W8 Ethernet Flashcards

1
Q

Most popular wired ethernet standards today?

A

IEEE (Institute of Electrical and Electronics Engineers) 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IEEE 802.3 advantages:

A
  • Great cost to performance ratio

- Being developed into a MAN AND WAN technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Ethernet 802.11:

A
  • Most popular method to access internet

- Works together with wired connection to provide seamless communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wired Ethernet 802.3:

A
  • Network but in a hierarchical manner using workgroup and core switches
  • Allows combining expensive and cheap equipment
  • Workgroup switches connect devices to network
  • Core switches connect switches to switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Frame Format:

A
Preamble – synchronization 0s and 1s
SFD – beginning of frame
Destination MAC address
Source MAC address
Length of Header
Data – Max 1500 bytes (MTU)
Pad – padding used on frames less than 64 bytes (needed for Collision Detection)
FCS – 4 bytes
Total size 1518 bytes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Ethernet Networks:

A

Gigabit Ethernet: IEEE 802.3z

10 Gigabit Ethernet: IEEE 802.3ae

Power over Ethernet (PoE): IEEE 802.3-2012

Metro Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Types of Switches

A
  • Store and Forward
  • Cut Through
  • Fragment-free switching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Store and Forward switches:

A
  • Receives entire frame and stores in memory
  • Checks errors by computing the CRC and checking frame length
  • If OK looks at destination address (if not deletes frame)
  • Forwards the frame out the destination port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cut Through Switches:

A
  • Starts to forward the frame as soon as it receives the destination address
  • Does no error checking
  • Advantage - very fast used ,on high speed backbones
  • Disadvantage - may waste bandwidth forwarding frames with errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fragment-free switching:

A
  • Lies between the extremes of cut-through switching and store and forward switching
  • First 64 bytes of frame are read and stored
  • If all header data appears correct, switches begin transmitting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSTP:

A

Rapid Spanning Tree Protocol
A hierarchical network cannot have loops
Network prone to single points of failure
RSTP protocol to allow backup links.
Core switch polls the Main switch to see if alive.
If true – ignores backup link
If false – uses backup link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1x Port Security:

A
  • Designed to protect data ports

- Divides the port into 2 virtual ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WLAN:

A

Wireless Local Area Network:

  • Uses radio frequency to transmit and receive data
  • WLAN spec replaced by WPA (Wi-fi protected access) to address security problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Problem with WPA2:

A
  • Public wifi networks are open and allow traffic to be sent over them that isn’t encrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA3 solution:

A
  • Encrypts all traffic between a device and wifi access point by using a unique key, to avoid MATM (Man in the middle) attacks)
  • Not as secure as authenticated encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless errors:

A

Greater attenuation than copper or fiber optic cable

“Absorptive attenuation” of plants

Higher frequencies do not bend around objects can get shadow or dead zones

17
Q

Wireless frame format:

A
  • Frame Control
  • Duration (16 bit field)
  • MAC of sender
  • MAC of AP
    MAC of next wifi device
  • MAC address (optional)
  • Sequence control
  • Payload - message
  • CRC (12 bits, error detection)
18
Q

Rouge Access Point:

A
  • Unauthorized access point installed with network SSID

- Created by intruder to steal data or by employee who wants unfettered access

19
Q

Evil Twin:

A

An access point operating at high power with network SSID

  • Wireless devices connect to strongest signal. Client thinks imposter is the real AP
  • Intruder has full access and can alter communication without other side knowing
  • Used to steal personal info or corporate intellectual property
20
Q

VPN:

A

Virtual Private network:

  • Costly, but allows use of internet as extension of private network
  • encrypts outbound traffic, encapsulates it in unencrypted IPv4 packet
  • Destination VPN removes IPv4 packet from inbound traffic
  • Decrypts the message and forwards to destination host