Ethernet Networks In Review - Chapter 3

Description

Understanding LANs in the perspective of Ethernet Technologies
sirhulk1
Quiz by sirhulk1, updated more than 1 year ago
sirhulk1
Created by sirhulk1 about 10 years ago
46
0

Resource summary

Question 1

Question
What is Ethernet ? (Choose two)
Answer
  • Ethernet is a trademark for a family of Ethernet technologies for Local Area Networks (LANs) was introduced in 1980 and standardized in 1985 as IEEE 802.3
  • Ethernet is a contention based media access method that allows all hosts on a network to share the same bandwidth of a link.
  • Ethernet is a access method that provides end to end delivery during network services.

Question 2

Question
What is a collision domain?
Answer
  • This is an Ethernet term describing two devices on one physical segment both sends out a packet at the same time. This will result in a collision and forcing both devices to retransmit at a later time. A collision domain is typically found in a Hub network environment.
  • A collision domain is a feature where a device fails to send a packet to the network and tries to resend the packet.

Question 3

Question
What is a broadcast domain?
Answer
  • Its part of a network technology that provides broadcasts for all hosts connected to the internetwork.
  • This refers to a group of devices on a network segment that hear all the broadcasts sent on that network segment.

Question 4

Question
Carrier Sense Multiple Access w/collision detection (CSMA/CD) is a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.
Answer
  • True
  • False

Question 5

Question
When two devices send out a packet at the same time on the same segment causing a collision, how does CSMA/CD act on resolving this? (Choose four)
Answer
  • A jam signal informs all devices that a collision occurred.
  • The collision triggers a random back off algorithm.
  • The signal provides the devices to generate an inquiry file log.
  • Each device on the segment stops transmitting for a short time until their backoff timers expire.
  • All hosts have equal priority to transmit after the timers have expired.

Question 6

Question
What is the difference between Half Duplex and Full Duplex Ethernet?
Answer
  • Half Duplex uses just one pair on the network cable wire with a signal running in both directions. It also uses CSMA/CD protocol to help detect and prevent collisions. Half Duplex is typically run on hub environments.
  • Full Duplex uses one pair on the network cable wire with a signal running in both directions which offers a collision free network segment.
  • Half Duplex uses two pairs on the network cable wire with a signal running in both directions which is a collision free network segment. Half Duplex is typically run on hub environments.
  • Full Duplex uses two pairs on the network cable wire with a signal running in both directions which offers a collision free network segment.

Question 7

Question
Full Duplex Ethernet can run on Hub device environments
Answer
  • True
  • False

Question 8

Question
Full Duplex mode requires a dedicated switch port and a host network card that is capable of Full Duplex mode .
Answer
  • True
  • False

Question 9

Question
Ethernet at the Data Link layer is responsible for Ethernet addressing that is commonly referred to as ______________ addressing or _____________ addressing.
Answer
  • Logical
  • Hardware
  • MAC

Question 10

Question
In the Data Link layer there are four different types of Ethernet frames.
Answer
  • Ethernet_II
  • IEEE 802.3
  • Media Access Control (MAC)
  • Sub Network Access Protocol (SNAP)
  • IEEE 802.2

Question 11

Question
Ethernet_II frame is the most commonly used
Answer
  • True
  • False

Question 12

Question
For Ethernet what is the most commonly used frame?
Answer
  • Sub Network Access Protocol (SNAP)
  • Ethernet_II

Question 13

Question
For wireless specifications what is the most commonly used frame?
Answer
  • Sub Network Access Protocol (SNAP)
  • Ethernet_II

Question 14

Question
What makes up Ethernet Addressing ?
Answer
  • It uses Media Access Control (MAC) which is a sublayer of the Data Link Layer
  • The MAC is a 48 bit (6 byte) address burned into every Ethernet network interface card (NIC) but it can be overridden.
  • It uses Media Access Control (MAC) which is a sublayer of the Physical Layer
  • The MAC address is divided into two parts, first 24 bits is called the Organizational Unit Identifier (OUI) and the second 24 bits are Vendor assigned.

Question 15

Question
What are the values of a nibble and a byte in binary numbering?
Answer
  • A nibble is 8 bits with the value of each bit are the following: 128 64 32 16 8 4 2 1
  • A byte is 8 bits with the value of each bit are the following: 128 64 32 16 8 4 2 1
  • A byte is 4 bits with the value of each bit are the following: 8 4 2 1
  • A nibble is 4 bits with the value of each bit are the following: 8 4 2 1

Question 16

Question
Each hex character has a value of one _______ and every two hex characters has the value of one _____
Answer
  • Each hex character has a value of one byte (8 bits) and every two hex characters has the value of one nibble (4 bits).
  • Each hex character has a value of one nibble (4 bits) and every two characters has the value of one byte (8 bits).

Question 17

Question
In order to convert a hex value to a decimal value, you must first convert hex into binary, then add the binary values that will result in the decimal value. Example: 0xC84 => 1100 1000 0100 => 2048 + 1024 + 128 + 4 => 3204
Answer
  • True
  • False

Question 18

Question
In order to convert binary to hex, you must first break the 8 bit binary into two 4 bit nibbles, then add up each nibble value separately which will result in the hex value. Example: 01010101 => 0101 => 5 and 0101 => 5 , now add the two nibble values separately in hex format using "0x" => 0x55
Answer
  • True
  • False

Question 19

Question
The Data Link layer is responsible for combining bits into bytes and bytes into frames.
Answer
  • True
  • False

Question 20

Question
What are the three types of media access methods for Ethernet networks?
Answer
  • Contention (Ethernet)
  • CSMA/CD (Carrier Sense Multiple Access/Collision Detection
  • Polling (IBM Mainframes)
  • Token Passing (Token Ring and Fiber Distributed Data Interface - FDDI)

Question 21

Question
Encapsulating a frame within a different type of frame is called Tunneling.
Answer
  • True
  • False

Question 22

Question
The Ethernet_II frame contains what field that is used to identify the network upper layer protocol.
Answer
  • Type field
  • Length field

Question 23

Question
SNAP frame has its own protocol field to identify the upper-layer protocol. How can you identify a SNAP Frame?
Answer
  • SNAP frame contains a field that is identified by Ethernet by its header.
  • SNAP frame has the DSAP and SSAP fields are always AA

Question 24

Question
Name the different types of Ethernet Cabling. (Choose three)
Answer
  • Fiber Optical Cabling (SC/LC)
  • Straight-through Cabling
  • Cross-over cabling
  • Rolled Cabling
  • CAT5 Cabling

Question 25

Question
Straight-Through cables can connect to which devices?
Answer
  • Host to switch or hub
  • Switch to Switch
  • Hub to Hub
  • Router to Switch or hub
  • Hub to Switch
  • Router direct to host

Question 26

Question
Crossover cables connect to what devices?
Answer
  • Host to switch or hub
  • Switch to Switch
  • Host to Host
  • Hub to Hub
  • Router direct to host
  • Router to switch or hub
  • Switch to hub

Question 27

Question
Cross-over cabling connects to what cable pins?
Answer
  • 1 to 1 , 2 to 2, 3 to 3, 6 to 6 (uses two pairs)
  • 1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2, 8 to 1 (uses four pairs)
  • 1 to 3, 2 to 6 (uses only two pairs)

Question 28

Question
Data Encapsulation is data wrapped with protocol information that is created for each layer of the OSI model. To communicate and exchange information each layer uses Protocol Data Units (PDUs)
Answer
  • True
  • False

Question 29

Question
What specific name for the PDU at the Transport layer?
Answer
  • Bits
  • Frames
  • Segments
  • Packets

Question 30

Question
What is the specific PDU name for the Data Link Layer?
Answer
  • Segment
  • Frames
  • Bits
  • Packets

Question 31

Question
What is the specific PDU name for the Network Layer?
Answer
  • Segment
  • Packet
  • Bits
  • Frames

Question 32

Question
What is the specific PDU name for the Physical Layer?
Answer
  • Segment
  • Frame
  • Bits
  • Packets

Question 33

Question
The Transport layer when using TCP, it takes the data stream and makes segments and establishes a __________ circuit.
Answer
  • physical
  • virtual

Question 34

Question
When TCP completes the virtual circuit session, its defined by the _______ and _________ port numbers.
Answer
  • high and well known
  • Source and Destination

Question 35

Question
In the Transport Layer, along with the Virtual Circuit session, the source and destination IP address is defined and called a __________.
Answer
  • Reliable session
  • Socket

Question 36

Question
In TCP the destination port number represents the upper layer process (Application). As an example if the destination port was 23 that would be considered a telnet session needed for the receiving host.
Answer
  • True
  • False

Question 37

Question
The Network layer is responsible in finding the destination hardware address that will dictate where the packet will go on the local area network (LAN). It does this by sending an ________ request.
Answer
  • ping (Packet Internetwork Grouper)
  • ARP (Address Resolution Protocol)
Show full summary Hide full summary

Similar

Understanding Cisco Nexus Equipment
sirhulk1
Mechanics
james_hobson
The First, Second, Third and Fourth Crusades
adam.melling
Cognitive Psychology Key Terms
Veleka Georgieva
Common Irish Words
silviaod119
GCSE REVISION TIMETABLE
haameem1999
GCSE French - The Environment
Abby B
Edexcel Additional Science Biology Topic 1
hchen8nrd
Testing for ions
Joshua Rees
1PR101 2.test - Část 12.
Nikola Truong
Information security and data protection
хомяк убийца