Ethernet Fundamentals (1.3, 2.1, 2.3, 4.4 & 5.5) Flashcards

1
Q

Ethernet Fundamentals

A

o Ethernet Fundamentals
▪ In early computer networks, there were many different network technologies competing for a portion of the market share
▪ Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and others fought for dominance
▪ Currently, Ethernet is dominant for Layer 1
▪ Due to Ethernet’s popularity, it is important to understand the fundamentals of Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Origins of Ethernet (first was coax (10base5, 10base2) / ethernet is now twisted pair / 10BASE-T is UTP)

A

▪ Was first run over coax cables (10Base5, 10Base2)
▪ Ethernet has changed to using twisted pair cables
▪ 10BASE-T is Unshielded Twisted Pair
● Maximum speed: 10 Mbps
● Maximum distance: 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How should devices access the network?

A

▪ Deterministic
● Very organized and orderly
● Need an electronic token to transmit
● For example, Token Ring networks

▪ Contention-based

● Very chaotic
● Transmit (almost) whenever you want
● For example, Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carrier Sense Multiple Access/ Collision Detect (CSMA/CD)

A

▪ Ethernet devices transmit based on a principle called carrier sense multiple access/collision detect (CSMA/CD)
▪ Carrier sense
● Listen to the wire, verify it is not busy
▪ Multiple access
● All devices have access at any time
▪ Collision detect
● If two devices transmit at the same time, a collision occurs
● Back off, wait a random time, and try again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of CSMA/CD

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collision Domains

A

▪ Comprised of all devices on a shared Ethernet segment (everything on same cable or hub)
▪ Devices operate at half-duplex when connected to a hub (Layer 1 device)
▪ Devices must listen before they transmit to avoid collisions when operating as CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collision Domains with Switches

A

▪ Ethernet switches increase scalability of the network by creating multiple collision domains
▪ Each port on a switch is a collision domain, no chance of collisions, and increases speed
▪ Switches can operate in full-duplex mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Speed Limitations

A

▪ Bandwidth is the measure of how many bits the network can transmit in 1-second (bps)
▪ Type of cable determines the bandwidth capacity of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distance Limitations

A

▪ Type of cable determines the distance limitation of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Infrastructure Devices

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Infrastructure

A

▪ Primary devices used in our networks (devices include a router, and a switch)

▪ Devices they evolved from (bridge and hub)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hub

A

▪ Layer 1 device used to connect multiple network devices/workstations
▪ Known as multiport repeaters
▪ Three basic types of Ethernet hubs:
● Passive hub
o Repeats signal with no amplification
● Active hub
o Repeats signal with amplification
● Smart hub
o Active hub with enhanced features like SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Collision Domains

A

▪ Multiple network segments connected together by hubs
▪ Hubs (layer 1) were used to connect multiple network segments together
▪ Each LAN segment becomes a separate collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bridges

A

▪ Bridges analyze source MAC addresses in frames entering the bridge and populate an internal MAC address table

▪ Makes intelligent forwarding decisions based on destination MAC address in the frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Switch

A

▪ Layer 2 device used to connect multiple network segments together
▪ Essentially a multiport bridge
▪ Switches learn MAC addresses and make forwarding decisions based on them
▪ Switches analyze source MAC addresses in frames entering the switch and populate an internal MAC address table based on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 2 Switch

A

▪ Each port on a switch represents an individual collision domain
▪ All ports belong to the same broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Router

A

▪ Layer 3 device used to connect multiple networks together
▪ Make forwarding decisions based on logical network address information
● Such as using IP addresses (IPv4 or IPv6)
▪ Routers are typically more feature rich and support a broader range of interface types than multilayer switches
▪ Each port is a separate collision domain
▪ Each port is a separate broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Layer 3 Switch

A

▪ Layer 3 device used to connect multiple network segments together
▪ Can make Layer 3 routing decisions and interconnect entire networks (like a router), not just network segments (like a switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Summary of Network Infrastructure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Additional Ethernet Features

A

o Features to enhance network performance, redundancy, security, management, flexibility, and scalability
▪ Common switch features
● Virtual LANs (VLANs)
● Trunking
● Spanning Tree Protocol (STP)
● Link aggregation
● Power over Ethernet
● Port monitoring
● User authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Link Aggregation (802.3ad)

A

▪ Congestion can occur when ports all operate at the same speed

▪ Allows for combination of multiple physical connections into a single logical connection

▪ Bandwidth available is increased and the congestion is minimized or prevented

22
Q

Power Over Ethernet (PoE 802.3af, PoE+ 802.3at)

A

▪ Supplies electrical power over Ethernet
● Requires CAT 5 or higher copper cable
● Provides up to 15.4 watts of power to device

● PoE+ provides up to 25.5 W of power to device
▪ Two device types
● Power Sourcing Equipment (PSE)
● Powered Device (PD)

23
Q

Port Monitoring or Mirroring

A

▪ Helpful to analyze packet flow over network
● Connect a network sniffer to a hub and it sees all
● But, switches require port monitoring for network analyzer to see all the traffic
▪ Port mirroring makes a copy of all traffic destined for a port and sends it to another port

24
Q

User Authentication (802.1x)

A

▪ For security purposes, switches can require users to authenticate themselves before gaining access to the network
▪ Once authenticated, a key is generated and shared between the supplicant (device wanting access) and the switch (authenticator)

▪ Authentication server checks the supplicant’s credentials and creates the key
▪ Key is used to encrypt the traffic coming from and being sent to the client

25
Q

Management Access and Authentication

A

▪ To configure and manage switches, you can use two options:
● SSH
o Remote administration program that allows you to connect to the switch over the network
● Console port
o Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45)

26
Q

Out-of-band (OOB)

A

▪ Management involves keeping all network configuration devices on a separate network

27
Q

First-Hop Redundancy

A

▪ Hot Standby Router Protocol (HSRP) uses virtual IP and MAC addresses to provide a “active router” and a “standby router”
● HSRP is a Cisco-proprietary protocol
● If Active is offline, then standby answers

28
Q

Other First-Hop Redundancy Protocols

A

▪ Gateway Load Balancing Protocol (GLBP)
● Cisco-proprietary protocol
▪ Virtual Router Redundancy Protocol (VRRP)
● Open-source protocol
▪ Common Address Redundancy Protocol (CARP)
● Open-source protocol

29
Q

MAC Filtering

A

▪ Permits or denies traffic based on a device’s MAC address to improve security

30
Q

Traffic Filtering

A

▪ Multilayer switches may permit or deny traffic based on IP addresses or application ports

31
Q

Quality of Service (QoS)

A

▪ Forwards traffic based on priority markings

32
Q

Spanning Tree Protocol (STP) (802.1D)

A

o Permits redundant links between switches and prevents traffic loops
o Availability is measured in 9’s
▪ Five 9’s is 99.999% uptime and allows only 5 minutes down per year
o Shortest Path Bridging (SPB) is used for larger network environments instead

o Without STP, MAC Address table corruption can occur

33
Q

Broadcast Storms

A

▪ If broadcast frame received by both switches, they can forward frames to each other
▪ Multiple copies of frame are forwarded, replicated, and forwarded again until the network is consumed with forwarding many copies of the same initial frame

34
Q

Root and Nonroot Bridges

A

▪ Root bridge
● Switch elected to act as a reference point for a spanning tree
● Switch with the lowest bridge ID (BID) is elected as the root bridge
● BID is made up of a priority value and a MAC address (with the lowest value considered root)
▪ Nonroot bridge
● All other switches in an STP topology
▪ MAC Address table corruption can occur

35
Q

Root, Designated, and Non-Designated Ports

A

▪ Root Port
● Every non-root bridge has a single root port
● Port closest to the root bridge in terms of cost
● If costs are equal, lowest port number is chosen
▪ Designated Port
● Every network segment has a designated port
● Port closest to the root bridge in terms of cost
● All ports on root bridge are designated ports
▪ Non-Designated Port
● Ports that block traffic to create loop-free topology

36
Q

Root and Nonroot Bridges

A

▪ Single root port on non-root bridge
▪ All other ports on non-root bridge are non-designated
▪ All ports on root bridge are designated

37
Q

Port States

A

▪ Non-designated ports do not forward traffic during normal operation, but do receive bridge protocol data units (BPDUs)

▪ If a link in the topology goes down, the non-designated port detects the failure and determines whether it needs to transition to a forwarding state
▪ To get to the forwarding state, though, it has to transition through four states
▪ Blocking
● BPDUs are received but they are not forwarded
● Used at beginning and on redundant links
▪ Listening
● Populates MAC address table
● Does not forward frames
▪ Learning
● Processes BPDUs
● Switch determines its role in the spanning tree
▪ Forwarding
● Forwards frames for operations
▪ Root and Non-designated port are blocking
▪ Designated ports are forwarding

38
Q

Link Costs

A

▪ Associated with the speed of a link
▪ Lower the link’s speed, the higher the cost

▪ Long STP is being adopted due to higher link speeds over 10 Gbps
▪ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10 Tbps

39
Q

Virtual Local Area Network (VLAN)

A

o VLANs
▪ Switch ports are in a single broadcast domain
▪ Allow you to break out certain ports to be in different broadcast domains
▪ Before VLANs, you had to use routers to separate departments, functions, or subnets
▪ Allow different logical networks to share the same physical hardware
▪ Provides added security and efficiency

40
Q

Before VLANs

A

▪ Different switches were required for each LAN for separation

41
Q

VLAN Trunking (802.1q)

A

▪ Multiple VLANs transmitted over the same physical cable
▪ VLANs are each tagged with 4-byte identifier
● Tag Protocol Identifier (TPI)
● Tag Control Identifier (TCI)
▪ One VLAN is left untagged
● Called the Native VLAN

42
Q

Specialized Network Devices

A
43
Q

Virtual Private Network (VPN)

A

▪ Creates a secure VPN or virtual tunnel over an untrusted network like the Internet

44
Q

VPN Concentrator

A

▪ Virtual private network (VPN) creates a secure, virtual tunnel network over an untrusted network, like the Internet
▪ One of the devices that can terminate VPN tunnels is a VPN concentrator, although firewalls can also perform this function

45
Q

VPN Headend

A

VPN Headend
▪ A specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device

46
Q

Firewalls

A

▪ Network security appliance at your boundary
▪ Firewalls can be software or hardware
▪ Stateful firewalls
● Allows traffic that originates from inside the network and go out to the Internet
● Blocks traffic originated from the Internet from getting into the network

47
Q

Next-Generation Firewall (NGFW)

A

▪ Conducts deep packet inspection at Layer 7
▪ Detects and prevents attacks
▪ Much more powerful than basic stateless or stateful firewalls
▪ Continually connects to cloud resources for latest information on threats

48
Q

Intrusion Detection or Prevention System (IDS/IPS)

A

▪ IDS recognizes attacks through signatures and anomalies
▪ IPS recognizes and responds
▪ Host or network-based devices

49
Q

Proxy Server

A

A specialized device that makes requests to an external network on behalf of a client

50
Q

Content Engine/Caching Engine

A

▪ Dedicated appliance that performs the caching functions of a proxy server

51
Q

Content Switch/Load Balancer

A

▪ Distributes incoming requests across various servers in a server farm

52
Q

Other devices you may find on your network

A

o VoIP Phone
▪ A hardware device that connects to your IP network to make a connection to a call manager within your network

o Unified Communications (or Call) Manager
▪ Used to perform the call processing for hardware and software-based IP phones

o Industrial Control System (ICS)
▪ Describes the different types of control systems and associated instrumentation

o Supervisory Control and Data Acquisition (SCADA)
▪ Acquires and transmits data from different systems to a central panel for monitoring and control

o Virtual Network Devices
▪ Major shift in the way data centers are designed, fielded, and operated