Key Terms Chapter 2 LAN
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | The IEEE standard for error and flow control in data frames.
🗑
|
||||
show | The IEEE standard for Ethernet.
🗑
|
||||
802.5 | show 🗑
|
||||
show | The IEEE standard for wireless networking.
🗑
|
||||
802.16 | show 🗑
|
||||
ACK (acknowledgment) | show 🗑
|
||||
show | An organization composed of more than 1000 representatives from industry and government who together determine standards for the electronics industry
🗑
|
||||
API (application program interface) | show 🗑
|
||||
Application layer | show 🗑
|
||||
show | The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.
🗑
|
||||
show | A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.
🗑
|
||||
show | A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.
🗑
|
||||
show | A type of Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data.
🗑
|
||||
show | An algorithm (or mathematical routine) used to verify the accuracy of data contained in a data frame.
🗑
|
||||
show | The second layer in the OSI model. The Data Link layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.
🗑
|
||||
device ID | show 🗑
|
||||
EIA (Electronic Industries Alliance) | show 🗑
|
||||
encapsulate | show 🗑
|
||||
Ethernet | show 🗑
|
||||
show | The field in a frame responsible for ensuring that data carried by the frame arrives intact. It uses an algorithm, such as CRC, to accomplish this verification.
🗑
|
||||
flow control | show 🗑
|
||||
show | A Network layer service that subdivides segments it receives from the Transport layer into smaller packets.
🗑
|
||||
show | A package for data that includes not only the raw data, or “payload,” but also the sender’s and recipient’s addressing and control information. Frames are generated at the Data Link layer of the OSI model
🗑
|
||||
show | An Application layer protocol that formulates and interprets requests between Web clients and servers.
🗑
|
||||
show | A technical advisory group of researchers and technical professionals responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight.
🗑
|
||||
IANA (Internet Assigned Numbers Authority) | show 🗑
|
||||
ICANN (Internet Corporation for Assigned Names and Numbers) | show 🗑
|
||||
IEEE (Institute of Electrical and Electronics Engineers) | show 🗑
|
||||
show | An organization that sets standards for how systems communicate over the Internet (for example, how protocols operate and interact).
🗑
|
||||
IP (Internet Protocol) | show 🗑
|
||||
IP address (Internet Protocol address) | show 🗑
|
||||
ISO (International Organization for Standardization) | show 🗑
|
||||
ISOC (Internet Society) | show 🗑
|
||||
show | A business that provides organizations and individuals with Internet access and often, other services, such as e-mail and Web hosting.
🗑
|
||||
ITU (International Telecommunication Union) | show 🗑
|
||||
LLC (Logical Link Control) sublayer | show 🗑
|
||||
show | A 12-character string that uniquely identifies a network node. The manufacturer hard codes the MAC address into the NIC. This address is composed of the block ID and device ID.
🗑
|
||||
MAC (Media Access Control) sublayer | show 🗑
|
||||
show | The largest data unit a network (for example, Ethernet or token ring) will accept for transmission.
🗑
|
||||
show | A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Added to data packets and interpreted by protocols at the Network layer of the OSI model.
🗑
|
||||
show | The third layer in the OSI model. Protocols in the Network layer translate network addresses into their physical counter Internet Protocol See IP.
🗑
|
||||
IP (Internet Protocol) | show 🗑
|
||||
show | The Network layer address assigned to nodes to uniquely identify them on a TCP/IP network. IP addresses consist of 32 bits divided into four octets, or bytes.
🗑
|
||||
show | A collection of standards organizations representing 157 countries with headquarters located in Geneva, Switzerland. Its goal is to establish international technological standards to facilitate the global exchange of information and barrier-free trade.
🗑
|
||||
show | A professional organization with members from 90 chapters around the world that helps to establish technical standards for the Internet.
🗑
|
||||
show | A business that provides organizations and individuals with Internet access and often, other services, such as e-mail and Web hosting.
🗑
|
||||
ITU (International Telecommunication Union) | show 🗑
|
||||
LLC (Logical Link Control) sublayer | show 🗑
|
||||
MAC address - | show 🗑
|
||||
show | The lower sublayer of the Data Link layer. The MAC appends the physical address of the destination computer onto the frame.
🗑
|
||||
MTU (maximum transmission unit) | show 🗑
|
||||
show | A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Added to data packets and interpreted by protocols at the Network layer of the OSI model.
🗑
|
||||
Network layer | show 🗑
|
||||
OSI (Open Systems Interconnection) model | show 🗑
|
||||
show | A unit of data at any layer of the OSI model.
🗑
|
||||
Physical layer | show 🗑
|
||||
show | The sixth layer of the OSI model. Protocols in the Presentation layer translate between the application and the network. The Presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.
🗑
|
||||
show | The process of reconstructing data units that have been segmented.
🗑
|
||||
show | A not-for-profit agency that manages the distribution of IP addresses to private and public entities.
🗑
|
||||
show | To intelligently direct data between networks based on addressing, patterns of usage, and availability of network segments.
🗑
|
||||
router | show 🗑
|
||||
show | A unit of data that results from subdividing a larger protocol data unit.
🗑
|
||||
show | The process of decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle only smaller data units.
🗑
|
||||
sequencing | show 🗑
|
||||
show | A connection for data exchange between two parties. The term session may be used in the context of Web, remote access, or terminal and mainframe communications, for example.
🗑
|
||||
Session layer | show 🗑
|
||||
show | A documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their intended purpose.
🗑
|
||||
SYN (synchronization) | show 🗑
|
||||
show | The packet a node sends to acknowledge to another node that it has received a SYN request for connection. The SYN-ACK packet is the second of three in the three-step process of establishing a connection.
🗑
|
||||
show | A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with applications and data-processing services.
🗑
|
||||
TIA (Telecommunications Industry Association) | show 🗑
|
||||
token | show 🗑
|
||||
show | A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data.
🗑
|
||||
Transport layer | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Leisac
Popular Computers sets