Ethernet Networking and Data Encapsulation Flashcards

1
Q

______ is a contention-based media access method that allows all hosts on a network to share the same link’s bandwidth.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False:
Ethernet uses both Data Link and Physical layer specifications, presented with information relative to both layers, and need to effectively implement, troubleshoot, and maintain an Ethernet network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ refers to a network scenario wherein one device sends a frame out on a physical network segment forcing every other device on the same segment to pay attention to it.

A

collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False:
The hosts connected to each hub are in the same collision domain, so if one of them transmits, all the others must take the time to listen for and read the digital signal.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:
Each connection on a switch creates a separate collision domain.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False:
switches don’t break up broadcast domains by default

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It refers to a group of devices on a specific network segment that hear all the broadcasts sent out on that specific network segment.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ is usually a boundary delimited by physical media like switches and routers, the term can also refer to a logical division of a network segment, where all hosts can communicate via a Data Link layer, hardware address broadcast.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ______ creates broadcast domain boundaries.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium.

A

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ was actually created to overcome the problem of the collisions that occur when packets are transmitted from different nodes at the same time

A

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:
When a collision occurs on an Ethernet LAN, the following happens:
1. A jam signal informs all devices that a collision occurred.
2. The collision invokes a random backoff algorithm.
3. Each device on the Ethernet segment stops transmitting for a short time until its backoff timer expires.
4. All hosts have equal priority to transmit after the timers have expired.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ is defined in the original IEEE 802.3 Ethernet specification, Cisco says Ethernet uses only one wire pair with a digital signal running in both directions on the wire.

A

Half-duplex Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ also uses the CSMA/CD protocol I just discussed to help prevent collisions and to permit retransmitting if one occurs

A

Half-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a ______ is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions.

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Six situations that you can full-duplex ethernet:

A
  1. With a connection from a switch to a host
  2. With a connection from a switch to a switch
  3. With a connection from a host to a host
  4. With a connection from a switch to a router
  5. With a connection from a router to a router
  6. With a connection from a router to a host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ decides on the exchange capability, which means it checks to see if it can run at 10, 100, or even 1000 Mbps. It then checks to see if it can run full-duplex, and if it can’t, it will run half- duplex.

A

Auto-detect Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Important points in Full-Duplex:

A
  1. There are no collisions in full-duplex mode.
  2. A dedicated switch port is required for each full-duplex node.
  3. The host network card and the switch port must be capable of operating in full-duplex mode.
  4. The default behavior of 10Base-T and 100Base-T hosts is 10 Mbps half-duplex if the autodetect mechanism fails, so it is always good practice to set the speed and duplex of each port on a switch if you can.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ethernet at the _______ is responsible for Ethernet addressing, commonly referred to as MAC or hardware addressing.

A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_______ is also responsible for framing packets received from the Network layer and preparing them for transmission on the local network through the Ethernet contention-based media access method.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It uses the Media Access Control (MAC) address burned into each and every Ethernet network interface card (NIC).

A

Ethernet Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The MAC, or hardware, address is a_____ written in a ______ format.

A

48-bit (6-byte) address ;
hexadecimal format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ is assigned by the IEEE to an organization. It’s composed of 24 bits, or 3 bytes, and it in turn assigns a globally administered address also made up of 24 bits, or 3 bytes, that’s supposedly unique to each and every adapter an organization manufactures.

A

Organizationally Unique Identifier (OUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False:
The high-order bit is the Individual/Group (I/G) bit. When it has a value of 0, we can assume that the address is the MAC address of a device and that it may well appear in the source portion of the MAC header.

When it’s a 1, we can assume that the address represents either a broadcast or multicast address in Ethernet.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
________, sometimes called the G/L bit or U/L bit, where U means universal.
Global/Local bit
24
In Global/Local bit, when set to 0, this bit represents a ______ administered address, as assigned by the IEEE, but when it’s a 1, it represents a ______ governed and administered address. The low- order 24 bits of an Ethernet address represent a _______ code.
globally; locally; locally administered or manufacturer-assigned
25
_________ the use to limit either 1 or 0.
Binary digits or bits
26
__________ is group either 4 or 8 buts together
Nible and byte
27
The _______ are placed in a value spot, starting at the right and moving left, with each spot having double the value of the previous spot.
binary numbers
28
the typical decimal format being the _____ number
base-10
29
Hex is short for _____, which is a numbering system that uses the first six letters of the alphabet.
hexadecimal
30
The _______ is responsible for combining bits into bytes and bytes into frames.
Data Link layer
31
It provides error detection from a cyclic redundancy check (CRC).
MAC frame format
32
Encapsulating a frame within a different type of frame is called ________.
tunneling
33
Details of the various fields in the typical Ethernet frame type:
Preamble Start Frame Delimiter (SFD)/Synch Destination Address (DA) Source Address (SA) Length or Type Frame Check Sequence (FCS)
34
An alternating 1,0 pattern provides a 5 MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream.
Preamble
35
The preamble is seven octets and this is one octet (synch). The ____ is 10101011, where the last pair of 1s allows the receiver to come into the alternating 1,0 pattern somewhere in the middle and still sync up to detect the beginning of the data.
Start Frame Delimiter (SFD)/Synch
36
This transmits a 48-bit value using the least significant bit (LSB) first. The ____ is used by receiving stations to determine whether an incoming packet is addressed to a particular node. The destination address can be an individual address or a broadcast or multicast MAC address. Remember that a broadcast is all 1s—all Fs in hex— and is sent to all devices. A multicast is sent only to a similar subset of nodes on a network.
Destination Address (DA)
37
The ____ is a 48-bit MAC address used to identify the transmitting device, and it uses the least significant bit first. Broadcast and multicast address formats are illegal within the field.
Source Address (SA)
38
802.3 uses a Length field, but the Ethernet_II frame uses a Type field to identify the Network layer protocol. The old, original 802.3 cannot identify the upper-layer protocol and must be used with a proprietary LAN—IPX, for example.
Length or Type
39
_________ is a field at the end of the frame that’s used to store the cyclic redundancy check (CRC) answer. The CRC is a mathematical algorithm that’s run when each frame is built based on the data in the frame. When a receiving host receives the frame and runs the CRC, the answer should be the same. If not, the frame is discarded, assuming errors have occurred.
Frame Check Sequence (FCS)
40
______ created and implemented the first Ethernet LAN specification, which the IEEE used to create the IEEE 802.3 committee.
Digital, Intel, and Xerox (DIX)
41
The ________ is the standards body that creates the Physical layer specifications for Ethernet. The EIA/TIA specifies that Ethernet use a registered jack (RJ) connector on unshielded twisted-pair (UTP) cabling (RJ45). But the industry is moving toward simply calling this an 8-pin modular connector.
EIA/TIA (Electronic Industries Alliance and the newer Telecommunications Industry Association)
42
Common IEEE Ethernet Standards, Starting With 10 Mbps Ethernet:
10Base-T (IEEE 802.3) 100Base-TX (IEEE 802.3u) 100Base-FX (IEEE 802.3u) 1000Base-CX (IEEE 802.3z) 1000Base-T (IEEE 802.3ab) 1000Base-SX (IEEE 802.3z) 1000Base-LX (IEEE 802.3z) 1000Base-SX (IEEE 802.3z) 1000Base-LX (IEEE 802.3z) 1000Base-ZX (Cisco standard) 10GBase-T (802.3.an) 10GBase-T
43
10 Mbps using category 3 unshielded twisted pair (UTP) wiring for runs up to 100 meters. Unlike with the 10Base-2 and 10Base-5 networks, each device must connect into a hub or switch, and you can have only one host per segment or wire. It uses an RJ45 connector (8-pin modular connector) with a physical star topology and a logical bus.
10Base-T (IEEE 802.3)
44
_______, most commonly known as Fast Ethernet, uses EIA/TIA category 5, 5E, or 6 UTP two-pair wiring. One user per segment; up to 100 meters long. It uses an RJ45 connector with a physical star topology and a logical bus.
100Base-TX (IEEE 802.3u)
45
Uses fiber cabling 62.5/125-micron multimode fiber. Point- to- point topology; up to 412 meters long. It uses ST and SC connectors, which are media interface connectors.
100Base-FX (IEEE 802.3u)
46
Copper twisted-pair, called twinax, is a balanced coaxial pair that can run only up to 25 meters and uses a special 9-pin connector known as the High Speed Serial Data Connector (HSSDC). This is used in Cisco’s new Data Center technologies.
1000Base-CX (IEEE 802.3z)
47
Category 5, four-pair UTP wiring up to 100 meters long and up to 1 Gbps.
1000Base-T (IEEE 802.3ab)
48
The implementation of 1 Gigabit Ethernet running over multimode fiber-optic cable instead of copper twisted-pair cable, using short wavelength laser. Multimode fiber (MMF) using 62.5- and 50-micron core; uses an 850 nanometer (nm) laser and can go up to 220 meters with 62.5-micron, 550 meters with 50-micron.
1000Base-SX (IEEE 802.3z)
49
Single-mode fiber that uses a 9-micron core and 1300 nm laser and can go from 3 kilometers up to 10 kilometers.
1000Base-LX (IEEE 802.3z)
50
The implementation of 1 Gigabit Ethernet running over multimode fiber-optic cable instead of copper twisted-pair cable, using short wavelength laser. Multimode fiber (MMF) using 62.5- and 50-micron core; uses an 850 nanometer (nm) laser and can go up to 220 meters with 62.5-micron, 550 meters with 50-micron.
1000Base-SX (IEEE 802.3z)
51
Single-mode fiber that uses a 9-micron core and 1300 nm laser and can go from 3 kilometers up to 10 kilometers.
1000Base-LX (IEEE 802.3z)
52
________ is a Cisco specified standard for Gigabit Ethernet communication. 1000BaseZX operates on ordinary single-mode fiber-optic links with spans up to 43.5 miles (70 km).
1000Base-ZX (Cisco standard) ; 1000BaseZX, or 1000Base-ZX,
53
It is a standard proposed by the IEEE 802.3an committee to provide 10 Gbps connections over conventional UTP cables, (category 5e, 6, or 7 cables).
10GBase-T (802.3.an)
54
______ allows the conventional RJ45 used for Ethernet LANs and can support signal transmission at the full 100-meter distance specified for LAN wiring.
10GBase-T
55
THREE TYPES OF CABLES:
Straight-through cable Crossover cable Rolled cable
56
The ______ cable can handle speeds up to a gigabit with a distance of up to 100 meters. Typically we’d use this cable for 100 Mbps and category 6 for a gigabit, but the category 5 Enhanced is rated for gigabit speeds and category 6 is rated for 10 Gbp
category 5 Enhanced UTP
57
The______ is used to connect the following devices: Host to switch or hub Router to switch or hub
straight-through cable
58
______ isn’t used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a host EIA- TIA 232 interface to a router console serial communication (COM) port.
ROLLED CABLE
59
If you have a Cisco router or switch, you would use this cable to connect your PC, Mac, or a device like an iPad to the Cisco hardware.
Rolled Cable
60
Eight wires are used in this cable to connect serial devices, although not all eight are used to send information, just as in Ethernet networking.
Rolled Cable
61
This cable allows for very fast transmission of data, is made of glass (or even plastic!), is very thin, and works as a waveguide to transmit light between two ends of the fiber.
Fiber Optic
62
______ has been used to go very long distances, as in intercontinental connections, but it is becoming more and more popular in Ethernet LAN networks due to the fast speeds available and because, unlike UTP, it’s immune to interference like cross-talk.
Fiber optics
63
Layers of a typical fiber cable:
Buffer (Outer) Cladding (Middle) Core (Inner)
64
The ______ is 125 microns, which is actually a fiber standard that allows manufacturers to make connectors for all fiber cables. The last piece of this cable is the ______, which is there to protect the delicate glass.
cladding; buffer
65
There are two major types of fiber optics:
Single-mode Multimode
66
________ is more expensive, has a tighter cladding, and can go much farther distances than multimode. The difference comes in the tightness of the cladding, which makes a smaller core, meaning that only one mode of light will propagate down the fiber.
Single-mode
67
_______ is looser and has a larger core so it allows multiple light particles to travel down the glass.
Multimode
68
_______ is when a host transmits data across a network to another device, the data goes through a process and wrapped with protocol information at each layer of the OSI model.
Encapsulation
69
______ use to communicate and exchange information in each layer.
Protocol data units (PDUs)
70
These hold the control information attached to the data at each layer of the model. They are usually attached to the header in front of the data field but can also be at the trailer, or end, of it.
Protocol data units (PDUs)?
71
_____ is a piece of data created and attached data field in transport layer.
Segment
72
_____ (for example, IP and IPv6) is used to get each segment to the correct network.
Logical addressing
73
______ adds a control header to the segment handed down from the Transport layer.
Packet Or Datagram
74
The Data Encapsulation Method Works Like This:
1. User information is converted to data for transmission on the network. 2. Data is converted to segments, and a reliable connection is set up between the transmitting and receiving hosts. 3. Segments are converted to packets or datagrams, and a logical address is placed in the header so each packet can be routed through an internetwork. 4. Packets or datagrams are converted to frames for transmission on the local network. Hardware (Ethernet) addresses are used to uniquely identify hosts on a local network segment. 5. Frames are converted to bits, and a digital encoding and clocking scheme is used.
75
______ that helps us understand where things belong, how things fit together, and what functions go where.
Hierarchy
76
_____ helps summarize a complex collection of details into an understandable model, bringing order from the chaos.
Hierarchy
77
The can help you design, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork.
Cisco hierarchical model
78
The _____ is literally the core of the network.
core layer
79
- is responsible for transporting large amounts of traffic both reliably and quickly. - is to switch traffic as fast as possible.
Core layer
80
Don’t do in core layer:
1. Never do anything to slow down traffic. This includes making sure you don’t use access lists, perform routing between virtual local area networks, or implement packet filtering. 2. Don’t support workgroup access here. 3. Avoid expanding the core (e.g., adding routers when the internetwork grows). If performance becomes an issue in the core, give preference to upgrades over expansion.
81
Here’s a list of things that we want to achieve as we design the core: Design the core for high reliability. Consider data-link technologies that facilitate both speed and redundancy, like Gigabit Ethernet with redundant links or even 10 Gigabit Ethernet. Design with speed in mind. The core should have very little latency. Select routing protocols with lower convergence times. Fast and redundant data-link connectivity is no help if your routing tables are shot!
Design the core for high reliability. Consider data-link technologies that facilitate both speed and redundancy, like Gigabit Ethernet with redundant links or even 10 Gigabit Ethernet. Design with speed in mind. The core should have very little latency. Select routing protocols with lower convergence times. Fast and redundant data-link connectivity is no help if your routing tables are shot!
82
The _____ is sometimes referred to as the workgroup layer and is the communication point between the access layer and the core.
distribution layer
83
The primary functions of the _____ are to provide routing, filtering, and WAN access and to determine how packets can access the core, if needed.
distribution layer
84
The ______ must determine the fastest way that network service requests are handled—for example, how a file request is forwarded to a server.
distribution layer
85
There are several things that should generally be handled at the distribution layer:
1. Routing Implementing tools (such as access lists), packet filtering, and queuing 2. Implementing security and network policies, including address translation and firewalls 3. Redistributing between routing protocols, including static routing 4. Routing between VLANs and other workgroup support functions 5. Defining broadcast and multicast domains
86
The _____ controls user and workgroup access to internetwork resources.
access layer
87
The following are some of the functions to be included at the access layer:
Continued (from distribution layer) use of access control and policies Creation of separate collision domains (microsegmentation/switches) Workgroup connectivity into the distribution layer Device connectivity Resiliency and security services Advanced technology capabilities (voice/video, etc.)
87
The access layer is sometimes referred to as the _______. The network resources most users need will be available locally because the distribution layer handles any traffic for remote services.
desktop layer
88