Tutorial 2 - Week 2 Network Hardware Essentials: Review Questions 1. Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (Choose all that apply.) a. Total number of computers that could be connected b. The processing speed of the computers connected c. Cable length d. No Internet access 2. Which of the following is true of a repeater? a. Receives frames and forwards them b. Determines which network to send a packet
Words: 1327 - Pages: 6
3.2. Network topology 3.2.1. Network topology in general There are many network topologies which are point to point which is stranded lan between 2 or more pcs using cat 5 or 6 cables to connect them. Bus used coax and connected a series of computers on a shared line but if devise fails they all fail also this topology is no longer used since the introduction of Cat 5 and higher cables. There is ring topology where computers are connected to each other and a virtual token is used to allow pcs to
Words: 1228 - Pages: 5
Amor, John Anthony Y. Mr. Lopez BSIT-1A CRITIQUE PAPER Transmission Media is the physical path between transmitter and receiver. The transmission media that are used to convey information can be classified as guided or unguided. Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable, and optical fiber. Unguided media employ an antenna for transmitting
Words: 679 - Pages: 3
Participation Chapter 3: Network Topology and Technologies Name: John Lacsamana Date: 9/16/2015 Note: You can work in groups but each student must submit his/her own answers. You can submit it via Canvas or give the hard copy to the instructor by the due date. 1. Is it important that Industrial Technology students have a working knowledge of network topology and technologies? Why? Students should be able to know how network topologies work, how to set them up, and when
Words: 648 - Pages: 3
|Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic
Words: 2355 - Pages: 10
larger area A centralised WAN consist of a central computer to which other computers. Basically WAN is the combination of different LAN’s. E.g.: internet. Figure (c) Wide Area Network (Advance IT, 2009) Local Area Network Local Area Network (LAN) is limited to a specific area, like an office, an organisation, a school or a college but we can’t access the internet outside the building means it works within a specific area. If any
Words: 12246 - Pages: 49
An automatic fire alarm system is an active fire protection system designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion. In general, a fire alarm system is either classified as automatic, manually activated, or both. The basic modern system consists of a dependable primary power supply, a secondary or backup power supply, any number of "initiating devices" and "notification appliances." Automatic fire alarm systems can be used to notify people
Words: 14033 - Pages: 57
Chapter 7 The Data Link Layer It is the role of the OSI Data Link layer to prepare Network layer packets for transmission and to control access to the physical media. Frame. A PDU at the Data Link layer is called a frame. Node. A node is a device n a network. Media. The media are the physical means used to carry data signals. Network. A network is two or more devices connected to a common medium. The Data Link later performs two basic services: * Allows the upper
Words: 1955 - Pages: 8
Computer network components consist of 2 parts - the items that are to be connected and the equipment that connects them The equipment to be networked are those components that you want to be able to communicate with each other or hardware that you want to share A network is defined as a group of interconnected computers but it really is more than that. The connected computers communicate with each other and share resources on the network. Common resources include printers, disk storage, databases
Words: 1558 - Pages: 7
Lesson 4 Review: LAN Topologies The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. What are the two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously? (Min. word count: 15) Carrier sense multiple access methods are detection where a transmission is cancel when collision is detected and avoidance where transmission is delayed. Which topology would you use when unable
Words: 454 - Pages: 2