Network+ Cisco Study

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Category 5 supports

100Mbps

Which of the following fiber-optic cable types can help data travel approximately 1.24 miles or 2 km/2000m?

Multimode

Each octet in 1pv4 contains

8 bits (or 1 byte

Which of the following fiber-optic cable types use light emitting diodes (LEDs) as a data light source transmitter?

Multimode

What attribute of a NIC would place it at the data link layer of the OSI model?

Mac Address

The media access control method used depends on which two criteria?

Media Sharing Topology

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

Mesh Typologies

Which of the following fiber-optic cable types is used within a campus network?

Multimode

When a vendor assigns a MAC address to a device or Ethernet interface, the vendor must do as follows

Use its assigned OUI as the first 6 hexadecimal digits. Assign a unique value in the last 6 hexadecimal digits.

Frame start and stop indicator flags

Used to identify the beginning and end limits of the frame.

What are two actions performed by a Cisco switch? (Choose two.)

Utilizing the MAC address table to forward frames via the destination MAC address. using the source MAC address of frames to build and maintain a MAC address table.

What kind of network would use point-to-point, hub and spoke, or mesh topologies?

WAN Network

De-encapsulation

When the packet arrives at the network layer of the destination host, the host checks the IP header of the packet. If the destination IP address within the header matches its own IP address, the IP header is removed from the packet. After the packet is de-encapsulated by the network layer, the resulting Layer 4 PDU is passed up to the appropriate service at the transport layer. The de-encapsulation process is performed by the destination host of the IP packet.

Cancellation

When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other and also cancel out any outside EMI and RFI signals.

True or false? The physical layer is only concerned with wired network connections.

false

wireless network use

guest in a coffee shop waiting rooms in a hospital

IPv6 uses a

hexadecimal system of 0-9 and the letters A-F.

Crosstalk

is a disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire

Encoding or line encoding

is a method of converting a stream of data bits into a predefined "code".

A big advantage of store-and-forward switching is that

it determines if a frame has errors before propagating the frame

Two statements that describe the services provided by the data link layer

it packages various layer 3 PDUs into a frame format that is compatible with the network interface. it manages the access of the frames to the network media.

Category 8 supports

40 Gbps

An Ethernet MAC address consists of a

48-bit binary value

The minimum Ethernet frame size is

64 bytes

What are the two sizes (minimum and maximum) of an Ethernet frame?

64 bytes 1518 bytes

Which part of an Ethernet frame detects errors in the frame?

Frame Check Sequence

The data link layer of

prepares network data for the physical network

Type

Identifies the Layer 3 protocol in the data field.

Header Checksum

This is used to detect corruption in the IPv4 header.

Which two characteristics describe Ethernet technology?

it is supported by IEEE 802.3 standards

The hexadecimal numbering system uses the numbers and the letters

0 to 9 A to F

What is the special value assigned to the first 24 bits of a multicast MAC address?

01-00-5E

Which lists the Layer 2 and Layer 3 address fields in the correct order?

1. destination NIC address 2. Source NIC address 3. Source IP address 4.destination IP address

Converting decimal numbers to hexadecimal values is straightforward. Follow the steps listed

1.Convert the decimal number to 8-bit binary strings. 2.Divide the binary strings in groups of four starting from the rightmost position. 3.Convert each four binary numbers into their equivalent hexadecimal digit.

Converting hexadecimal numbers to decimal values is also straightforward. Follow the steps listed

1.Convert the hexadecimal number to 4-bit binary strings. 2.Create 8-bit binary grouping starting from the rightmost position. 3.Convert each 8-bit binary grouping into their equivalent decimal digit.

Category 6 supports up to

10 Gbps

Category 7 also supports

10 Gbps

Ethernet supports data bandwidths of the following

10 Mbps 100 Mbps 1000 Mbps (1 Gbps) 10,000 Mbps (10 Gbps) 40,000 Mbps (40 Gbps) 100,000 Mbps (100 Gbps)

Category 5e supports

1000 Mbps

Which of the following is the decimal equivalent of 7D?

125

IPv6 addresses are

128 bits in length and every 4 bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values

The maximum Ethernet frame size is

1518 bytes

Which is the decimal equivalent of A9?

169

a router performs the following Layer 2 functions:

Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network

What Layer 2 function does a router perform?

Accepts the frame De-encapsulates the frame Re-encapsulates the packet into a new frame

The process that a source host uses to determine the destination MAC address associated with an IPv4 address is known as

Address Resolution Protocol (ARP).

To accomplish end-to-end communications across network boundaries, network layer protocols perform four basic operations:

Addressing end devices Encapsulation Routing De-encapsulation

ANSI

American National Standards Institute

What type of address is 01-00-5E-0A-00-02?

An address that reaches a specific group of hosts

Which delivery method does not guarantee that the packet will be delivered fully without errors?

Best effort

Which is the hexadecimal equivalent of 202?

CA

What method is used to manage contention-based access on a wireless network?

CSMA/CA

Which data link layer media access control method does Ethernet use?

CSMA/CD

the media access control method of all ethernet networks is

CSMA/CD

Which media access control method is used in legacy Ethernet LANs?

CSMA/CD Carrier Sense Multiple Access/Collision Detection

Ethernet uses

Carrier Sense Multiple Access Collision Detection CSMA/CD

Which of the following attaches antennas to wireless devices? It can also be bundled with fiber-optic cabling for two-way data transmission.

Coaxial

Which of the following terminates with BNC, N type and F type connectors?

Coaxial

These are the basic characteristics of IP:

Connectionless Best Effort Media Independent

Version

Contains a 4-bit binary value set to 0100 that identifies this as an IPv4 packet.

Data

Contains the frame payload (i.e., packet header, segment header, and the data).

What are two methods for switching data between ports on a switch? (Choose two.)

Cut-Through switching store and forward switching

Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?

Data Field

The physical layer of the receiving device passes bits up to which higher level layer?

Data Link

Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium?

Data Link Layer

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

Data Link Layer

Which statement describes the half-duplex mode of data transmission?

Data that is transmitted over the network flows in one direction AT A TIME

Copper cables network use

Desktop PCs in an enterprise office horizontal cabling structure

What does a router do after de-encapsulating a received frame?

Determines the best path

refers to the spreading out of a light pulse over time. Increased dispersion means increased loss of signal strength

Dispersion

The data link layer does the following:

Enables upper layers to access the media. The upper layer protocol is completely unaware of the type of media that is used to forward the data. Accepts data, usually Layer 3 packets (i.e., IPv4 or IPv6), and encapsulates them into Layer 2 frames. Controls how data is placed and received on the media. Exchanges frames between endpoints over the network media. Receives encapsulated data, usually Layer 3 packets, and directs them to the proper upper-layer protocol. Performs error detection and rejects any corrupt frame.

Addressing end devices

End devices must be configured with a unique IP address for identification on the network.

Which part of an Ethernet Frame describes the higher-layer protocol that is encapsulated?

EtherType

Data link layer protocols include:

Ethernet 802.11 Wireless Point-to-Point Protocol (PPP) High-Level Data Link Control (HDLC) Frame Relay

A cable used to interconnect similar devices. For example, to connect a switch to a switch, a host to a host, or a router to a router. However, crossover cables are now considered legacy as NICs use medium-dependent interface crossover (auto-MDIX) to automatically detect the cable type and make the internal connection.

Ethernet Crossover cable

What is The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router.

Ethernet Straight-through cable

ETSI

European Telecommunications Standards Institute

Which LAN topology is a hybrid topology?

Extended Star

Which is the hexadecimal equivalent of 254?

FE

True or false? When a frame is encoded by the physical layer, all bits are sent over the media at the same time.

False

Which switching method has the lowest level of latency?

Fast-Forward

There are two variants of cut-through switching:

Fast-forward switching Fragment-free switching

Which media uses patterns of light to represent bits?

Fiber-Optic

Differentiated Services or DiffServ (DS)

Formerly called the type of service (ToS) field, the DS field is an 8-bit field used to determine the priority of each packet. The six most significant bits of the DiffServ field are the differentiated services code point (DSCP) bits and the last two bits are the explicit congestion notification (ECN) bits.

What is the term for splitting up an IP packet when forwarding it from one medium to another medium with a smaller MTU?

Fragmentation

What PDU is received by the physical layer for encoding and transmission?

Frame

two fields or features that Ethernet examines to determine if a received frame is passed to the data link layer or discarded by the NIC

Frame Check Sequence FCS Minimum frame size

Frame fields include the following:

Frame start and stop indicator flags Addressing Type Control Data Error Detection

Which duplex communication method is used in WLANs?

Half-Duplex

ata link layer frames, each frame type has three basic parts:

Header Data Trailer

What does the data link layer add to a Layer 3 packet to create a frame?

Header Trailer

Which organization defines standards for the network access layer (i.e., the OSI physical and data link layers)?

IEEE

Best Effort

IP is inherently unreliable because packet delivery is not guaranteed.

Control

Identifies special flow control services such as quality of service (QoS). QoS gives forwarding priority to certain types of messages. For example, voice over IP (VoIP) frames normally receive priority because they are sensitive to delay.

Physical topology

Identifies the physical connections and how end devices and intermediary devices (i.e, routers, switches, and wireless access points) are interconnected. The topology may also include specific device location such as room number and location on the equipment rack. Physical topologies are usually point-to-point or star.

Media Access Control (MAC)

Implements this sublayer (IEEE 802.3, 802.11, or 802.15) in hardware. It is responsible for data encapsulation and media access control. It provides data link layer addressing and it is integrated with various physical layer technologies.

Fragment-free switching

In fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding. Fragment-free switching can be viewed as a compromise between store-and-forward switching and fast-forward switching. The reason fragment-free switching stores only the first 64 bytes of the frame is that most network errors and collisions occur during the first 64 bytes. Fragment-free switching tries to enhance fast-forward switching by performing a small error check on the first 64 bytes of the frame to ensure that a collision has not occurred before forwarding the frame. Fragment-free switching is a compromise between the high latency and high integrity of store-and-forward switching, and the low latency and reduced integrity of fast-forward switching.

Error Detection

Included after the data to form the trailer.

Error detection

Includes a trailer used to detect transmission errors.

Addressing

Indicates the source and destination nodes on the media.

IEEE

Institute of Electrical and Electronics Engineers

Engineering organizations that define open standards and protocols that apply to the network access layer (i.e., the OSI physical and data link layers) include the following:

Institute of Electrical and Electronics Engineers (IEEE) International Telecommunication Union (ITU) International Organization for Standardization (ISO) American National Standards Institute (ANSI)

Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

International Organization For Standardization (ISO) International Telecommunication Union (ITU)

ISO

International Organization for Standardization

What identifier is used at the data link layer to uniquely identify an Ethernet device?

MAC address

has a greater dispersion

MMF

(ITU

International Telecommunication Union

Point to point

Is the simplest and most common WAN topology. It consists of a permanent link between two endpoints

What is a function of the MAC sublayer?

It Controls access to the media it checks for errors in the received bits it uses the CSMA/CD or CSMA/CA to support Ethernet Technologies

What are two services performed by the data link layer of the OSI model? (Choose two.)

It accepts layer 3 packets and encapsulates them into frames it provides media access control and performs error detection

Which function or operation is performed by the LLC sublayer?

It communicates with the upper protocol layers

The features of an Ethernet broadcast are as follows:

It has a destination MAC address of FF-FF-FF-FF-FF-FF in hexadecimal (48 ones in binary). It is flooded out all Ethernet switch ports except the incoming port. It is not forwarded by a router.

Which two functions or operations are performed by the MAC sublayer?

It is responsible for Media Access Control It adds a header and trailer to form an OSI Layer 2 PDU

multicast.

Just as with multicast IP addresses, there is a special assigned value for multicast MAC addresses. The first 24 bits are set in hex to: 01-00-5E. The remaining 6 hex digits are derived from the lower 23 bits of the IP multicast.

Which data link sublayer controls the network interface through software drivers?

LLC

Which data link sublayer works with the upper layers to add application information for delivery of data to higher level protocols?

LLC

What are the two sublayers of the OSI model data link layer?

LLC Layer MAC Layer

The IP header is examined by

Layer 3 devices (i.e., routers and Layer 3 switches) as it travels across a network to its destination.

data link layer consists of the following two sublayers:

Logical Link Control (LLC) Media Access Control (MAC)

The IEEE 802 LAN/MAN data link layer consists of which two sublayers?

Logical link control Media Access Control

What is true concerning physical and logical typologies?

Logical typologies refer to how a network transfers data between devices

The data link protocol is responsible for

NIC-to-NIC communications within the same network.

The process that a source host uses to determine the destination MAC address associated with an IPv6 address is known as

Neighbor Discovery (ND).

Media Independent

Operation is independent of the medium (i.e., copper, fiber-optic, or wireless) carrying the data

The physical layer standards address three functional areas

Physical Components Encoding Signaling

There are two types of topologies used when describing LAN and WAN networks:

Physical topology Logical topology

Which part of an Ethernet Frame notifies the receiver to get ready for a new frame?

Preamble

Addressing

Provides source and destination addressing for transporting the Layer 2 frame between devices on the same shared medium

Logical topology

Refers to the way a network transfers frames from one node to the next. This topology identifies virtual connections using device interfaces and Layer 3 IP addressing schemes.

Which of the following counters EMI and RFI by using shielding techniques and special connectors?

STP

A layer 2 switch is used to switch incoming frames from a 1000Base-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

Shared memory buffering

Which of the following fiber-optic cable types is used to connect long-distance telephony and cable TV applications?

Single-Mode

Which of the following fiber-optic cable types use lasers in a single stream as a data light source transmitter?

Single-Mode

This cable consists of a very small core and uses expensive laser technology to send a single ray of light

Single-Mode Fiber

This cable is a popular in long-distance situations spanning hundreds of kilometers, such as those required in long haul telephony and cable TV applications.

Single-Mode Fiber

Which of the following fiber-optic cable types can travel approximately 62.5 miles or 100 km/100000 m?

Single-mode

fiber-optic cables are broadly classified into two types:

Single-mode fiber (SMF) Multimode fiber (MMF)

What type of physical topology can be created by connecting all Ethernet cables to a central device?

Star Topology

Switches use one of the following forwarding methods for switching data between network ports

Store-and-forward switching Cut-through switching

Time to Live (TTL)

TTL contains an 8-bit binary value that is used to limit the lifetime of a packet. The source device of the IPv4 packet sets the initial TTL value. It is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. Because the router decrements the TTL of each packet, the router must also recalculate the Header Checksum.

TIA/EIA

Telecommunications Industry Association/Electronic Industries Association

Ethernet Addressing

The Ethernet frame includes both a source and destination MAC address to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN.

Frame Check Sequence Field

The Frame Check Sequence (FCS) field (4 bytes) is used to detect errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame. The receiving device receives the frame and generates a CRC to look for errors. If the calculations match, no error occurred. Calculations that do not match are an indication that the data has changed; therefore, the frame is dropped. A change in the data could be the result of a disruption of the electrical signals that represent the bits.

Preamble and Start Frame Delimiter Fields

The Preamble (7 bytes) and Start Frame Delimiter (SFD), also called the Start of Frame (1 byte), fields are used for synchronization between the sending and receiving devices. These first eight bytes of the frame are used to get the attention of the receiving nodes. Essentially, the first few bytes tell the receivers to get ready to receive a new frame.

a network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. the administrator notices the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput?

The amount of traffic that is currently crossing the network the type of traffic that is crossing the network the latency created by the number of network devices that the data is crossing

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI

What happens to runt frames received by a Cisco Ethernet switch?

The frame dropped

Frame delimiting

The framing process provides important delimiters to identify fields within a frame. These delimiting bits provide synchronization between the transmitting and receiving nodes.

A network administrator is connecting two modern switches using a straight through cable. The switches are new and have never been configured. Three statements that are correct about the final result of the connection.

The link between switches will work as full duplex the auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable the link between the switches will work at the fastest speed supported by both switches

Encapsulation

The network layer encapsulates the protocol data unit (PDU) from the transport layer into a packet. The encapsulation process adds IP header information, such as the IP address of the source (sending) and destination (receiving) hosts. The encapsulation process is performed by the source of the IP packet.

Routing

The network layer provides services to direct the packets to a destination host on another network. To travel to other networks, the packet must be processed by a router. The role of the router is to select the best path and direct packets toward the destination host in a process known as routing. A packet may cross many routers before reaching the destination host. Each router a packet crosses to reach the destination host is called a hop.

During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?

The physical address is added

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

The use of full-duplex capable Layer 2 switches

Hub and Spoke

The wan version of the star topology in which a central site interconnects branch sites through the use of point to point links.

Connectionless

There is no connection with the destination established before sending data packets.

What statement describes a characteristic of MAC addresses?

They must be globally unique

Ethernet Frame Fields Type / Length

This 2-byte field identifies the upper layer protocol encapsulated in the Ethernet frame. Common values are, in hexadecimal, 0x800 for IPv4, 0x86DD for IPv6 and 0x806 for ARP. Note: You may also see this field referred to as EtherType, Type, or Length.

Source MAC Address Field

This 6-byte field identifies the originating NIC or interface of the frame.

Destination MAC Address Field

This 6-byte field is the identifier for the intended recipient. As you will recall, this address is used by Layer 2 to assist devices in determining if a frame is addressed to them. The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame. Can be a unicast, multicast or broadcast address.

LLC Sublayer

This IEEE 802.2 sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to use the same network interface and media.

Logical Link Control (LLC)

This IEEE 802.2 sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to use the same network interface and media.

Destination IPv4 Address

This contains a 32-bit binary value that represents the destination IPv4 address of the packet. The destination IPv4 address is a unicast, multicast, or broadcast address.

Source IPv4 Address

This contains a 32-bit binary value that represents the source IPv4 address of the packet. The source IPv4 address is always a unicast address.

Data Field

This field (46 - 1500 bytes) contains the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet. All frames must be at least 64 bytes long. If a small packet is encapsulated, additional bits called a pad are used to increase the size of the frame to this minimum size.

Protocol

This field is used to identify the next level protocol. This 8-bit binary value indicates the data payload type that the packet is carrying, which enables the network layer to pass the data to the appropriate upper-layer protocol. Common values include ICMP (1), TCP (6), and UDP (17).

Cut-through switching

This frame forwarding method forwards the frame before it is entirely received. At a minimum, the destination address of the frame must be read before the frame can be forwarded.

Store-and-forward switching

This frame forwarding method receives the entire frame and computes the CRC. CRC uses a mathematical formula, based on the number of bits (1s) in the frame, to determine whether the received frame has an error. If the CRC is valid, the switch looks up the destination address, which determines the outgoing interface. Then the frame is forwarded out of the correct port.

MAC Sublayer

This sublayer (IEEE 802.3, 802.11, or 802.15 for example) is implemented in hardware and is responsible for data encapsulation and media access control. It provides data link layer addressing and is integrated with various physical layer technologies.

Mesh Topology

This topology provides the highest availability but requires that every end system is connected to each other making it costly to implement

Which of these is a measure of the transfer of bits across the media?

Throughput

Which is a function of the Logical Link Control (LLC) sublayer?

To identify which network layer protocol is being used

Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet?

Transport Layer

An Ethernet MAC address is

a 48-bit address expressed using 12 hexadecimal digits

he MAC address table is sometimes referred to as

a content addressable memory (CAM) table

What is auto-MDIX?

a feature that detects Ethernet cable type

all vendors that sell Ethernet devices must register with the IEEE to obtain

a unique 6 hexadecimal (i.e., 24-bit or 3-byte) code called the organizationally unique identifier (OUI).

Category 6 has an

added separator between each wire pair to support higher speeds

Full duplex

allows communication in both directions, and, unlike half-duplex, allows this to happen simultaneously.

CSMA/CD

allows multiple devices to share the same half-duplex medium, detecting a collision when more than one device attempts to transmit simultaneously. It also provides a back-off algorithm for retransmission.

What feature automatically negotiates the best speed and duplex setting between interconnecting devices?

autonegotiation

Which of these is the name for the capacity of a medium to carry data?

bandwidth

An IPv4 packet header consists of fields containing important information about the packet. These fields contain

binary numbers which are examined by the Layer 3 process.

Any frame less than 64 bytes in length is considered a

collision fragment or runt frame

Layer 2 addresses are only used to

connect devices within the same shared media, on the same IP network.

Which media uses electrical pulses to represent bits?

copper

Which switching method can be implemented using fast-forward switching or fragment-free switching?

cut-through switching

Ethernet operates in the

data link layer and the physical layer

ull-duplex communications with Ethernet switches

do not require access control through CSMA/CD.

The IPv4 packet header is used to

ensure that this packet is delivered to its next stop on the way to its destination end device.

Data link layer protocols add a trailer to the end of each frame. In a process called

error detection

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

it will discard the frame

Frames with more than 1500 bytes of data are considered

jumbo or baby giant frames

The data link layer address is only used for

local delivery. Addresses at this layer have no meaning beyond the local network.

Which topology displays networking device layer IP addresses?

logical topology

fiber optic cabling network use

long haul networks desktop PCs in an enterprise office

the transport layer (OSI Layer 4)

manages the data transport between the processes running on each host

The data link layer is responsible for

network interface card (NIC) to network interface card communications.

fast-forward switching

offers the lowest level of latency. Fast-forward switching immediately forwards a packet after reading the destination address. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. This occurs infrequently, and the destination NIC discards the faulty packet upon receipt. In fast-forward mode, latency is measured from the first bit received to the first bit transmitted. Fast-forward switching is the typical cut-through method of switching.

Which two types of memory buffering techniques are used by switches?

port-based memory buffering shared memory buffering

Half duplex

provides communication in both directions, but only one direction at a time (not simultaneously)

The network layer, or OSI Layer 3

provides services to allow end devices to exchange data across networks

store-and-forward switching is required for

quality of service (QoS) analysis on converged networks where frame classification for traffic prioritization is necessary

IP addressing information

remains the same from the time the packet leaves the source host until it arrives at the destination host, except when translated by the device performing Network Address Translation (NAT) for IPv4.

this cable is used to connect a workstation to a router or switch console port.

rollover cable, which is Cisco proprietary

To counter the negative effects of EMI and RFI,

some types of copper cables are wrapped in metallic shielding and require proper grounding connections

To counter the negative effects of crosstalk

some types of copper cables have opposing circuit wire pairs twisted together

network layer communication protocols (i.e., IPv4 and IPv6)

specify the packet structure and processing used to carry the data from one host to another host

Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?

switch

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

switch

The electrical characteristics of copper cabling are defined by

the Institute of Electrical and Electronics Engineers (IEEE).

The topology of a network is

the arrangement, or the relationship, of the network devices and the interconnections between them.

MAC addressing provides a method for device identification at

the data link layer of the OSI model.

The Internet Engineering Task Force (IETF) maintains

the functional protocols and services for the TCP/IP protocol suite in the upper layers, but they do not define the functions and operation of the TCP/IP network access layer.

The data link layer "sees"

the logical topology of a network when controlling data access to the media

With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?

the magnetic field around the adjacent pair of wires

If the size of a transmitted frame is less than the minimum, or greater than the maximum

the receiving device drops the frame.

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames

The IP header is used

to deliver the packet to the destination host

What is the function of the last field in a data link layer frame?

to determine whether the frame experienced transmission errors

The IP protocol was not designed to

track and manage the flow of packets.

Which media uses patterns of microwaves to represent bits?

wireless

The multicast MAC address is a special value that begins

with 01-00-5E in hexadecimal. It allows a source device to send a packet to a group of devices.


संबंधित स्टडी सेट्स

Chapter 7: The Late Silent Era in Hollywood, 1920-1928

View Set

Econ Final Chapter 14 Price Discrimination and Pricing Strategy

View Set

4.04 Quiz War's End - American World History

View Set

HTML5, CSS3, and JavaScript: Tutorial 12 test questions

View Set

Business Communication Essentials Ch 2

View Set

DSM ch. 10, DSM (ch. 6,, A&P Lecture Ch. 8,9,11, DSM ch 9, DSM ch. 8, HW (CH. 6-10, DSM (ch 7,

View Set