SECTION 6 : ETHERNET FUNDAMENTALS Flashcards

1
Q

What were the first Ethernet networks ?

A

10BASE2 ThinNet 200m
10BASE5 ThickNet 500m

At the beginning ethernet was one standard among others competitors. It ended up winning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the new type of network ?

A

10BASE-T allows up to 10 Mbps of speed but only covers a distance of up to 100 meters. CAT3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a deterministic network ?

A

Very organized and orderly and requires an electronic token to transmit. Each device waits its turns. Token ring or bus network. Zero collisions because they wait their turn.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a contention based network ?

A

Very chaotic and can transmit whenever possible. You speak when you hear a gap. Contention based access is chaotic and can cause collisions. Ethernet used contention-based network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main drawback of deterministic ?

A

You don’t use all the bandwidth because you have to leave some for the other devices. The efficiency of the network is not maximized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is CSMA/CD ,

A

Carrier Sense Multiple Access With Collision Detection.

It prevents collisions by using carrier-sensing to defer transmissions until no other stations are transmitting.

CS = ethernet needs to listen to the network and determine the sender of the data. When there is a gap the MA intervenes.
If the CD detects a collision allows to determine who waits or not. If a collision is detected Both Ethernet will stop transmitting and then retransmits. They take a random number and count to it (for instance 150 ms backoff and the other 30ms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Collision Domain ?

A

Each are of the network that shares a single segment. The more devices communicating on a single network segment the more collision there is. That’s why devices operate in half-duplex mode when connected to a hub (layer 1devices) because they have to listen before communicating. You need to keep collision domains small inside your networks. The entire bandwidth is minimized. You have to segment your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the purpose of Ethernet switches when it comes to collision domain ?

A

It increases scalability of network by creating multiple collision domains. Each port is a collision domain. Besides switch ports can operate on full duplex. One computer connected to one switch avoids every trouble so full duplex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the bandwidth ?

A

Measures how many bits the network can transmit per second. Types of cables determine the bdwdth of cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the standards when it comes to Ethernet and fibers ?

A

Number BASE - T —> ethernet
Nimber BASE - FX / SX / LX / SR / LR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Needs to memorize when it comes to distances

A
  1. Copper cables have a maximum distance of 100 meters
  2. Using CAT 6 at 100 meters will limit the speed from 10Gbps to 1Gbps
  3. Using CAT 6 at under 55 meters can reach 10 Gbps of speed
  4. MMF deal with shorter distances between 200-500 meter range
  5. SMF for long distances (kilometers)

If you need short distances with fiber use MMF or else copper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the primary devices on network ?

A

Router
switches
hubs
bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are hubs ?

A

Also known as a multiport repeater it is a L1 device that connects multiple network devices and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three different types of hubs ?

A

Passive : repeats signal with no amplification.
Active : repeats signal with amplification. Take the signal and boosts it. Try to reach the 100 meter limit of the TPC. Good to overcome the distance limit.
Smart : active hub with enhanced feature like SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What about collision domains when it comes to hub?

A

Multiple network segments connected together by hubs. Hubs increase the probability of collision domains because it broadcasts the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a bridge reduce collision domain ?

A

You can split a network in two with a hub and reduce the collision domain.
It retransmits data based on MAC adresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a switch ?

A

L2 device just like a bridge.
Also known as a multiport bridge, it is a L2 device that connects multiple network segments together.
It has a bridge on every port that allows to minimize collision domain to each port. But everything on the switch is part to the same broadcasting domain.
Switches make forwarding decisions just like a bridge, based on MAC adresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the cinematic of connection ?

A

When there are two switches, devices will send an ARP request to the switch.
The switch will forward to every devices connected on each of its port.
If it doesn’t find eat it will redirect to another switch.
Every one got the question who is the device. But when they know it the keep in memory.
Besides, switches support full duplex so every PC can produce ARP requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a router ?

A

L3 device that connects multiple networks and makes forwarding decisions based on logical network information.
Router allows to reduce the traffic and the noise because they split the broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a L3 switch ?

A

Makes L3 routing decisions and then interconnects entire networks not just segments. Hubs and bridges are combined to make a switch.
L2 switch and a router are combined to make a L3 switch.
They can do routing decisions and can connect network segments. Each port acts as its own broadcast and collision domain. With a small office a L3 switch can be convenient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the specificity of a home router ?

A

Usually it combines different functions such as Ethernet CAT 4 cable, WAP, router and so on.
It’s like a big media converter that converts data from CAT4 for instance to WAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the other switch features ?

A

VLANs,
Trunking
Spanning tree protocol
Link aggregation
Power over Ethernet
Port monitoring
User authentification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is link aggregation ?

A

IEEE 802.3ad standard

Combines multiple physical connections into a single logical connection to minimize or prevent congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When does congestion occur ? I

A

When ports all operate at the same speed. Switches are full duplex so every port can operate at 100Mb/s. But the switch need to send out the total amount. We solve that with link aggregation. It’s rare that every PC uses full bandwidth to the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Concrete example of link aggregation

A

When three PCs are connected to a switch with a bandwidth of 100 MB/s the switch can operate link aggregation to another router or switch by combining the different physical links coming from the computers.

26
Q

What is Power over Ethernet ?

A

802.3af and Poe + 802.3 at

Supplies electrical power over Ethernet and requires CAT 5 or higher copper cable

27
Q

What is the different electrical capabilities of PoE 802.3af and PoE+ 802.3at?

A

PoE 802.3af —> up to 15.4 watts
PoE+ 802.3 at—> up to 25.5 watts

28
Q

What are the different devices concerned with PoE ?

A

The Power sourcing équipment will provide the power (normally the switch) and the powered device will receive it.
Etg will occur over a RJ-45 connector.

29
Q

What is port monitoring or mirroring ?

A

Makes a copy of all traffic destined for a port and sends it to another port. Each switch port has its own collision domain. Port mirroring must be configured to send the traffic of port 1 and 23 to port 24. Port mirroring must also be set up on the targeted computer.

It replicates traffic passing through a switch.

30
Q

What is user authentication ?

A

802.1x
Requires users to authenticate themselves before gaining access to the network.

31
Q

Work flow of user authentication ?

A

The supplicant (pc1) will talk to the switch and ask for permission to join the network. The authentication server will send the key to the switch that will send it back to PC1.

32
Q

What is management access and authentication ?

A

You can use SSH and Console Port

33
Q

What is DSH ?

A

Remote administration program that allows connection to the switch over a network

34
Q

What is console port ?

A

Allows for local administration of the switch using a separate laptop and a rollover cable (DB9 to RJ45).

35
Q

Which what is Out of band management ?

A

Keeps all network configuration devices on a separate network. You create another network dedicated to management. It gives additional security.

36
Q

What is first hop redundancy ?

A

It has to do with L3.
Uses hot standby router protocol (HSRP) to create virtual IP and MAC addresses to provide active and standby routers.

37
Q

Concrete workflow of first hop redundancy ?

A

The HSRP protocol creates a new virtual router besides the active and standby router. It creates redundancy.

38
Q

What are the first hop redundancy protocol ?

A

HSRP (hot standby router protocol) —> most important
GLBP (gateway load balancing protocol)
Virtual router redundancy protocol (VRRP)
Common address redundancy protocol (CARP)

39
Q

What is MAC filtering ??

A

L2 function
Permits or denies traffic based on a device’s MAC address. When you connect devices to MAC address you can tell the switch to block a specific devices.

40
Q

What is traffic filtering ?

A

Permits or denies traffic based on IP addresses or application ports. L3 function. It’s on the logical layer. It can occur on L4. It can occur from the multilayer switch. You can évén block from ports (l4).

41
Q

What is Quality of Service ! I

A

Forwards traffic based on priority markings.
A MLSWITCH has three devices including a phone. You can give priority to a phone over computers. Phones are dealing with UDP voice traffic so they get priority. You can tell a switch or a router what is the most important.

42
Q

how much nines of availability ?

A

99.999% —> 5 minutes a year

43
Q

What is the purpose of the Spanning Tree Protocol ?

A

It allows to avoid broadcast storm or loops by electing a root bridge and by activating several states (blocking, listening, learning, forwarding, disabled) on ports.
Switches and devices exchange BPDUs (bridge protocol data units) in order to adjust ports (designated or block).

44
Q

Which switch become the root bridge in the Spanning tree protocol ?

A

The one with the lowest MAC Adress.

45
Q

Why does a port shut down in the spanning tree protocol ?

A

When it provides the farthest link to the root bridge.

46
Q

What happens if we add another segment ?

A

The spanning tree protocol adapts to designate another non-designated port.

47
Q

What is a VLAN ?

A

Allows different logical networks to share the same physical hardware and provides added security and efficiency. Before that, we had different routers and switches. It is integrated inside different L3 Switches.

48
Q

What about cable management when it comes to VLAN ?

A

When it comes to VLAN, cables can be the same, but on the logical topology, they must be distinct. This is VLAN trunking (802.1q).

49
Q

What is a trunk ?

A

A trunk occurs when you merge all the data onto a single cable.

50
Q

How to identify the different VLAN going over a trunk cable ?

A

We use a 4 byte identifier which is an electronic tag. It is constitude of a Tag Protocol Identifier (TPI) and Tag Control Identifier (TCI).

51
Q

What is a VPN concentrator ?

A

Creates a secure VPN or virtual tunnel over an untrusted network like the internet. The device that terminates VPN tunnels and allows for multiple VPN connections in one location is a VPN concentrator (frequently integrated in a firewall).

52
Q

What is a VPN headend ?

A

It is a specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device.

53
Q

What is a firewall ?

A

Network security appliance placed at the boundary of a network.

54
Q

What are NGFW ?

A

Conducts deep packet inspection at Layer 7 and can look through traffic to detect and prevent attacks. Much more powerful than basic stateless or stateful.

55
Q

What is a proxy server ?

A

Specialized device that makes requests to an external network on behalf of a client. It’s a go-between. Two functions :
- security because it can perform content logging and filtering.
- keeps requests in cache in order to save bdwth and resources.

56
Q

What is a content engine ?

A

Dedicated appliance that performs the caching function of a proxy server. Very useful to save resources and bandwidth. Useful inside a remote branch office.

57
Q

What is a content switch/load balancer ?

A

Distributes incoming requests across various servers in a server farm. Send the request and distribute the workload across all different servers in order to provide the best response time.

58
Q

What is a VoIP phone ?

A

Hardware device that connects to your IP network to make a connection to a call manager within your network. The call manager is used to perform the call processing for hardware and software-based IP phones. The call manager is useful for transmitting data to non-IP phone network.

59
Q

What are physicall access control devices ?

A

Doors, cards and so on. Not connected to your corporate network. or they must be in their own VLAN. Same for cameras because they are very insecure devices.

60
Q

What are HVAC ?

A

Should be placed in their own VLANs. Not a lot of security built-in.

61
Q

What is ICS ?

A

Describes the different types of control systems and associated instrumentation => automate and operate industrial processes. SCADA is one type of ICS.