IT 300 CH 6

Ace your homework & exams now with Quizwiz!

what are the three methods for secure communication - bluethooth

1) authentication 2) data encryption 3) generation of session key

Physical Topology

Aligns with the specific LAN standard, the types of network devices available and logical topology of network

what is the mechanism used for 802.11?

CSMA/CA listen to the channel frequency for any traffic prior to sending frames

what is DTE and describe it

Data terminal equipment - end devices liked terminals, computers and servers

Logical Topology

Describes how connected computers are arranged to communicate with one another over the physical topology

IEEE 802.3 what is it?

Ethernet LAN that describes botht the physical layer and data link layer - 1983

An IEEE 802.11 wireless LAN (WLAN) does not share a common medium and therefore data collisions are not possible. This is the reason why CSMA/CD is not used on WLANs.

FALSE

For a local area network (LAN), the physical topology must always be the same as the logical topology.

FALSE

Regarding WLAN security, WEP (wired equivalent privacy) is much better than the older WPA2 (WiFi protected access).

FALSE

The IEEE 802.3 Ethernet standard only describes the Data Link Layer of the OSI Reference Model. Therefore, any physical medium can be used.

FALSE

______________ is the standard for wireless LAN (WLAN ) and uses what?

IEEE 802.11 uses de-centralized distributed coordination function (DCF) tp enable access on shared air space

Ethernet is divided into ________ and ____________ sublayers

LLC (logical link control)-- MAC(medium access control)-- layer 2

define LAN and what it does

Local Area Network comprised of multiple PC's and servers interconnected to one another through guided and unguided medium

What is the MAC layer and what does it do

Medium access control lowermost layer within the OSI model involving either a centralized or distributed control mode

what is P2P

P2P - all computers connect directly to one another in order to share information

A shared IEEE 802.3 Ethernet LAN requires the CSMA/CD protocol to help avoid data collisions; however, data collision can still occur.

TRUE

Data collisions will not occur when implementing full-duplex (FDX) switched Ethernet.

TRUE

For 802.11 WLANs, the four frame exchange protocol is implemented to help avoid the hidden node problem.

TRUE

For 802.3 LANs, a hybrid canceller transceiver device is used which enables full-duplex data communications

TRUE

For WLAN applications, 2.4 GHZ ISM channels overlap, while channels in the 5G ISM range are adjacent to one another.

TRUE

The Bluetooth access code is defined by the master node within a piconet, and is unique to that piconet

TRUE

The use of 4B5B encoding enables 100BaseTx Ethernet LANs to use a simpler form of line coding (i.e., NRZ-Inverted). However, by doing this, a 20% overhead penalty resulting in a reduced data throughput is incurred.

TRUE

ZigBee is an 802.15.4 specification intended to be a less expensive and simpler than Bluetooth WPAN.

TRUE

define WAN and what it does

Wide Area Network Spans greater distances and are commonly used to interconnect LANS together from different geographical locations

define WLAN and what it does

Wireless LAN Allows PC's to wirelessly connect to the network through AP (access points)

define WPAN and what it does

Wireless Personal Area Network Cables connecting peripheral devices (mouse/keyboard)

What does 100BaseT mean? Answers: a. 100 Mbps, baseband, twisted pair b. 100 bps, baseband, twisted pair c. 100 meters, baseband, transmit d. 100 kilometers, baseband, transmit

a. 100 Mbps, baseband, twisted pair

shared Ethernet

all connected devices receive all transmitted data frames regardless of whether they are the intended receipient or not -lot of collision

what is Zig bee

another form of Bluetooth good battery ideal protocol that suppor tht internet of things supporting residential and commercial purposes LOW DATA RATES

Select the correct statement(s) regarding peer-to-peer (P2P) networks. Answers: a. computers on P2P networks have a centralized location for all shared data b. there is a possibility that duplicate data files will exist on a P2P network c. P2P networks always use centralized authentication and access methods d. all are correct statements

b. there is a possibility that duplicate data files will exist on a P2P network

Hub

broadcast device designed with several ports used to connect each computer on the LAN

what is CSMA and what does it do

carrier sense multiple access tell you that all nodes on the LAN have access to the shared medium, and that each node must continuously listen and be aware of any data traffic or collision on the medium

OS

clients that run on a computer

10Base -TX Ethernet LAN

configured in a physical star topology with all computer connected to hub

802.15.1= bluethooth what capabilities does it have

core adopted optional

What is correct regarding 100Base-TX? Answers: a. By using 4B5B coding, only 80% of the logical data sent represents real information (i.e., 20% of the bits are considered overhead) b. Can operate in full or half-duplex modes over two pair or single pair wire respectively. c. Operates over Cat5e UTP which enables a signaling rate of 125 MBaud d. All are correct

d. All are correct

In order to achieve 1Gbps (1GbE) over Cat5e cabling, what needs to be done? Answers: a. Use all four wire pairs in full-duplex b. Apply PAM-5 modulation to achieve N=2 (bits per symbol) c. Use hybrids that enable full-duplex transmission over a single wire pair d. All of the above

d. All of the above

Increasing data capacity (i.e., throughput) on an 802.3 LAN using UTP can be done by: Answers: a. Increasing wire gauge (e.g., go from Cat5e to Cat6 or 7) b. Adopting a line coding technique with a higher "M" c. Enabling both transmit and receive on a single wire pair using magnetic hybrid technology d. All of the above

d. All of the above

What are ways to increase data capacity on an 802.11 WLAN? Answers: a. increase frequency bandwidth b. increase operating frequency c. use M'ary modulation d. All of the above

d. All of the above

Select the correct statement regarding 802.15 Bluetooth Answers: a. FHSS operates at 1600 hops per second over 79 one MHz channels b. Bluetooth is a centralized access model where the master nodes acts as the centralized controller c. FHSS is a spread spectrum technology used in 802.15 WPANs d. All of the above are correct

d. All of the above are correct

Select the correct statement(s) regarding 802.11 WLANs. Answers: a. Operates over unlicensed ISM frequencies b. Implements spread spectrum or OFDM techniques for better noise resistance and spectral efficiency c. Uses CSMA/CA since collisions are always possible d. All of the above are correct

d. All of the above are correct

Select the correct statement(s) regarding the 802.3 MAC layer. Answers: a. The MAC layer resides in the data link layer 2, under the LLC layer b. The MAC layer is where the 48 bit data link address resides c. MAC is responsible for contention-based access (i.e., CSMA/CD or CSMA/CA) d. All of the above are correct

d. All of the above are correct

Select the correct statement(s) regarding 802.15 Bluetooth piconets and scatternets. Answers: a. A device in one piconet cannot participate as a device in another piconet at the same time b. A scatternet is comprised of 8 or more devices c. A bridge device acts to interface the Bluetooth device to a LAN d. Up to eight devices can comprise a piconet

d. Up to eight devices can comprise a piconet

Select the correct statement(s) regarding 802.11 specifications. Answers: a. 802.11 operates on ISM frequencies. Using 5 GHz vice 2.4 GHz frequencies enable higher bit rate capacity. b. MIMO is used in later specifications to help increase bit rate throughput c. M'ary modulation techniques are used to increase bit rate capacity d. all are correct statements

d. all are correct statements

Select the correct statement(s) regarding decentralized (distributed) access control on a LAN. Answers: a. no centralized access process exists, and therefore each connected station has the responsibility for controlling its access b. data collisions are possible, therefore mechanisms such as CDMA/CD are required c. when a data collision occurs, the nearest station detecting the collision transmits a jamming signal d. all of the above are correct

d. all of the above are correct

what is DCE and describe it

data communication equipment describes the network equipment such as modems

what is LLC sub layer

data link and network layer responsible for interface between MAC and statndard such as IP, IPX, ARP prepares packets for framing MAC layer connection or connectionless

what is L2CAP

data link control protocol enables 3 types of logical connections: connectionless- simplex channel from master to slave nodes conecction oriented - FDX services are established between master and slave nodes signaling - singalling messages between L2CAP device

what is MAC sub-layer

data link layer- works closely with physical layer responsible for generation of preamable and creation of Ethernet data frame which encapsulates data delivered from the detection field for frame 48 bit

what is 10Base 2/ 10Base5

describes certain physical characteristics of coaxial cable

NOS (network operating system)

designed specifically to operate in the clien server envionrment

switched Ethernet

devices are connected to the switch through dedicated full duplex links-- meaning no toehr device shares physical link (different paths)

describe IEEE 802.3 TODAY

emerged as the LAN standard of choice upgraded 10GBase-T- over twisted pair guided medium

what is baseband layer

formation of piconets and scatternets.

what are the 2 handshaking protocols used with CA?

frame exchange protocol RTS (request to send)

DTEandDCEareaconventionsthathelp

identify physical layer communication characterisitics between device in a network

difference between jamming and wait

jamming - informs other nodes they must cease all transmission wait - period before being allowed to transmit data

what is LMP

link manager protocol link set up and management between master ans slave nodes within the piconet includes qos.

what is distributed access control approach?

no centralized process. each node on the LAN is responsible for determining if it can access the shared medium. data collisions can occur

What is Token Ring (IEEE 802.5)

passing of tokens from one computer to the next in circular round robin fashion

networks can have ______ and _______ configurations that differ

physical logical

LAN is configured as a _________ star but operates as a ___________ bus

physical star logical bus

what is client server

provide highly capable network computers that provide centralized services and data storage easily assed by user computers (clients)

what is radio layer

responsible for establishing phywidql link within piconet. identifies transmission power, frequency , modulation and hopping sequence

centralized control leads to deterministic access which means?

the node in the possession of the token has sole access to the medium without fear of interferences from other nodes

Centralized access control approaches can involve...

the passing of a token or the use of polling by a master controller that grants transmits access to individual nodes on the network

WHat is thicknet vs thinet/cheapernet

thickent - thickness of coaxial cable thinnet - thinner coaxial cable that reduced the maximum LAN cable length

cross over cable

used to connect devices (DTE interface to another DTE interface) or DCE interface connections

what is frame exchange protocol?

when the transmistting node sends a data frame to the intended receiver and the receiver sends back and acknowledgement (ACK)

what is the four frame exchange?

where transmitter sends a RTS (request to send) frame to the receiver the receiever respondes with a CTS (clear to send) and upon receipt, the transmitter begins sending data.

IEEE 802.15.4 is considered what

zig bee


Related study sets

R4:M8: Entity / Owners Transactions.

View Set

Classify as: direct materials, direct labor, or manufacturing overhead

View Set

109- TEST 2- Acute and Chronic respiratory

View Set

Mr. McGlynn's History - Unit one Roanoke Vocabulary

View Set

Postpartum Depression & Baby Blues

View Set