Seller Inventory BTE Book Description Cengage Learning. Choose Expedited for fastest shipping!
To avoid ordering the wrong item, please check your item's ISBN number!. Seller Inventory C Brand new! Please provide a physical shipping address. Book Description Softcover.
Same contents as the US edition with days shipping. Book Description Course Technology Ptr, In Stock. Publisher: Cengage Learning , This specific ISBN edition is currently not available.
View all copies of this ISBN edition:. About the Author : Jill West, a CIS instructor at Georgia Northwestern Technical College, brings a unique cross-section of experience in business, writing and education to the development of innovative educational materials. Buy New Learn more about this copy. Other Popular Editions of the Same Title. Search for all books with this author and title. Customers who bought this item also bought. Published by Brooks Cole New Softcover Quantity Available: 1.
Seller Rating:. At this point, the data unit becomes a packet. Network layer protocols also determine the path from point A on one network to point B on another network by factoring in: Delivery priorities for example, packets that make up a phone call connected through the Internet might be designated high priority, whereas a mass e-mail message is low priority Network congestion Quality of service for example, some packets may require faster, more reliable delivery Cost of alternative routes PTS: 1.
Describe how error checking is handled in the Data Link layer. ANS: Error checking is accomplished by a 4-byte FCS frame check sequence field, whose purpose is to ensure that the data at the destination exactly matches the data issued from the source. When the source node transmits the data, it performs an algorithm or mathematical routine called a CRC cyclic redundancy check.
Network+ Guide To Networks
CRC takes the values of all of the preceding fields in the frame and generates a unique 4-byte number, the FCS. If this comparison fails, the receiving node assumes that the frame has been damaged in transit and requests that the source node retransmit the data. Define and describe the two parts of a physical address.
Traditionally, this portion of a physical address is sometimes called the block ID. The remaining characters in a physical address, known as the extension identifier, identify the interface. By assigning unique extension identifiers, companies ensure that no two NICs share the same physical address. Extension identifiers may also be known as device IDs. Describe Physical layer protocol functions when receiving data. ANS: When receiving data, Physical layer protocols detect and accept signals, which they pass on to the Data Link layer. Physical layer protocols also set the data transmission rate and monitor data error rates.
However, even if they recognize an error, they cannot perform error correction. When you install a NIC in your desktop PC and connect it to a cable, you are establishing the foundation that allows the computer to be networked. In other words, you are providing a Physical layer.
Compare Ethernet and Token Ring frames in terms of their operation on a network. ANS: Ethernet frames are different from token ring frames, and the two will not interact with each other on a network. In fact, most LANs do not support more than one frame type, because devices cannot support more than one frame type per physical interface, or NIC.
NICs can, however, support multiple protocols. Although you can conceivably transmit both token ring and Ethernet frames on a network, Ethernet interfaces cannot interpret token ring frames, and vice versa. See More. Standards assist in network design. Network functions are associated with only one layer of the OSI model. The Application layer includes software applications. Not all Transport layer protocols are concerned with reliability.
Network+ Guide to Networks, 5th Edition
For greater network efficiency, segmentation is preferred. Standards define the a. Which statement accurately describes the OSI model? Physical b. Network d. Data Link REF: 47 9. Each network node has a. Data Link REF: 50 In which OSI model layer do hubs operate? Data Link d. The Application layer separates data into , or discrete amounts of data. She has worked in a variety of businesses where she's designed, written, and supported application software.
She has also managed a computer repair help desk and handled troubleshooting for wide area networks. Andrews has written numerous books on software, hardware and the Internet. She lives in north Georgia. Show More Table of Contents 1. An Introduction to Networking 2. Network Protocols 4.
Network Architecture 5. Networking Media 6.
Network+ Guide to Networks - West, Jill/ Andrews, Jean, Ph.D./ Dean, Tamara - | HPB
Networking Hardware 7. WANs and Remote Connectivity 8. Windows NT-Based Networking 9. NetWare-Based Networking Troubleshooting Network Problems