Ethernet Switching Flashcards

(90 cards)

1
Q

What protocol emerged as the dominant Layer 2 communication protocol in local area networks?

A

Ethernet

Ethernet became the standard due to its efficiency and widespread adoption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the maximum distance covered by 10Base-T Ethernet?

A

100 meters

This distance limitation was significant for network design in the 1980s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Deterministic Access and Contention-based Access?

A

Deterministic Access is organized and orderly (e.g., Token Ring - raising hand in the classroom so no collision), while Contention-based Access is chaotic but more efficient (e.g., Ethernet, everyone talking at a bar)

Contention may lead to collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CSMA/CD stand for?

A

Carrier Sense Multiple Access with Collision Detection

This protocol allows devices to manage network access and detect collisions.

Bar example of talking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Collision Domain?

A

An area where collisions can occur

Understanding collision domains is essential for network design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of hubs?

A

Passive, Active, Smart

Each type of hub serves different functions in network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do switches improve network efficiency?

A

By breaking networks into smaller collision domains

Each switch port acts as its collision domain, allowing full-duplex communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary function of Layer 3 devices?

A

To operate based on IP addresses and connect dissimilar networks

This functionality enhances routing capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Virtual Local Area Network (VLAN)?

A

A logical subdivision of a network that segments it into separate broadcast domains

VLANs enable flexibility and efficient resource management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does 802.1Q Tagging refer to?

A

An IEEE standard that facilitates the management of multiple VLANs on a single network by adding VLAN IDs

It involves inserting VLAN tags into Ethernet frames.

Helps switches distinguish one VLAN from another

Creates logical separations between different departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Link Aggregation?

A

Combining multiple network connections into a single logical link

This increases bandwidth capacity and provides redundancy.

Ex. By aggregating four 1 Gbps links, we get a total bandwidth of 4 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the standard MTU size for wired Ethernet?

A

1500 bytes

This size ensures efficiency and compatibility across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the Spanning Tree Protocol (STP)?

802.1d

A

To prevent loops in network traffic

STP ensures network availability and prevents broadcast storms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role does the root bridge play in STP?

A

Acts as a reference point for the entire spanning tree

The root bridge is elected based on the lowest Bridge ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Network Access Control (NAC)?

A

A method for increasing network security by inspecting devices as they connect

NAC ensures that only secure devices are granted access to the network.

Ex. Going through airport security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: The maximum size of a frame that can be sent over a network is referred to as the _______.

A

Maximum Transmission Unit (MTU)

MTU is crucial for determining data transmission capacity.

Elevator example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What happens if the MTU is set too high?

A

Packet loss and retransmission can occur

Proper MTU configuration is essential for optimal network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the function of a Switch Virtual Interface (SVI)?

A

Provides Layer 3 processing for VLANs and allows routing between VLANs

SVIs enhance network efficiency by minimizing additional routing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of port security?

A

To secure physical network ports and prevent unauthorized access

Port security can limit the number of devices that connect to a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the difference between allow listing and block listing in MAC Filtering?

A

Allow listing permits only approved MAC addresses, while block listing denies access to specific MAC addresses

These methods control network access based on device MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ethernet is a what-based networking protocol?

A

Contention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Random Backoff Timer

A

allows 2 devices to attempt to retransmit again when the timer hits zero (after they have both tried to transmit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do you break down collision domains?

A

Ethernet Switch - increases scalability of the network by creating multiple collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Devices operate in what duplex mode when connected to a switch?

A

Full Duplex - because ethernet doesnt need to listen and then transmit since they know they have a full time dedicated channel to that switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Ethernet is what layer?
Layer 2 - Data Link - Frames
26
What type of device is a hub?
Layer 1 device ## Footnote Known as multi-port repeaters
27
What are the types of hubs?
* Passive – repeats signal without amplification * Active – boosts signal to overcome cable length limitations * Smart – active hub with enhanced features like SNMP for remote configuration
28
What do hubs connect?
Collision domains, making them bigger
29
What type of device is a bridge?
Layer 2 device
30
How does a bridge populate its MAC address table?
Analyzes source MAC addresses
31
What decisions does a bridge make?
Forwarding decisions based on destination MAC addresses
32
What is the function of a bridge in relation to collision domains?
Breaks up collision domains and adds security and efficiency to networks
33
What type of device is a switch?
Layer 2 device focused on MAC addresses
34
What is a switch known as?
Multiport bridge
35
How does each port on a switch function?
Acts as a separate collision domain
36
What does a switch learn to make forwarding decisions?
MAC addresses
37
What are the benefits of using a switch?
* Efficiently manages traffic * Reduces collisions * Improves security
38
What communication capability does a switch support?
Full duplex support allows simultaneous communication without interference
39
What type of device is a router?
Layer 3 device focused on IP addresses
40
On what basis do routers operate?
IP addresses
41
What do routers connect?
Dissimilar networks
42
What do routers separate to enhance network efficiency?
Broadcast domains
43
What types of interfaces do routers support?
Various interface types for versatile connectivity
44
What are Layer 3 switches also known as?
Multilayer switches
45
What functions do Layer 3 switches combine?
Functions of switches and routers
46
How do Layer 3 switches operate like routers?
Each port as a broadcast domain
47
What is the efficiency of Layer 3 switches in internal networks?
Efficient for internal networks but less effective for large-scale routing operations
48
In exam tips, what are switches focused on?
MAC addresses unless specified as multilayer or Layer 3 switches
49
What do routers focus on according to exam tips?
IP addresses
50
How should multilayer or Layer 3 switches be treated in exam questions?
Like a router
51
52
What is VLAN trunking (802.1q)
Multiple VLANs transmitted over the same physical cable
53
VLAN operates at which Layer
Layer 2 - Data Link - Frames
54
Cisco switch uses what
VLAN.DAT
55
Switch Virtual Interface
Helps VLANs route traffic
56
Native (default) VLAN
Default VLAN for untagged frames For devices that don't understand VLAN tags (legacy systems) Must be consistently configured
57
Voice VLAN
Specialized dedicated tk VPIP traffic within the network Improve quality of voice traffic Imlememt QOS so voice traffic is prioritized
58
Duplex is what
HOW data is sent Half or Full
59
Half Duplex
Data transmission and reception cannot occur simultaneously Like walkie talkies
60
Full Duplex
Devices send and receive data simultaneously
61
802.1d
Spanning Tree Portocol
62
Broadcast Storm
What happens when you don't have spanning tree installed on your network You get multiple copies of frames being forwarded back and forth which consumes the network
63
What is a root port?
Every non-root port has a single root port, closest to root bridge in terms of cost ## Footnote The root port is essential in spanning tree protocol (STP) for managing network topology.
64
How is the cost for determining the root port calculated?
Cost is determined based on cable types, where: * The lowest port number on the switch will be chosen * Faster cables – lower cost * Slower cables – higher cost ## Footnote This helps in establishing the most efficient path to the root bridge.
65
What is a designated port?
On every network segment, closest to root bridge in terms of cost ## Footnote Designated ports are responsible for forwarding traffic on network segments.
66
What is a non-designated port?
Blocks traffic to prevent loops ## Footnote Non-designated ports are crucial for maintaining network stability in STP.
67
What are the STP port states?
The STP port states include: * Blocking * Listening * Learning * Forwarding * Disabled ## Footnote These states determine how a port behaves in the network.
68
What happens in the blocking state of STP?
Stops forwarding frames ## Footnote The blocking state prevents loops by not allowing data to flow through the port.
69
What does the Listening state in the spanning tree protocol do?
Learns MAC addresses but does not forward frames ## Footnote This state is essential for gathering information about the network topology.
70
What is the primary function of the Learning state in the spanning tree protocol?
Processes BPDU and determines role in spanning tree ## Footnote BPDU stands for Bridge Protocol Data Unit.
71
What is the function of the Forwarding state in the spanning tree protocol?
Forwards frames as designated or root port ## Footnote This state allows for the actual communication of data across the network.
72
What is Link Cost associated with in the spanning tree protocol?
Associated with link speed ## Footnote Link cost impacts the selection of the best path in the network.
73
True or False: In the spanning tree protocol, lower speed links have a lower cost.
False ## Footnote Lower speed links have a higher cost, affecting path selection.
74
Fill in the blank: Higher speed links have a ______ cost.
Lower ## Footnote This relationship helps in optimizing network performance.
75
Mac addressing
Aka allow listing - allow specific devices and block everything else Can use blocklisting too - less secure because you're only blocking those you know
76
802.1x Authentication
Authentication framework to ensure only authenticated users can access the network Eap - Extensible Authentication protocol
77
What is a Supplicant in networking?
User device ## Footnote A supplicant is a client device that requests access to a network.
78
What is the role of an Authenticator in a network?
Network device ## Footnote An authenticator acts as a gatekeeper, controlling access to the network based on authentication.
79
What does an Authentication server do?
Authenticates user device ## Footnote An authentication server verifies the identity of the user device before granting access to the network.
80
What is a persistent agent?
For company-provided computers ## Footnote Persistent agents are typically used to maintain a consistent security posture on managed devices.
81
What type of agents are used for personally owned devices?
Non-persistent agents ## Footnote Non-persistent agents are often used in Bring Your Own Device (BYOD) scenarios.
82
What is the purpose of captive portals?
To manage access for personally owned devices ## Footnote Captive portals often require users to authenticate before gaining full access to the network.
83
What happens to devices that fail inspection in a network access control (NAC) system?
They are either denied access or placed in a quarantine zone for further remediation ## Footnote Quarantine zones allow for remediation steps to be taken before granting full access.
84
What is time-based access control?
Limits network access based on specified hours ## Footnote This feature helps organizations enforce policies that restrict access during non-business hours.
85
What does location-based access control verify?
The physical location of the device ## Footnote This ensures that access is granted only from authorized geographical locations.
86
What is role-based access control?
Grants permissions based on user roles ## Footnote This method allows organizations to tailor access rights based on job functions.
87
MTU sizes
MTU too high – packet loss and retransmission ■ MTU too low – increased overhead and slow network
88
VPN and PPPoE Connections
● Require smaller MTU due to encapsulation overhead ● Recommended size – 1400 to 1420 bytes
89
Jumbo frames
Configured at 9000 bytes Difficult to troubleshoot
90
VPN size should be what
Smaller be ause they already add headers to the data