week 3 Flashcards

1
Q

what are NIC’s

A

They connect a device to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the 2 types of NICs

A
  • -> WLAN NICs

- -> ethernet NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are wlan used for

A

used for wireless connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are ethernet NICs

A

used for wired connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does physical layer of the OSI model do

A

–> provides the means to transport the bits that make up a data link layer frame across the network media

–> accepts a complete frame from the data link layer and encodes the frame by creating an electrical, optical or radio wave signals that represent the bits in each frame, to be transmitted onto the local media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the tcp/ip standards are implemented in __________ and governed by _______________

A

software, IETF (Internet Engineering Task Force)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how are the physical layer standards implemented

A

implemented in hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

physical layer standards are governed by

A
governed by ISO, 
IEEE, 
ITU-T,
ANSI
TIA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is bandwidth

A
  • -> CAPACITY of a medium to carry data

- -> measures the amount of data that can flow from one place to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the units of bandwidth measurement

A
  • -> kilobits per second

- -> megabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what factors play a role in determining the available bandwidth

A
  • -> physical media properties
  • -> current technologies
  • -> laws of physics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is throughput

A
  • -> it is the measure of the transfer of bits across the media over a given period of time
  • -> throughput is usually less than the specified bandwidth in physical layer implementations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what factors influence throughput

A
  • -> amount of traffic
  • -> type of traffic
  • -> latency created by the network devices between source and destination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is latency

A

refers to the delays for data to travel from one device to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

why is throughput slower than the slowest link in the path between source and destination

A

the slowest link creates a bottleneck to the throughput of the entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

why is copper media used

A

less expensive
low electrical resistance
easy to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is transmission affected by

A
  • -> distance: the longer the signal travels the more it deteriorates
  • -> Electromagnetic interference / radio frequency interference
  • -> crosstalk: the disturbance caused by electric/magnetic fields of a signal on one wire to the signal in an adjacent wire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is done to counter emi / rfi

A

wrapped in metallic shieldings

require proper grounding connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is done to counter crosstalk

A

opposing circuit wire pairs are twisted together to cancel crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

properties of optical fibre cables

A

–> optical fibre cables are used to transmit data over longer distances and at higher bandwidths via light impulses

–> transmits signals with less attenuation (energy loss) and is immune to emi/rfi

  • -> type of cabling is used in
    - -> enterprise networks
    - -> long haul networks
    - -> submarine networks
    - -> FTTH (fiber to the home) networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ requires the highest installation skills

A

fiber optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

__________ has highest safety precautions

A

fiber optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is the distance of copper media

A

1 to 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

distance of fiber optic cables

A

1 to 100,000 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

bandwidth of copper medi

A

10Mbps to 10Gbps

26
Q

bandwidth of fiber optic

A

10 Mbps – 100 Gbps

27
Q

2 sub layers of data link layer

A

Logical link control

media access control

28
Q

what is LLC

A
  • -> upper sublayer defines the software processes that provide services to the network layer protocols
  • -> places information in the frame to identify which network layer protocol is being used for which frame allowing different layer 3 protocols to use the same NIC and media
29
Q

what is the Media access control layer

A
  • -> lower sublayer
  • -> defines how the hardware performs the media access process
  • -> provides data link addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol used
30
Q

data link layer protocols govern how to __________________________

A

format a frame for use on different media

31
Q

different _____- may be used for different media

A

protocols

32
Q

what happens at each hop along the path

A
  • -> an intermediary device accepts the frame from one medium and deencapsulates it
  • -> packet is then encapsulated into a new frame with headers formatted for the specific medium the new frame is forwarded to
33
Q

specific bit patterns denote the __________ of the frame

A

start and end

34
Q

what are the generic frame field types

A
  • -> frame start and stop indicator flags
  • -> addressing
  • -> Type
  • -> Control
  • -> data
  • -> error detection
35
Q

what are the frame start and stop indicator flags

A

–> used by the mac to identify beginning and end limits of the frame

36
Q

what is addressing field

A

–> used by mac to identify source and destination nodes

37
Q

what is the type field

A

used by llc to identify layer 3(network layer) protocols

38
Q

what is control field

A

identifies special flow control services

39
Q

what is data field

A

contains the frame payload data

40
Q

what is error detection field

A

check for error detection

41
Q

regulating the placement of data frames on the media is controlled by __________

A

media access layer

42
Q

what are the different mac methods used to regulate the placing of frames onto different media

A
  • -> contention based access

- -> controlled access

43
Q

what are the characteristics of contention based access

A
  • -> stations can transmit at any time
  • -> collisions happen
  • -> mechanisms are put in place to resolve contention for the media
44
Q

what are the different contention based access technologies

A

CSMA/CD - collision detection (ethernet networks)

CSMA/CA - collision avoidance (wireless networks )

45
Q

what happens in CSMA

A
  • -> non deterministic
  • -> network device can attempt to access the medium whenever it has data to send
  • -> network data first detects if the media is carrying a signal
  • -> if a carrier signal is detected on the media that means another device is transmitting data. It will wait for a while and then try again.
  • -> if no carrier signal is detected the device transmits its data
  • -> it is possible that 2 devices transmit at the same time creating a data collision. If this happens the data sent will be corrupted and needs to be resent.
46
Q

what happens in collision detection

A
  • -> monitors the media for collision
  • -> if collision occurs, it sends a jamming signal
  • -> all devices will stop sending and try again later
  • -> used by traditional forms of ethernet
47
Q

what happens in collision avoidance

A
  • -> the sending device sends a notification across the media of its intent to use it
  • -> once it receives a clearance to transmit, the device then sends the data
48
Q

what are the characteristics in controlled access

A
  • -> only one station can transmit at a time
  • -> devices wanting to transmit must wait for their turn
  • -> no collisions
  • -> may use a token passing method
49
Q

what are the controlled access technologies

A
  • -> FDDI

- -> token ring

50
Q

what is token ring

A
  • -> schedules access deterministic
  • -> network devices take turns, in sequence, to access the medium
  • -> if the end device does not need to access the medium then the opportunity is passed to the next device
  • -> the process is facilitated with the use of a token
  • -> the sending device will acquire the token and place a frame onto the media, no other device can do so until that frame reaches the destination, releasing the token
51
Q

why are deterministic methods inefficient

A

–> although controlled access is well ordered and provides predictable throughput deterministic methods are inefficient because a device has to wait for its turn before it can use the medium

52
Q

what is topology of a network

A

relationship of the network devices and interconnections between them

53
Q

what is physical topology

A
  • -> refers to physical connections

- -> identifies how end devices and infrastructure devices are interconnected

54
Q

what is logical topology

A
  • -> refers to the way a network transfers frames from one node to the next
  • -> logical signal paths are defined by data link layer
55
Q

which topology is used in legacy ethernet networks

A

Bus topology

56
Q

which topology is used in legacy token ring and FDDI

A

ring

57
Q

which topology has the most availability but is the most expensive to implement

A

mesh

58
Q

what is star topology

A
  • -> end devices are connected to a central intermediate device
  • -> most common topology
  • -> in wan known as hub and spoke topology
59
Q

field names in point to point protocol frame

A
flag 
address (broadcast address)
control 
protocol 
data 
frame check sequence
60
Q

ethernet frame fields

A
permeable (used for synchronization)
destination address (mac)
source address (mac)
 type 
data or payload 
frame check sequence (checks for damaged frames)