• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
The access control byte contains the priority and reservation field, and a token and monitor bit.
True or False:
A monitor bit determines whether a frame is continuously circling the ring.
True
The access control byte contains the priority and reservation field, and a token and monitor bit.
True or False:
The end delimiter distinguishes a token from a data/command frame.
FALSE
The token bit distinguishes a token from a data/command frame.
Which are true about command frames
>Vary in size depending on the size of the information field.
>Contain control information and have no data for upper layer protocols
>Covered by IEEE 802.5
>Contain control information and have no data for upper layer protocols
>Covered by IEEE 802.5
Which words describe a deterministic network
>Predictable
>Robust
>Ideal for a factory automation environment
>All of the above
>All of the above
The access control byte contains the priority and reservation field, and a token and monitor bit.
True or False:
The end delimiter signals the end of the token or data/command frame.
TRUE
The end delimiter signals the end of the token or data/command frame.
TRUE OR FALSE:
It contains bits that indicate a damaged frame, and a frame that is the last of a logical sequence.
TRUE
In token ring what is the byte length of a token
>1
>2
>3
>8
>16
3 bytes
The access control byte contains the priority and reservation field, and a token and monitor bit.
True or False:
The token bit determines whether a frame is continuously circling the ring.
FALSE

A monitor bit determines whether a frame is continuously circling the ring.
The access control byte contains the priority and reservation field, and a token and monitor bit.
True or False:
The token bit distinguishes a token from a data/command frame.
True
Which are true about data frames
>Data/command frames vary in size depending on the size of the information field.
>Contain control information and have no data for upper layer protocols
>Data frames carry information for upper layer protocols.
>three bytes in length
>Data/command frames vary in size depending on the size of the information field.
>Data frames carry information for upper layer protocols.
Tokens contain
>the priority and reservation field, and a token and monitor bit
>a start delimiter, an access control byte, and an end delimiter
>is used to configure the Interior Gateway
>alerts each station to the arrival of a token or data/command frame
>90 seconds
>a start delimiter, an access control byte, and an end delimiter
The access control byte contains the priority and reservation field, and a token and monitor bit.
True or False:
The end delimiter distinguishes a token from a data/command frame.
FALSE
The token bit distinguishes a token from a data/command frame.
TRUE OR FALSE:

Data/command frames are fixed in size.
FALSE.
Data/command frames vary in size depending on the size of the information field.
TRUE OR FALSE:
Command frames carry information for upper layer protocols
FALSE
Command frames contain control information and have no data for upper layer protocols.
Whic standard covers Token Rings
>ISO 1001
>IEEE 802.3
>IEEE 802.5
>None of the above
>IEEE 802.5
Define "deterministic" networks
>a network number which the router is attached to
>the maximum time that will pass before any end station will be able to transmit can be calculated
>have no data for upper layer protocols.
>none of the above
>the maximum time that will pass before any end station will be able to transmit can be calculated
Media Access Control (MAC) - defines how the medium is accessed, including:
Frame format
Token handling
Addressing
Algorithm for calculating a cyclic redundancy check and error recovery mechanisms
Media Access Control (MAC) - defines how the medium is accessed, including:
Frame format
Token handling
Addressing
Algorithm for calculating a cyclic redundancy check and error recovery mechanisms
Physical Layer Protocol (PHY) - defines data encoding/decoding procedures, including:
Clocking requirements
Framing
Other functions
Physical Layer Protocol (PHY) - defines data encoding/decoding procedures, including:
Clocking requirements
Framing
Other functions
Physical Layer Medium (PMD) - defines the characteristics of the transmission medium, including:
Fiber optic link
Power levels
Bit error rates
Optical components
Connectors
Physical Layer Medium (PMD) - defines the characteristics of the transmission medium, including:
Fiber optic link
Power levels
Bit error rates
Optical components
Connectors
Station Management (SMT) - defines the FDDI station configuration, including:
Ring configuration
Ring control features
Station insertion and removal
Initialization
Fault isolation and recovery
Scheduling
Collection of statistics
Station Management (SMT) - defines the FDDI station configuration, including:
Ring configuration
Ring control features
Station insertion and removal
Initialization
Fault isolation and recovery
Scheduling
Collection of statistics
The Access Control Byte contain
>the priority and reservation field, and a token and monitor bit
>a start delimiter, an access control byte, and an end delimiter
>is used to configure the Interior Gateway
>alerts each station to the arrival of a token or data/command frame
>90 seconds
>the priority and reservation field, and a token and monitor bit
Put layers in order
1. Session
2. Presentation
3. Application
4. Physical
5. Network
6. Data Link
7. Transport
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application

Layer Responsibilities
1. 'Physical'
Basic hardware components for networks. i.e. RS-232 specification
2. 'Data Link'
Frame format, Transmitting frames over the net. i.e. bit/byte stuffing, checksum
3. 'Network Address'
assignment, Packet's forwarding methods
4. 'Transport'
Transfer correctness
5. 'Session'
Establishing a communication session, Security, Authentication i.e. passwords
6. 'Presentation'
Computers represent data in different ways (char, integer) thus the protocol need to translate the data to and from the local node.
7. 'Application'
Specifications for applications using the network, how to send a request, how to specify a filename over the net, how to respond to a request etc.