Nt1310 Unit 7

Great Essays
1. What provides the physical connection between workstations on the network? The cables/wires and network interface card (NIC) provide the physical connection between work stations on the network.

2. What directs the flow of data over the network? A switch/hub/router directs the flow of data over the network.

3. What are the three functions of network software?
The three functions of the network software are:
To make sure that the information is addressed properly.
To organise information into packets (a series of messages that a file is broken down into) on the sending workstation and putting the packets back to make a file on the receiving workstation.
To check that each packet reaches the designated workstation.
4. What are the
…show more content…
The token in a token ring network is used to prevent collision as no device can transmit data without the token. When the token is available to the workstation, it attaches the data to the token and the token then carries the data to its designated location.

14. How do workstations know that a message can be sent in a token ring network?
When the sending device removes the message from the token, it changes the signal to indicate that the token is available and then sends the token along the network. Through this message, the workstations know that a message can now be sent.

15. How does a network card determine that a message is meant for a particular device?
Each packet of data that is sent, contains the unique IP address of the workstation that the data is meant for. The network card identifies the workstation using the IP address and sends the packet to the designated computeréworkstation.

16. After a message has been read, what happens to the token and the message? After a message has been read, the receiving workstation removes the message from the token and then it sends a signal along the network that the token is available. After this message has been sent, the token is sent along the

Related Documents

  • Great Essays

    How DHCP works:- Dynamic IP address will be generated and assigned from pool of network. It assigns that IP address which are expired. This is done using DHCP server. The high level working of DHCP has mentioned below: a) The network which is connected to your machine, request for IP address to DHCP server. b) On request, DHCP server allocates an IP address to machine.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    We can use a method called Network Address Translation to assign routable addresses to non-routable addressed traffic. Simply put, there is a bucket of routable addresses available for use by data packets that are exiting the router or firewall. The packet gets assigned a routable address as it leaves and it drops off that address when it returns. Routers keep track of these pairings in a way that is similar to the MAC address table…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    The main functions of Security Onion are capturing packets, analysis tools, and NIDS and HIDS. Full Packet Captures are done via netsniff-ng – it captures all the network traffic that passes through the sensors and subsequently stores them. Analysis tools such as sguil, OSSEC, Bro, and others help the analyst understand the data. NIDS and HIDS these inspect the systems or the network traffic, and log and alert any suspicious activity. An Intrusion Detection System is a piece of software or hardware security management for computers and networks.…

    • 1488 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Basically it determines what data entities stores the needed information within the system. As well as the workflows and business rules that are needed to be completed to process request. Then finally the client request is send through the Data Access Service to make sure that this data is able to be accessed and provided to requestor. Once this is confirmed…

    • 1025 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    1. (5 points) Compare and contrast the three types of addresses used in a network. Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data. Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2. What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers and workstations deployed on the network.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    Can be written in DDN format c. Are listed in the data-link trailer d. Used by routers to make a forwarding decision 16. Which of the following statements is true comparing LANs and WANs? (Choose two answers.) a. LANs generally connect devices that are nearer to each other, compared to WANs. b. WANs are purchased, and LANs are leased.…

    • 957 Words
    • 4 Pages
    Decent Essays
  • Great Essays

    Django Case Study

    • 1057 Words
    • 5 Pages

    Answer: The session framework facilitates you to store and retrieve arbitrary data on a per-site visitor basis. It stores data on the server side and abstracts the receiving and sending of cookies. Session can be implemented through a piece of middleware. Question: What are the usage of middlewares in Django? Answer: Below are the usage of middlewares in Django: • Session management • Cross-site request forgery protection • Use authentication • Content Gzipping Question: What are the roles of receiver and sender in signals?…

    • 1057 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Applications can dictate their networking requirements to the controller via northbound PAIS. In response, the controller converts those requirements into flows and installs them into the switches. Any malicious application can overwrite past policies/rules and make the network vulnerable (e.g. overwrite the old security rule with a new rule: bypass the firewall). There is no security mechanism in place to stop this kind of policy…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Four specific jobs performed by the Network layer: 1- Communication with the Transport layer Transport layer ensures reliable arrival of messages and offers error mechanisms and data flow control activities. The transport layer provides services for sending "free space", "connection-oriented" and emissions. For connection, transmission, transfer or destination, it can send packets that have to be reconstituted at the other end the whole message.…

    • 423 Words
    • 2 Pages
    Decent Essays