Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
Contention-based media access method that allows all host on a network to share the same links bandwidth |
Ethernet |
|
A wireless device that allows host to connect wirelessly using IEEE 802.11 specification |
Wireless access point.
Only extends a collision domain and does not segment the network |
|
Protocol that helps the devices share bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium |
Carrier sense multiple access with collision detection (CSMA/CD) |
|
Transmitting over half-duplex network, a host... |
First checks for the presence of a digital signal on the wire. If clear, will transmit.
Transmitting host constantly monitors the wire to make sure no other hosts begin transmitting.
Sends extended jam signal that causes other nodes to stop sending data.
Collisions after 15 tries will time-out node.
|
|
When a collision occurs on ethernet LAN |
1. Jam signal informs all devices that are collision occurred.
2. Collision invokes a random backoff algorithm.
3. Each device stops transmitting until backoff algorithm expires.
4. All hosts have equal priority to transmit after the timers have expired. |
|
Auto-detect mechanism |
When a full-duplex ethernet port is powered on it first connects to the remote end and then negotiates with the other end of the fast ethernet link.
Checks to see if It can run 10, 100, or 1000 Mbps.
checks if it can run full-duplex. If can't, will run half-duplex. |
|
MAC address |
I/G | G/L | OUI | vendor | { 24 }{ 24 } |
|
Individual/Group Bit 0=? 1=? |
0 = Address is a MAC address of a device. 1 = Address represents broadcast or multicast address in ethernet |
|
Global/Local bit 0=? 1=? |
0 = represents a globally administered address 1 = represents a locally governed and administered address |
|
CRC |
Cyclic redundancy check - error detection, not error correction |
|
Encapsulating a frame within a different type of frame is called |
Tunneling |
|
Ethernet II Frame Format |
1. Preamble - 7 bytes 2. Start Frame Delimiter (SFD) - 1 byte 3. Destination Address (DA) - 6 bytes 4. Source Address (SA) - 6 bytes 5. Length or Type - 2 bytes 6. Data and Pad - 46-1,500 bytes 7. Frame Check Sequence (FCS) - 4 bytes |
|
Ethernet broadcast |
FF:FF:FF:FF:FF:FF |
|
10Base-T |
IEEE 802.3 - 10 Mbps CAT 3 UTP Runs up to 100 meters |
|
100Base-TX |
802.3u - CAT 5, 5E, 6 UTP two-pair 100 meters RJ45 connector |
|
100Base-FX |
802.3u Point to Point 412 meters long |
|
1000Base-CX |
892.3z Copper twisted pair 25 meters |
|
1000Base-T |
802.3ab CAT 5, four-pair UTP 1 GBPS 100 Meters |
|
1000Base-SX |
802.3z 220 meters (62.5 micron) 550 meters (50 micron) |
|
1000Base-LX |
802.3z 3 Km (9 micron) 10 Km (1300 nm laser) |
|
1000Base-ZX |
CISCO STANDARD Gigabit Ethernet Communication Spans up to 43.5 miles |
|
10GBase-T |
802.3an 10 gbps over UTP cables 100 meter transmission |
|
Crossover Cable |
Switch to switch Host to host Hub to hub Hub to switch Router direct to host Router to router
1->3 2->6 |
|
Straight-Through Cable |
Host to switch or hub Router to switch or hub
1->1 2->2 6->6 |
|
Rolled Cable |
Used to connect PC to Cisco router or switch
1->8 2->7 3->6 4->5 |
|
Configuring your console emulation program |
Baud Rate: 9600 Data bits: 8 Parity: none No Flow Control options set |
|
When a host transmits data across the network to another device, the data goes through... |
Encapsulation process |
|
Protocol data units (PDUs) |
Hold control information attached to the data at each layer of the model.
To communicate and exchange information |
|
Data encapsulation method |
1. User information is converted to data for transmission on the network 2. Data is converted to segments reliable connection set up between transmitting and receiving hosts 3. Segments converted to packets or datagrams logical address placed in header to remote packet through Internet internetwork 4. Packets or datagrams converted to frames for local network. Hardware address uniquely identifies hosts on local network. 5. Frames converted to bits and a digital encoding and clocking scheme is used |
|
This layer uses port numbers to define both the virtual circuit and upper layer processes |
Transport layer (4) |
|
A socket |
Defined by the source and destination port numbers and the source and destination IP address |
|
Cisco's three layers of hierarchy |
Core Distribution Access |
|
The Core Layer |
1. Core of the network 2. Transports large amount of data in traffic reliably and quickly 3. Switch traffic fast as possible --fault tolerance is important --speed and latency chief concern |
|
The distribution layer |
1. Workgroup Layer 2. Communication point between access and core layers. 3. Provides routing, filtering, WAN access, to determine how packets can access the core. --fastest way --determines best path |
|
The Access Layer |
Controls user and workgroup access to Internetwork resources --desktop Layer 1. Accessing control policies 2. Creation of separate collision domains 3. Workgroup connectivity 4. Device connectivity 5. Resiliency and security 6. Gigabit and ethernet switching |