Modul 4-7 Flashcards
- What is the purpose of the OSI physical layer?
- controlling access to media
- transmitting bits across the local media
- performing error detection on received frames
- exchanging frames between nodes over physical network media
- What is the purpose of the OSI physical layer?
- controlling access to media
- transmitting bits across the local media
- performing error detection on received frames
- exchanging frames between nodes over physical network media
- Why are two strands of fiber used for a single fiber optic connection?
- The two strands allow the data to travel for longer distances without degrading.
- They prevent crosstalk from causing interference on the connection.
- They increase the speed at which the data can travel.
- They allow for full-duplex connectivity.
- Why are two strands of fiber used for a single fiber optic connection?
- The two strands allow the data to travel for longer distances without degrading.
- They prevent crosstalk from causing interference on the connection.
- They increase the speed at which the data can travel.
- They allow for full-duplex connectivity.
- Which characteristic describes crosstalk?
- the distortion of the network signal from fluorescent lighting
- the distortion of the transmitted messages from signals carried in adjacent wires
- the weakening of the network signal over long cable lengths
- the loss of wireless signal over excessive distance from the access point
- Which characteristic describes crosstalk?
- the distortion of the network signal from fluorescent lighting
- the distortion of the transmitted messages from signals carried in adjacent wires
- the weakening of the network signal over long cable lengths
- the loss of wireless signal over excessive distance from the access point
- Which procedure is used to reduce the effect of crosstalk in copper cables?
- requiring proper grounding connections
- twisting opposing circuit wire pairs together
- wrapping the bundle of wires with metallic shielding
- designing a cable infrastructure to avoid crosstalk interference
- avoiding sharp bends during installation
- Which procedure is used to reduce the effect of crosstalk in copper cables?
- requiring proper grounding connections
- twisting opposing circuit wire pairs together
- wrapping the bundle of wires with metallic shielding
- designing a cable infrastructure to avoid crosstalk interference
- avoiding sharp bends during installation
- A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
- the amount of traffic that is currently crossing the network
- the sophistication of the encapsulation method applied to the data
- the type of traffic that is crossing the network
- the latency that is created by the number of network devices that the data is crossing
- the bandwidth of the WAN connection to the Internet
- the reliability of the gigabit Ethernet infrastructure of the backbone
- A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
- the amount of traffic that is currently crossing the network
- the sophistication of the encapsulation method applied to the data
- the type of traffic that is crossing the network
- the latency that is created by the number of network devices that the data is crossing
- the bandwidth of the WAN connection to the Internet
- the reliability of the gigabit Ethernet infrastructure of the backbone
Explanation: Throughput usually does not match the specified bandwidth of physical links due to multiple factors. These factors include, the amount of traffic, type of traffic, and latency created by the network devices the data has to cross.
- What are two characteristics of fiber-optic cable? (Choose two.)
- It is not affected by EMI or RFI.
- Each pair of cables is wrapped in metallic foil.
- It combines the technique of cancellation, shielding, and twisting to protect data.
- It typically contains 4 pairs of fiber-optic wires.
- It is more expensive than UTP cabling is.
- What are two characteristics of fiber-optic cable? (Choose two.)
- It is not affected by EMI or RFI.
- Each pair of cables is wrapped in metallic foil.
- It combines the technique of cancellation, shielding, and twisting to protect data.
- It typically contains 4 pairs of fiber-optic wires.
- It is more expensive than UTP cabling is.
Explanation: Fiber-optic cabling supports higher bandwidth than UTP for longer distances. Fiber is immune to EMI and RFI, but costs more, requires more skill to install, and requires more safety precautions.
- What is a primary role of the Physical layer in transmitting data on the network?
- create the signals that represent the bits in each frame on to the media
- provide physical addressing to the devices
- determine the path packets take through the network
- control data access to the media
- What is a primary role of the Physical layer in transmitting data on the network?
- create the signals that represent the bits in each frame on to the media
- provide physical addressing to the devices
- determine the path packets take through the network
- control data access to the media
Explanation: The OSI physical layer provides the means to transport the bits that make up a frame across the network media. This layer accepts a complete frame from the data link layer and encodes it as a series of signals that are transmitted to the local media.
- With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
- the magnetic field around the adjacent pairs of wire
- the use of braided wire to shield the adjacent wire pairs
- the reflection of the electrical wave back from the far end of the cable
- the collision caused by two nodes trying to use the media simultaneously
- With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
- the magnetic field around the adjacent pairs of wire
- the use of braided wire to shield the adjacent wire pairs
- the reflection of the electrical wave back from the far end of the cable
- the collision caused by two nodes trying to use the media simultaneously
Explanation: Crosstalk is a type of noise, or interference that occurs when signal transmission on one wire interferes with another wire. When current flows through a wire a magnetic field is produced. The produced magnetic field will interface the signal carried in the adjacent wire.
- In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
- crosstalk
- bandwidth
- size of the network
- signal modulation technique
- electromagnetic interference
- In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
- crosstalk
- bandwidth
- size of the network
- signal modulation technique
- electromagnetic interference
Explanation: Copper media is widely used in network communications. However, copper media is limited by distance and signal interference. Data is transmitted on copper cables as electrical pulses. The electrical pulses are susceptible to interference from two sources:
- Electromagnetic interference (EMI) or radio frequency interference (RFI) – EMI and RFI signals can distort and corrupt the data signals being carried by copper media.
- Crosstalk – Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one wire interfering with the signal in an adjacent wire.
- Which two devices commonly affect wireless networks? (Choose two.)
- Blu-ray players
- home theaters
- cordless phones
- microwaves
- incandescent light bulbs
- external hard drives
- Which two devices commonly affect wireless networks? (Choose two.)
- Blu-ray players
- home theaters
- cordless phones
- microwaves
- incandescent light bulbs
- external hard drives
Explanation: Radio Frequency Interference (RFI) is the interference that is caused by radio transmitters and other devices that are transmitting in the same frequency.
- Which two statements describe the services provided by the data link layer? (Choose two.)
- It defines the end-to-end delivery addressing scheme.
- It maintains the path between the source and destination devices during the data transmission.
- It manages the access of frames to the network media.
- It provides reliable delivery through link establishment and flow control.
- It ensures that application data will be transmitted according to the prioritization.
- It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.
- Which two statements describe the services provided by the data link layer? (Choose two.)
- It defines the end-to-end delivery addressing scheme.
- It maintains the path between the source and destination devices during the data transmission.
- It manages the access of frames to the network media.
- It provides reliable delivery through link establishment and flow control.
- It ensures that application data will be transmitted according to the prioritization.
- It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.
Explanation: The data link layer is divided into two sub layers, namely Logical Link Control (LLC) and Media Access Control (MAC). LLC forms a frame from the network layer PDU into a format that conforms to the requirements of the network interface and media. A network layer PDU might be for IPv4 or IPv6. The MAC sub layer defines the media access processes performed by the hardware. It manages the frame access to the network media according to the physical signaling requirements (copper cable, fiber optic, wireless, etc.)
- What is the function of the CRC value that is found in the FCS field of a frame?
- to verify the integrity of the received frame
- to verify the physical address in the frame
- to verify the logical address in the frame
- to compute the checksum header for the data field in the frame
- What is the function of the CRC value that is found in the FCS field of a frame?
- to verify the integrity of the received frame
- to verify the physical address in the frame
- to verify the logical address in the frame
- to compute the checksum header for the data field in the frame
Explanation: The CRC value in the FCS field of the received frame is compared to the computed CRC value of that frame, in order to verify the integrity of the frame. If the two values do not match, then the frame is discarded.
- What is contained in the trailer of a data-link frame?
- logical address
- physical address
- data
- error detection
- What is contained in the trailer of a data-link frame?
- logical address
- physical address
- data
- error detection
Explanation: The trailer in a data-link frame contains error detection information that is pertinent to the frame included in the FCS field. The header contains control information, such as the addressing, while the area that is indicated by the word “data” includes the data, transport layer PDU, and the IP header.
- Which statement describes a characteristic of the frame header fields of the data link layer?
- They all include the flow control and logical connection fields.
- Ethernet frame header fields contain Layer 3 source and destination addresses.
- They vary depending on protocols.
- They include information on user applications.
- Which statement describes a characteristic of the frame header fields of the data link layer?
- They all include the flow control and logical connection fields.
- Ethernet frame header fields contain Layer 3 source and destination addresses.
- They vary depending on protocols.
- They include information on user applications.
Explanation: All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields that are contained in the header vary according to the protocol. Different data link layer protocols may use different fields, like priority/quality of service, logical connection control, physical link control, flow control, and congestion control.
- A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?
- mesh
- partial mesh
- hub and spoke
- point-to-point
- A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?
- mesh
- partial mesh
- hub and spoke
- point-to-point
Explanation: Partial mesh topologies provide high availability by interconnecting multiple remote sites, but do not require a connection between all remote sites. A mesh topology requires point-to-point links with every system being connected to every other system. A point-to-point topology is where each device is connected to one other device. A hub and spoke uses a central device in a star topology that connects to other point-to-point devices.
- Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC? (Choose two.)
- auto-MDIX
- CEF
- Frame Check Sequence
- minimum frame size
- source MAC address
- Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC? (Choose two.)
- auto-MDIX
- CEF
- Frame Check Sequence
- minimum frame size
- source MAC address
Explanation: An Ethernet frame is not processed and is discarded if it is smaller than the minimum (64 bytes) or if the calculated frame check sequence (FCS) value does not match the received FCS value. Auto-MDIX (automatic medium-dependent interface crossover) is Layer 1 technology that detects cable straight-through or crossover types. The source MAC address is not used to determine how the frame is received. CEF (Cisco Express Forwarding) is a technology used to expedite Layer 3 switching.
- Which media communication type does not require media arbitration in the data link layer?
- deterministic
- half-duplex
- full-duplex
- controlled access
- Which media communication type does not require media arbitration in the data link layer?
- deterministic
- half-duplex
- full-duplex
- controlled access
Explanation: Half-duplex communication occurs when both devices can both transmit and receive on the medium but cannot do so simultaneously. Full-duplex communication occurs when both devices can transmit and receive on the medium at the same time and therefore does not require media arbitration. Half-duplex communication is typically contention-based, whereas controlled (deterministic) access is applied in technologies where devices take turns to access the medium.
- Which statement describes an extended star topology?
- End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
- End devices are connected together by a bus and each bus connects to a central intermediate device.
- Each end system is connected to its respective neighbor via an intermediate device.
- All end and intermediate devices are connected in a chain to each other.
- Which statement describes an extended star topology?
- End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
- End devices are connected together by a bus and each bus connects to a central intermediate device.
- Each end system is connected to its respective neighbor via an intermediate device.
- All end and intermediate devices are connected in a chain to each other.
Explanation: In an extended star topology, central intermediate devices interconnect other star topologies.
- What is a characteristic of the LLC sublayer?
- It provides the logical addressing required that identifies the device.
- It provides delimitation of data according to the physical signaling requirements of the medium.
- It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
- It defines software processes that provide services to the physical layer.
- What is a characteristic of the LLC sublayer?
- It provides the logical addressing required that identifies the device.
- It provides delimitation of data according to the physical signaling requirements of the medium.
- It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
- It defines software processes that provide services to the physical layer.
Explanation: The Logical Link Control (LLC) defines the software processes that provide services to the network layer protocols. The information is placed by LLC in the frame and identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media.
- What are three ways that media access control is used in networking? (Choose three.)
- Ethernet utilizes CSMA/CD.
- Media access control provides placement of data frames onto the media.
- Contention-based access is also known as deterministic.
- 802.11 utilizes CSMA/CD.
- Data link layer protocols define the rules for access to different media.
- Networks with controlled access have reduced performance due to data collisions.
- What are three ways that media access control is used in networking? (Choose three.)
- Ethernet utilizes CSMA/CD.
- Media access control provides placement of data frames onto the media.
- Contention-based access is also known as deterministic.
- 802.11 utilizes CSMA/CD.
- Data link layer protocols define the rules for access to different media.
- Networks with controlled access have reduced performance due to data collisions.
Explanation: Wired Ethernet networks use CSMA/CD for media access control. IEEE 802.11 wireless networks use CSMA/CA, a similar method. Media access control defines the way data frames get placed on the media. The controlled access method is deterministic, not a contention-based access to networks. Because each device has its own time to use the medium, controlled access networks such as legacy Token Ring do not have collisions.
- During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?
- An IP address is added.
- The logical address is added.
- The physical address is added.
- The process port number is added.
- During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?
- An IP address is added.
- The logical address is added.
- The physical address is added.
- The process port number is added.
Explanation: The Ethernet frame includes the source and destination physical address. The trailer includes a CRC value in the Frame Check Sequence field to allow the receiving device to determine if the frame has been changed (has errors) during the transmission.
- What three items are contained in an Ethernet header and trailer? (Choose three.)
- source IP address
- source MAC address
- destination IP address
- destination MAC address
- error-checking information
- What three items are contained in an Ethernet header and trailer? (Choose three.)
- source IP address
- source MAC address
- destination IP address
- destination MAC address
- error-checking information
Explanation: Layer 2 headers contain the following:
- Frame start and stop indicator flags at the beginning and end of a frame
- Addressing – for Ethernet networks this part of the header contains source and destination MAC addresses
- Type field to indicate what Layer 3 protocol is being used
- Error detection to determine if the frame arrived without error
- What type of communication rule would best describe CSMA/CD?
- access method
- flow control
- message encapsulation
- message encoding
- What type of communication rule would best describe CSMA/CD?
- access method
- flow control
- message encapsulation
- message encoding
Explanation: Carrier sense multiple access collision detection (CSMA/CD) is the access method used with Ethernet. The access method rule of communication dictates how a network device is able to place a signal on the carrier. CSMA/CD dictates those rules on an Ethernet network and CSMA/CA dictates those rules on an 802.11 wireless LAN.
- Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)
- header
- type field
- MTU size
- data
- trailer
- CRC value
- Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)
- header
- type field
- MTU size
- data
- trailer
- CRC value
Explanation: The data link protocol is responsible for NIC-to-NIC communications within the same network. Although there are many different data link layer protocols that describe data link layer frames, each frame type has three basic parts:
- Header
- Data
- Trailer
- Which statement is true about the CSMA/CD access method that is used in Ethernet?
- When a device hears a carrier signal and transmits, a collision cannot occur.
- A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
- All network devices must listen before transmitting.
- Devices involved in a collision get priority to transmit after the backoff period.
- Which statement is true about the CSMA/CD access method that is used in Ethernet?
- When a device hears a carrier signal and transmits, a collision cannot occur.
- A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
- All network devices must listen before transmitting.
- Devices involved in a collision get priority to transmit after the backoff period.
Explanation: Legacy bus-topology Ethernet LAN uses CSMA/CD as network media access control protocol. It works by detecting a collision in the medium and backing off (after transmitting a jam signal) as necessary. When one host wants to transmit a frame, it listens on the medium to check if the medium is busy. After it senses that no one else is transmitting, the host starts transmitting the frame, it also monitors the current level to detect a collision. If it detects a collision, it transmits a special jam signal so that all other hosts can know there was a collision. The other host will receive this jam signal and stop transmitting. After this, both hosts enter an exponential backoff phase and retry transmission.
- What is the auto-MDIX feature on a switch?
- the automatic configuration of an interface for 10/100/1000 Mb/s operation
- the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection
- the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable
- the ability to turn a switch interface on or off accordingly if an active connection is detected
- What is the auto-MDIX feature on a switch?
- the automatic configuration of an interface for 10/100/1000 Mb/s operation
- the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection
- the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable
- the ability to turn a switch interface on or off accordingly if an active connection is detected
Explanation: The auto-MDIX enables a switch to use a crossover or a straight-through Ethernet cable to connect to a device regardless of the device on the other end of the connection.