Ethernet Networking and Data Encapsulation Flashcards

1
Q

a contention-based media access method that allows all hosts on a network to share the same link’s bandwidth

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ethernet uses both ___ and ___ layer specifications, presented with information relative to both layers, and need to effectively implement, troubleshoot, and maintain an ethernet network

A

data link and physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to a network scenario wherein one device sends a frame out on a physical network segment forcing every other device on the same segment to pay attention to it

A

collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

true or false: the hosts connected ot each hub are in the same collision domain, so if one of them transmits, all the others must take the time to listen for and read the digital signal

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

true or false: each port of a switch is a single collision domain

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

true or false: switches can’t break broadcast domains

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to a group of devices on a specific network segment that hear all the broadcasts sent out on that specific network segment

A

broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is usually a boundary delimited by physical media like switches and routers

A

broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

broadcast domain can also refer to a _______ of a network segment, where all hosts can communicate via a data link layer, hardware address broadcast

A

logical division

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium

A

carrier sense multiple access with collision detection (csma/cd)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

created to overcome the problem of the collisions that occur when packets are transmitted from different nodes at the same time

A

csma/cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

enumerate what happens when a collision occurs on an ethernet LAN

A
  1. a jam signal informs all devices that a collision occurred.
  2. the collision invokes a random backoff algorithm
  3. each device on the ethernet segment stops transmitting for a short time until its backoff timer expires.
  4. all hosts have equal priority to transmit after the timers have expired
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

defined in the original IEEE 802.3 Ethernet specification, Cisco says Ethernet uses only one wire pair with a digital signal running in both directions on the wire

A

half-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what protocol does half-duplex use?

A

csma/cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

true or false: if a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the six situations where you can operate in full-duplex ethernet

A

with a connection from a:
switch to a host
switch to a switch
host to a host
switch to a router
router to a router
router to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

decides on the exchange capability, which means it checks to see if it can run at 10, 100, or even 1000 Mbps. it then checks to see if it can run full-duplex, and if it can’t, it will run half-duplex

A

auto-detect mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

enumerate the important points in full-duplex

A
  1. there are no collisions in full-duplex mode
  2. a dedicated switch port is required for each full-duplex mode
  3. the host network card and the switch port must be capable of operating in full-duplex mode
  4. the default behavior of 10Base-T and 100Base-T hosts is 10 mbps half-duplex if the auto-detect mechanism fails, so it is always goo practice to set the speed and duplex of each port on a switch if you can
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ at the data link layer is responsible for ethernet addressing, commonly referred to as MAC orr hardware addressing

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

it is also responsible for framing packets received from the network layer and preparing them for transmission on the local network through the ethernet contention-based media access emthod

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ethernet addressing uses _____ address burned into each and every ethernet network interface card (nic)

A

media access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how many bits and bytes is in a MAC address

A

48 bits or 6 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

in what format is the MAC address written in

A

Hexadecimal format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what does OUI mean

A

organizationally unique identifier (OUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
the OUI is assigned by whom
IEEE
26
what does IEEE mean
institute of electrical and electronics engineers
27
it is composed of 24 bits or 3 bytes and it assigns a globally administered address also made up of 24 bits or 3 bytes, which is unique to each and every adapter an organization manufactures
organizationally unique identifier (OUI)
28
the high order bit is in the
individual/group (I/G) bit
29
true or false: when the high-order bit has a value of 0, we can assume that the address is the MAC address of a device and that it may well appear in the source portion of the MAC header
true
30
when the high-order bit in the MAC address is a 1, what does it represent
the address represents either a broadcast or multicast address in the ethernet
31
this is used to send data to multiple devices on a network
multicast MAC address
32
this MAC address is used to send data to all devices on a local network segment
Broadcast MAC Address (FF:FF:FF:FF:FF:FF)
33
what does G/L bit or U/L bit mean
global/local bit or universal/local bit
34
what does the G/L bit represent when it's set to 0 or 1
0 - globally administered address 1 - locally governed and administered address
35
represents a locally administered or manufacturer/vendor-assigned code
the low order 24 bits
36
the use to limit either 1 or 0
binary digits or bits
37
a group of either 4 or 8 bits together
nible or byte
38
placed in a value spot, starting at the right and moving left, with each spot having double the value of the previous spot
binary numbers
39
short for hexadecimal, which is a numbering system that uses the first six letters of the alphabet
hex
40
responsible for combining bits into bytes and bytes into frames
data link layer
41
the MAC frame format provides error detection from a
cyclic redundancy check (CRC)
42
encapsulating a frame within a different type of frame is called
tunneling
43
what is the typical ethernet format
ethernet ii preamble - 7 bytes sfd - 1 byte destination - 6 bytes source - 6 bytes type - 2 bytes data and pad - 46 to 1500 bytes fcs - 4 bytes
44
an alternating 1, 0 pattern providing a 5 MHHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream
preamble
45
how many octets is the preamble
seven
46
how many octets is the SFD
one
47
10101011, where the last pair of 1s allows the receiver to come into alternating 1, 0 pattern somewhere in the middle and still sync up to detect the beginning of the data
start frame delimiter (SFD)/Synch
48
transmits a 48-bit value using the least significant bit (LSB) first; used by receiving stations to determine whether an incoming packet is addressed to a particular node.
Destination Address
49
true or false: the destination address can be an individual address or a broadcast or multicast MAC address
true
50
true or false: broadcast address is all 1s or all Fs in hex sent to all devices
true
51
this is only sent to a similar subset of nodes on a network
multicast
52
this is a 48-bit MAC address used to identify the transmitting device, and it uses the least significant bit first.
source address (SA)
53
true or false: broadcast and multicast address formats are illegal within the SA field
true
54
uses a length field, but the ethernet_ii frame uses a type field to identify the network layer protocol.
length or type 802.3
55
true or false: the old, original 802.3 cannot identify the upper-layer protocol and must be used with a proprietary LAN-IPX, for example
true
56
a field at the end of the frame that's used to store the cyclic redundancy check answer
frame check sequence
57
it uses a math algorithm that runs when each frame is built based on the data in the frame when a receiving host receives the frame and runs the CRC, the answer should be the same if not the frame is discarded assuming errors have occured
cyclic redundancy check (CRC)
58
they created and implemented the first ethernet LAN specification, which the IEEE used to create the IEEE 802.3 committee
Digital, Intel, and Xerox (DIX)
59
true or false: DIX was a 10 mbps network running on a coax then eventually twisted pair and fiber physical media
truea
60
what does eia/tia mean
electronic industries alliance and the newer telecommunications industry association
61
standard body that creates physical layer specifications for ethernet
eia/tia
62
this specifies that ethernet uses a registered jack (RJ) connector on unshielded twisted pair (UTP) cabling (RJ45)
eia/tia
63
what are the three types of cables
straight-through cable crossover cable rolled cable
64
can handle speeds up to a gigabit with a distance of up to 100 meters typically used for 100 mbps
category 5 enhanced UTP cable
65
what cable is used for a gigabit
category 6
66
1. rated for gigabit speeds 2. rated for 10gbp
1. cat5 2. cat6
67
use cases of straight-through cable
host to switch router to switch
68
how many wires are used in straight through cable to connect ethernet devices
four wires
69
on what pins do straight through cables transmit and receive pins
transmit: 1 & 2 receive: 3 & 6
70
sequence of a t-568a wiring standard
WG G WO B WB O WB B
71
sequence of a t-568b wiring standard
WO O WG B WB G WB B
72
use cases of crossover cable
switch to switch hub to hub host to host hub to switch router direct to host router to router
73
setup of a crossover ethernet cable
device 1: receive on pins 1 & 2 transmit on pins 3 & 6 device 2: transmit on pins 3 & 6 receive on pins 1 & 2
74
what is 1000base-t
UTP gigabit wiring
75
isn't used to connect any ethernet connections together, used to connect to a host EIA-TIA 232 interface to a router console serial communication (COM) port
rolled cable
76
how many wires are used in a rolled cable
eight wires, though not all is used to send information
77
the easiest cables to make because you just cut the end off on one side of a straight-through cable, turn it over, and put it back on-with a new connector
rolled cable
78
what emulation program is used to create a console connection and configure the device
PuTTY or SecureCRT
79
cable that allows for very fast transmission of data, made of glass or plastic, is very thin and works as a waveguide to transmit light between two ends of the fiber
fiber optic
80
true or false: fiber optic is immune to interference like crooss-talk
true
81
fiber cable parts
core, cladding, buffer
82
125 microns, a fiber standard that allows manufacturers to make connectors for all fiber cables
cladding
83
protects the delicate glass in fiber cables
buffer
84
two types of fiber optics
single-mode multimode
85
more expensive, has a tighterr cladding, and can go much farther distances than multimode
single-mode
86
looser cladding and has a larger core so it allows multiple light particles to travel down the glass
multimode
87
when a host transmits data across the network to another device, the data goes through a process and wrapped with protocol information at each layer of the OSI model
encapsulation
88
used to communicate and exchange information in each layer
protocol data units (PDUs)
89
these hold the control information attached to theh data at each layer of the model. they are usually attached to the header in front of the data field but can also be at the trailer or end of it
protocol data units (PDUs)
90
a piece of data created and attached data field in transport layer
segment
91
used to get each segment to the correct network
logical addressing
92
adds a control header to the segment handed down from the transport layer
packet or datagram
93
how does the data encapsulation method work
1. user information is converted to data for transmission on the network 2. data is converted to segments and a reliable connection is set up between the transmitting and receiving hosts 3. segments are converted to packets or datagrams, and a logical address is placed in the header so each packet can be routed through an internetwork 4. packets or datagrams are converted to frames for transmission on the local network 5. frames are converted to bits, and a digital encoding and clocking scheme is used
94
port number used in part to define the virtual circuit
source port: 1028
95
port number used to define upper layer process or application
destination port: 23
96
what are the three layers in the cisco hierarchical model
core, distribution, access
97
this helps us understand where things belong, how things fit together, and what functions go where helps us summarize a complex collection of details into an understandable model, bringing order from the chaos
hierarchy
98
can help you design, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork
cisco hierarchical model
99
core of the network responsible for transporting large amounts of traffic both reliably and quickly; switches traffic as fast as possible
the core layer
100
don't do in core layer
]don't use access lists or perform routing between VLAN or implement packet filtering in the core layer don't support workgroup access avoid expanding the core; upgrade than expand
101
sometimes referred to as the workgroup layer and is the communication point between the access layer and the core
distribution layer
102
provides routing, filtering, and WAN access and to determine how packets can access the core, if needed
Distribution layer
103
must determine the fastest way that network service requests are handled-for example, how a file request is forwarded to a server
distribution layer
104
what are the things handled by the distribution layer
routing, implementing tools, access lists, packet filtering, queuing, implementing security and network policies, redistributing between routing protocols, routing between VLANS and other workgroup fucntions, define broadcast and multicast domains
105
controls user and workgroup access to internetwork resources
access layer
106
the access layer is sometimes referred to as
desktop layer
107
this layer handles any traffic for remote services
access layer
108
functions of the access layer
use of access control and policies, separation of collision domains (microsegmentation), workgroup connectivity, device connectivity, resiliency and security services, advanced technology capabilities
109
what are the common ethernet standards, starting with 10 mbps ethernet
10Base-T (IEEE 8022.3) 100Base-TX (IEEE 802.3u) 100Base-FX (IEEE 802.3u) 100Base-CX (IEEE 802.3z) 1000Base-T (IEEE 802.3ab) 1000Base-SX (IEEE 802.3z) 1000Base-LX (IEEE 802.3z) 1000Base-Zx (Cisco Standard) 10GBase-T (802.3.an) 10GBase-T
110
most commonly known as fast ethernet, uses eia/tia category 5, 5e, or 6 utp two-pair wiring upto 100 meters long uses an rj45 connector
100Base-TX (IEEE 802.3u)