Coaxial Cable - Bus Topology (Old Technology)

SEMESTER 1 Chapter 9 140 Points
Ethernet

V 4.0

9.1.1 / Who originally published the Ethernet standard and when was that? / published in 1980 by a consortium of Digital Equipment Corporation, Intel, and Xerox (DIX).
Who and when published LAN standards? / 1985, the Institute of Electrical and Electronics Engineers (IEEE)
What is the number for the Ethernet LAN standard? / 802.3
What layers of the OSI model do Ethernet standards operate at? / 1 and 2
9.1.2 / What does Ethernet Layer 1 involve? / signals, bit streams that travel on the media, physical components that put signals on media, and various topologies
What are the Ethernet Layer 2 functions that overcome the limitations of Ethernet Layer 1? / Connects to the upper layers via the LLC
Uses addressing schemes to identify devices
Uses frames to organize bits into groups
Uses MAC to identify transmission sources
9.1.3 / What are the two sublayers of the Data Link Layer? / the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer.
What are the 4 functions of the LLC? / Makes connection with the upper layers
Frames the network layer packet
Identifies the network layer protocol
Remains relatively independent of the physical layer
What type of environment is LLC implemented in? / Software
9.1.4 / Where is the MAC sublayer implemented? / NIC
What are the 2 primary functions of the MAC sublayer? / Data Encapsulation
Media Access Control
What are the 3 primary functions of data encapsulation? / Frame delimiting
Addressing
Error detection
What are the two main functions of the media access control? / Control of frame placement on and off the media
Media recovery
What is the underlying topology of Ethernet? / Mulit-access bus
What is the media access control method for Ethernet? / CSMA/CD Carrier Sense Multiple Access with Collision Detection
9.1.5 / What are the four factors that have made Ethernet a success? / Simplicity and ease of maintenance
Ability to incorporate new technologies
Reliability
Low cost of installation and upgrade
What part of the Ethernet standard remains consistent across all of its physical implementations? / Frame structure
9.2.1 / What was the historic network that Ethernet was based on called? / Alohanet
9.2.1.2 / Describe the method of transmission on a hub? / A frame received in one port is transmitted out all other ports
9.2.2 / What is legacy Ethernet? / 10Base-T network with a hub at its center
What is the current standard for Ethernet? / 100Base-T network with switches
What is full duplex? / a connection that can carry both transmitted and received signals at the same time
What is the difference when forwarding a frame from a switch vs. hub? / Hub always send the signal out all ports and switch sends directly to device if it’s address is known
9.2.3 / What two new uses are requiring the move to Gigabit Ethernet? / Voice over IP (VoIP) and multimedia services
9.2.3.2 / Define a MAN? / Ethernet connection across an entire city
9.3.1 / What is the most significant difference between the IEEE 802.3 (original) and the revised IEEE 802.3? / the addition of a Start Frame Delimiter (SFD) and a small change to the Type field to include the Length
What were the minimum and maximum sizes of Ethernet frames originally? / the minimum frame size as 64 bytes and the maximum as 1518 bytes
What is the new maximum size for a frame? / 1522 bytes
What happens if the size of a transmitted frame is less than the minimum or greater than the maximum? / It is dropped
9.3.1.2 / What are the six portions of an Ethernet frame discussed? / Preamble, start frame delimiter, destination address, source address, length/type, 802.2 header and data, frame check sequence
9.3.1.3 / What is the Frame Check Sequence (FCS)? / (4 bytes) used to detect errors in a frame
What is the algorithm used in determining the value of the FCS? / Cyclical redundancy check
What happens if the FCS values do not match? / The frame is dropped
9.3.2 / What was created to assist in determining the source and destination address? / Media Access Control (MAC) address
How is an Ethernet MAC address represented? / a 48-bit binary value expressed as 12 hexadecimal digits
9.3.2.2 / Define the two parts of an Ethernet MAC address? / All MAC addresses assigned to a NIC or other Ethernet device must use that vendor's assigned OUI as the first 3 bytes.
All MAC addresses with the same OUI must be assigned a unique value (vendor code or serial number) in the last 3 bytes.
What is another name for the MAC address? / Burned-in address
As an Ethernet frame passes through a network what happens if that devices MAC address matches the destination MAC address? / the NIC passes the frame up the OSI layers, where the decapsulation process take place
As an Ethernet frame passes through a network what happens if that devices MAC address does not match the destination MAC address? / The frame is discarded
9.3.3.2 / Where can you find your computer’s MAC address? / Ipconfig/all or ipconfig
9.3.4 / What is the problem with physical addressing? / No meaning outside the local network
What is the difference between physical (Network Layer) and logical (Data Link Layer) addressing? / The Network layer address enables the packet to be forwarded toward its destination.
The Data Link layer address enables the packet to be carried by the local media across each segment.
9.3.5 / When a unicast transmission used? / when a frame is sent from a single transmitting device to single destination device
9.3.5.2 / When is a broadcast transmission used? / all hosts on that local network (broadcast domain) will receive and process the packet
How is a broadcast IP address represented? / All 1’s in the host portion of the IP address
How is a broadcast MAC address represented? / FF-FF-FF-FF-FF-FF
9.3.5.3 / When is a multicast transmission used? / When a frame is sent to a group of computers
How can a multicast packet only be used? / as the destination of a packet
What type of address does the source have? / Unicast
What is the multicast MAC address? / Begins with 01-00-5E The value ends by converting the lower 23 bits of the IP multicast group address into the remaining 6 hexadecimal characters of the Ethernet address. The remaining bit in the MAC address is always a "0".
9.4.1 / How does a shared media environment operate? / all devices have guaranteed access to the medium, but they have no prioritized claim on it. If more than one device transmits simultaneously, the physical signals collide and the network must recover in order for communication to continue.
When does a device on a shared environment transmit? / When it detects that no other computer is sending a frame, or carrier signal
9.4.2 / Define latency. / The time delay between when a process is started and that same process is detected
Define collision. / When two stations transmit at the same time
How does collision detection occur? / When a device is in listening mode it can detect an increase in amplitude of the signal above the normal level
What happens when all devices on a shared medium detect a collision? / they send out a jamming signal
What is invoked after a device receives a jamming signal? / The backoff algorithm
How does a backoff algorithm work? / All devices stop transmitting for a random amount of time
What mode does a device return to after the backoff algorithm has expired? / Listening
9.4.2.2 / What are the three reasons given that the growth of the Internet has resulted in more collisions? / More devices are being connected to the network.
Devices access the network media more frequently.
Distances between devices are increasing.
Define a collision domain? / The media within a network where collsions can occur
What does the connection of hubs and repeaters do to collision domains? / They increase the collision domain size
What happens when the number of collisions increases significantly? / reduces the network's efficiency and effectiveness until the collisions become a nuisance to the user
9.4.3 / Which devices extend the latency in the medium? / Hubs and repeaters
Why would an increased latency cause more collisions? / The other device may not hear the signal before it begins to transmit
9.4.3.2 / What is sent before an entire Ethernet frame is sent? / The preamble
What does asynchronous communication mean? / each receiving device will use the 8 bytes of timing information to synchronize the receive circuit to the incoming data and then discard the 8 bytes
What does synchronous communication mean? / the timing information is not required
9.4.3.3 / What is a bit time? / a period of time is required for a bit to be placed and sensed on the media
What is the slot time? / The time it takes for an electronic pulse to travel the length of the maximum theoretical distance between two nodes.
9.4.4 / What is interframe spacing? / time measured from the last bit of the FCS field of one frame to the first bit of the Preamble of the next frame
What happens to interframe spacing as the network speed increases? / The time reduces
9.4.4.3 / What happens when the MAC layer is unable to send a frame after 16 attempts? / it gives up and generates an error to the Network layer
9.5.1 / What are the four data rates are currently defined for operation over optical fiber and twisted-pair cables? / 10 Mbps - 10Base-T Ethernet
100 Mbps - Fast Ethernet
1000 Mbps - Gigabit Ethernet
10 Gbps - 10 Gigabit Ethernet
9.5.2 / What are the three principal 10 Mbps implementations of Ethernet? / 10BASE5 using Thicknet coaxial cable
10BASE2 using Thinnet coaxial cable
10BASE-T using Cat3/Cat5 unshielded twisted-pair cable
9.5.2.2 / What are the most popular implementations of 100 Mbps Ethernet? / 100BASE-TX using Cat5 or later UTP
100BASE-FX using fiber-optic cable
9.5.3 / What is Gigabit Ethernet more susceptible to because of its speed? / Noise
What type of transmission does 1000Base-T allow for? / the transmission and reception of data in both directions - on the same wire and at the same time
What is the maximum number of voltages used on the media at the same during transmission? / 17
What are the two main causes of noise on the line? / cable and termination problems
9.5.4 / What are the ways that 10Gbps can be compared to other varieties of Ethernet? / Frame format is the same, allowing interoperability between all varieties of legacy, fast, gigabit, and 10 gigabit Ethernet, with no reframing or protocol conversions necessary.
Bit time is now 0.1 nS. All other time variables scale accordingly.
Because only full-duplex fiber connections are used, there is no media contention and CSMA/CD is not necessary.
The IEEE 802.3 sublayers within OSI Layers 1 and 2 are mostly preserved, with a few additions to accommodate 40 km fiber links and interoperability with other fiber technologies.
9.6.1 / What is the problem associate with the classic Ethernet implementation using hubs? / high levels of collisions on the LAN
List the four problems related to the implementation of classic Ethernet? / Scalability, Latency, Network Failure, and Collisions
9.6.2 / How do switches segment a LAN? / Separate collision domains
What does the separation of collision domains mean for the bandwidth to the device? / Full media bandwidth to each device
9.6.2.2 / What are the three reasons that bandwidth increases dramatically when each device is connected to a switch port? / Dedicated bandwidth to each port
Collision-free environment
Full-duplex operation
What are the three reasons that hubs are still being used? / Availability, Economics, and Requirements
9.6.3 / Describe selective forwarding? / establishing a momentary point-to-point connection between the transmitting and receiving nodes
What is the process called when the switch holds the frame until the receiving node is available called? / Store-and-forward
Describe the store-and-forward operation mode of a switch? / The switch receives the entire frame and checks the FCS before forwarding the frame
How does a switch use a MAC table? / The incoming frame destination MAC address is compared to the MAC table to decide which port to forward the frame to
9.6.3.2 / What are the five basic operations of a switch? / Learning
Aging
Flooding
Selective Forwarding
Filtering
How does a switch learn a MAC address? / The source address of the incoming frame
What happens when an addresses countdown reaches 0? / The address is removed from the MAC table
What happens when a switch does not know the destination address? / The frame is flooded out all but the incoming port
What type of frames will not be forwarded? / A frame with a destination of the same port, a corrupt frame, and security reasons
9.7.1 / What are the two basic functions of ARP? / Resolving IPv4 addresses to MAC addresses
Maintaining a cache of mappings
What are the names of the tables that store the list of MAC addresses with the network address? / ARP table or ARP Cache
What are the two ways a computer can gather MAC addresses? / From an incoming frame or using an ARP request
What are the 2 destination addresses in an ARP Request? / Broadcast MAC address and the destination MAC address
9.7.2 / If the destination is on the local network segment, what MAC address is used? / The device MAC address
If the destination is on a remote network, what MAC address is used? / The gateway MAC address
If the MAC address of the gateway is unknown, what process is used? / ARP Request
9.7.2.2 / What is the most common reason for using a proxy ARP? / When the device can not determine if the host is on the same network or not
9.7.3 / How long are addresses held in the ARP table? / 2 minutes unless used again in those 2 minutes and then 10 minutes
9.7.4 / How could ARP requests impact performance on a network? / Too many broadcasts at once that each host receives and processes therefore slowing down the network
What is another problem that may be associated with ARP? / Security- ARP spoofing which causes errors on the network

* 3 Ethernet media types: