Ethernet Fundamentals (1.3, 2.1, 2.3, 4.4 & 5.5) Flashcards

(52 cards)

1
Q

Ethernet Fundamentals

A

o Ethernet Fundamentals
▪ In early computer networks, there were many different network technologies competing for a portion of the market share
▪ Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and others fought for dominance
▪ Currently, Ethernet is dominant for Layer 1
▪ Due to Ethernet’s popularity, it is important to understand the fundamentals of Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Origins of Ethernet (first was coax (10base5, 10base2) / ethernet is now twisted pair / 10BASE-T is UTP)

A

▪ Was first run over coax cables (10Base5, 10Base2)
▪ Ethernet has changed to using twisted pair cables
▪ 10BASE-T is Unshielded Twisted Pair
● Maximum speed: 10 Mbps
● Maximum distance: 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How should devices access the network?

A

▪ Deterministic
● Very organized and orderly
● Need an electronic token to transmit
● For example, Token Ring networks

▪ Contention-based

● Very chaotic
● Transmit (almost) whenever you want
● For example, Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carrier Sense Multiple Access/ Collision Detect (CSMA/CD)

A

▪ Ethernet devices transmit based on a principle called carrier sense multiple access/collision detect (CSMA/CD)
▪ Carrier sense
● Listen to the wire, verify it is not busy
▪ Multiple access
● All devices have access at any time
▪ Collision detect
● If two devices transmit at the same time, a collision occurs
● Back off, wait a random time, and try again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of CSMA/CD

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collision Domains

A

▪ Comprised of all devices on a shared Ethernet segment (everything on same cable or hub)
▪ Devices operate at half-duplex when connected to a hub (Layer 1 device)
▪ Devices must listen before they transmit to avoid collisions when operating as CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collision Domains with Switches

A

▪ Ethernet switches increase scalability of the network by creating multiple collision domains
▪ Each port on a switch is a collision domain, no chance of collisions, and increases speed
▪ Switches can operate in full-duplex mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Speed Limitations

A

▪ Bandwidth is the measure of how many bits the network can transmit in 1-second (bps)
▪ Type of cable determines the bandwidth capacity of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distance Limitations

A

▪ Type of cable determines the distance limitation of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Infrastructure Devices

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Infrastructure

A

▪ Primary devices used in our networks (devices include a router, and a switch)

▪ Devices they evolved from (bridge and hub)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hub

A

▪ Layer 1 device used to connect multiple network devices/workstations
▪ Known as multiport repeaters
▪ Three basic types of Ethernet hubs:
● Passive hub
o Repeats signal with no amplification
● Active hub
o Repeats signal with amplification
● Smart hub
o Active hub with enhanced features like SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Collision Domains

A

▪ Multiple network segments connected together by hubs
▪ Hubs (layer 1) were used to connect multiple network segments together
▪ Each LAN segment becomes a separate collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bridges

A

▪ Bridges analyze source MAC addresses in frames entering the bridge and populate an internal MAC address table

▪ Makes intelligent forwarding decisions based on destination MAC address in the frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Switch

A

▪ Layer 2 device used to connect multiple network segments together
▪ Essentially a multiport bridge
▪ Switches learn MAC addresses and make forwarding decisions based on them
▪ Switches analyze source MAC addresses in frames entering the switch and populate an internal MAC address table based on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 2 Switch

A

▪ Each port on a switch represents an individual collision domain
▪ All ports belong to the same broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Router

A

▪ Layer 3 device used to connect multiple networks together
▪ Make forwarding decisions based on logical network address information
● Such as using IP addresses (IPv4 or IPv6)
▪ Routers are typically more feature rich and support a broader range of interface types than multilayer switches
▪ Each port is a separate collision domain
▪ Each port is a separate broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Layer 3 Switch

A

▪ Layer 3 device used to connect multiple network segments together
▪ Can make Layer 3 routing decisions and interconnect entire networks (like a router), not just network segments (like a switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Summary of Network Infrastructure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Additional Ethernet Features

A

o Features to enhance network performance, redundancy, security, management, flexibility, and scalability
▪ Common switch features
● Virtual LANs (VLANs)
● Trunking
● Spanning Tree Protocol (STP)
● Link aggregation
● Power over Ethernet
● Port monitoring
● User authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Link Aggregation (802.3ad)

A

▪ Congestion can occur when ports all operate at the same speed

▪ Allows for combination of multiple physical connections into a single logical connection

▪ Bandwidth available is increased and the congestion is minimized or prevented

22
Q

Power Over Ethernet (PoE 802.3af, PoE+ 802.3at)

A

▪ Supplies electrical power over Ethernet
● Requires CAT 5 or higher copper cable
● Provides up to 15.4 watts of power to device

● PoE+ provides up to 25.5 W of power to device
▪ Two device types
● Power Sourcing Equipment (PSE)
● Powered Device (PD)

23
Q

Port Monitoring or Mirroring

A

▪ Helpful to analyze packet flow over network
● Connect a network sniffer to a hub and it sees all
● But, switches require port monitoring for network analyzer to see all the traffic
▪ Port mirroring makes a copy of all traffic destined for a port and sends it to another port

24
Q

User Authentication (802.1x)

A

▪ For security purposes, switches can require users to authenticate themselves before gaining access to the network
▪ Once authenticated, a key is generated and shared between the supplicant (device wanting access) and the switch (authenticator)

▪ Authentication server checks the supplicant’s credentials and creates the key
▪ Key is used to encrypt the traffic coming from and being sent to the client

25
Management Access and Authentication
▪ To configure and manage switches, you can use two options: ● SSH o Remote administration program that allows you to connect to the switch over the network ● Console port o Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45)
26
Out-of-band (OOB)
▪ Management involves keeping all network configuration devices on a separate network
27
First-Hop Redundancy
▪ Hot Standby Router Protocol (HSRP) uses virtual IP and MAC addresses to provide a “active router” and a “standby router” ● HSRP is a Cisco-proprietary protocol ● If Active is offline, then standby answers
28
Other First-Hop Redundancy Protocols
▪ Gateway Load Balancing Protocol (GLBP) ● Cisco-proprietary protocol ▪ Virtual Router Redundancy Protocol (VRRP) ● Open-source protocol ▪ Common Address Redundancy Protocol (CARP) ● Open-source protocol
29
MAC Filtering
▪ Permits or denies traffic based on a device’s MAC address to improve security
30
Traffic Filtering
▪ Multilayer switches may permit or deny traffic based on IP addresses or application ports
31
Quality of Service (QoS)
▪ Forwards traffic based on priority markings
32
Spanning Tree Protocol (STP) (802.1D)
o Permits redundant links between switches and prevents traffic loops o Availability is measured in 9’s ▪ Five 9’s is 99.999% uptime and allows only 5 minutes down per year o Shortest Path Bridging (SPB) is used for larger network environments instead o Without STP, MAC Address table corruption can occur
33
Broadcast Storms
▪ If broadcast frame received by both switches, they can forward frames to each other ▪ Multiple copies of frame are forwarded, replicated, and forwarded again until the network is consumed with forwarding many copies of the same initial frame
34
Root and Nonroot Bridges
▪ Root bridge ● Switch elected to act as a reference point for a spanning tree ● Switch with the lowest bridge ID (BID) is elected as the root bridge ● BID is made up of a priority value and a MAC address (with the lowest value considered root) ▪ Nonroot bridge ● All other switches in an STP topology ▪ MAC Address table corruption can occur
35
Root, Designated, and Non-Designated Ports
▪ Root Port ● Every non-root bridge has a single root port ● Port closest to the root bridge in terms of cost ● If costs are equal, lowest port number is chosen ▪ Designated Port ● Every network segment has a designated port ● Port closest to the root bridge in terms of cost ● All ports on root bridge are designated ports ▪ Non-Designated Port ● Ports that block traffic to create loop-free topology
36
Root and Nonroot Bridges
▪ Single root port on non-root bridge ▪ All other ports on non-root bridge are non-designated ▪ All ports on root bridge are designated
37
Port States
▪ Non-designated ports do not forward traffic during normal operation, but do receive bridge protocol data units (BPDUs) ▪ If a link in the topology goes down, the non-designated port detects the failure and determines whether it needs to transition to a forwarding state ▪ To get to the forwarding state, though, it has to transition through four states ▪ Blocking ● BPDUs are received but they are not forwarded ● Used at beginning and on redundant links ▪ Listening ● Populates MAC address table ● Does not forward frames ▪ Learning ● Processes BPDUs ● Switch determines its role in the spanning tree ▪ Forwarding ● Forwards frames for operations ▪ Root and Non-designated port are blocking ▪ Designated ports are forwarding
38
Link Costs
▪ Associated with the speed of a link ▪ Lower the link’s speed, the higher the cost ▪ Long STP is being adopted due to higher link speeds over 10 Gbps ▪ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10 Tbps
39
Virtual Local Area Network (VLAN)
o VLANs ▪ Switch ports are in a single broadcast domain ▪ Allow you to break out certain ports to be in different broadcast domains ▪ Before VLANs, you had to use routers to separate departments, functions, or subnets ▪ Allow different logical networks to share the same physical hardware ▪ Provides added security and efficiency
40
Before VLANs
▪ Different switches were required for each LAN for separation
41
VLAN Trunking (802.1q)
▪ Multiple VLANs transmitted over the same physical cable ▪ VLANs are each tagged with 4-byte identifier ● Tag Protocol Identifier (TPI) ● Tag Control Identifier (TCI) ▪ One VLAN is left untagged ● Called the Native VLAN
42
Specialized Network Devices
43
Virtual Private Network (VPN)
▪ Creates a secure VPN or virtual tunnel over an untrusted network like the Internet
44
VPN Concentrator
▪ Virtual private network (VPN) creates a secure, virtual tunnel network over an untrusted network, like the Internet ▪ One of the devices that can terminate VPN tunnels is a VPN concentrator, although firewalls can also perform this function
45
VPN Headend
VPN Headend ▪ A specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device
46
Firewalls
▪ Network security appliance at your boundary ▪ Firewalls can be software or hardware ▪ Stateful firewalls ● Allows traffic that originates from inside the network and go out to the Internet ● Blocks traffic originated from the Internet from getting into the network
47
Next-Generation Firewall (NGFW)
▪ Conducts deep packet inspection at Layer 7 ▪ Detects and prevents attacks ▪ Much more powerful than basic stateless or stateful firewalls ▪ Continually connects to cloud resources for latest information on threats
48
Intrusion Detection or Prevention System (IDS/IPS)
▪ IDS recognizes attacks through signatures and anomalies ▪ IPS recognizes and responds ▪ Host or network-based devices
49
Proxy Server
A specialized device that makes requests to an external network on behalf of a client
50
Content Engine/Caching Engine
▪ Dedicated appliance that performs the caching functions of a proxy server
51
Content Switch/Load Balancer
▪ Distributes incoming requests across various servers in a server farm
52
Other devices you may find on your network
o VoIP Phone ▪ A hardware device that connects to your IP network to make a connection to a call manager within your network o Unified Communications (or Call) Manager ▪ Used to perform the call processing for hardware and software-based IP phones o Industrial Control System (ICS) ▪ Describes the different types of control systems and associated instrumentation o Supervisory Control and Data Acquisition (SCADA) ▪ Acquires and transmits data from different systems to a central panel for monitoring and control o Virtual Network Devices ▪ Major shift in the way data centers are designed, fielded, and operated