Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Similar documents
Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

2. What is a characteristic of a contention-based access method?

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Switching & ARP Week 3

Chapter 2. Switch Concepts and Configuration. Part I

Switches Chapter 2 1

1. Data Link Layer (Layer 2)

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Section 3 Understanding Ethernet and Switch Operations

Chapter 9 Ethernet Part 1

Imi :... Data:... Nazwisko:... Stron:...

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA 1 v5.0 R&S ITN Final Exam 2014

Question 7: What are Asynchronous links?

Chapter 7. OSI Data Link Layer

Chapter 7. OSI Data Link Layer. CCNA1-1 Chapter 7

- Hubs vs. Switches vs. Routers -

Switched Ethernet Virtual LANs

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

The MAC Address Format

Certified NCIA Network Basic v0.1

Preview Test: cis191_chap1_quiz

Hands-On Network Security: Practical Tools & Methods

Antonio Cianfrani. Virtual LAN (VLAN)

Computer Networking. December 2004 CEN CN

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Lab Viewing Network Device MAC Addresses

1. Data Link Layer Protocols

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

Introduction to Switched Networks Routing And Switching

CSC 4900 Computer Networks: Link Layer (2)

CS 3516: Advanced Computer Networks

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

ICS 451: Today's plan

7010INT Data Communications Lecture 7 The Network Layer

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

CCNA Practice test. 2. Which protocol can cause high CPU usage? A. NTP B. WCCP C. Telnet D. SNMP Answer: D

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

The Link Layer and LANs: Ethernet and Swiches


Computer Networks Principles LAN - Ethernet

Address Resolution Protocol

Interface The exit interface a packet will take when destined for a specific network.

LANs and ARP. Networking. Sirindhorn International Institute of Technology Thammasat University. Networking. LANs and ARP.

Lecture (04) Network Layer (Physical/Data link) 2

CISCO EXAM QUESTIONS & ANSWERS

Link layer: introduction

Chapter 9. Ethernet. Part II

Cisco Cisco Certified Network Associate (CCNA)

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

A Framework for Optimizing IP over Ethernet Naming System

CTS2134 Introduction to Networking. Module : Troubleshooting

CCNP Switch Questions/Answers Securing Campus Infrastructure

Section 3.1: Network Adapters

Configure Ethernet Physical Interface Properties on page 82. Configure 802.1Q VLANs on page 83. Configure the Management Ethernet Interface on page 84

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

Principles behind data link layer services:

Answers to the Do I Know This Already? Quizzes

Lab 9.8.1: Address Resolution Protocol (ARP)

Principles behind data link layer services

SWITCHED ETHERNET TESTING FOR AVIONICS APPLICATIONS. Ken Bisson Troy Troshynski

Implementing Inter-VLAN Routing

Principles behind data link layer services:

Principles behind data link layer services:

Computer Communication and Networks Lab Experiment 6 MAC Address and Ethernet Packet

Configuring ARP. Prerequisites for Configuring ARP. Restrictions for Configuring ARP

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

Configuring MAC Address Tables

Catalyst Switches for Microsoft Network Load Balancing Configuration Example

IP: Addressing, ARP, Routing

Configuring StackWise Virtual

Cisco Implementing Cisco IP Routing (ROUTE v2.0)

Implementing Inter-VLAN Routing. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Q&As Implementing Cisco IP Switched Networks (SWITCH v2.0)

Computer Networks. Wenzhong Li. Nanjing University

CCNA 1 Chapter v5.1 Answers 100%

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

FiberstoreOS IP Service Configuration Guide

Sections Describing Standard Software Features

Review is pretty much complete! Please help formatting review (indenting). - Jorden

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Troubleshooting High CPU Utilization Due to the IP Input Process

H

Transcription:

Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Describe the operation of the Ethernet sublayers. Identify the major fields of the Ethernet frame. Describe the purpose and characteristics of the Ethernet MAC address. Describe the purpose of ARP. Explain how ARP requests impact network and host performance. Explain basic switching concepts. Compare fixed configuration and modular switches. Configure a Layer 3 switch. 5.1 Ethernet Protocol 1. Ethernet operates at what OSI layers? a. data link layer b. physical layer 2. Ethernet is defined by which IEEE standards? a. 802.2 b. 802.3 3. What is the purpose of the LLC sublayer? The Ethernet LLC sublayer handles the communication between the upper layers and the lower layers 4. What is the purpose of the MAC sublayer? MAC constitutes the lower sublayer of the data link layer. 5. What are the Ethernet MAC sublayer s two primary responsibilities? a. Data encapsulation b. Media access control 6. Data encapsulation provides three primary functions. These are: a. Frame Delimiting b. Addressing c. Error Detection

7. The two primary functions of Media Access Control are: a. Control of frame placement on and off the media b. Media recovery 8. Explain how CSMA/Collision Detection operates. In CSMA/Collision Detection (CSMA/CD), the device monitors the media for the presence of a data signal. If a data signal is absent, indicating that the media is free, the device transmits the data. If signals are then detected that show another device was transmitting at the same time, all devices stop sending and try again later. 9. Explain how CSMA/Collision Avoidance operates. In CSMA/CA, the device examines the media for the presence of a data signal. If the media is free, the device sends a notification across the media of its intent to use it. The device then sends the data. This method is used by 802.11 wireless networking technologies. 10. Why were MAC addresses created? To prevent the excessive overhead involved in the processing of every frame, a unique identifier called a MAC address was created to identify the actual source and destination nodes within an Ethernet network. 11. The IEEE requires vendors to follow two simple rules. These are: a. All MAC addresses assigned to a NIC or other Ethernet device must use that vendor's assigned OUI as the first 3 bytes. b. All MAC addresses with the same OUI must be assigned a unique value (vendor code or serial number) in the last 3 bytes. 12. What does BIA stand for? Burned-in address 13. Descriptions of the MAC and LLC sublayers are provided in the table. Place a check in the MAC or LLC fields to match the descriptions to the correct sublayer. 2

14. What are the minimum and the maximum frame sizes as defined by Ethernet II and IEEE802.3? Minimum: 64 bytes Maximum: 1518 bytes 15. Explain what a "collision fragment" or "runt frame" is and what happens to it on the network. Any frame less than 64 bytes in length is automatically discarded by receiving stations. 16. What happens to frames that are larger than the maximum size? It is discarded 17. Label the primary fields in an Ethernet frame. 7 Preamble 1 Start of Frame Delimiter 6 Destinati on MAC Address 6 Source MAC Address 2 Length 46 t0 1500 802.2 Header and Data 4 Frame Check Sequence 18. Write in the correct Ethernet frame field name with its description.

19. Convert the decimal number 15 to hexadecimal and show the two different ways it can be correctly represented in text. a. 0x0F b. 0FH 20. On a Windows host, what command can be used to identify the MAC address of an Ethernet adapter? ipconfig /all 21. What is a unicast MAC address? It is the unique address used when a frame is sent from a single transmitting device to a single destination device. 22. On Ethernet networks, how is the broadcast MAC address displayed in hexadecimal? FF-FF-FF-FF-FF-FF. 23. How are multicast addresses different than unicast or broadcast addresses? They allow a source device to send a packet to a group of devices. 4

24. What is the IPv4 address range for multicast addresses? 224.0.0.0 to 239.255.255.255. 5.2 Address Resolution Protocol 25. What are the two basic functions of the ARP protocol? a. Resolving IPv4 addresses to MAC addresses b. Maintaining a table of mappings 26. There are two ways that a device can gather MAC addresses. Explain both. a. One way is to monitor the traffic that occurs on the local network segment. As a node receives frames from the media, it can record the source IP and MAC address as a mapping in the ARP table. As frames are transmitted on the network, the device populates the ARP table with address pairs. b. Another way a device can get an address pair is to send an ARP request. An ARP request is a Layer 2 broadcast to all devices on the Ethernet LAN. The ARP request contains the IP address of the destination host and the broadcast MAC address, FFFF.FFFF.FFFF. 27. Entries in the ARP table are time stamped. What does this mean? If a device does not receive a frame from a particular device by the time the time stamp expires, the entry for this device is removed from the ARP table. 28. What happens if no device responds to the ARP request? The packet is dropped because a frame cannot be created. 29. If the destination IPv4 host is on the local network, the frame will use the MAC address of this device as the destination MAC address. If the destination IPv4 host is not on the local network, what happens? The source node needs to deliver the frame to the router interface that is the gateway or next hop used to reach that destination. The source node will use the MAC address of the gateway as the destination address for frames containing an IPv4 packet addressed to hosts on other networks. 30. What command is used on a Cisco router to display the ARP table? Show ip arp 31. What command is used in Windows 7 to display the ARP table?

arp -a 32. List and explain two potential issues with ARP. a. Overhead on the Media As a broadcast frame, an ARP request is received and processed by every device on the local network. If a large number of devices were to be powered up and all start accessing network services at the same time, there could be some reduction in performance for a short period of time b. Security ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP requests. An attacker forges the MAC address of a device and then frames can be sent to the wrong destination. 5.3 LAN Switches 33. Number in sequence, the following steps a switch takes to build its MAC address table and correctly forward frames. 5 The switch enters the source MAC address of the device replying to host 1 and switch port it is connected to. 2 The switch enters the source MAC address and the switch port that received the frame in to the MAC table. 1 A switch receives a broadcast frame from host 1. 3 The switch floods the broadcast frame out all ports except the port from it was received from. 6 The switch can now forward messages between the two devices without flooding the network because it has recorded the MAC addresses and associated switch ports in its MAC address table. 4 The destination device replies tot eh broadcast with a unicast frame addressed to host 1. 34. The MAC address table is sometimes referred to as a what? Content addressable memory (CAM) table. 35. What is half duplex communication? 6

Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. 36. What is full duplex communication? In full-duplex communication, data flow is bidirectional, so data can be sent and received at the same time 37. List and explain the three duplex settings supported by a Cisco Catalyst switch. a. Full option sets full-duplex mode. b. Half option sets half-duplex mode. c. Auto option sets autonegotiation of duplex mode. With autonegotiation enabled, the two ports communicate to decide the best mode of operation. 38. What duplex setting is required when using 1000Mb/s speeds? Full duplex 39. Explain in detail what the Auto-MDIX feature does. When the auto-mdix feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interfaces accordingly. Therefore, you can use either a crossover or a straight-through cable for connections to a copper 10/100/1000 port on the switch, regardless of the type of device on the other end of the connection. 40. List and explain the two types of switch packet forwarding methods. a. Store-and-forward switching The switch receives the frame, it stores the data in buffers until the complete frame has been received. During the storage process, the switch analyzes the frame for information about its destination. In this process, the switch also performs an error check using the Cyclic Redundancy Check (CRC) trailer portion of the Ethernet frame.

b. Cut-through A cut-through switch forwards the frame before it is entirely received. At a minimum, the destination address of the frame must be read before the frame can be forwarded. 41. List and explain the two variants of cut-through switching. a. Fast-forward switching Fast-forward switching offers the lowest level of latency. Fast-forward switching immediately forwards a packet after reading the destination address. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. b. Fragment-free switching In fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding. Fragment-free switching can be viewed as a compromise between store-and-forward switching and fast-forward switching. The reason fragment-free switching stores only the first 64 bytes of the frame is that most network errors and collisions occur during the first 64 bytes. 42. Descriptions of switch frame forwarding methods are provided in the table. Check in the Store-and-Forward or Cut-Through fields to match the methods to the descriptions. 8

43. Fill in the blanks. 44. List and explain the two methods of memory buffering. a. Port-based Memory Buffering

In port-based memory buffering, frames are stored in queues that are linked to specific incoming and outgoing ports. b. Shared Memory Buffering Shared memory buffering deposits all frames into a common memory buffer that all the ports on the switch share. 45. 46. 47. 10

48. 49. Explain the differences between fixed configuration switches and modular switches. a. Fixed configuration switches Features and options are limited to those that originally come with the switch. b. Modular switches The chassis accepts line cards that contain the ports. 50. Explain how a layer 2 switch operates.

A Layer 2 LAN switch performs switching and filtering based only on the OSI data link layer (Layer 2) MAC address and depends upon routers to pass data between independent IP subnetworks 51. Explain how a layer 3 switch differs from a layer 2 switch. Instead of using only the Layer 2 MAC address information for forwarding decisions, a Layer 3 switch can also use IP address information. 52. Cisco devices which support Layer 3 switching utilize what Cisco forwarding method? Cisco Express Forwarding (CEF). 53. What are the two main components of CEF operation? a. Forwarding Information Base (FIB) b. Adjacency tables 54. List and describe the major types of Layer 3 interfaces. a. Switch Virtual Interface (SVI) Logical interface on a switch associated with a virtual local area network (VLAN). b. Routed Port Physical port on a Layer 3 switch configured to act as a router port. c. Layer 3 EtherChannel Logical interface on a Cisco device associated with a bundle of routed ports. 55. A switch port can be configured to be a Layer 3 routed port and behave like a regular router interface. What is needed to accomplish this? a. The no switchport command b. Assign an IP address to the port 12