English

1-Impedance: it’s the total resistance that the cable presents to the electrical current. (Measure of the opposition to time) Attenuation: it’s the loss of intensity of the current. (Decibels per unit length)
Shielding: it’s the practice of reducing the electromagnetic field in a space. Capacitance: it’s the ability of a body to store an electrical charge. (Pico-farads)
 2-Pairs of copper: wires are encased in color-coded plastic insulation and are twisted together. An outer jacket protects the pairs. When an electricity flows through a copper wire, a magnetic field is created around the wireCoaxial cable: is a type of cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield. The copper conductor is a layer of flexible insulation. The second layer can reduce the amount of outside interference. Optical fiber cable: it’s a cable containing one or more optical fibers. The optical fiber elements are coated with plastic layers and containing a protective tube where the cable will be deployed.
 3- UTP: (Unshielded twisted pair) it’s a cable that has 2 or 4 pairs of wires. 
STP: (Shielded twisted pair) each pair of wires is wrapped in metallic foil to shield the wires from noise. STP prevents interference better than UTP, but STP is more expensive. STP s more difficult to install because of the thickness, but STP cables also have a range of 100 m and it’s better to outside buildings.
 4- When crimping RJ-45 UTP cables, how can you create straight-through, crossover and loopback cables? Describe some situations in which they are used. 
Straight-through: is a type of twisted pair copper wire for LAN (local area network) use for which the RJ-45 connectors at each. It can be used to directly connect like hubs or switches.
Crossover cables: provide a network connection between two similar devices. (pc to pc) or (switch to router). It directly connects two networks devices of the same type to each other over Ethernet. Crossover cables have the 1st and 3rd wires crossed and the 2nd and 6th wires crossed.Two types: Pc to switch, Pc to Pc
5- Multimode fiber: Uses multiple light rays or modes currently, each at a different reflection angle. Single mode fiber: Uses a single ray of light. -Single-mode fiber :uses a thinner core than multimode fiber. -Multimode fiber uses a greater bandwidth than single-mode, but a single- mode fiber is better for longer distances than multimode fiber. -Multimode fiber can work with cheaper equipment while single-mode cannot. 
6- LAN: (Local Area Network) is a computer network that interconnects in a limited area such as home, school…MAN: (Metropolitan Area Network) is a computer network that spans a city or campus. (It usually interconnects a number of LAN) (Police station) WAN: (Wide Area Network) is a computer networks that covers a broad area using private or public networks transports. (Business and government) (Internet) PAN: (Personal Area Network) is the interconnection of information technology devices within a range of 10 meters (more or less) (Bluetooth) CAN: (Campus Area Network) is a computer networks made up of an interconnection of LAN within a limited geographical area. (Universities, airports)
7- Simplex: You can only transmit in one direction. (Signal TV)
 Half-duplex: it allows alternating transmission in two directions, but not simultaneously. (Walkie-talkie) Full-duplex: when data flows in both directions at the same time. (Mobile) 2
 8- Packets in a network Each piece of information transmitted on an Ethernet network is sent in a packet. A packet is a chunk of data enclosed in one or more wrapped. Three parts:
-HEADER: it contains instruction about the data carried in a packet. -Length of packet: is used to check if the packet arrived correctly. (The address can be IP or MAC) -Packet number: is used because you cannot receive the packets in order. -Frame: second layer (MAC) -Packet: third layer (IP)
 -DATA OF BODY: the actual data that the packet is delivering to the destination. 
-CRC: is used to hash function. It’s the most common error checking used in packets
 9- OSI model (7layers) -Physical: it’s a combination of software and hardware programming and may include electromechanical devices. It transmits information. (Hubs) -Data link: it provides the means to transfer data between networks entities and provides he means to detect and correct errors occurred in the physical layer. In this layer are uses MAC address. -Network: provides the functional and procedural means of transferring variable length data sequences from a source to a destination host via one or more networks while maintaining the quality of service functions. In this layer are uses the IP address (routers) -Transport: This layer is used to fragment the information and arrange in the correct order. – Session: provides the mechanism for opening, closing and managing a session between end-user application processes. -Presentation: compression and encryption the information. -Application: an abstraction layer reserved for communications protocols and methods designed for process-to-process communications across an Internet Protocol (IP) 
 10- SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.POP3: Post Office Protocol is used to download e-mail from a remote mail server. IMAP: Internet Message Access Protocol is also used to download e-mail from a remote mail server. With IMAP4, clients cannot only retrieve messages from a server, but they can also manipulate the remote message folders in which the messages are stored. FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple simultaneous connections to remote file systems. HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW). HTTPS: provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks DNS: Is vital to the Internet, providing a mechanism for resolving host names into Internet Protocol (IP) addresses. 11
 12- INTERNET PROTOCOLS :
Address Resolution Protocol (ARP): is used to map the MAC address of a node on the network when IP address is known. (Routers) RARP (Reverse Address Resolution Protocol): is a protocol by which a physical machine in a LAN can request to learn its IP address. Internet Control Message Protocol (ICMP): is used for networks testing and troubleshooting. Internet Group Management Protocol (IGMP): is a communication protocol used by host and routers on IP networks to establish multicast group membership.
 13- IP ADDRESS: is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices. (32 binary bits grouped into four 8-bit bytes called octets) MAC ADDRESS: (Media access control). Is a globally unique identifier assigned to network devices and referred to as hardware or physical address. 6-byte (48-bits) in length. 
14- How and why can you ping an IP address? You can ping the IP address to test IP connectivity. Ping works by sending an ICMP echo request to other network device, and the receiving device confirms the connectivity. (Four ICMP echo request, pings, are sent to the destination computer and the destination computer responds with four ICMP echo request)
 15- Are there reserved IP addresses within a given network? Which ones? What for? Yes, the IP address are X.X.X.0 and X.X.X.255. -The X.X.X.0 is used for the networks address and is an identifier for a node or network interface. -The X.X.X.255 is the broadcast address and is a logical address at which all devices connected are enabled to receive datagrams. 
 16- Compare subnet mask classes A, B and C. How do they relate with IP addresses? The subnet mask indicates the network portion of an IP address. Usually all hosts within a LAN use the same subnet mask. -255.0.0.0: Class A, which indicates that the first octet of the IP address is the network Portion. You have until two by 24 hosts possible. -255.255.0.0: Class B, which indicates that the first two octets of the IP address are the network portion. You have until two by 16 hosts possible. -255.255.255.0: Class C, which indicates that the first three octets of the IP address are the network portion. You have until two by 8 hosts possible. This class is usually used to LAN’s.
 17- Describe how TCP communication occurs: TCP 3-Way Handshake and TCP Windowing. HANDSHAKE: Establishing a normal TCP connection requires three steps. 1. The first host (Alice) sends the second host (Bob) a “synchronize” (SYN) message with its own sequence number, which Bob receives. 2. Bob replies with a synchronize-acknowledgment (SYN-ACK) message with its own sequence number and acknowledgement number, which Alice receives. 3. Alice replies with an acknowledgment message with acknowledgement number, which Bob receives, and doesn’t need to reply to. In this setup, the synchronize messages, act as service requests from one server to the other, while SYN-ACK return to the requesting server to let it know the message was received. The client first sends a segment with its own initial sequence number, then the server responds by sending a segment with its own sequence number and the acknowledgement number, and finally the client responds by sending a segment with acknowledgement number. The reason for the client and server not using the default sequence number such as 0 for establishing connection is to protect against two incarnations of the same connection. WINDOWING: is primarily used to avoid congestion in the traffic. It controls the amount of unacknowledged data a sender can send before it gets an acknowledgment back from the receiver that it has received it. You need confirm that the transmission is reliable. 
 18- Describe the main physical topologies (e.g. bus, star, ring and mesh) according to parameters such as cost, set-up, scalability, maintenance and performance. 
BUS: a bus topology connects all the devices using a single cable. The main cable segment must end with a terminator that absorbs the signal when it reaches the end of the wire. STAR: Is made up of a central connection point that is a device such as hub, switch, or router, where all the cabling segments meet. Although a star topology costs more to implement that the bus topology, is better because each host is connected to the central device with its own cable. RING: are connected in the form of a ring or circle. Unlike the physical bus topology, the ring topology has no beginning or end that needs to be terminated. MESH: Connects all devices (nodes) to each other for redundancy and fault tolerance. The advantage is that every node is connected physically to every other node, which creates a redundant connection. If any link fails, information can flow through many other links to reach its destination.
 19- Explain how communication takes place between two computers within an Ethernet network. Remember that Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection). Most of the Ethernet uses Carrier Sense Multiple Access (CSMA)/Collision Detection (CD). CSMA/CD logic helps prevent collisions and also defines how to act when a collision does occur. The CSMA/CD algorithm works like this: a) A device with a frame to send listens until Ethernet is not busy. b) When the Ethernet is not busy, the sender begins sending the frame. c) The sender listens to make sure that no collision occurred. d) Once the sender hears the collision, they each send a jamming signal, to ensure that all stations recognize the collision. e) After the jamming is complete, each sender randomizes a timer and waits that long. f) When each timer expires, the process starts over with Step 1. Jam signal: A signal sent by a device on an Ethernet network to indicate that a collision has occurred on the network. 20- Explain how communication takes place between two computers in a Token Ring network. In a token ring network individual host are arranged in a ring. A special data token circulates around the ring. When a host wants to transmit, it seizes the token, transmits the data for a limited time, and then places the token back in the ring, where it can be passed along, or seized, by another hostuí!