Lesson 4 - Ethernet Technology Flashcards
(41 cards)
1973
The genesis of Ethernet was 1973, when this technology was developed by Xerox Corporation
IEEE 802.3
n general, you can use the term IEEE 802.3 interchangeably with the term Ethernet. However, be aware that these technologies have some subtle distinctions. For example, an Ethernet frame is a fixed-length frame, whereas an 802.3 frame length can vary
10BASE5
The 10 in 10BASE5 referred to network throughput, specifically 10Mbps (that is, 10 million [mega] bits per second). The BASE in 10BASE5 referred to baseband, as opposed to broadband, as discussed in Lesson 2, “The OSI Reference Model.” Finally, the 5 in 10BASE5 indicated the distance limitation of 500 meters. The cable used in 10BASE5 networks, as shown in Figure 4-1, was a larger diameter than most types of media. In fact, this network type became known as thicknet.
10BASE2
you might conclude that 10BASE2 was a 10Mbps baseband technology with a distance limitation of 200 meters. That is almost correct. However, 10BASE2’s actual distance limitation was 185 meters. The cabling used in 10BASE2 networks was significantly thinner and therefore less expensive than 10BASE5 cabling. As a result, 10BASE2 cabling, as shown in Figure 4-2, was known as thinnet or cheapernet.
10BASE-T
The 10Mbps version of Ethernet that relied on UTP cabling, an example of which is provided in Figure 4-3, is known as 10BASE-T, where the T in 10BASE-T refers to twisted-pair cabling.
How many frames on ethernet segment at a time?
Ethernet permits only a single frame to be on a network segment at any one time
carrier-sense multiple access/collision detection (CSMA/CD)
The procedure used by Ethernet to decide whether it is safe to transmit, detect collisions, and retransmit if necessary
CSMA/CD
Carrier sense: A device attached to an Ethernet network can listen to the wire, prior to transmitting, to make sure that a frame is not being transmitted on the network segment.
Multiple access: Unlike a deterministic method of network access (for example, the method used by Token Ring), all Ethernet devices simultaneously have access to an Ethernet segment.
Collision detection: If a collision occurs (perhaps because two devices were simultaneously listening to the network and simultaneously concluded that it was safe to send), Ethernet devices can detect that collision and set random back-off timers. After each device’s random timer expires, it again tries to transmit its data.
CSMA/CA
This technology is common in wireless networks and was made famous by Token Ring in early LANs.
Standard Ethernet
10Mbps: 10 million bits per second (that is, 10 megabits per second)
Fast Ethernet
100Mbps: 100 million bits per second (that is, 100 megabits per second)
Gigabit Ethernet
1Gbps: 1 billion bits per second (that is, 1 gigabit per second) (1000 Mbps)
10-Gigabit Ethernet
10Gbps: 10 billion bits per second (that is, 10 gigabits per second)
100-Gigabit Ethernet
100Gbps: 100 billion bits per second (that is, 100 gigabits per second)
Five nines of availability
If a system has five nines of availability, it is up and functioning 99.999 percent of the time, which translates to only about 5 minutes of downtime per year.
Spanning Tree Protocol
To improve network availability at Layer 2, many networks have redundant links between switches. However, unlike Layer 3 packets, Layer 2 frames lack a Time-to-Live (TTL) field. As a result, a Layer 2 frame can circulate endlessly through a looped Layer 2 topology. Fortunately, IEEE 802.1D Spanning Tree Protocol (STP) allows a network to physically have Layer 2 loops while strategically blocking data from flowing over one or more switch ports to prevent the looping of traffic.
IEEE 802.1D
Spanning Tree Protocol (STP)
If a nondesignated port needs to transition to the forwarding state, it does not do so immediately. Rather, it transitions through the following states:
Blocking: The port remains in the blocking state for 20 seconds by default. During this time, the nondesignated port evaluates BPDUs in an attempt to determine its role in the spanning tree.
Listening: The port moves from the blocking state to the listening state and remains in this state for 15 seconds by default. During this time, the port sources BPDUs, which inform adjacent switches of the port’s intent to forward data.
Learning: The port moves from the listening state to the learning state and remains in this state for 15 seconds by default. During this time, the port begins to add entries to its MAC address table.
Forwarding: The port moves from the learning state to the forwarding state and begins to forward frames
link aggregation
To help alleviate congested links between switches, you can (on some switch models) logically combine multiple physical connections into a single logical connection, over which traffic can be sent. This feature, as illustrated in Figure 4-19, is called link aggregation.
IEEE 802.3ad standard
Link Aggregation Control Protocol (LACP)
IEEE 802.3af
PoE Power over Ethernet. IEEE 802.3af standard can supply a maximum of 15.4W (watts) of power
However, a more recent standard, IEEE 802.3at, offers as much as 32.4W of power, enabling PoE to support a wider range of devices
Port Mirroring
port mirroring feature, which makes a copy of traffic seen on one port and sends that duplicated traffic out another port (to which a network sniffer could be attached)
User Authentication
For security purposes, some switches require users to authenticate themselves (that is, provide credentials, such as a username and password, to prove who they are) before gaining access to the rest of the network. A standards-based method of enforcing user authentication is IEEE 802.1X.
IEEE 802.1X
A standards-based method of enforcing user authentication is IEEE 802.1X.