1/530
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is Ethernet primarily used for?
Ethernet is the dominant protocol for Layer 2 communication in local area networks (LANs).
What were the original cables used in Ethernet?
Originally, Ethernet used coaxial cables with BNC connectors and vampire tabs (10Base2 and 10Base5).
What is the maximum distance covered by 10Base-T Ethernet?
10Base-T Ethernet covers a distance of up to 100 meters.
What is the speed of 10Base-T Ethernet?
10Base-T Ethernet operates at a speed of 10 Megabits per second (Mbps).
What is the difference between deterministic access and contention-based access?
Deterministic access is organized and orderly (e.g., Token Ring), while contention-based access is chaotic but allows more efficient use of bandwidth (e.g., Ethernet).
What does CSMA/CD stand for?
Carrier Sense Multiple Access with Collision Detection.
What is the role of Carrier Sensing (CS) in CSMA/CD?
Carrier Sensing allows devices to listen for existing transmissions before attempting to send data.
What does Multiple Access (MA) refer to in networking?
Multiple Access refers to many devices being able to access the network simultaneously.
What happens during a collision in a network?
Devices detect collisions and handle them using a Random Back-off Timer to avoid simultaneous retransmissions.
What is a Collision Domain?
A Collision Domain is an area where collisions can occur in a network.
How do Ethernet switches improve network efficiency?
Ethernet switches break networks into smaller collision domains, allowing full-duplex communication and improving efficiency.
What is the primary Layer 2 protocol for modern networks?
Ethernet is the primary Layer 2 protocol for modern networks.
Why are switches preferred over hubs in network management?
Switches are preferred because they provide more efficient network management by reducing collisions and allowing full-duplex communication.
What type of device is a hub classified as?
A hub is classified as a Layer 1 device, also known as a multi-port repeater.
What is the significance of the Random Back-off Timer in CSMA/CD?
The Random Back-off Timer allows devices involved in collisions to pause and select random times before retransmitting, reducing the likelihood of further collisions.
What technology did Ethernet transition from?
Ethernet transitioned from using coaxial cables to twisted pair cables (Cat 3) with the introduction of 10Base-T.
What is the maximum speed of early Ethernet technologies like 10Base2 and 10Base5?
Early Ethernet technologies like 10Base2 and 10Base5 operated at speeds of 10 Mbps.
What is the main function of an Ethernet switch?
The main function of an Ethernet switch is to connect devices within a network and manage data traffic efficiently.
What is the impact of using switches on collision domains?
Each switch port creates its own collision domain, which helps to minimize collisions and improve overall network performance.
What is the primary advantage of full-duplex communication in Ethernet switches?
Full-duplex communication allows simultaneous sending and receiving of data, enhancing network efficiency.
What are the two types of access methods in networking?
The two types of access methods are deterministic access and contention-based access.
What is the primary function of a passive hub?
To repeat signals without amplification.
How does an active hub differ from a passive hub?
An active hub boosts signals to overcome cable length limitations.
What enhanced features does a smart-active hub provide?
It includes features like SNMP for remote configuration.
What is the role of a switch in a network?
A switch connects collision domains, making them larger, and operates as a Layer 2 device.
How does a switch manage MAC addresses?
It analyzes source MAC addresses to populate a MAC address table and makes forwarding decisions based on destination MAC addresses.
What are the benefits of using switches over hubs?
Switches break up collision domains, add security, and improve efficiency in networks.
What type of device is a router classified as?
A Layer 3 device.
What is the primary function of a router?
To connect dissimilar networks and make routing decisions based on IP addresses.
How do routers enhance network efficiency?
By separating broadcast domains and efficiently managing traffic.
What is full duplex support in routers?
It allows simultaneous communication without interference.
What is a Layer 3 switch also known as?
A multilayer switch.
What functions do Layer 3 switches combine?
They combine the functions of switches and routers.
What is a Virtual Local Area Network (VLAN)?
A logical subdivision of a network that segments it into separate broadcast domains.
How do VLANs differ from traditional LANs?
VLANs group hosts together regardless of their physical connections.
What is the method of achieving VLANs?
Through software rather than hardware and cabling.
What are the benefits of using VLANs?
They provide flexibility in network configuration and efficient resource allocation and management.
What should you remember about switches for the exam?
Switches are Layer 2 devices focused on MAC addresses unless specified as multilayer or Layer 3 switches.
How should multilayer or Layer 3 switches be treated in exam questions?
They should be treated like routers.
What is the significance of each port on a switch?
Each port acts as a separate collision domain.
What is the main advantage of using switches in internal networks?
They are efficient for internal networks but less effective for large-scale routing operations.
What is the primary focus of routers?
Routers are focused on IP addresses.
What are VLANs and their primary purpose?
VLANs (Virtual Local Area Networks) allow different logical networks to share the same physical hardware, reducing hardware requirements.
At which layer of the OSI model do VLANs operate?
VLANs operate at Layer 2 (Data Link Layer) of the OSI model.
What is the function of VLAN tags in data frames?
VLAN tags are used to determine the path of frames, ensuring they stay within their designated VLAN.
List three reasons for using VLANs.
1. Enhanced Security: Isolates sensitive data and reduces data breach risks. 2. Improved Performance: Reduces broadcast domain size and decreases unnecessary traffic. 3. Increased Management: Facilitates easier policy implementation and troubleshooting.
What does the VLAN database contain?
The VLAN database contains VLAN configurations for switches, including identifiers, names, and MTU sizes.
What is a Switch Virtual Interface (SVI)?
An SVI is a virtual interface on a switch that provides Layer 3 processing for VLANs, allowing routing between VLANs without a separate router.
What is 802.1Q tagging?
802.1Q tagging is an IEEE standard that facilitates the management of multiple VLANs on a single network by inserting VLAN tags into Ethernet frames.
What is trunking in the context of VLANs?
Trunking is the transmission of traffic from different VLANs across the same physical network infrastructure while keeping that traffic separate and secure.
What is a native VLAN?
The native VLAN is one VLAN on a trunk port that does not get tagged with a VLAN ID, serving as the default VLAN for untagged frames.
What is the purpose of a Voice VLAN?
A Voice VLAN is dedicated to voice traffic (VoIP), ensuring quality and reliability of voice communications by segregating voice traffic.
What is link aggregation?
Link aggregation, also known as port channeling or bonding, combines multiple network connections into a single logical link to enhance bandwidth capacity and provide redundancy.
What are speed and duplex configurations?
Speed refers to the rate of data transfer (Mbps or Gbps), while duplex refers to how data is sent: half duplex (send or receive, not both) or full duplex (send and receive simultaneously).
What is the Spanning Tree Protocol (STP)?
STP is an Ethernet feature that prevents loops in network traffic, enabling redundant links between switches and preventing broadcast storms.
What is the role of the root bridge in STP?
The root bridge acts as a reference point for the entire spanning tree, elected based on the lowest Bridge ID (BID).
What are the types of STP ports?
1. Root Port: Closest to the root bridge in terms of cost. 2. Designated Port: Closest to the root bridge on a network segment. 3. Non-designated Port: Blocks traffic to prevent loops.
What are the states of STP ports?
1. Blocking: Stops forwarding frames. 2. Listening: Learns MAC addresses but does not forward frames. 3. Learning: Processes BPDUs and determines role in spanning tree. 4. Forwarding: Forwards frames as designated or root port.
What is Network Access Control (NAC)?
NAC is a method for increasing network security by inspecting devices as they connect to determine if they are secure enough for access.
What is port security?
Port security secures physical network ports to prevent unauthorized access and limits the number of devices that can connect to a switch.
What is MAC filtering?
MAC filtering controls access to the network based on devices' unique MAC addresses, maintaining a list of approved MAC addresses.
What is 802.1X authentication?
802.1X provides an authentication framework for networks, ensuring only authenticated users can access network services.
What are the three components of 802.1X authentication?
1. Supplicant: User device. 2. Authenticator: Network device. 3. Authentication Server: Authenticates the user device.
What is the Maximum Transmission Unit (MTU)?
MTU refers to the largest size of a frame that can be sent over a network, measured in bytes, dictating data transmission capacity.
What is the impact of MTU on network performance?
Properly configured MTU ensures optimal data packet and frame size, improving overall network performance.
What are advanced NAC features?
1. Time-based Access Control: Limits access based on hours. 2. Location-based Access Control: Verifies device location. 3. Role-based Access Control: Grants permissions based on user roles.
What is the importance of configuration best practices in networking?
Configuration best practices, such as auto-negotiation and manual configurations, help ensure optimal performance and prevent misconfigurations that can impact network throughput.
What is the impact of a high MTU on network performance?
A high MTU can lead to packet loss and retransmission.
What happens when the MTU is set too low?
It increases overhead and slows down the network.
What is the standard MTU size for Wired Ethernet?
The standard MTU size is 1500 bytes.
Why is a smaller MTU size recommended for wireless networks?
Due to instability and higher error rates.
What MTU size is recommended for VPN and PPPoE connections?
A recommended size is between 1400 to 1420 bytes.
What are Jumbo Frames?
Frames that exceed the standard 1500 bytes, typically configured at 9000 bytes.
What are the benefits of using Jumbo Frames?
They are beneficial for high bandwidth applications but require careful configuration.
What challenges are associated with Jumbo Frames?
Not all network equipment supports them, fragmentation may occur with smaller MTU devices, limited support in traditional troubleshooting tools, and consistent configuration across devices is necessary.
What is an IP Address?
An assigned numerical label used to identify Internet communicating devices on a computer network.
What is IPv4 Addressing?
The most common type of IP addressing used in networks, represented as a 32-bit binary number.
How is an IPv4 address represented?
In Dotted-decimal Notation, as a series of four decimal numbers separated by dots.
What are Octets in the context of IPv4 addressing?
The four decimal numbers in an IPv4 address, each representing 8 bits of a binary number.
What is the range of decimal numbers for each octet in an IPv4 address?
Decimal numbers range from 0 to 255.
What determines the network and host portions of an IPv4 address?
They are determined by a subnet mask.
What is a Subnet Mask?
A mask that contains continuous strings of ones (1) and zeros (0), indicating the network and host portions.
What is Classful Subnetting?
The process of using default masks associated with specific address classes.
What is Classless Subnetting?
The process of using any subnet mask that is not the default for a specific address class.
What are the classes of IPv4 addresses based on the first octet?
Class A (1-127), Class B (128-191), Class C (192-223), Class D (224-239), Class E (240-255).
What is the default subnet mask for Class A addresses?
255.0.0.0.
What is the default subnet mask for Class B addresses?
255.255.0.0.
What is the default subnet mask for Class C addresses?
255.255.255.0.
What is a Multicast Address?
A logical identifier for a group of hosts, typically in the range of 240 to 255.
What is the purpose of Class E addresses?
Reserved for experimental use in terms of research and development.
What is CIDR notation?
A method of borrowing bits from the host portion to expand the network portion, allowing for smaller subnetworks, represented as IP/subnet.
What are the default CIDR notations for IP address classes A, B, and C?
Class A: /8, Class B: /16, Class C: /24.
What is a public IPv4 address?
A routable IP address that is a unique identifier assigned to devices on the internet, leased or purchased from ISPs, and globally managed by ICANN.
What is the role of Regional Internet Registries (RIRs)?
They manage public IP addresses for different regions, including ARIN (North America), LACNIC (Latin America), AFNIC (Africa), APNIC (Asia Pacific), and RIPE (Europe).
What is a private IPv4 address?
A non-internet routable IP address used within local networks, allowing communication between devices without using a public IP.
What is Network Address Translation (NAT)?
A method used to translate private IP addresses into public IP addresses and vice versa, facilitating communication between local and public networks and conserving global IP address space.
What is an RFC?
A formal publication from the Internet Engineering Task Force (IETF) documenting new technologies or standards proposed by individuals or groups.
What does RFC 1918 define?
It defines the ranges for private IP addresses.
What are the private IP address ranges for Class A, B, and C?
Class A: 10.0.0.0 - 10.255.255.255, Class B: 172.16.0.0 - 172.31.255.255, Class C: 192.168.0.0 - 192.168.255.255.
What is the loopback address?
The specialized IP address 127.0.0.1, used for internal testing and troubleshooting, allowing higher-level protocols to send data back to the host.