Chapter 2- Ethernet Networking and Data Encapsulation Flashcards

1
Q

___________ on an Ethernet network is the retransmission delay that’s enforced when a collision occurs.
A. Backoff
B. Carriersense C. Forwarddelay
D. Jamming

A

A. Backoff on an Ethernet network is the retransmission delay that’s enforced when a collision occurs. When that happens, a host will only resume transmission after the forced time delay has expired. Keep in mind that after the backoff has elapsed, all stations have equal priority to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network interface port has collision detection and carrier sensing enabled on a shared twisted-pair network. From this statement, what is known about the network interface port?
A. This is a 10 Mbps switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half-duplex.
D. This is an Ethernet port operating at full-duplex.
E. This is a port on a network interface card in a PC

A

C. Half-duplex Ethernet networking uses a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)
A. To uniquely identify devices at layer 2
B. To allow communication with devices on a different network C. To differentiate a layer 2 frame from a layer 3 packet
D. To establish a priority system to determine which device gets to transmit first E. To allow communication between different devices on the same network
F. To allow detection of a remote device when its physical address is unknown

A

A, E. Physical addresses or MAC addresses are used to identify devices at layer 2. MAC addresses are only used to communicate on the same network. To communicate on different network, we have to use layer 3 addresses (IP addresses).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)
A. When they receive a special token
B. When there is a carrier
C. When they detect that no other devices are sending
D. When the medium is idle
E. When the server grants access

A

C, D. An Ethernet network is a shared environment, so all devices have the right to access the medium. If more than one device transmits simultaneously, the signals collide and cannot reach the destination.If a device detects another device is sending, it will wait for a specified amount of time before attempting to transmit. When there is no traffic detected, a device will transmit its message. While this transmission is occurring, the device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to its default listening mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
When configuring a terminal emulation program, which of the following is an incorrect setting?
A. Bit rate: 9600
B. Parity:None
C. Flow control: None
D. Data bits: 1
A
D. When you set up the connection, use these settings:
Bits per sec: 9600 
Data bits: 8 
Parity: None
Stop bits: 1
Flow control: None
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which part of a MAC address indicates whether the address is a locally or globally administered address?
A. FCS
B. I/G bit C. OUI
D. U/L bit

A

D. When set to 0, this bit represents a globally administered address, as specified by the IEEE, but when it’s a 1, it represents a locally governed and administered address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not one of the actions taken in the operation of CSMA/CD when a collision occurs?
A. A jam signal informs all devices that a collision occurred.
B. The collision invokes a random backoff algorithm on the systems involved in the collision.
C. Each device on the Ethernet segment stops transmitting for a short time until its backoff timer expires.
D. All hosts have equal priority to transmit after the timers have expired.

A

C. Each device on the Ethernet segment stops transmitting for a short time until its backoff timer expires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following statements is false with regard to Ethernet?
A. There are very few collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. The host network card and the switch port must be capable of operating in full- duplex mode to use full-duplex.
D. The default behavior of 10Base-T and 100Base-T hosts is 10 Mbps half-duplex if the autodetect mechanism fails.

A

A. There are no collisions in full-duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1000Base-T
1000Base-SX
10Base-T
100Base-TX

A
The given cable types are matched with their standards in the following table. 
IEEE 802.3u 100Base-Tx
IEEE 802.3 10Base-T 
IEEE 802.3ab 1000Base-T 
IEEE 802.3z 1000Base-SX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The cable used to connect to the console port on a router or switch is called a \_\_\_\_\_\_\_\_\_ cable.
A. Crossover
B. Rollover
C. Straight-through
D. Full-duplex
A

B. Although rolled cable isn’t used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a host EIA-TIA 232 interface to a router console serial communication (COM) port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following items does a socket comprise?
A. IP address and MAC address B. IP address and port number
C. Port number and MAC address
D. MAC address and DLCI

A

B. If you’re using TCP, the virtual circuit is defined by the source and destination port number plus the source and destination IP address and called a socket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following hexadecimal numbers converts to 28 in decimal?
A. 1c B. 12 C. 15 D. ab

A

A. The hex value 1c is converted as 28 in decimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

0000 is what number in hex

A

0 is this number in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

0001 is this number in hex

A

1 is this hex number in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

0010 is this number in hex

A

2 in hex is this number in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

0011 is this number in hex

A

3 in hex is this number in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

0100 is thiss sad number in hex

A

4 in hex is this number in binary

18
Q

0101 is this number in hex

A

5 in hex is this number in binary

19
Q

0110 is this number in hex

A

6 in hex is this number in binary

20
Q

0111 is this number in hex

A

7 is the hex number of this binary number

21
Q

1000 is this number in hex

A

8 in hex is this number in binary

22
Q

1001 is this number in hex

A

9 in hex is this number in binary

23
Q

1010 in binary has this value in hex

A

A is also this number in binary

24
Q

1011 is this value in hex

A

B is this value in binary

25
Q

1100 is this value in hex

A

C is this value in binary

26
Q

1101 is this value in hex

A

D is this value for in binary

27
Q

1110 is this value in hex

A

E in hex is this number in binary

28
Q

1111 is this value in hex

A

F is this value in binary

29
Q

Four steps in CSMA/CD Operations

A
  1. Jam signal informs all devices a collision occurred
  2. The collision invoked a random back off algorithm
  3. Each device on the Ethernet segment stops transmitting for a short time until the timers expire
  4. All hosts have equal priority to transmit after the timers have expire
30
Q

Outline the Encapsulation process

A
  1. User information is converted to data for transmission
  2. Data is converted to segments and a reliable connection is setup between the transmitting and receiving hosts
  3. Segments are converted to packets or datagrams , and a logical address is placed in the header so each packet can be routed through in the internetwork
  4. Packets or datagrams are converted to frames for transmission on the local network. Hardware addresses are used to uniquely identify hosts on a local network segment
  5. Frames are converted to bits , and a digital encoding and clocking scheme is used
31
Q

What pins are used for transmitting/receiving on a straight through cable?

A

Host 1 uses pins 1-2 to transmit and pins 3-6 to receive. Host two uses 1-2 to receive and 3-6 to transmit.

32
Q

Which devices use crossover cables?

A
Switch to switch
Hub to hub
Router to router 
Router to pc
Pc to pc
33
Q

Which devices use straight through cables?

A
Switch to router 
Switch to pc
Switch to server 
Hub to pc
Hub to server
34
Q

What pins are used in a crossover cable?

A

Pins 1-2 go to 3-6 of host 2
Pins 3-6 go to 1-2 of host 2
Pins 4-7 go to 7-4 of host 2
Pins 5-8 go to 8-5 of host 2

35
Q

What are 3 violation modes?

A

Protect , Restrict , and shutdown are three types of these modes

36
Q

What occurs in the protect violation mode?

A

Permits traffic from known MAC address to be forwarded , drops traffic from unknown MAC addresses when over the allowed MAC address limit. No notifications are sent when traffic is dropped

37
Q

What occurs in restrict mode?

A

This mode permits traffic from known MAC addresses to be forwarded while dropping traffic from unknown MAC addresses when over the allowed MAC address limit.

When configured a syslog message is logged, a SNMP message is sent , and a violation counter is incremented when traffic is dropped

38
Q

What occurs in Shutdown mode?

A

This mode is the default violation mode. When in this mode the switch will force the switch port into error disabled (err-disabled)
State when a violation occurs. While in this mode , the switch port forwards no traffic. A simple network management protocol (SNMP) trap is sent.

39
Q

What’s a distance-vector routing protocol?

A

This protocol requires the router to inform its neighbors of topology changes periodically. Examples are EIGRP and RIPv2.

40
Q

What’s a link state routing protocol?

A

This protocol requires a router to inform all the nodes in a network of topology changes. Examples are OSPF and IS IS.

41
Q

What are two signs in switch configurations that may indicate broadcast storms?

A

High numbers of packets in buffers and high packets ignored can indicate this condition on switch configurations

42
Q

What are two signs of possible duplex issues on switch configurations?

A

Late collisions and input errors sometimes indicate this condition on switch configurations.