Home > Flashcards > Print Preview
The flashcards below were created by user
on FreezingBlue Flashcards
. What would you like to do?
a temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache, the processes can access the cached copy instead of accessing the original data. A cache reduces the average access time and reduces the overhead of recalculating the data.
a signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.
carrier sense multiple access (CSMA)
media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed, the node waits for the transmission in progress to finish before initiating its own transmission.
carrier sense multiple access collision detect (CSMA/CD)
The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed, the node waits for transmission in progress to finish before initiating its own transmission. If a collision occurs and is detected, the sending node uses the backoff algorithm before retransmitting.
a communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
channel service unit/data service unit
a device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device, typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
a unicast IP address that is considered to have three parts: a network part, a subnet part, and a host part. The term classful refers to the fact that classful network rules are first applied to the address, and then the rest of the address can be separated into a subnet and a host part to perform subnetting. In the early days of IPV4, IP addresses were divided into five classes, namely A, B, C, D and E.
an IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in current network implementations.
a network device that accesses a service on another computer remotely by accessing the network.
In networking, a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.
a grouping of code that meets a certain, already specified, condition for entering in that certain group.
Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
In ethernet, the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media
a physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain, if a device sends a frame on a network segment, every other device on that same segment will receive that frame. In an ethernet network, repeaters and hubs increase the size of collision domains by propagating the signals. LAN switches and bridges separate collision domains.
communication where the sender and receiver must prearrange for communications to occur; otherwise, the communication fails.
any communication in which the sender and receiver do not prearrange for communications to occur
a port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device
data that directs a process. a flag in a data-link frame is an example of control data.
another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice, video and data on the same network infrastructure. A more common usage represents the process by which routers recognize that something has occured that changes some routers' routes, reacts to the event and finds the now-currently best routes.
cyclic redundancy check
a type of hash function that is used to produce a small, fixed size checksum of a block of data, such as a packet or a computer file. A CRC is computed and appended before transmission or storage, and verified afterward by the recipient to confirm that no changes have happened in transit.
What would you like to do?
Home > Flashcards > Print Preview