper Cable Click here to enter text.
  • Fiber-optic Cable - Click here to enter text.
  • Wireless - Click here to enter text.

4.1.2.3

The protocols and operations of the upper OSI layers are performed in Click here to enter text.

The physical layer consists ofClick here to enter text.,Click here to enter text. , andClick here to enter text. developed by engineers.

4.1.3.1

Give 3 examples of Physical Components. Click here to enter text.

What is encoding? Click here to enter text.

What is signaling? Click here to enter text.

4.1.3.2

Click here to enter text. is the capacity of a medium to carry data and is measured in Click here to enter text.

What factors determine the bandwidth?

  • Click here to enter text.
  • Click here to enter text.

4.1.3.3

Click here to enter text.is the measure of the transfer of bits across the media over a given period of time.

What factors affect throughput?

  • Click here to enter text.
  • Click here to enter text.

What is latency?Click here to enter text.

What is goodput? Click here to enter text.

4.1.3.4

Standards for copper media are defined for the:

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

4.2.1.1

Why do some networks use copper cabling? Click here to enter text.

Copper cabling is limited by Click here to enter text.

What happens to the electrical pulses as they travel to greater distances? Click here to enter text.

How are negative effects of EMI and RMI reduced? Click here to enter text.

How are negative effects of crosstalk reduced? Click here to enter text.

Electronic noise can be limited by:

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

4.2.1.2

What are the 3 main types of copper cabling?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

TheClick here to enter text. is widely used in LANs with one type of media and in some WANs with another media type.

4.2.1.3

Unshielded-twisted-pair is the most common type of cabling and is terminated with aClick here to enter text.

Unshielded-twisted-pair is used for interconnecting network hosts to Click here to enter text.

Why are the wires in UTP cable twisted? Click here to enter text.

4.2.1.4

Shielded twisted-pair (STP) provides better Click here to enter text.than UTP cabling.

What are some reasons not to use STP? Click here to enter text.

4.2.1.5

What are the two main uses of coaxial cable?Click here to enter text.

4.2.1.6

What types of hazards can exist with copper cabling? Click here to enter text.

4.2.2.1

What is inside UTP copper cabling? Click here to enter text.

What is cancellation? Click here to enter text.

How does UTP cabling create cancellation? Click here to enter text.

4.2.2.2

UTP cabling conforms to the standards established jointly by the Click here to enter text..

Cables in higher categories are designed and constructed to support Click here to enter text.

4.2.2.3

Why is it important to have a UTP cable terminated properly? Click here to enter text.

4.2.2.4

What is the common use for Ethernet Straight-Through cable? Click here to enter text.

What is the common use for Ethernet Crossover cable? Click here to enter text.

What is a rollover cable used for? Click here to enter text.

4.2.2.5

UTP cables should be tested for:

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

4.2.2.6

Do the activity.

4.2.3.1

Fiber-optic cable can transmit signals with Click here to enter text.and is completely immune to Click here to enter text..

Fiber-optic cabling is now being used in four types of industry:

  • Enterprise Networks: Click here to enter text.
  • Fiber-to-the-Home (FTTH): Click here to enter text.
  • Long-Haul Networks: Click here to enter text.
  • Submarine Cable Networks: Click here to enter text.

4.2.3.2

How is fiber made stronger? Click here to enter text.

4.2.3.3

What type of fiber cable Uses LEDs? Click here to enter text.

What type of fiber has a small core? Click here to enter text.

What type of fiber has less dispersion? Click here to enter text.

What type of fiber is used with LANs or distances of a couple of hundred meters? Click here to enter text.

What type of fiber uses lasers? Click here to enter text.

What is dispersion? Click here to enter text.

4.2.3.4

Why are two fibers required for full duplex? Click here to enter text.

What is a duplex connector used for? Click here to enter text.

Orange cable is Click here to enter text. and yellow cable is Click here to enter text. .

4.2.3.5

What are 3 types of fiber termination errors?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

4.2.3.6

Why is fiber immune to electromagnetic interference? Click here to enter text.

4.2.4.1

What are areas of concern about wireless technology?

  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.
  • Click here to enter text.

4.2.4.3

What device concentrates the wireless signals and connects to existing copper based cabling? Click here to enter text.

Why do network administrators need to develop and apply security policies and processes? Click here to enter text.

4.3.1.1

The Data Link layer is responsible for:

  • Allowing the upper layers to access the Click here to enter text.
  • Accepting Layer 3 packets and packaging them into Click here to enter text.
  • Preparing network data for the Click here to enter text.
  • Controlling how data is placed and received on the Click here to enter text.
  • Exchanging frames between Click here to enter text. over a physical network media, such as UTP or fiber-optic
  • Receiving and directing Click here to enter text. to an upper layer protocol
  • Performing Click here to enter text.

4.3.1.2

Briefly describe the two layers of the data link layer.

Logical Link Control Click here to enter text.

Media access control Click here to enter text.

4.3.1.3

The technique used for getting the frame on and off the media is called the Click here to enter text.

4.3.1.4

At each hop along the path, a router:

  • Accepts a Click here to enter text. from a medium
  • Click here to enter text.the frame
  • Click here to enter text.the packet into a new frame
  • Click here to enter text. the new frame appropriate to the medium of that segment of the physical network

4.4.1.1

Regulating the placement of data frames onto the media is controlled by the Click here to enter text.

Media access control techniques define if and how the nodes share the Click here to enter text..

The actual media access control method used depends on:

  • Click here to enter text. - How the connection between the nodes appears to the data link layer.
  • Click here to enter text. - How the nodes share the media. The media sharing can be point-to-point, such as in WAN connections, or shared such as in LAN networks.

4.4.1.2

The Click here to enter text. is the physical connections identifying how end devices are interconnected.

The Logical Topology refers to the way a network transfers Click here to enter text.from one node to the next.

The data link layer "sees" theClick here to enter text. of a network when controlling data access to the media.

4.4.2.1

A permanent link between two nodes is called a Click here to enter text.

The star topology is sometimes called the Click here to enter text.

The Click here to enter text.requires that every end system be interconnected to every other system.

A Click here to enter text.is a variation or combination of any of the above topologies.

4.4.2.2

Why is physical point-to-point topology the simplest? Click here to enter text.

4.4.2.3

What is the difference between the physical point-to-point and the logical point-to-point? Click here to enter text.

The logical point-to-point uses a Click here to enter text. to form the connection.

4.4.3.1

Study the different topologies.

4.4.3.2

What is half duplex? Click here to enter text.

What is full duplex? Click here to enter text.

Two interfaces must use the Click here to enter text. .

4.4.3.3

Contention-based access is all nodes competing for the use of the medium? Why? Click here to enter text.

Why is controlled-access inefficient? Click here to enter text.

4.4.3.4

Briefly describe Contention-Based-Access. Click here to enter text.

4.4.3.5

What is the difference between CSMA/CD and CSMA/CA?Click here to enter text.

4.4.4.1

What are the 3 basic parts of a frame?Click here to enter text.

4.4.4.2

What is the CRC and where is it placed in a frame? Click here to enter text.

4.4.4.4

Each data link frame contains the Click here to enter text.data link address of the NIC card sending the frame, and the Click here to enter text.data link address of the NIC card receiving the frame.

The physical address or MAC address isClick here to enter text.to a specific device and does not change.

4.4.4.5

High bandwidth is cost effective for Click here to enter text.

Low bandwidth is used for Click here to enter text.

The difference in bandwidth normally results in the use of different Click here to enter text.for LANs and WANs.