100MHz
suitable for10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (GigabitEthernet)
Backward compatible
Specifications against crosstalk and noise
performance of up to 250 MHz
RJ-45 connectors when used as patch cable
Unshielded and Foiled
defines the standard at frequencies up to 500 MHz
rates up to 10 Gbps
Better transmission characteristics than UTP
Shielding is applied to all pairs individually and an additional overall shielding is also added.
It allows 10 Gigabit Ethernet
Up to 1000 MHz
It allows 40 Gigabit Ethernet
Up to 2000 MHz
It depends on the operating frequency
a measure of the time delay experienced by a system
The delay of a network specifies how long it takes for a bit of data to travel acrossthe network from one node or endpoint to another.
temperature-dependant
it adds White noise to signal and can distort it
Combined frequencies (f1+f2, f1-f2)
Pink noise can interfere with the transmitted signal and degrade its quality.
flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair
used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications
they permit transmission over longer distances and at higher bandwidths (data rates)than electrical cables
Signals travel along them with less loss
Fibers are immune to electromagnetic interference
Powered via distributor
Power and data is transmitted
Standard IEEE 802.3af PoE
Addressing
Encapsulation
Routing
Decapsulation
Geographic location
Purpose
Ownership
avoid degradation in performance
Security
Addressing management
Physical location
organizations
Routable protocols:
A communications protocol that contains a network address as well as a device address. It allows packets to be forwarded from network to another.
Routing protocols:
They specify how routers communicate with each other, distributinginformation that enables them to select routes between any two nodes ona computer network. Routing algorithms determine the specific choice ofroute.
replies to all the client questions
keeps the names assignment for all IP addresses of the area.
Static IP addresses
Servers, Switches, routers
Dynamic IP addresses
Clients (end devices)
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA) best one now si WPA3 = improved WEP
pre-shared key (PSK)
TKIP - no longer considered secure
AES-CCMP = encryption
protocol (better than WEP)
Extensible Authentication Protocol (EAP) = authentication
framework
Remote Authentication Dial-In User Service (RADIUS) = networking protocol
maximizing throughput
minimizing wait time
No two processes may be simultaneously inside their critical regions.
No assumptions may be made about speeds or the number of CPUs.
No process running outside its critical region may block any process.
No process should have to wait forever to enter its critical region.
First fit (In the first fit, the first available free hole fulfills the requirement of the process allocated.)
Best fit (In the best fit, allocate the smallest hole that is big enough to process requirements. For this, we search the entire list, unless the list is ordered by size.)
Worst fit (Allocate the largest available hole to process. This method produces the largest
leftover hole.)