Lower Layers Part 2 Flashcards

1
Q

What are the three types of networks classified by area?

A

LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network)

Personal Area Networks (PANs) are also sometimes included.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary distinction between LANs and WANs in terms of technology?

A

LANs typically use simpler technologies and protocols, while WANs require more complex planning and structured addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does CSMA/CD stand for?

A

Carrier Sense Multiple Access Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the main purpose of early LANs?

A

To connect terminals to timeshare computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is one of the main applications of WANs?

A

File transfer, job transfer, remote login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: Ethernet was originally developed at Xerox in the 1970s.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: The maximum frame size for Ethernet is _______ bytes.

A

1500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the significance of the 0x55 preamble in Ethernet frames?

A

It allows receivers to synchronize with the data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technology is known for connecting computers within data centers?

A

Vendor Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the typical maximum length of an Ethernet segment without amplification?

A

500 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol suite did ARPANET originally use before TCP/IP?

A

NCP (Network Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two main types of Ethernet cables mentioned?

A

Coaxial cable and twisted pair cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens when a collision is detected in a CSMA/CD network?

A

The network is jammed with a specific pattern to inform all stations of the collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the minimum frame size for Ethernet?

A

64 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: The function of the VLAN tag in an Ethernet frame is mandatory.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ATM stand for in networking technology?

A

Asynchronous Transfer Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of the inter-packet gap in Ethernet?

A

To allow time for the network to recover before the next packet is sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the main challenge of WAN technology historically?

A

Slow speed and unreliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum diameter for an Ethernet network determined by?

A

The maximum length of the transmission medium and the permissible number of repeaters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the function of a checksum in Ethernet frames?

A

To verify the integrity of the data within the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the term ‘collision domain’ refer to?

A

The set of all stations whose packets might mutually collide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fill in the blank: Ethernet originally operated at _____ Mbps.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False: The Ethernet protocol allows multiple stations to transmit simultaneously without any control.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the different BaseT standards for Ethernet?

A

10BaseT, 100BaseT, 1000BaseT

These standards represent different speeds and technologies for Ethernet networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the maximum length for twisted pair cables in modern Ethernet?

A

95m

This applies when using RJ45 connectors to a hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of cabling is required for faster Ethernet speeds?

A

Category 5

This cabling has different twists in the pairs to support higher data rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the function of a repeater in networking?

A

An analogue amplifier that sees collisions on both sides

Repeaters regenerate signals but do not prevent collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What distinguishes a ‘dumb’ bridge from a ‘learning’ bridge?

A

‘Dumb’ bridges propagate all frames, while ‘learning’ bridges only send frames that belong on the other side

This reduces unnecessary traffic in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or False: Ether hubs are considered bridges.

A

False

Ether hubs are repeaters and do not manage collisions like bridges do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the main advantage of full duplex in Ethernet?

A

Traffic goes in and out without colliding

Each direction operates as a separate collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are cut-through switches designed to do?

A

Transmit frames immediately after reading the header

This reduces latency but can propagate broken frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a key characteristic of ATM (Asynchronous Transfer Mode)?

A

It breaks data into a stream of 48-byte packets

This was a compromise due to political reasons among different stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the purpose of traffic shaping in ATM?

A

To manage bandwidth and ensure quality of service

It allows for different profiles like Constant Bit Rate and Variable Bit Rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the maximum speed of ATM25?

A

25Mbps

This was commonly used in ADSL modems during the late 1990s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What networking topology does IBM Token Ring use?

A

Star topology

This topology was popular for its robustness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Fill in the blank: A __________ is a set of learning bridges in a box.

A

switch

Switches manage traffic efficiently in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the latency introduced by conservative switches?

A

Additional latency compared to a straight piece of wire

This is due to the need to confirm checksums before transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the function of a virtual circuit in ATM?

A

To establish a dedicated path for packets

This simplifies error recovery and maintains packet order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What problem is associated with the original idea for UK ADSL broadband using switched virtual circuits?

A

ATM switches couldn’t handle the volume of circuit establishment

This led to the use of permanent virtual circuits instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the main disadvantage of the ATM’s 48-byte packet structure?

A

It is appalling for performance and reliability

This structure complicates the mixing of voice and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

True or False: Token Ring networks guarantee bounded latency.

A

True

However, in practice, achieving this is complicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What technology is used in CDDI?

A

FDDI over copper

CDDI can survive multiple failures but was expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the purpose of slotted rings in networking?

A

To circulate empty data frames instead of tokens

This concept was inspired by the conveyor belt in a Sushi restaurant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does the term ‘echo cancellation’ refer to?

A

Filtering out echoes in telephony for clear audio

This is critical for maintaining call quality.

45
Q

What are the four types of ATM traffic profiles?

A
  • Constant Bit Rate
  • Available Bit Rate
  • Variable Bit Rate
  • Unspecified Bit Rate

These profiles help manage bandwidth and quality of service.

46
Q

What is a Constant Bit Rate (CBR)?

A

Guarantees a fixed-speed point-to-point link

CBR is as close to a piece of wire as you can get.

47
Q

What does Variable Bit Rate (VBR) allow?

A

Allows bursting to higher speeds while preserving guarantees about timing

48
Q

What is Available Bit Rate (ABR)?

A

Guarantees a minimum performance but potentially delays packets that exceed it

ABR is very complicated.

49
Q

What does Unspecified Bit Rate (UBR) represent?

A

Best efforts for rate, delay, and reliability

50
Q

What do all traffic profiles guarantee that IP does not?

A

Ordering

51
Q

What is traffic shaping?

A

Shaping data into a particular profile by clocking it into large buffers as it arrives

52
Q

What happens when the average input rate exceeds the average departure rate in traffic shaping?

A

Packets are dropped

53
Q

What is Random Early Drop?

A

A strategy to randomly drop packets with increasing probability as the buffer fills

54
Q

What is the purpose of traffic policing?

A

Checks whether passing traffic is within parameters for the virtual circuit and discards anything outside

55
Q

What is Multi-Protocol Label Switching (MPLS)?

A

A technology that can be thought of as ATM with larger packets

56
Q

What is the benefit of using Wave Division Multiplexing (WDM)?

A

Transmits multiple streams down a single fibre using different colour light

57
Q

What is the difference between Dense and Coarse Wavelength Division Multiplexing?

A

Coarse: 20nm difference; Dense: originally 0.8nm difference, now can be 0.4nm or 0.2nm

58
Q

What is the typical use case for Ethernet in 2023?

A

Short range: ether over copper; Medium range: ether over multimode fibre; Long range: ether over WDM

59
Q

What does Ethernet switching solve?

A

Many problems of Ethernet including data hogging by machines and unpredictable performance

60
Q

What is understeer in driving terms?

A

When the driver hits the barrier with the front of the car

61
Q

What does queuing in networking refer to?

A

The management of data packets as they wait for processing in a network

62
Q

What can happen if a switch does not have ingress queuing of at least 8K?

A

The request is repeated until the PC gives up

63
Q

What is a special case of queuing in networking?

A

Blocking

64
Q

What are the characteristics of core switches?

A

Non-blocking, sufficient capacity to switch all ports at wire speed with arbitrary packet sizes

65
Q

What is the typical buffering strategy at the edge of a network?

A

Deeper per-port buffers and sometimes global buffers shared by all ports

66
Q

What is the takeaway regarding Ethernet switching in modern networks?

A

Robust under load with substantial excess performance

67
Q

True or False: Debugging in network capacity issues is straightforward.

A

False

68
Q

Fill in the blank: Traffic policing is often called ______.

A

hard drop policing

69
Q

What job did early LANs perform in addition to connecting terminals?

A

Early LANs were also used for tasks that WANs performed but achieved them faster.

70
Q

What is UUCP and why is it mentioned?

A

UUCP (Unix-to-Unix Copy Protocol) is a system for transferring files, executing commands, and sending email between Unix systems. It was widely used in the early days of networking before the internet became dominant.

It is mentioned humorously here as a relic of the past, with the note that it hasn’t been “used in the wild” for around 20 years.

71
Q

What was a turning point in the past for needing faster networks?

A

When personal workstations were introduced.

72
Q

Why is the 0x55 pattern used in Ethernet communication?

A

The 0x55 pattern is used to help receivers lock to the current speed of the transmitter. This is crucial because Ethernet has no central clock, and devices must synchronize their data clocking independently.

73
Q

What does the note “Network time protocol is standardized now” imply about Ethernet clocking?

A

The note suggests that while Ethernet still relies on decentralized clocking (like using 0x55 patterns), standardized time protocols (e.g., NTP) can help align clocks across devices for better synchronization.

74
Q

What is the process for recovering from a collision in Ethernet communication?

A

On the first attempt, choose a “random” number ( k ) from {0,1} and delay ( k \times 512 ) bit periods before retrying. For subsequent attempts, choose ( k ) from {0…( 2^n )} and delay ( k \times 512 ) bit periods, giving up after 10 attempts.

75
Q

Does the “random number” used in collision recovery need to be truly random?

A

No, it doesn’t have to be truly random, just different from other stations to generate non-identical sequences of delays.

76
Q

What is the maximum number of attempts allowed for collision recovery?

A

The maximum number of attempts is 10, after which the system gives up.

77
Q

What does a Dumb Bridge do with traffic between hosts?

A

A Dumb Bridge forwards all unbroken frames, making traffic visible across both sides.

78
Q

When using a Dumb Bridge, can traffic from Host 1 to Host 2 collide with traffic from Host 4 to Host 5 in a Dumb Bridge setup?

A

No, traffic between these groups does not collide.

79
Q

What is the main feature of a Filtering Bridge?

A

A Filtering Bridge forwards unbroken frames except for local traffic.

80
Q

Why is a Filtering Bridge better for security and capacity?

A

It limits visibility and reduces unnecessary traffic forwarding.

81
Q

What happens to packets with unknown destinations in an Ethernet Switch?

A

Packets are sent out of all ports unless the traffic is for a specific connected device.

82
Q

What is an Ethernet Switch?

A

An Ethernet Switch is a set of learning bridges in a box, with each interface having its own collision domain.

83
Q

How do large buffers in Ethernet Switches handle congestion?

A

Buffers assume high data traffic will last only briefly, managing temporary bursts.

84
Q

What is the backplane in an Ethernet Switch?

A

It allows traffic to be sent only when the destination is known or needs to be located.

85
Q

Is the Ethernet Switch backplane slow or fast? What does it’s speed determine?

A

It is very fast. It’s speed determines the performance of the entire switch.

86
Q

What is the difference between conservative and aggressive cut-through switches?

A

Conservative switches wait for the entire frame and verify the checksum, while aggressive switches start transmitting after reading the header.

87
Q

What is the latency issue with conservative switches?

A

They introduce latency by waiting for the full packet, equivalent to several kilometers of copper transmission.

88
Q

What is the benefit of aggressive cut-through switches?

A

They minimize latency by transmitting after reading only 160–192 bits of the header.

89
Q

What is a potential problem with aggressive cut-through switches?

A

They might propagate broken frames as they do not verify checksums.

90
Q

What was argued about Ethernet despite limited evidence?

A

It was argued to behave badly under high load.

91
Q

What is a theoretical advantage of token-based systems for a network?

A

They offer bounded latency, as the token circulates in a predictable time based on the number of stations and packet periods.

92
Q

What are practical challenges of token-based systems for a network?

A

They are complex to implement correctly due to issues like token loss, creation, and station failure.

93
Q

What is FDDI Fibre, and where is it still in use?

A

FDDI Fibre is a dual-ring network offering 100Mbps, known for robustness, and is still used in interconnects and data centres as a backup.

94
Q

What is a Slotted Ring network?

A

A Slotted Ring network requires a minimum cable length to maintain empty packets and often includes coiled cables under the floor.

95
Q

Why was the Slotted Ring network popular in UK universities?

A

It was cheap, easy to build, and had driver support for Unix variants, though it saw little traction elsewhere.

96
Q

What happens in a Slotted Ring network if a computer crashes after sending a packet that isn’t received?

A

A frame will remain occupied until a clean-up algorithm is used to clear it.

97
Q

What was the issue with creating and destroying circuits in switched virtual circuits (SVC)?

A

Creating and destroying circuits was very “expensive”, making it impractical for frequent dynamic use.

98
Q

What is traffic shaping in networking?

A

Traffic shaping smooths incoming data into a buffer, controlling output rate to prevent congestion and delay.

99
Q

How does a buffer in traffic shaping work?

A

A buffer queues data like passengers on a crowded train, holding it until the network can transmit it at a controlled rate.

100
Q

What is a crude solution for handling excessive traffic in networking?

A

discard packets to prevent buffer overflow.

101
Q

What is Random Early Drop (RED)?

A

RED randomly drops packets as buffers fill up to signal senders to slow down, avoiding complete congestion.

102
Q

What happens after packet loss in transport connections?

A

Packet loss triggers a timeout and retransmission, slowing down the connection over time.

103
Q

What is traffic policing in networking?

A

Traffic policing, or “hard drop” policing, enforces parameters for virtual circuits and discards excess traffic.

104
Q

When is traffic policing useful in networking?

A

Traffic policing is useful for managing mixed data types like voice, file transfer, and video conferencing.

105
Q

What is Wave Division Multiplexing (WDM)?

A

WDM uses different colours of light to transmit multiple data streams on a single fibre for long-distance communication.

106
Q

What is the key takeaway regarding Ethernet switching and robustness?

A

Ethernet switching is robust under load, with 10GigE interconnects offering substantial performance headroom.

107
Q

What makes debugging in Ethernet switching environments challenging?

A

Performance issues, once found, can be dramatic and hard to isolate.

108
Q

Why might over-engineering in networking be preferred?

A

It can be cheaper and more effective than trying to “right-size” resources for network demands.

109
Q

What caution is advised regarding buffering in networks?

A

More buffering is better, especially at the edge of the network, to handle load.