• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

Protocol Data Units (PDUs)

When messages are sent between hosts on an "ethernet" network, the host formats the message into the frame layout specified by the standards.

What layer does ethernet operate in?

Ethernet operates in the data link layer (layer 2) and the physical layer (layer 1).

What bandwidth speeds does ethernet support?

10mb/S to 100,000 mb/S (100 gb/s)

What sub layers does ethernet rely on?

LLC (Logical Link Control) - Handles the communication between the upper and lower layers. This is typically between the networking software and the device hardware. The LLC sub layer takes the network protocol Data, which is typically an IP4 packet, and adds control information to help deliver the packet to the destination node.



MAC sub layers - constitutes the lower sub layer of the data link layer. MAC is implemented by hardware, typically in the NIC.

What are the 2 responsibilities of the ethernet sub layer?

Data encapsulation


Media access control

3 primary functions of data encapsulation

Frame delimiting


Addressing


Error detection

Ethernet relies on 2 sub layers of the data link

LLC (Logical Link control) sub layer


MAC sub layer

What is the LLC sub layer?

Handles communication between upper and lower layers (network software and device hardware)



The LLC sub layer is used to communicate with he upper layers of the application and transition the packet to the lower layers for delivery.

2 responsibilities of MAC Sub layer

Data encapsulation


Media access control

Carrier sense multiple access (CSMA)

CSMA/CD (Collision detection)


CSMA/CA (Collision avoidance)

How many bits in a MAC address?

48 bit (6 bytes)


12 hexadecimal digits (4 bits per digit)

OUI (Organisationally unique identifier)

The IEEE assigns the vendor 3 byte (24 bit) code called OUI

What is a MAC address also referred to as?

Burned in address (BIA)


Because, historically, this address is burned into the ROOM on the NIC

2 styles of ethernet framing

IEEE 802.3 ethernet standard


DIX ethernet standard (ethernet II)

Size of ethernet frame

Minimum frame 64 bytes


Maximum frame 1518 bytes

Ethernet frame collisions

If any frame is less than 64 bytes in length, it is considered a "collision fragment" or "runt frame"

Primary fields in an ethernet frame

Preamble (7 bytes)


Start of frame delimiter (1 byte)


Destination address (6 bytes)


Source address (6 bytes)


Length (2 bytes)


802.2 header information and data (46-1500 bytes)


Frame check sequence (4 bytes)

What does the preamble field do in ethernet field?

Notifies destination to get ready for a new frame

What does the start of frame delimiter field in an ethernet frame do?

Synchronises sending and receiving frame for delivery

How many bytes in a source MAC address?

6 bytes (48 bit)

What does the frame check sequence field in an ethernet frame do?

Detects errors in an ethernet frame. It uses cycle redundancy check (CRC) to look for errors. If calculations match, no error occurred. Calculations that do not match means data has been changed and frame is dropped.

MAC address of broadcast

FF-FF-FF-FF-FF-FF

2 protocols that used broadcast

DHCP


ARP

Range of multicast addresses

224.0.0.0 to 239.255.255.255

What would a multicast address be used in?

Online gaming


Video conferencing

First 6 digits in a multicast MAC address

01-00-5E

What does ARP stand for?

Address resolution protocol

What layer is ARP?

Layer 2

2 functions of ARP

Resolve IPv4 addresses to MAC addresses


Maintain a table of mapping

Where is ARP table stored

RAM of device

What is ARP spoofing?

Technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP replies

What is A MAC address also referred to as?

Content addressable memory (CAM)

2 methods of frame forwarding?

Store and forward forwarding


Cut through forwarding

What does store and forward switching do in frame forwarding?

Receives entire frame, then computes CRC (Cyclone redundancy check). If CRC us valid, the frame is forwarded. Store and forward switching is required for Quality of Service (QoS).

What does cut through switching do in frame forwarding?

Forwards the frame before it is entirely received. The destination address must be read before frame is forwarded. The switch does not perform any error checking on the frame. This method is faster but it will forward corrupt frames throughout the network. The destination NIC eventually discards the corrupt frame.

2 variations of cut through switching

Fast forward switching (no checks whatsoever)


Fragment free switching (checks first 64 bytes of frame

2 methods of memory buffering

Port based memory


Shared memory

What is CEF?

Cisco express forwarding.


CEF decouples the usual strict independence between layer 2 and layer 3 decision making to make forwarding faster.

2 components of CEF (cisco express forwarding) operations

Forwarding information base


Adjencency tables