2101 Ch07-12 Final Part 2
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the maximum bandwidth supported by Ethernet technology?

  • 100 Mbps
  • 40 Gbps
  • 10 Gbps
  • 100 Gbps (correct)
  • Which layer of the OSI model does Ethernet operate in?

  • Network layer and transport layer
  • Session layer and data link layer
  • Data link layer and physical layer (correct)
  • Application layer and physical layer
  • What role does the LLC sublayer play in Ethernet technology?

  • Manages physical layer technologies
  • Provides MAC addressing
  • Communicates between network software and hardware (correct)
  • Encapsulates data for transmission
  • What does the MAC sublayer specifically handle in Ethernet?

    <p>Data encapsulation and media access control</p> Signup and view all the answers

    What essential information is included in the Ethernet frame for delivery?

    <p>Source and destination MAC addresses</p> Signup and view all the answers

    What occurs when one port operates at half-duplex while the other operates at full-duplex?

    <p>Duplex mismatch</p> Signup and view all the answers

    What is the recommended practice for configuring Ethernet switch ports?

    <p>Set both to full-duplex</p> Signup and view all the answers

    Which type of cable is used for connecting like devices directly?

    <p>Crossover cable</p> Signup and view all the answers

    How does auto-MDIX functionality assist Ethernet switches?

    <p>It detects and adjusts for correct cable type automatically.</p> Signup and view all the answers

    What is the purpose of the MAC address in Ethernet networking?

    <p>It uniquely identifies devices on the local network segment.</p> Signup and view all the answers

    What is the purpose of the Frame Check Sequence (FCS) in an Ethernet frame?

    <p>For error detection</p> Signup and view all the answers

    What happens when a NIC receives an Ethernet frame and the destination MAC address does not match its own?

    <p>The NIC discards the frame.</p> Signup and view all the answers

    Which access method is used in half-duplex Ethernet communications?

    <p>Carrier Sense Multiple Access / Collision Detection (CSMA/CD)</p> Signup and view all the answers

    What is the minimum frame size for an Ethernet frame?

    <p>64 bytes</p> Signup and view all the answers

    Which protocol is used by a source host to determine the destination MAC address for an IPv4 address?

    <p>Address Resolution Protocol (ARP)</p> Signup and view all the answers

    What is the destination MAC address used in an Ethernet broadcast frame?

    <p>FF-FF-FF-FF-FF-FF</p> Signup and view all the answers

    Which numbering system is used to represent an Ethernet MAC address?

    <p>Hexadecimal</p> Signup and view all the answers

    What is considered a 'jumbo frame' in Ethernet communications?

    <p>Frames larger than 1500 bytes</p> Signup and view all the answers

    What is a characteristic of an Ethernet multicast frame?

    <p>It is flooded out all Ethernet switch ports except the incoming port.</p> Signup and view all the answers

    What does a Layer 2 Ethernet switch base its forwarding decisions on?

    <p>The Layer 2 MAC addresses of the frame.</p> Signup and view all the answers

    What does a switch do when it receives a frame from a device?

    <p>It examines the destination MAC address to determine the outgoing interface.</p> Signup and view all the answers

    What is the primary advantage of store-and-forward switching?

    <p>It performs error checking before propagating the frame.</p> Signup and view all the answers

    Which of the following correctly describes cut-through switching?

    <p>It forwards frames without performing any error checks.</p> Signup and view all the answers

    What distinguishes fragment-free switching from fast-forward switching?

    <p>Fragment-free switching stores only the first 64 bytes for error checking.</p> Signup and view all the answers

    What is the role of buffering in switch operations?

    <p>Buffering helps control the flow of data during congestion.</p> Signup and view all the answers

    What role do routers play in the network layer?

    <p>They direct packets toward their destination using routing protocols.</p> Signup and view all the answers

    Which of the following is a characteristic of the IP protocol?

    <p>It operates independently of the underlying medium.</p> Signup and view all the answers

    What happens during the de-encapsulation process in the network layer?

    <p>The IP header is removed if the destination address matches.</p> Signup and view all the answers

    How does the network layer communicate with the transport layer?

    <p>By encapsulating transport layer PDUs into packets.</p> Signup and view all the answers

    What is the primary function of the Internet Control Message Protocol (ICMP)?

    <p>To send error messages and operational information.</p> Signup and view all the answers

    Study Notes

    Ethernet Technology

    • Ethernet and WLAN are the two main LAN technologies.
    • Ethernet supports bandwidths up to 100 Gbps.
    • Ethernet uses wired communication (twisted pair, fiber-optic, coaxial).
    • It operates at the data link layer (LLC and MAC sublayers) and the physical layer.
    • Defined by IEEE 802.2 and 802.3 standards.
    • Ethernet supports various bandwidths: 10 Mbps, 100 Mbps, 1 Gbps, 10 Gbps, 40 Gbps, 100 Gbps.

    MAC Sublayer

    • Hardware-based sublayer handling data encapsulation and media access control.
    • Provides data link layer addressing.
    • Integrates with various physical layer technologies.
    • Responsible for data encapsulation and accessing the media.

    Ethernet Frame Structure

    • Minimum frame size: 64 bytes.
    • Maximum frame size: 1518 bytes (excluding preamble)
    • Fields include preamble, start frame delimiter, destination MAC address, source MAC address, EtherType, data, and FCS.
    • Frames less than 64 bytes (runt frames) are discarded.
    • Frames exceeding 1518 bytes (jumbo frames) are usually supported by switches and NICs.
    • Ethernet addressing uses source and destination MAC addresses.
    • Ethernet error detection employs a frame check sequence (FCS) trailer.

    Ethernet MAC Addressing

    • 48-bit binary value, represented by 12 hexadecimal digits (6 bytes).
    • Unique to each Ethernet device or interface.
    • Assigned in accordance with vendor's organizationally unique identifier (OUI).
    • OUI is a 6-hexadecimal-digit code assigned by IEEE.
    • Vendor assigns unique 6 hexadecimal digits after the OUI to complete the MAC address.

    Ethernet Media Access

    • Legacy Ethernet (bus topology/hubs): Shared, half-duplex medium using CSMA/CD. This method ensures one device transmits at a time.
    • Current Ethernet (switches): Full-duplex operation, no CSMA/CD needed.

    Ethernet Switches and Forwarding Methods

    • Use MAC address table for forwarding decisions.
    • Store-and-forward switching: Receives entire frame, checks CRC and forwards based on destination MAC. Discards erroneous frames. Best for QoS (quality of service).
    • Cut-through switching: Forwards frame before entire reception. Fast-forward: Lowest latency but may forward errored packets. Fragment-free: Stores first 64 bytes to avoid collision fragments before forwarding. May be configured per port.
    • Buffering used for frames and congestion. Shared memory improves handling of larger frames and asymmetric port bandwidths.

    Duplex and Autonegotiation

    • Full-duplex: Simultaneous sending and receiving.
    • Half-duplex: Only one end transmits at a time.
    • Autonegotiation: Auto-detection of best speed and duplex capabilities. Best practice is to configure all ports as full-duplex.
    • Duplex mismatch common performance issue in 10/100 Mbps links.

    Crossover vs. Straight-Through Cables

    • Crossover cables connect like devices, straight-through for unlike devices.
    • Auto-MDIX (automatic medium-dependent interface crossover) feature on most switches eliminates cable type concern for copper connections. Use correct cable type for best practice.

    Network Layer (OSI Layer 3)

    • Provides services for end-device communication across networks.

    • Key protocols: IPv4 and IPv6. Other protocols: OSPF, ICMP.

    • Four basic network layer operations:

    • Addressing end devices

    • Encapsulation

    • Routing

    • Decapsulation

    • IP header carries information for packet delivery.

    IP Version 4 (IPv4)

    • Packet header fields: Version, DS, TTL, Protocol, Header Checksum, Source and Destination IPv4 Addresses.
    • TTL limits packet lifetime, decremented by each router hop.
    • Unreliable (best-effort delivery); other protocols handle reliability.
    • IPv4 is connectionless, best-effort, and independent of media.
    • IPv4 has limited addresses, inherent complexity with NAT implementation.

    IPv4 Packet Fragmentation

    • Routers may fragment IPv4 packets if destination MTU is smaller.
    • IPv6 packets cannot be fragmented.

    IP Version 6 (IPv6)

    • Larger address space (128 bits) compared to IPv4.
    • Simplified header for efficient routing.
    • No need for NAT (Network Address Translation)
    • Key fields in IPv6 packet header: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source and Destination IPv6 Addresses

    Routing Table

    • Used by hosts and routers to find destinations.
    • Types of routes: directly-connected, remote, default.

    Host Routing

    • IPv4: Uses subnet mask, IPv4 address of destination and source hosts to determine whether the destination is on the local network or remote network.
    • IPv6: Router advertises local network prefix.

    Default Gateway

    • Router(s) that route traffic to other networks.
    • Hosts need default gateway for external network communications.

    Router Routing Tables

    • Three types of routes: Directly-connected networks, remote networks, and default.
    • Different route sources: (L, C, S, O, D)

    Static Routing

    • Manually configured route entries.
    • Not automatically updated if network topology changes.
    • Suitable for small networks with few redundant paths.

    Dynamic Routing

    • Routers learn about remote networks from other routers.
    • Updates routing tables automatically to adapt to network-topology changes.
    • Protocols: OSPF, EIGRP.

    ARP (Address Resolution Protocol)

    • Maps IPv4 addresses to MAC addresses.
    • ARP table keeps address mappings for a short time.
    • ARP request is broadcasted, reply is unicast.

    ICMPv6 Neighbor Discovery (NDP)

    • Maps IPv6 addresses to MAC addresses (replacement for IPv4 ARP).
    • Uses ICMPv6 messages. Neighbor solicitation (broadcasted), neighbor advertisement (unicast)

    MAC Addresses and IP Addressing

    • MAC addresses are used for Layer 2 communication within a local network.
    • IP addresses are used for end-to-end communication across networks.

    Network Segmentation and Subnetting

    • Splitting a single network into smaller networks (subnets).
    • Subnet mask: Differentiates network and host portions of an IPv4 address.
    • Prefix Length: Number of network bits in an address (e.g., /24 = 24 network bits).
    • Binary AND operation: To get network address match the IPv4 and subnet mask.

    IPv4 Address Types

    • Unicast: one-to-one communication.
    • Broadcast: one-to-all communication(IPv4).
    • Multicast: one-to-many communication.
    • Public vs. Private addresses; private addresses cannot be routed over the internet.

    Special IPv4 Addresses

    • Loopback: 127.0.0.0/8, used for testing the host's TCP/IP protocol stack
    • Link-Local: 169.254.0.0/16, assigned automatically if DHCP is unavailable.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers key aspects of Ethernet technology, including its bandwidth capabilities and frame structure. Explore the functions of the MAC sublayer and the relevant IEEE standards that govern Ethernet operations. Test your knowledge on this fundamental LAN technology.

    More Like This

    Ethernet Technology
    10 questions

    Ethernet Technology

    DiligentCactus avatar
    DiligentCactus
    Ethernet Technology and Data Center Networks
    24 questions
    Ethernet Basics and Advantages
    8 questions
    Use Quizgecko on...
    Browser
    Browser