Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
Protocol Data Units (PDUs) |
When messages are sent between hosts on an "ethernet" network, the host formats the message into the frame layout specified by the standards. |
|
What layer does ethernet operate in? |
Ethernet operates in the data link layer (layer 2) and the physical layer (layer 1). |
|
What bandwidth speeds does ethernet support? |
10mb/S to 100,000 mb/S (100 gb/s) |
|
What sub layers does ethernet rely on? |
LLC (Logical Link Control) - Handles the communication between the upper and lower layers. This is typically between the networking software and the device hardware. The LLC sub layer takes the network protocol Data, which is typically an IP4 packet, and adds control information to help deliver the packet to the destination node. MAC sub layers - constitutes the lower sub layer of the data link layer. MAC is implemented by hardware, typically in the NIC. |
|
What are the 2 responsibilities of the ethernet sub layer? |
Data encapsulation Media access control |
|
3 primary functions of data encapsulation |
Frame delimiting Addressing Error detection |
|
Ethernet relies on 2 sub layers of the data link |
LLC (Logical Link control) sub layer MAC sub layer |
|
What is the LLC sub layer? |
Handles communication between upper and lower layers (network software and device hardware) The LLC sub layer is used to communicate with he upper layers of the application and transition the packet to the lower layers for delivery. |
|
2 responsibilities of MAC Sub layer |
Data encapsulation Media access control |
|
Carrier sense multiple access (CSMA) |
CSMA/CD (Collision detection) CSMA/CA (Collision avoidance) |
|
How many bits in a MAC address? |
48 bit (6 bytes) 12 hexadecimal digits (4 bits per digit) |
|
OUI (Organisationally unique identifier) |
The IEEE assigns the vendor 3 byte (24 bit) code called OUI |
|
What is a MAC address also referred to as? |
Burned in address (BIA) Because, historically, this address is burned into the ROOM on the NIC |
|
2 styles of ethernet framing |
IEEE 802.3 ethernet standard DIX ethernet standard (ethernet II) |
|
Size of ethernet frame |
Minimum frame 64 bytes Maximum frame 1518 bytes |
|
Ethernet frame collisions |
If any frame is less than 64 bytes in length, it is considered a "collision fragment" or "runt frame" |
|
Primary fields in an ethernet frame |
Preamble (7 bytes) Start of frame delimiter (1 byte) Destination address (6 bytes) Source address (6 bytes) Length (2 bytes) 802.2 header information and data (46-1500 bytes) Frame check sequence (4 bytes) |
|
What does the preamble field do in ethernet field? |
Notifies destination to get ready for a new frame |
|
What does the start of frame delimiter field in an ethernet frame do? |
Synchronises sending and receiving frame for delivery |
|
How many bytes in a source MAC address? |
6 bytes (48 bit) |
|
What does the frame check sequence field in an ethernet frame do? |
Detects errors in an ethernet frame. It uses cycle redundancy check (CRC) to look for errors. If calculations match, no error occurred. Calculations that do not match means data has been changed and frame is dropped. |
|
MAC address of broadcast |
FF-FF-FF-FF-FF-FF |
|
2 protocols that used broadcast |
DHCP ARP |
|
Range of multicast addresses |
224.0.0.0 to 239.255.255.255 |
|
What would a multicast address be used in? |
Online gaming Video conferencing |
|
First 6 digits in a multicast MAC address |
01-00-5E |
|
What does ARP stand for? |
Address resolution protocol |
|
What layer is ARP? |
Layer 2 |
|
2 functions of ARP |
Resolve IPv4 addresses to MAC addresses Maintain a table of mapping |
|
Where is ARP table stored |
RAM of device |
|
What is ARP spoofing? |
Technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP replies |
|
What is A MAC address also referred to as? |
Content addressable memory (CAM) |
|
2 methods of frame forwarding? |
Store and forward forwarding Cut through forwarding |
|
What does store and forward switching do in frame forwarding? |
Receives entire frame, then computes CRC (Cyclone redundancy check). If CRC us valid, the frame is forwarded. Store and forward switching is required for Quality of Service (QoS). |
|
What does cut through switching do in frame forwarding? |
Forwards the frame before it is entirely received. The destination address must be read before frame is forwarded. The switch does not perform any error checking on the frame. This method is faster but it will forward corrupt frames throughout the network. The destination NIC eventually discards the corrupt frame. |
|
2 variations of cut through switching |
Fast forward switching (no checks whatsoever) Fragment free switching (checks first 64 bytes of frame |
|
2 methods of memory buffering |
Port based memory Shared memory |
|
What is CEF? |
Cisco express forwarding. CEF decouples the usual strict independence between layer 2 and layer 3 decision making to make forwarding faster. |
|
2 components of CEF (cisco express forwarding) operations |
Forwarding information base Adjencency tables |