2.5 Ethernet Flashcards

1
Q

Bus Topology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ring Topology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Star Topology

A

A star topology uses a hub or switch to connect all network connections to a single physical location. Today it is the most popular type of topology for a LAN. With a star:
All network connections are located in a single place. This makes it easy to troubleshoot and reconfigure.
Nodes can be added to or removed from the network easily.
Cabling problems usually affect only one node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carrier Sent Multiple Access Collision Detection (CSMA/CD)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mesh Topology

A

A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This increases the network’s fault tolerance because an alternate path can be used when one path fails. Two variations of mesh topologies exist:
Partial Mesh: some redundant paths exist.
Full Mesh: every node has a point-to-point connection with every other node.
Full mesh topologies are usually impractical in a standard LAN, because the number of connections increases dramatically with every new node added to the network. A separate network interface and cable for each host on the network is required. However, a full mesh topology is commonly used to interconnect routers. It provides alternate paths should one path go down or become overloaded.

Mesh networks are also commonly used to create redundant paths between access points in a wireless network. They provide alternate paths back to the wireless controller should one access point go down or become overloaded. With this topology, every access point can communicate directly with every other access point on the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid Topology

A

A hybrid topology exists when two or more types of network topologies are connected with each other. For example, a network of wireless access points (mesh topology) connected to a network switch (star topology) would be considered a hybrid topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Media access

A

Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to control access to the transmission medium. Devices use the following process to send data:

  • Because all devices have equal access to the transmission media (multiple access), a device with data to send, first listens to the transmission medium to determine if it is free (carrier sense).
  • If it is not free, the device waits a random time and listens again to the transmission medium. When it is free, the device transmits its message.
  • If two devices transmit at the same time, a collision occurs. The sending devices detect the collision (collision detection) and send a jam signal.
  • Both devices wait a random length of time before attempting to resend the original message. The process of waiting before attempting to resend is called a backoff .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transmission media

A

Ethernet supports the following cable types:

  • Unshielded twisted-pair cables (UTP) with RJ-45 connectors. This is the most common transmission medium used for Ethernet. Each cable consists of eight wires twisted into four pairs. UTP cables are classified by the following types (called categories):Type Speed
    Cat5 100 Mbps
    Cat5e 1000 Mbps
    Cat6 10 Gbps
  • Fiber optic is most commonly used in high-speed applications, e.g., servers or streaming media. Fiber optic cables have ST, SC, LC, and MT-RJ connectors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frame type

A

The Ethernet frame size is 64 to 1518 bytes This is the same for all Ethernet standards. The most common frame types are:

  • Ethernet 802.3 is the original Ethernet frame type.
  • Ethernet 802.2 is the frame type that accommodates standards set by the IEEE 802.2 committee related to the logical link control (LLC) sublayer. It is a more current frame type than 802.3.
  • Ethernet II is a frame type that provides the ability to use TCP/IP as a transport/network layer protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical address

A

The MAC address (also called the burned-in address) is the Data Link layer physical device address. The MAC address is:

  • A 12-digit hexadecimal number (each number ranges from 0-9 or A-F).
  • Often written using hyphens (e.g., 00-B0-D0-06-BC-AC), periods, (e.g., 00B0.D006.BCAC), or colons (e.g., 00:B0:D0:06:BC:AC) to separate the address parts.
  • Guaranteed unique through design. The first six digits of the MAC address is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value that identifies the host address. A manufacturer that uses all the addresses in the original assignment can apply for a new MAC address assignment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Half-duplex

A

In half-duplex mode:

  • Collision detection is turned on.
  • The device can only send or receive at any given time.
  • Devices connected to a hub must use half-duplex communication.

Up to the rated bandwidth (100 Mbps for 100BaseT, 1000 Mbps for 1000BaseT, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Full-duplex

A

In full-duplex mode:

  • Collision detection is turned off.
  • The device can send and receive at the same time.
  • NICs need to be full-duplex capable.
    A switch with dedicated switch ports is required.

Double the rated bandwidth (200 Mbps for 100BaseT, 2000 Mbps for 1000BaseT, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Preamble

A

The preamble is a set of alternating ones and zeros terminated by two ones (11), which mark it as a frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Destination address

A

The destination address identifies the receiving host’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Source address

A

The source address identifies the sending host’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Type

A

The type field is two bytes and specifies the network/internet layer protocol being used.

17
Q

Packet (data)

A

The packet or data contains the information that needs to be transmitted from one host to the other.

18
Q

Pad

A

Ethernet frames are sized between 64 and 1518 bytes. If the frame is smaller than 64 bytes, the sending NIC places junk data in the pad to make it the required 64 bytes.

19
Q

Frame Check Sequence (FCS)

A

The FCS helps verify that the frame contents have arrived uncorrupted. It uses a cyclic redundancy check (CRC), which is a mathematical calculation performed on the frame.

20
Q

What is the first thing that happens when a collision occurs on an Ethernet network?

A

The device that detected the collision transmits a jam signal.