Module 1: ethernet stuff. Flashcards

the Networking Layer

1
Q

What are becoming common ways to connect computing devices to networks?

A

Wireless and cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What connection method is the most common option you find in the workplace and data center, even today when wireless is available?

A

traditional cable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the protocol most widely used to send data across individual links. provide means for software at higher levels of the stack to send and receive data.

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

primary purpose of the data link layer

A

so that the internet transport and application layers can all operate the same no matter how the device they are running on is connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ethernet network access method that uses carrier sensing and collision detection to regulate how communication takes place over a shared transmission medium. Solves the problem of collision domains

A

carrier sense multiple access with collision detection. CSMA CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what determines when the communications channels are clear and when the device is free to transmit data.

A

csma cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

on ethernet, if no data is currently being transmitted on a network segment, what happens?

A

a node is free to send data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what happens if two or more computers try to send data at the same time on ethernet?

A

computers detect the collision and stop sending data. each device then waits a random interval of time before trying to send data again, which prevents all computers involved in the collision from colliding again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why are Media Access Control addresses (MAC) important in a collision domain?

A

We can identify which node a transmission is actually meant for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how many bits, groupings, and which digits are used in MAC addresses?

A

48 bits, represented by six groupings of two hexadecimal numbers. sixteen digits in hexadecimal, using a-f.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

any number that can be represented by 8 bit

A

octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what’s the total number of possible mac addresses that can exist

A

2^ 48, or 281474976710656 unique possibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how many sections in a mac address

A

two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the first three octets (the first section) of a mac address known as

A

the organizational unique identifier, or OUI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is assigned to individual hardware manufacturers by the institute of electrical and electronics engineers, IEEE

A

OUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what can I always identify purely by its mac address?

A

the manufacturer of a network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the last three octets of a mac address?

A

they can be assigned in any way the manufacturer wants with the condition that they only assign each possible address once, keeping all mac addresses unique globally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what ensures that the data sent over ethernet has an address for the machine that sends the transmission and the one that the transmission was intended for

A

Ethernet Mac Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what the saving mac addresses do for devices on a network

A

they let nodes on a network know when traffic are attended for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is it when one device transmits data to another device. always meant for just one receiving address.

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is done at the ethernet level by looking at a special bit in the destination mac address. if the least significant bit in the first octet of a destination address is set to zero, the ethernet frame is intended for only the destination address.

A

unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what happens if the least significant bit in the first octet of a destination mac address is set to zero?

A

the ethernet frame will be sent to all devices on the collision domain, but only received and processed by the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what happens if the least significant bit in the first octet of a destination mac address is set to one?

A

a multicast frame is sent to all devices on the local network segment. it will be accepted or discarded by each device depending on criteria aside from their own hardware mac address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

how can network interfaces accept lists of configured multicast addresses for these sorts of communications?

A

they can be configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What kind of ethernet transmission is sent to every single device on a LAN, using a special destination address in all F so devices can learn more about each other.

A

Broadcast, using a broadcast address

26
Q

an all encompassing term that represents any single set of binary data being sent across a network link.

A

Data packet

27
Q

a concept of a set of data being sent from point A to point B

A

packet

28
Q

data packets at the ethernet level

A

ethernet frames

29
Q

what are ethernet frames for?

A

so network interfaces at the physical layer can convert a stream of bits travelling across the link into meaningful data, or vice versa

30
Q

The first part of an ethernet frame. 8 bytes, 64 bits long. can be split in two sections.

A

preamble

31
Q

what are the first seven bytes of an internet frame preamble?

A

a series of alternating ones and zeros that act as a buffer between frames and can be used by the network interfaces to synchronize internal clocks which they used to regulate the speed at which they send data.

32
Q

what’s the last byte in the preamble? which signals to a receiving device that the preamble is over and the actual frame contents will now follow.

A

the start frame delimiter, SFD,

33
Q

what is the second part of an ethernet frame. this is the hardware address of the intended recipient. 48 bits, 6 bytes.

A

destination mac address

34
Q

What is the third part of the ethernet frame. this is where the frame originated from.48 bits, or 6 bytes.

A

source mac address

35
Q

What is the fourth part of an ethernet frame. 16 bits. used to describe the protocol of the contents of the frame.

A

ether-type field

36
Q

What is an option for the 4th part of the ethernet frame. it indicates that the frame itself is what is called VLAN frame. if present, the Ether-type field comes fifth, not 4th. VLAN: virtual LAN.

A

VLAN Header

37
Q

What is a technique that allows you to have multiple logical LAN operating on the same physical equipment.

A

VLAN, Virtual Local Area Network

38
Q

where will frames with VLAN tags be delivered out of?

A

only out of a switch interface configured to relay that specific tag

39
Q

what do you want a VLAN for?

A

so you have a single physical network that operates like it is multiple LAN

40
Q

What are VLAN used for?

A

segregating different forms of traffic. i.e. phones vs desktops.

41
Q

What is the actual data being transported, the fifth field in an ethernet frame. Anywhere from 46-1500 bytes long. contains all the data from higher layers like the IP, transport, and application layers.

A

Data payload of ethernet frame

42
Q

What is the actual data being transported, everything that isn’t a header. Networking terms.

A

Payload

43
Q

What is the 6th item in the ethernet frame. 4byte, or 32 bit. represents a checksum value for the entire frame.

A

Frame check sequence

44
Q

how OSI check some value calculated?

A

by calculating a cyclical redundancy check against the frame

45
Q

What is a concept for data integrity used all over computing. a mathematical transformation that uses polynomial division to create a number representing a larger set of data. anytime you perform this against a set of data you should end up with the same check some number.

A

Cyclical redundancy check, CRC

46
Q

why is a check sum number included in ethernet frame

A

so the receiving network interface can infer if it received uncorrupted data

47
Q

what is the checksum value calculated off of?

A

all the information in the ethernet frame

48
Q

what happens if a cyclical redundancy check happens in the result doesn’t match the checksum in the frame check sequence field?

A

the data is thrown out. Some must have been lost or corrupted.

49
Q

does ethernet perform data recovery?

A

no.

50
Q

What layer are the client and server on?

A

the transport layer

51
Q

What protocol provides mechanisms ensuring data is reliably delivered

A

TCP

52
Q

which layer in the transmission control protocol internet protocol (TCP/IP) model is responsible for defining a common waiter interpret signals so network devices can communicate

A

Data link

53
Q

when an electrical pulse on one wire is accidentally detected on another near by wire what is this known as

A

crosstalk

54
Q

what is a network with only a single device at each end of the link called

A

a point to point connection

55
Q

which of the following is a device that knows how to forward traffic between independent networks

A

a router

56
Q

That device provides emails to devices like laptops and desktop computers

A

server

57
Q

What is it when data flows across a cable in both directions

A

duplex communication

58
Q

What is the most common plug used with twisted pair network cables

A

registered jack 45

59
Q

what is used to determine when the communications channels are clear and when the device is free to transmit data

A

carrier sense multiple access with collision detection (CSMA CD)

60
Q

What type of communication does the telephone use

A

Full duplex, because you can hear it on both sides at the same time.