Information Technology Reference
In-Depth Information
3. Discussion Question 1 outlined a process in which members
of a class could simulate an Ethernet network.
a. Outline a process in which members of a class could simu
late a tokenring network.
b. Follow your simulation in part a so class members have
the experience of applying the relevant rules of tokenring
networks.
c. Assuming you have participated in simulations for both
Discussion Questions 1 and 3, compare the effectiveness of
the two approaches. Does your experience suggest any ad
vantages or disadvantages to either approach?
4. Ask a manager or director at the computer center at your
school or business to describe the various segments, hubs, and
bridges in use for computers near you. Some points to con
sider might be:
a. How many machines are placed on a single segment?
b. How are computers organized (e.g., by department, lab,
application)?
c. How many bridges are in use, and how are they organized?
d. How does your school or business connect to the rest of
the Internet?
Exercises
1. Consider the words and phrases in the “Terminology from
This Chapter” section.
a. Organize this terminology under the headings “Network
Types,” “Hardware to Connect Computers,” and “Other
Terms.”
b. Provide careful definitions for each word or phrase. In
each case, be sure it is clear why the term is in the category
that you selected in part a.
c. While the “Terminology from This Chapter” section iden
tifies the major terms, this chapter also contains definitions
of various supporting elements. Find six additional terms
introduced in this chapter, and provide careful definitions
of each.
Search WWH ::




Custom Search