Chapter 2, Network Hardware Chapter 2, Lesson 1 Network Cables |2| |3|
1.
Cable Topologies A.
Bus topology 1. Uses coaxial cable 2. Used by thick and thin _________ networks 3. The nodes are connected in ________. 4. A bus network must be _____________ at both ends. 5. The signals transmitted by a computer travel in both directions. 6. Cable faults affect the __________ network. a. b.
|4|
B.
Star topology 1. _________ common topology used in LANs today a.
|5|
C.
Used primarily with Ethernet
2. Uses various cable types, especially unshielded twisted pair (UTP) 3. Requires a ______ (or concentrator) 4. Computers are connected to the _________, not to each other. 5. Cable faults affect only _____ computer. 6. The hub is a central point of ________, but hub faults are rare. Ring topology 1. A ring network is like a ____ network with the two ends connected. 2. Used primarily by Token Ring and Fiber Distributed Data Interface (FDDI) protocols 3. Most (but not all) ring networks are ________ rings. a.
4. |6|
A cable fault breaks the network in two, preventing signals from passing from one segment to the other. The lack of termination on the broken ends further degrades performance.
5. 6. 7. 8.
The physical network takes the form of a star.
Most ring networks use the token passing Media Access Control (MAC) mechanism. In a physical ring, a cable fault affects the _______ network. A logical ring is physically cabled as a star and has the fault tolerance of a star network. FDDI can use a ___________ ring topology or a double ring topology. Double ring topology a. b. c.
Consists of two separate rings, with traffic flowing in ____________ directions Requires a computer to have a network interface with two jacks If a cable __________, traffic is shunted to the other ring.
D.
|7|
E. |8|
Hierarchical star topology 1. Also known as a branching tree network 2. Expands a star network beyond a _________ hub Mesh topology 1. Mesh LANs a. b.
2.
|9|
Mesh internetworks a. b.
F.
|10|
b.
|11|
A.
Coaxial cable 1. Consists of two conductors separated by ___________:
2. 3. 4.
|12|
5.
_______ Ethernet 0.405 inch thick Uses N connectors The sheath is often yellow (“frozen yellow garden hose”). Uses a separate Attachment Unit Interface (AUI) cable to connect the ___________ to the RG-8 cable
RG-58 type a. b. c.
B.
A central core that carries the signals A copper _______ that surrounds the central core and functions as a ground
Used on LANs only for thick and thin ____________ Obsolete on LANs today RG-8 type a. b. c. d. e.
2
Ad hoc topology. Connects two or more wireless computers communicating only with each other Infrastructure network. Connects wireless computers communicating with a wireless interface device called a network access point (1) The network access point provides access to a standard cabled network.
Cable Types
a. b.
|13|
In a mesh internetwork, there are multiple ___________ to a destination. Mesh internetworks use redundant routers to provide fault tolerance.
Wireless topologies 1. Wireless LANs have two basic topologies: ad hoc and infrastructure. a.
2.
Mesh LANs are generally theoretical; _______ do not actually use them. In a mes h LAN, every computer is ____________ connected to every other computer.
________ Ethernet 0.195 inch thick Uses bayonet-Neill-Concelman (______) connectors with a T fitting, which plug into the computer
Twisted-pair cable 1. UTP cable contains _______ separate insulated wires twisted into four pairs. Outline, Chapter 2 Network+ Certification, Second Edition
a.
2. 3. 4.
Twisted-pair cables are traditionally wired straight through; all circuit crossovers are performed in the ______. _____________ cables are available for special applications (such as hubless, two-node networks). Individual wires can be solid or stranded. a. b.
5. 6.
|14|
C.
Contains ____ pairs of wires Each pair is individually shielded. Originally used on IBM _______ _______ networks ________ used today Type 1A cables are used for longer runs. Type 6A cables are used for shorter patch cables. Uses IBM data connectors (IDCs) Used in environments vulnerable to electromagnetic interference
Fiber optic cable 1. Uses glass or _________ filaments 2. The signals are pulses of ______, not electrical charges as with copperbased cables. 3. Used for FDDI, fiber optic Ethernet, and many types of wide area network (WAN) technologies 4. Offers several advantages: a. b. c.
5. |16|
Most __________ cable type for LANs Classified in _____ categories by the Electronics Industry Association/Telecommunications Industry Association (EIA/TIA) (1) Most UTP networks installed today use Category __ cable. (2) Some legacy networks use Category __, the standard grade for voice telephone cabling.
Shielded twisted-pair (STP) cable a. b. c. d. e. f. g. h.
|15|
Solid wires are stiffer but carry signals better and are used for _________ runs. Stranded wires are more flexible and are used for shorter runs.
Uses ________ connectors Unshielded twisted-pair (UTP) cable a. b.
7.
Each pair is twisted at a different rate, to prevent _____________ and outside interference.
6. 7.
Impervious to _____________________ _____________ More resistant to _______________ than copper is More secure than copper cable
Contains a single conductor surrounded by reflective cladding and a protective sheath Typically uses straight tip (ST) or subscriber connector (SC) connectors The cable size is referenced by the diameter of the core followed by the diameter of the cladding, measured in __________. a.
Example: 62.5/125
Outline, Chapter 2 Network+ Certification, Second Edition
3
8.
|17|
There are two primary types of fiber optic cable: ________________ and _________________. a.
b.
Singlemode fiber optic (1) Typical size: 8.3/125 (2) More expensive than multimode (3) Uses a single-wavelength __________ light source (4) Used for ________-distance cable runs (5) Generally used for WANs Multimode fiber optic (1) Typical size: 62.5/125 (2) Less ____________ than singlemode (3) Uses a light-emitting diode (____) light source (4) Cannot span distances as long as singlemode fiber optic cable can (5) Used mostly in ________ installations
Chapter 2, Lesson 2 Network Interface Adapters |18|
1.
Understanding Network Interface Adapter Functions A. B. C.
|19|
D. E.
|20|
F.
4
A network interface adapter is known as a ______ when it is installed in an expansion slot. Provides the computer with an interface to the _____________ Usually takes the form of an ___________ card that plugs into one of the following: 1. Peripheral Component Interconnect (PCI) bus 2. Industry Standard Architecture (ISA) bus 3. PC Card bus Can be _____________ into the motherboard Functions 1. Data-link layer protocol implementation (with a network adapter ______) 2. Data encapsulation 3. Signal encoding and decoding 4. Data transmission and reception 5. Data buffering 6. Serial/parallel conversion 7. Media Access Control (MAC) What to check for when purchasing a NIC 1. Does the NIC use the correct data-link layer protocol? 2. Does the NIC use the correct bus type? 3. Does the NIC have the correct network cable ______________?
Outline, Chapter 2 Network+ Certification, Second Edition
2.
Installing a NIC A.
|21|
3.
Configuring a NIC A. B.
|22|
C.
4.
5.
NICs need access to hardware resources in order to communicate with the computer. NICs use the following hardware ___________: 1. Interrupt request (IRQ) 2. Input/output (I/O) port address 3. Memory address 4. Direct memory access (DMA) channel Most NICs require only an IRQ and an _____ port address.
Installing Network Adapter Drivers A. B.
|23|
To install a NIC into a standard expansion slot on a desktop computer: 1. Power off the computer. 2. Open the computer case. 3. Locate a free slot. 4. Remove the slot cover. 5. Insert the card into the slot. 6. Secure the card in the slot. 7. Close the computer case.
Every network interface adapter requires a ________. Network adapter drivers must be configured to use the same hardware resources as the adapter itself.
Troubleshooting a Network Interface Adapter A. B.
C.
D.
A network interface adapter rarely malfunctions. Before checking the network interface adapter, check the following for problems: 1. Check the adapter’s _____________ to the computer and the network. 2. Check the driver. 3. Check the configuration of the computer’s other networking components. 4. Check the network _______ by swapping it with one that you know is functional. NIC manufacturers sometimes provide a diagnostic program. 1. If the dia gnostic program finds a problem with the card, open the computer and examine the NIC. 2. Ensure that the NIC is fully __________ in the slot. Replace faulty NICs rather than trying to repair them.
Outline, Chapter 2 Network+ Certification, Second Edition
5
Chapter 2, Lesson 3 Network Hubs |24|
1.
Understanding Ethernet Hubs A.
B.
C.
A hub is a device used to ___________ all of the computers on a star or ring network. 1. Also called a concentrator or a multiport ___________ 2. Usually a _____________-layer device Available in various sizes 1. The number of _______ varies from 4 to 24 or more. 2. Some hubs are small, inexpensive, standalone devices intended for home or small business networks. 3. Larger hubs can be stacked together or mounted in a _________. The hub creates a shared network medium on a LAN. 1. Functions as a repeater: a device that _____________ signals to counteract the effects of attenuation 2. When signals enter any of the hub’s ports, the hub amplifies them and transmits them through ______ of the other ports. 3. Hub ports have a crossover circuit that routes the transmit signals generated by one computer to the receive inputs of the others. 4. Ethernet hubs are in most cases purely electrical devices that work with signals at their most __________ level. a.
D.
Smart hubs (also known as intelligent hubs) have greater data processing capabilities, including the following services: 1. Store and forward a. b.
2.
b.
E.
Uses Simple Network Management Protocol (SNMP) to transmit periodic reports to a network management console Allows you to monitor the operation of each port
Connecting Ethernet hubs 1. Most hubs have an _________ port (an extra port used to connect to other ________). a. b.
2.
6
The hub contains buffers used to store packets temporarily before it retransmits stored packets out through specific ports. Function approaches that of a switch (as covered in Chapter 3, “Network Connections”)
Managed hub a.
|25|
The hub does _______ read the contents of data packets or even recognize them as data packets.
The uplink port provides a __________-through circuit, while the other ports all have crossovers. The uplink port can sometimes be switched to a ____________ port.
To connect two hubs, you plug a cable into the uplink port on one hub and into a ___________ port on the other hub.
Outline, Chapter 2 Network+ Certification, Second Edition
|26|
2.
Understanding Token Ring MAUs A. B. C. D.
E.
|27|
A multistation access unit is called a MAU (or MSAU). Similar in appearance to an Ethernet hub, but very different in __________ MAUs are _______ repeaters. MAU functions 1. MAUs receive signals through one port and transmit them out through the ________ port in line. 2. ____________ connected to a MAU are responsible for transmitting all signals they receive from the MAU back to the MAU. 3. By sending signals to and receiving them back from each connected computer in turn, the MAU implements the logical ring topology. Each port on a MAU must be initialized to add the connected computer to the ring network.
Chapter Summary A. B. C. D. E. F.
The network topology is the pattern used to connect computers and other devices with the cable or other network medium. The three primary LAN topologies are bus, star, and ring. UTP cable in the star topology is the most common network medium used today. A network interface adapter provides the interface that enables a computer to connect to a network. The network interface adapter and its driver implement the data-link layer protocol on the computer. Hubs are devices that connect computers on a star or ring network.
Outline, Chapter 2 Network+ Certification, Second Edition
7