• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back

Contention-based media access method that allows all host on a network to share the same links bandwidth

Ethernet

A wireless device that allows host to connect wirelessly using IEEE 802.11 specification

Wireless access point.



Only extends a collision domain and does not segment the network

Protocol that helps the devices share bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium

Carrier sense multiple access with collision detection (CSMA/CD)

Transmitting over half-duplex network, a host...

First checks for the presence of a digital signal on the wire. If clear, will transmit.



Transmitting host constantly monitors the wire to make sure no other hosts begin transmitting.



Sends extended jam signal that causes other nodes to stop sending data.



Collisions after 15 tries will time-out node.


When a collision occurs on ethernet LAN

1. Jam signal informs all devices that are collision occurred.



2. Collision invokes a random backoff algorithm.



3. Each device stops transmitting until backoff algorithm expires.



4. All hosts have equal priority to transmit after the timers have expired.

Auto-detect mechanism

When a full-duplex ethernet port is powered on it first connects to the remote end and then negotiates with the other end of the fast ethernet link.



Checks to see if It can run 10, 100, or 1000 Mbps.



checks if it can run full-duplex. If can't, will run half-duplex.

MAC address

I/G | G/L | OUI | vendor |


{ 24 }{ 24 }

Individual/Group Bit


0=?


1=?

0 = Address is a MAC address of a device.


1 = Address represents broadcast or multicast address in ethernet

Global/Local bit


0=?


1=?

0 = represents a globally administered address


1 = represents a locally governed and administered address

CRC

Cyclic redundancy check - error detection, not error correction

Encapsulating a frame within a different type of frame is called

Tunneling

Ethernet II Frame Format

1. Preamble - 7 bytes


2. Start Frame Delimiter (SFD) - 1 byte


3. Destination Address (DA) - 6 bytes


4. Source Address (SA) - 6 bytes


5. Length or Type - 2 bytes


6. Data and Pad - 46-1,500 bytes


7. Frame Check Sequence (FCS) - 4 bytes

Ethernet broadcast

FF:FF:FF:FF:FF:FF

10Base-T

IEEE 802.3 - 10 Mbps CAT 3 UTP


Runs up to 100 meters

100Base-TX

802.3u - CAT 5, 5E, 6 UTP two-pair


100 meters


RJ45 connector

100Base-FX

802.3u


Point to Point


412 meters long

1000Base-CX

892.3z


Copper twisted pair


25 meters

1000Base-T

802.3ab


CAT 5, four-pair UTP


1 GBPS


100 Meters

1000Base-SX

802.3z


220 meters (62.5 micron)


550 meters (50 micron)

1000Base-LX

802.3z


3 Km (9 micron)


10 Km (1300 nm laser)

1000Base-ZX

CISCO STANDARD


Gigabit Ethernet Communication


Spans up to 43.5 miles

10GBase-T

802.3an


10 gbps over UTP cables


100 meter transmission

Crossover Cable

Switch to switch


Host to host


Hub to hub


Hub to switch


Router direct to host


Router to router



1->3


2->6

Straight-Through Cable

Host to switch or hub


Router to switch or hub



1->1


2->2


6->6

Rolled Cable

Used to connect PC to Cisco router or switch



1->8


2->7


3->6


4->5

Configuring your console emulation program

Baud Rate: 9600


Data bits: 8


Parity: none


No Flow Control options set

When a host transmits data across the network to another device, the data goes through...

Encapsulation process

Protocol data units (PDUs)

Hold control information attached to the data at each layer of the model.



To communicate and exchange information

Data encapsulation method

1. User information is converted to data for transmission on the network


2. Data is converted to segments reliable connection set up between transmitting and receiving hosts


3. Segments converted to packets or datagrams logical address placed in header to remote packet through Internet internetwork


4. Packets or datagrams converted to frames for local network. Hardware address uniquely identifies hosts on local network.


5. Frames converted to bits and a digital encoding and clocking scheme is used

This layer uses port numbers to define both the virtual circuit and upper layer processes

Transport layer (4)

A socket

Defined by the source and destination port numbers and the source and destination IP address

Cisco's three layers of hierarchy

Core


Distribution


Access

The Core Layer

1. Core of the network


2. Transports large amount of data in traffic reliably and quickly


3. Switch traffic fast as possible


--fault tolerance is important


--speed and latency chief concern

The distribution layer

1. Workgroup Layer


2. Communication point between access and core layers.


3. Provides routing, filtering, WAN access, to determine how packets can access the core.


--fastest way


--determines best path

The Access Layer

Controls user and workgroup access to Internetwork resources


--desktop Layer


1. Accessing control policies


2. Creation of separate collision domains


3. Workgroup connectivity


4. Device connectivity


5. Resiliency and security


6. Gigabit and ethernet switching