CCNA cap. 4-7 tutto insieme

0.0(0)
studied byStudied by 3 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/227

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

228 Terms

1
New cards

What is the process called when data moves down the layers from the Application layer to the Physical layer?

Encapsulation.

2
New cards

In the process of encapsulation, what is the PDU (Protocol Data Unit) called at the Transport Layer?

Segments.

3
New cards

In the process of encapsulation, what is the PDU called at the Network Layer?

Packet.

4
New cards

In the process of encapsulation, what is the PDU called at the Data Link Layer?

Frame.

5
New cards

In the process of encapsulation, what is the PDU called at the Physical Layer?

Bits.

6
New cards

Which components make up an Ethernet Frame?

Destination MAC, Source MAC, Destination IP, Source IP, User data (Packet), and FCS (Frame Check Sequence).

7
New cards

What is Bandwidth?

The capacity of a medium to carry data in a given amount of time. It is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).

8
New cards

What is the fundamental unit of bandwidth?

Bits per second (b/s).

9
New cards

Define Throughput.

The measure of the transfer of bits across the media over a given period of time (including amount and type of traffic).

10
New cards

Define Latency.

The amount of time, including delays, for data to travel from one given point to another.

11
New cards

Define Goodput.

The measure of usable data transferred over a given period of time; it is calculated as throughput minus traffic overhead for establishing sessions, acknowledgements, and encapsulation.

12
New cards

What is the signaling method?

The method used by the physical layer to generate the electrical, optical, or wireless signals that represent the "1" and "0" bits on the media.

13
New cards

How are data signals transmitted in a synchronous communication method?

Data signals are sent along with a clock signal which occurs at evenly spaced time durations, referred to as the bit time.

14
New cards

How are data signals transmitted in an asynchronous communication method?

Data signals are transmitted without an associated clock signal. Frames require start and stop indicator flags because the spacing between data characters or blocks may be of arbitrary duration.

15
New cards

What type of physical signals are used by copper cable?

Electrical Signals.

16
New cards

What type of physical signals are used by fiber-optic cable?

Light Pulse.

17
New cards

What type of physical signals are used by wireless media?

Microwave Signals (using Amplitude Modulation (AM), Frequency Modulation (FM), or Phase Modulation (PM)).

18
New cards

Which organization officially adopted RJ connectors (e.g., RJ-11, RJ-45) and the ISO 11801 network cabling standard?

ISO.

19
New cards

Which organization governs the TCP/IP standards implemented in software?

IETF.

20
New cards

Which organization co-developed the 568-C RJ-45 pinouts standard with EIA/TIA?

ANSI.

21
New cards

Which standard organization is responsible for 802.3 (Ethernet), 802.11 (WLAN/Wi-Fi), and 802.15 (Bluetooth)?

IEEE.

22
New cards

Which organization is responsible for telecommunications cabling standards (like TIA/EIA 568-C, TIA-569-B, and TIA-942)?

EIA/TIA.

23
New cards

What are two common external interferences that negatively affect copper cabling?

Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI) (due to sources like fluorescent lights or electric motors).

24
New cards

What is Crosstalk?

Interference caused by the proximity of two wires, where an electromagnetic wave in one wire interferes with the signal in the adjacent wire.

25
New cards

How do Unshielded Twisted-Pair (UTP) cables limit the negative effect of crosstalk without using shielding?

By employing Cancellation and Varying the number of twists per wire pair.

26
New cards

What are the two types of UTP cable termination standards defined by EIA/TIA for RJ-45 connectors?

T568A and T568B.

27
New cards

What is a Straight-through (Patch) cable and when is it used?

It has the same wiring standard (A or B) applied at both ends. It is used to connect dissimilar devices (e.g., a PC and a Switch/Hub), where the TX pins of one device align with the RX pins of the other.

28
New cards

What is an Ethernet Crossover cable and when is it used?

It uses T568A on one end and T568B on the other, crossing pairs 2 and 3. It is used to connect similar devices (e.g., two Switches, two Hubs, two Routers, or two PCs) which have TX/RX pins in the same positions.

29
New cards

What is the application of a Rollover cable?

It is a Cisco proprietary cable used to connect a workstation serial port to a router or switch console port using an adapter.

30
New cards

What are the maximum supported speeds and distance for UTP cabling?

Supports bandwidths from 10 Mb/s up to 10 Gb/s over relatively short distances (1–100 meters).

31
New cards

Which type of copper media is terminated with BNC, N type, and F type connectors?

Coaxial cable.

32
New cards

Which cable type provides bandwidth performance up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX, and 1000BASE-T (Gigabit Ethernet)?

CAT 5e.

33
New cards

Which copper cable category is characterized by double shielding and supports transmissions up to 1200 MHz, making it ideal for 40GHz Ethernet connections?

Category 7-7a.

34
New cards

What is the core structure of a fiber-optic cable?

It consists of the Core, surrounded by the Cladding, then the Buffer, strengthening material, and finally the Jacket.

35
New cards

What are the key characteristics of Single-mode fiber (SMF)?

Small core (9 microns), less dispersion, suited for long distance applications (up to 100,000 meters), and uses lasers as the light source.

36
New cards

What are the key characteristics of Multimode fiber (MMF)?

Larger core (50/62.5 microns), allows multiple paths for light, suited for long distance applications but shorter than single-mode (up to 2,000 meters), and uses LEDs as the light source.

37
New cards

Name three common types of fiber optic connectors.

ST Connectors (older bayonet style), SC Connectors (Subscriber/Square Connector, push-pull mechanism), and LC Connector (Lucent/Local Connector, small size).

38
New cards

List three common issues that can affect fiber optic media implementation.

Misalignment (fibers not precisely aligned), End gap (media not completely touching), and End finish (media ends not well polished or dirt present).

39
New cards

How does fiber-optic cabling compare to UTP cabling in terms of immunity to electrical hazards and EMI/RFI?

Fiber optic cabling has High immunity (it is completely immune) while UTP has Low immunity.

40
New cards

What is the media access control process used by IEEE 802.11 (Wi-Fi)?

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA).

41
New cards

Which IEEE standard defines the Bluetooth technology?

802.15.

42
New cards

What maximum speed and frequency are supported by the IEEE 802.11g standard?

54 Mb/s at 2.4 GHz.

43
New cards

What maximum speed and frequency are supported by the IEEE 802.11ac standard?

1 Gb/s at 5 GHz.

44
New cards

What is the primary role of the Data Link Layer (Layer 2)?

To prepare network data for the physical network and control how data is placed and received on the media. It accepts Layer 3 packets and packages them into frames.

45
New cards

The Data Link Layer is divided into two sublayers. Name them.

The Logical Link Control (LLC) sublayer (upper) and the Media Access Control (MAC) sublayer (lower).

46
New cards

What is the function of the LLC Sublayer?

It communicates with the network layer (Layer 3) and places information in the frame that identifies which network layer protocol (like IPv4 or IPv6) is being used.

47
New cards

What is the function of the MAC Sublayer?

It defines the media access processes performed by the hardware, provides data link layer addressing, and handles access to various network technologies (like Ethernet or Wi-Fi).

48
New cards

What is the difference between a Physical Topology and a Logical Topology?

Physical topology indicates how devices are physically connected (e.g., point-to-point or star). Logical topology refers to the way frames are transferred within the network.

49
New cards

What is the difference between Half-duplex and Full-duplex communication?

Half-duplex restricts data exchange to one direction at a time. Full-duplex allows sending and receiving of data to happen simultaneously.

50
New cards

Which networking devices typically operate in Full-duplex mode?

Ethernet switches.

51
New cards

Which networking devices typically operate in Half-duplex mode?

Devices in legacy bus topologies, Ethernet hubs, and devices in WLANs.

52
New cards

Which media access control method requires nodes to operate in half-duplex, allowing only one device to send data at a time?

Contention-based access.

53
New cards

Within a Data Link Frame, what is the purpose of the Type field?

It identifies the Layer 3 protocol (e.g., IPv4 or IPv6) contained in the data field.

54
New cards

Within a Data Link Frame, what is the purpose of the Control field?

It specifies special flow control services, such as Quality of Service (QoS).

55
New cards

Which two OSI layers does Ethernet operate in?

The Data Link Layer and the Physical Layer.

56
New cards

What are the two sublayers Ethernet is based upon?

The Logical Link Control (LLC) and the Medium Access Control (MAC) sublayers.

57
New cards

Which IEEE standard defines the Logical Link Control (LLC) sublayer?

IEEE 802.2.

58
New cards

Which IEEE standard defines the MAC sublayer and physical specifications?

IEEE 802.3.

59
New cards

What are the three main functions provided by the Data Encapsulation process at the MAC sublayer?

Frame delimitation; Addressing (using MAC addresses); and Error detection (using CRC).

60
New cards

What is the primary method used by Ethernet to control how nodes share access to the medium?

Carrier Sense Multiple Access (CSMA).

61
New cards

What type of network access is Ethernet considered, meaning any device can try to transmit data whenever it has data to send?

A contention-based (non-deterministic) method.

62
New cards

What does CSMA/CD stand for, and when is it used?

Carrier Sense Multiple Access/Collision Detection. It is used in Ethernet networks; but is considered superfluous in modern LANs.

63
New cards

What does CSMA/CA stand for, and when is it primarily used?

Carrier Sense Multiple Access/Collision Avoidance. It is used in wireless networks (802.11).

64
New cards

What is the MAC Address also known as, since it is burned into the ROM of the Network Interface Card (NIC)?

Burned-in Address (BIA).

65
New cards

How is a MAC address structured?

It is a 6-byte (48-bit) hexadecimal address; divided into a 3-byte Organizationally Unique Identifier (OUI) assigned by the manufacturer; and 3 bytes assigned uniquely to the interface.

66
New cards

What is the size range (in bytes) of a standard Ethernet frame?

Minimum 64 bytes and maximum 1518 bytes.

67
New cards

What is a "collision fragment" or "runt frame"?

Any frame less than 64 bytes in length; which is automatically discarded by receiving stations.

68
New cards

What is the function of the Frame Check Sequence (FCS) field in an Ethernet frame?

It uses the Cyclic Redundancy Check (CRC) to detect errors in the frame.

69
New cards

What does the Type field in an Ethernet II frame header identify?

The higher-layer protocol being encapsulated (e.g.; 0x0800 for IPv4; 0x86DD for IPv6; 0x0806 for ARP).

70
New cards

Which MAC address is used for a Broadcast communication in Ethernet?

FF-FF-FF-FF-FF-FF (all Fs).

71
New cards

Which MAC address range indicates a Multicast frame?

A special value that begins with 01-00-5E in hexadecimal.

72
New cards

What is the logical topology of an Ethernet network, which implies shared media access?

A bus with multiple access.

73
New cards

What is the physical topology of most modern Ethernet networks?

A star or extended star topology; where end devices connect to a Layer 2 LAN switch.

74
New cards

On what basis does a Layer 2 LAN switch perform filtering and forwarding decisions?

Only on the Layer 2 (Data Link) MAC address.

75
New cards

What is the term sometimes used for the MAC Address Table, particularly in Cisco devices?

Content Addressable Memory (CAM).

76
New cards

How does a Layer 2 switch dynamically build its MAC address table?

By examining the source MAC address of incoming frames and recording it along with the incoming port number.

77
New cards

If a switch receives a frame and the source MAC address already exists in the table but on a different port, how does the switch handle it?

The old entry is replaced with the same MAC address and the newest port number.

78
New cards

What happens if a switch receives a frame destined for a Unicast MAC address NOT found in its table?

The switch forwards (floods) the frame out of all ports except the incoming port. This is known as an unknown unicast.

79
New cards

What happens if a switch receives a frame destined for a Broadcast or Multicast MAC address?

The frame is flooded out of all ports except the incoming port.

80
New cards

What must the switch do if the destination MAC address IS found in the MAC address table?

It forwards the frame only through the specific port associated with that destination MAC address.

81
New cards

What are the two primary traditional methods used by switches to forward data between network ports?

Store-and-forward switching and Cut-through switching.

82
New cards

Describe Store-and-forward switching.

The switch receives and stores the entire frame in a buffer before forwarding it. It performs an error check (CRC) on the frame's integrity.

83
New cards

What is the main advantage of Store-and-forward switching?

It conserves bandwidth by discarding corrupted frames; preventing them from consuming bandwidth across the network.

84
New cards

What is the main advantage of Cut-through switching?

It is the faster switching method.

85
New cards

Describe Cut-through switching.

The switch begins forwarding the data as soon as the destination MAC address (first 6 bytes after the preamble) is read.

86
New cards

What is the main disadvantage of Cut-through switching?

It does not perform error checking (CRC) and may forward corrupted frames onto the network; consuming bandwidth.

87
New cards

Which forwarding method is the only one used on current Cisco Catalyst switch models?

Store-and-forward switching.

88
New cards

What is Shared Memory Buffer?

A buffering method where all frames are deposited in a common memory buffer shared by all switch ports; allowing for dynamic linking to the destination port and generally reducing frame loss.

89
New cards

What is Asymmetric switching?

A feature allowed by Shared Memory Buffer that permits different data transmission speeds on different ports (e.g.; dedicating higher bandwidth to a server port).

90
New cards

In Full Duplex communication, how does data flow?

Data flow is bidirectional (sent and received simultaneously).

91
New cards

What state is the collision detection circuit in when operating in Full Duplex mode?

It is disabled (collision-free) because the two communicating nodes use separate circuits.

92
New cards

What are the three duplex settings supported by a Cisco Catalyst switch?

full (Full-duplex mode); half (Half-duplex mode); and AUTO (automatically decides the best operating mode).

93
New cards

What is the purpose of the auto-MDIX command?

When enabled; the switch detects the type of copper Ethernet cable needed (straight-through or crossover) and automatically configures the interface accordingly.

94
New cards

What is Power over Ethernet (PoE)?

A feature that allows a switch to provide power to a device (like IP phones or wireless access points) over the Ethernet cable; increasing installation flexibility.

95
New cards

What is the Forwarding Rate of a switch?

The processing capacity of a switch; defining the amount of data it can handle per second.

96
New cards

What is a Fixed Configuration Switch?

A switch whose features and ports cannot be added to or changed beyond what was originally provided.

97
New cards

What is a Modular Configuration Switch?

A switch that offers flexibility by using a chassis that accepts different-sized line cards; which contain the ports.

98
New cards

What is an SFP (Small Form-Factor Pluggable) module?

A transceiver module supported by switches (like the Catalyst 3560) that allows connection flexibility; supporting various fiber-optic and copper standards (e.g.; 100BASE-FX; 1000BASE-T).

99
New cards

How does a Layer 3 Switch differ from a Layer 2 switch?

A Layer 3 switch uses both the Layer 2 MAC address and Layer 3 IP address information to make forwarding and routing decisions.

100
New cards

What functions can Layer 3 switches perform on a LAN, potentially reducing the need for dedicated routers?

They can perform Layer 3 routing functions as quickly as they perform switching.