Comnet 2 Quiz Flashcards

(74 cards)

1
Q

is a contention-based media access method that allows all hosts on a
network to share the same link’s bandwidth

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

uses both Data Link and Physical layer specifications, presented with
information relative to both layers, and need to effectively implement,
troubleshoot, and maintain an Ethernet network.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to a network scenario wherein one device sends a frame
out on a physical network segment forcing every other device on the same
segment to pay attention to it

A

Collision Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to a group of devices on a specific
network segment that hear all the broadcasts sent out on that
specific network segment.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is usually a boundary delimited by physical
media like switches and routers, the term can also refer to a logical
division of a network segment, where all hosts can communicate via a
Data Link layer, hardware address broadcast.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

helps
devices share the bandwidth evenly while preventing two devices from
transmitting simultaneously on the same network medium.

A

Carrier Sense Multiple access with collision detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

created to overcome the problem of the collisions that
occur when packets are transmitted from different nodes at the same time.

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a collision occurs on an Ethernet LAN, the following happens:

A
  1. A jam signal informs all devices that a collision occurred.
  2. The collision invokes a random backoff algorithm.
  3. Each device on the Ethernet segment stops transmitting for a short time until
    its backoff timer expires.
  4. All hosts have equal priority to transmit after the timers have expired.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

defined in the original IEEE 802.3 Ethernet
specification, Cisco says Ethernet uses only one wire pair with a digital signal
running in both directions on the wire.

A

Half-Duplex Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

uses the CSMA/CD protocol I just discussed to help prevent
collisions and to permit retransmitting if one occurs.

A

Half Duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Six situations that you can full-duplex ethernet:

A
  1. With a connection from a switch to a host
  2. With a connection from a switch to a switch
  3. With a connection from a host to a host
  4. With a connection from a switch to a router
  5. With a connection from a router to a router
  6. With a connection from a router to a hos
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

decides on the exchange capability, which
means it checks to see if it can run at 10, 100, or even 1000 Mbps. It
then checks to see if it can run full-duplex, and if it can’t, it will run half-
duplex.

A

Auto-detect mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Important points in Full-Duplex:

A
  1. There are no collisions in full-duplex mode.
  2. A dedicated switch port is required for each full-duplex node.
  3. The host network card and the switch port must be capable of
    operating in full-duplex mode.
  4. The default behavior of 10Base-T and 100Base-T hosts is 10 Mbps
    half-duplex if the autodetect mechanism fails, so it is always good
    practice to set the speed and duplex of each port on a switch if you
    can.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

responsible for Ethernet addressing,
commonly referred to as MAC or hardware addressing.

A

Ethernet at the Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

responsible for framing packets received from the
Network layer and preparing them for transmission on the local
network through the Ethernet contention-based media access
method.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• It uses the Media Access Control (MAC) address burned into each and
every Ethernet network interface card (NIC).

A

Ethernet Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is assigned by the IEEE to an
organization. It’s composed of 24 bits, or 3 bytes, and it in turn assigns
a globally administered address also made up of 24 bits, or 3 bytes,
that’s supposedly unique to each and every adapter an organization
manufactures.

A

Organizationally Unique Identifier(OUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When it has a
value of _, we can assume that the address is the MAC address of a
device and that it may well appear in the source portion of the MAC
header.

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When it’s a _, we can assume that the address represents either a
broadcast or multicast address in Ethernet.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

sometimes called the G/L bit or
U/L bit, where U means universal.

A

Global/Local Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The use to limit order 1 and 0

A

Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

group either 4 or 8 buts togethe

A

Nible and byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

are placed in a value spot, starting at the right
and moving left, with each spot having double the value of the
previous spot.

A

Binary Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which is a numbering system that uses the
first six letters of the alpha

A

Hex is short for Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
responsible for combining bits into bytes and bytes into frames. • MAC frame format it provides error detection from a cyclic redundancy check (CRC)
Data Link Layer
26
Encapsulating a frame within a different type of frame is called
Tunneling
27
An alternating 1,0 pattern provides a 5 MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream.
Preamble
28
h The preamble is seven octets and the SFD is one octet (synch). The SFD is 10101011, where the last pair of 1s allows the receiver to come into the alternating 1,0 pattern somewhere in the middle and still sync up to detect the beginning of the data
Start Frame Delimiter (SFD)SYNCH
29
This transmits a 48-bit value using the least significant bit (LSB) first. The DA is used by receiving stations to determine whether an incoming packet is addressed to a particular node. The destination address can be an individual address or a broadcast or multicast MAC address. Remember that a broadcast is all 1s—all Fs in hex— and is sent to all devices. A multicast is sent only to a similar subset of nodes on a network
Destination Address
30
a 48-bit MAC address used to identify the transmitting device, and it uses the least significant bit first. Broadcast and multicast address formats are illegal within the SA field
Source Address
31
uses a Length field, but the Ethernet_II frame uses a Type field to identify the Network layer protocol. The old, original 802.3 cannot identify the upper-layer protocol and must be used with a proprietary LAN—IPX, for example
Length or type 802.3
32
is a field at the end of the frame that’s used to store the cyclic redundancy check (CRC) answer
Frame Check Sequence (FCS)
33
is a mathematical algorithm that’s run when each frame is built based on the data in the frame. When a receiving host receives the frame and runs the CRC, the answer should be the same. If not, the frame is discarded, assuming errors have occurred
Cyclic Redundancy check
34
they created and implemented the first Ethernet LAN specification, which the IEEE used to create the IEEE 802.3 committee. • This was a 10 Mbps network that ran on coax and then eventually twisted- pair and fiber physical media.
Digital, Intel, and Xerox
35
is the standards body that creates the Physical layer specifications for Ethernet.
EIA/TIA (Electronic Industries Alliance and the newer Telecommunications Industry Association)
36
10 Mbps using category 3 unshielded twisted pair (UTP) wiring for runs up to 100 meter
10Base-T (IEEE 802.3)
37
most commonly known as Fast Ethernet, uses EIA/TIA category 5, 5E, or 6 UTP two-pair wiring. One user per segment; up to 100 meters long. It uses an RJ45 connector with a physical star topology and a logical bus.
100Base-TX (IEEE802.3u)
38
Uses fiber cabling 62.5/125-micron multimode fiber. Point- to- point topology; up to 412 meters long. It uses ST and SC connectors, which are media interface connectors.
100Base-FX (IEEE 802.3u)
39
Copper twisted-pair, called twinax, is a balanced coaxial pair that can run only up to 25 meters and uses a special 9-pin connector known as the High Speed Serial Data Connector (HSSDC). This is used in Cisco’s new Data Center technologies.
1000Base-CX (IEEE 802.3z)
40
Category 5, four-pair UTP wiring up to 100 meters long and up to 1 Gbps
1000Base-T (IEEE 802.3ab)
41
The implementation of 1 Gigabit Ethernet running over multimode fiber-optic cable instead of copper twisted-pair cable, using short wavelength laser. Multimode fiber (MMF) using 62.5- and 50-micron core; uses an 850 nanometer (nm) laser and can go up to 220 meters with 62.5-micron, 550 meters with 50-micron.
1000Base-SX (IEEE 802.3z)
42
Single-mode fiber that uses a 9-micron core and 1300 nm laser and can go from 3 kilometers up to 10 kilometers.
1000Base-LX (IEEE 802.3z)
43
The implementation of 1 Gigabit Ethernet running over multimode fiber-optic cable instead of copper twisted-pair cable, using short wavelength laser. Multimode fiber (MMF) using 62.5- and 50-micron core; uses an 850 nanometer (nm) laser and can go up to 220 meters with 62.5-micron, 550 meters with 50-micron.
1000Base-SX (IEEE 802.3z)
44
Single-mode fiber that uses a 9-micron core and 1300 nm laser and can go from 3 kilometers up to 10 kilometers.
1000Base-LX (IEEE 802.3z)
45
is a Cisco specified standard for Gigabit Ethernet communication operates on ordinary single-mode fiber-optic links with spans up to 43.5 miles (70 km)
* 1000Base-ZX (Cisco standard)
46
s a standard proposed by the IEEE 802.3an committee to provide 10 Gbps connections over conventional UTP cables, (category 5e, 6, or 7 cables).
10GBase-T (802.3.an)
47
allows the conventional RJ45 used for Ethernet LANs and can support signal transmission at the full 100-meter distance specified for LAN wiring.
10GBase-T
48
THREE TYPES OF CABLES:
Straight-through cable • Crossover cable • Rolled cable
49
e can handle speeds up to a gigabit with a distance of up to 100 meters. Typically we’d use this cable for 100 Mbps and category 6 for a gigabit, but the category 5 Enhanced is rated for gigabit speeds and category 6 is rated for 10 Gbp
Category 5
50
used to connect the following devices: • Host to switch or hub • Router to switch or hub
Straight -Through cable.
51
can be used to connect the following devices: • Switch to switch • Hub to hub • Host to host • Hub to switch • Router direct to host • Router to router C
Crossover cable( Same network)
52
isn’t used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a host EIA- TIA 232 interface to a router console serial communication (COM) port
Rolled cable
53
The cable allows for very fast transmission of data, is made of glass (or even plastic!), is very thin, and works as a waveguide to transmit light between two ends of the fiber.
Fiber Optic
54
has been used to go very long distances, as in intercontinental connections, but it is becoming more and more popular in Ethernet LAN networks due to the fast speeds available and because, unlike UTP, it’s immune to interference like cross-ta
Fiber optics
55
more expensive, has a tighter cladding, and can go much farther distances than multimode.
Single mode
56
looser and has a larger core so it allows multiple light particles to travel down the glass.
Multimode
57
when a host transmits data across a network to another device, the data goes through a process and wrapped with protocol information at each layer of the OSI mod
Encapsulation
58
use to communicate and exchange information in each layer.
• Protocol data units (PDUs)
59
is a piece of data created and attached data field in transport layer.
Segment
60
is used to get each segment to the correct network.
Logical Addressing
61
adds a control header to the segment handed down from the Transport layer.
Packet or datagram
62
helps us understand where things belong, how things fit together, and what functions go where helps summarize a complex collection of details into an understandable model, bringing order from the chaos
Hierarchy
63
can help you design, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork.
Cisco hierarchical model
64
literally the core of the network
Core layer
65
responsible for transporting large amounts of traffic both reliably and quickly.
Core layer
66
is to switch traffic as fast as possible
Core layer
67
Don’t do in core layer:
• Never do anything to slow down traffic. This includes making sure you don’t use access lists, perform routing between virtual local area networks, or implement packet filtering. • Don’t support workgroup access here. • Avoid expanding the core (e.g., adding routers when the internetwork grows). If performance becomes an issue in the core, give preference to upgrades over expansion. CCNA Routing an
68
sometimes referred to as the workgroup layer and is the communication point between the access layer and the core
Distribution Layer
69
70
are to provide routing, filtering, and WAN access and to determine how packets can access the core, if needed.
Distribution Layer
71
must determine the fastest way that network service requests are handled—for example, how a file request is forwarded to a server.
Distribution Layer
72
controls user and workgroup access to internetwork resources. is sometimes referred to as the desktop layer.
Access Layer
73
sometimes referred to as the desktop layer.
Access Layer
74