CCNA 1 - Module 5-7 Flashcards

1
Q

Binary vs. Decimal Numbering System

A
  • Binary numbering system consists of 1s and 0s, called bits
  • Decimal numbering system consists of digits 0 through 9
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a digit represents different values depending on the “position” the digit occupies in the sequence of numbers.

A

Binary Positional Notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
    • s a base sixteen numbering system, using the digits 0 through 9 and letters A to F.
  • It is easier to express a value as a single hexadecimal digit than as four binary bit.
A

Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • are 128 bits in length. Every 4 bits is represented by a single hexadecimal digit. That makes the IPv6 address a total of 32 hexadecimal values.
A

IPv6 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to convert hexadecimal numbers to decimal values

A
  • Convert the hexadecimal number to 4-bit binary strings.
  • Create 8-bit binary grouping starting from the rightmost position.
  • Convert each 8-bit binary grouping into their equivalent decimal digit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to convert decimal numbers to hexadecimal numbers

A
  • Convert the decimal number to 8-bit binary strings.
  • Divide the binary strings in groups of four starting from the rightmost position.
  • Convert each four binary numbers into their equivalent hexadecimal digit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • is responsible for communications between end-device network interface cards.
  • It allows upper layer protocols to access the physical layer media and encapsulates Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames.
  • It also performs error detection and rejects corrupts frames.
A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • The ___________ communicates between the networking software at the upper layers and the device hardware at the lower layers.
A

LLC sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • The _______ is responsible for data encapsulation and media access control.
A

MAC sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the arrangement and relationship of the network devices and the interconnections between them.

A

topology of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • – shows physical connections and how devices are interconnected.
A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • – identifies the virtual connections between devices using device interfaces and IP addressing schemes
A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • – the simplest and most common WAN topology. Consists of a permanent link between two endpoints.
A

Point-to-point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • – similar to a star topology where a central site interconnects branch sites through point-to-point links
A

Hub and spoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • – provides high availability but requires every end system to be connected to every other end system
A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

bus vs. ring

A
  • Bus – All end systems chained together and terminated on each end.
  • Ring – Each end system is connected to its respective neighbors to form a ring
17
Q
  • Only allows one device to send or receive at a time on a shared medium.
  • Used on WLANs and legacy bus topologies with Ethernet hubs.
A

Half-duplex communication

18
Q
  • Allows both devices to simultaneously transmit and receive on a shared medium.
  • Ethernet switches operate in full-duplex mode.
A

Full-duplex communication

19
Q
  • All nodes operating in half-duplex, competing for use of the medium. Examples are:
  • Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-topology Ethernet.
  • Carrier sense multiple access with collision avoidance (CSMA/CA) as used on Wireless LANs
A

Contention-based access

20
Q
  • Deterministic access where each node has its own time on the medium.
  • Used on legacy networks such as Token Ring and ARCNET.
A

Controlled access

21
Q
  • Used by legacy Ethernet LANs.
  • Operates in half-duplex mode where only one device sends or receives at a time.
  • Uses a collision detection process to govern when a device can send and what happens if multiple devices send at the same time
A

CSMA/CD

22
Q
  • Used by IEEE 802.11 WLANs.
  • Operates in half-duplex mode where only one device sends or receives at a time.
  • Uses a collision avoidance process to govern when a device can send and what happens if multiple devices send at the same time.
A

CSMA/CA

23
Q

Address is also called __________

A

Physical address

24
Q

: (IEEE 802.2) Places information in the frame to identify which network layer protocol is used for the frame.

A

LLC Sublayer

25
Q

: (IEEE 802.3, 802.11, or 802.15) Responsible for data encapsulation and media access control, and provides data link layer addressing.

A

MAC Sublayer

26
Q
  • This is the internal structure of the Ethernet frame.
  • a. 64 bytes < Ethernet Frame Size < 1518 bytes
  • b. 64 bytes > EFS == ‘collision fragment’ or ‘runt frame’ => automatically discarded
  • c. 1500 bytes < EFS == ‘jumbo’ or ‘baby giant frame’
A

Ethernet frame

27
Q
  • The Ethernet frame includes both a source and destination MAC address to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN.
A

Ethernet Addressing

28
Q
  • The Ethernet frame includes a frame check sequence (FCS) trailer used for error detection
A

Ethernet Error detection

29
Q

is received and processed by every device on the Ethernet LAN.

A

Ethernet broadcast frame

30
Q

is received and processed by a group of devices that belong to the same multicast group.

A

Ethernet multicast frame

31
Q
    • This frame forwarding method receives the entire frame and computes the CRC. If the CRC is valid, the switch looks up the destination address, which determines the outgoing interface. Then the frame is forwarded out of the correct port.
A

Store-and-forward switching

32
Q
    • This frame forwarding method forwards the frame before it is entirely received. At a minimum, the destination address of the frame must be read before the frame can be forwarded
A

Cut-through switching

33
Q
  • Provides the lowest latency by forwarding packets immediately after reading the destination address.
  • May relay packets with errors since it starts forwarding before the entire packet is received; faulty packets are discarded by the destination NIC.
  • Represents a typical cut-through switching method.
A

Fast-forward switching

34
Q
  • Balances the high latency and integrity of store-and-forward switching with the low latency and reduced integrity of fast-forward switching.
  • Stores and checks the first 64 bytes of a frame for errors before forwarding, helping to detect collisions that typically occur in that segment.
A

Fragment-free switching

35
Q
  • Frames are stored in queues that are linked to specific incoming and outgoing ports.
  • A frame is transmitted to the outgoing port only when all the frames ahead in the queue have been successfully transmitted. It is possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port.
  • This delay occurs even if the other frames could be transmitted to open destination ports.
A

Port-based memory

36
Q
  • Deposits all frames into a common memory buffer shared by all switch ports and the amount of buffer memory required by a port is dynamically allocated.
  • The frames in the buffer are dynamically linked to the destination port enabling a packet to be received on one port and then transmitted on another port, without moving it to a different queue.
  • Shared memory buffering also results in larger frames that can be transmitted with fewer dropped frames. This is important with asymmetric switching which allows for different data rates on different ports. Therefore, more bandwidth can be dedicated to certain ports (e.g., server port).
A

Shared memory

37
Q

full-duplex vs. half-duplex

A
  • Full-duplex - Both ends of the connection can send and receive simultaneously.
    o Gigabit Ethernet ports only operate in full-duplex.
  • **Half-duplex **- Only one end of the connection can send at a time.
38
Q

__________ feature is enabled by default on switches running Cisco IOS Release 12.2(18)SE or later. However, the feature could be disabled. For this reason, you should always use the correct cable type and not rely on the auto-MDIX feature
* can be re-enabled using the mdix auto interface configuration command

A

auto-MDIX