My reviewers and technical notes
NOTICE: The following procedure/reviewer contains here are all free and you can do
whatever you want with it. But I do not guarantee success or
support these actions. Any use of the information provided herein, is
performed at your own risk. You should make a backup copy of your files
prior to executing any of the following steps. Incorrect use of the
instructions can cause serious problems that may require a complete
reinstall of your operating system. I assumes no responsibility, expressed
or implied, regarding the consequences of any action taken as a result of
the information provided herein.
NAV Unable to Initialize Virus Scanning Engine Database IE issues Error: " The Print Spooler or one of its dependencies is not available. " helpful sites cd_dvd_hdd_fdd issues how do I Start Computer in SafeMode windows support page how to install lexmark printer? MS outlook issues PRINTERS/SCANNERS/CAMERA CDs not autorun when inserted in my CD/DVD drive in the MS Windows XP OS? A+ Certification Starting up and shutting down Windows 2000 Pro Amalgamation Braindump Network Admin_1 CDs not autorun when inserted in CD/ DVD drive in the MS Windows2000 or NT OS? Internetworking Technologies RAID LEVELs Internetworking Acronyms How do I troubleshoot a computer running Windows® 95/98 when it will not boot to the hard drive? DVD media may not ‘Autoplay’ in Windows XP Home/Pro Shells and stuff X linux partitions and disk mgmnt 315 from a Millionaire Bartleby Quotes of the Day Vocabulary 6 Civil Service Reviewer Internet acronyms Vocabulary 1 Vocabulary 10 Bible quiz DELL P1500 and S2500 Printers, Adding & setting up an optional paper tray 90-90 Diags MSWord Tips guide to subnetting TCP/IP basics having a successful job interview
‘Introduction to Internetworking
Application, presentation,
session, transport, network, data link, physical. Remember the sentence “all
people seem to need data processing.”
Layer 3, the network layer.
Voltage levels, time of voltage
changes, physical data rates, maximum transmission distances physical
connectors, and type of media.
ARP, Hello, predictable.
Connection-oriented.
‘Introduction to LAN Protocols
Ethernet uses carrier sense
multiple access collision detect (CSMA/CD). Each network station listens before
and after transmitting data. If a collision is detected, both stations wait a
random time before trying to resend.
Token ring passes a special type
of packet called a token around the network. If a network device has data to
send, it must wait until it has the token to send it. After the data has been
sent, the token is released back on the network.
A unicast is a transmission from
one source to one destination. A multicast is a transmission from one source to
many stations that register to receive the traffic. A broadcast is a
transmission from one source to every station on the local network segment.
‘Introduction to WAN Technologies.
Point-to-Point, packet-switched,
and circuit-switched.
DDR is dial-on-demand routing. DDR
dials up the remote site when traffic needs to be transmitted. Dial backup uses
the same type of services, but for backup to a primary circuit. When the primary
circuit fails, the dial backup line is initiated until the primary circuit is
restored.
A CSU/DSU interfaces a router with
a digital line such as T1.
A modem converts digital signal to
analog for transmission over a telephone line. Because ISDN circuit are digital,
the conversion from digital to analog is not required.
‘Bridging and
Switching Basics.
Bridges and switches are data
communications devices that operate principally at Layer2 of the OSI reference
model. As such, they are widely referred to as data link layer devices.
‘Routing Basics
‘Network Management Basics
‘Ethernet Technologies
‘Fiber Distributed Data Interface
‘Token Ring/ IEEE 802.5
‘Frame Relay
‘High-Speed Serial Interface
‘Integrated Services Digital Network
‘Point-to-Point Protocol
'Internet Protocols
In Request For Comments (RFCs).
-
What are the two primary responsiblities of
IP?
-
Which field in the IP packet keeps packets
from looping endlessly in a malconfigured network?
-
How is an IP address generally represented?
-
How is the class of an IP address
determined?
-
What is the purpose of the subnet mask in
an IP address?
-
What is the purpose of Address Resolution
Protocol (ARP)?
-
What is the function of Internet Control
Messege Protocol (ICMP)?
-
What type of data delivery does TCP
provide?
-
How does User Datagram Protocol (UDP)
differ from Transmission Control Protocol (TCP)?
back on top
|