The Bits and Bytes of Computer Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements accurately describe the differences between a hub and a switch?

A hub is a physical layer device that causes larger collision domains. A switch is a data link layer device that remembers which device is connected on each interface

What might a typical routing table contain?

A routing table entry needs to know how many hops away a destination network is. A routing table entry has to be tied to a specific destination network.

How many octets are there in a MAC address?

A MAC address is a 48-bit number consisting of 6 octets.

What's the difference between a client and a server?

A client requests data, a server responds to that request

What's a router?

A router connects independent networks by forwarding data between them.

What device forwards data and operates at layer three of the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

A router is a device that knows how to forward data between independent networks and operates at layer three.

What happens to the TTL field of an IP datagram every time it reaches a router?

At every router hop, the TTL field is decremented by one until it reaches zero, causing the datagram to be discarded.

The transmission method that sends data to every device on a LAN is known as a _____ transmission.

Broadcast transmissions are used to communicate with every node on a network segment.

When an electrical pulse on one wire is accidentally detected on another nearby wire, this is known as _____.

Crosstalk is reduced by the way that wires are twisted inside of a cable.

When data can flow across a cable in both directions, this is known as _____ communication.

Duplex communication occurs when data flows in both directions.

Which of the following is an example of a network layer (layer 3) protocol?

IP, or Internet Protocol, is the most common network layer protocol.

What does LAN stand for?

LAN stands for Local Area Network.

What process sends ones and zeroes across network cables?

Ones and zeroes are sent across network cables through a process called modulation.

A defined set of standards that computers must follow in order to communicate properly is known as a _____.

Protocols help define standards so that different computers can communicate with each other.

What are examples of routing protocols.

Routing Information and Border Gateway Protocol

What address is used for Ethernet broadcasts?

The address FF:FF:FF:FF:FF:FF is used for Ethernet broadcast traffic.

What immediately follows the Start Frame Delimiter in an ethernet frame?

The destination MAC address immediately follows the Start Frame Delimiter.

What is the fifth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

The fifth layer of the TCP/IP model is the application layer. The application layer focuses on application specific protocols.

You need to identify the manufacturer of a network interface. Where will you look for this information?

The first three octets of a MAC address are known as the Organizationally Unique Identifier (OUI). These are assigned to individual hardware manufacturers.

Which of the following are examples of layers of our five-layer network model?

Transport layer, application layer, physical layer

What is a cyclical redundancy check?

A cyclical redundancy check ensures that there was no data corruption.

Something that requests data from a server is known as a ____

A client requests data, and a server responds to that request.

Multiple systems try to send data at the same time. The electrical pulses sent across the cable interfere with each other. What type of network segment is being used?

A collision domain is a network segment where only one device can communicate at a time.

What's the difference between full and half duplex?

A half duplex connection allows communication in both directions, but only one side can communicate at a time.

How many octets does a subnet mask have?

A subnet mask is the same length as an IP address.

Select the device that will have the most network ports

A switch will have the most network ports, because its purpose is to connect many devices.

Who is permitted to use non-routable address space?

Anyone can use non-routable address space.

What is a correct form of CIDR notation?

CIDR notation uses a forward slash and then lists the numbers of bits in the subnet mask.

What does CIDR stand for?

CIDR stands for Classless Inter-Domain Routing.

What type of cable communicates binary data by changing the voltage between two ranges?

Copper cables communicate binary data across wires by changing the voltage between two ranges.

What is the type of modulation used by twisted pair cable computer networks known as?

Line coding is the modulation of an electrical charge so that each side of a connection knows what is a one and what is a zero.

Which section in an ethernet frame contains the data from higher layers, such as Internet Protocol (IP) and the transport and application layers?

The payload contains all of the data from higher layers, such as the IP, transport, and application layers, that's actually being transmitted.


Set pelajaran terkait

Topic 3 Review: Challenges in the Late 1800s:)

View Set

Exam 1 Objectives - Cellular Physiology

View Set

2016 CommTech Jeopardy Study Guide

View Set

Retailing Chapter 5 Managing the Supply Chain

View Set