SEMESTER 1 Chapter 9††††††††††††††† 140 Points

V 4.0




Who originally published the Ethernet standard and when was that?

published in 1980 by a consortium of Digital Equipment Corporation, Intel, and Xerox (DIX).


Who and when published LAN standards?

1985, the Institute of Electrical and Electronics Engineers (IEEE)


What is the number for the Ethernet LAN standard?



What layers of the OSI model do Ethernet standards operate at?

1 and 2


What does Ethernet Layer 1 involve?

signals, bit streams that travel on the media, physical components that put signals on media, and various topologies


What are the Ethernet Layer 2 functions that overcome the limitations of Ethernet Layer 1?

Connects to the upper layers via the LLC

Uses addressing schemes to identify devices

Uses frames to organize bits into groups

Uses MAC to identify transmission sources


What are the two sublayers of the Data Link Layer?

the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer.


What are the 4 functions of the LLC?

Makes connection with the upper layers

Frames the network layer packet

Identifies the network layer protocol

Remains relatively independent of the physical layer


What type of environment is LLC implemented in?



Where is the MAC sublayer implemented?



What are the 2 primary functions of the MAC sublayer?

Data Encapsulation

Media Access Control


What are the 3 primary functions of data encapsulation?

Frame delimiting


Error detection


What are the two main functions of the media access control?

Control of frame placement on and off the media

Media recovery


What is the underlying topology of Ethernet?

Mulit-access bus


What is the media access control method for Ethernet?

CSMA/CD Carrier Sense Multiple Access with Collision Detection


What are the four factors that have made Ethernet a success?

Simplicity and ease of maintenance

Ability to incorporate new technologies


Low cost of installation and upgrade


What part of the Ethernet standard remains consistent across all of its physical implementations?

Frame structure


What was the historic network that Ethernet was based on called?


Describe the method of transmission on a hub?

A frame received in one port is transmitted out all other ports


What is legacy Ethernet?

10Base-T network with a hub at its center


What is the current standard for Ethernet?

100Base-T network with switches


What is full duplex?

a connection that can carry both transmitted and received signals at the same time


What is the difference when forwarding a frame from a switch vs. hub?

Hub always send the signal out all ports and switch sends directly to device if itís address is known


What two new uses are requiring the move to Gigabit Ethernet?

Voice over IP (VoIP) and multimedia services

Define a MAN?

Ethernet connection across an entire city


What is the most significant difference between the IEEE 802.3 (original) and the revised IEEE 802.3?

the addition of a Start Frame Delimiter (SFD) and a small change to the Type field to include the Length


What were the minimum and maximum sizes of Ethernet frames originally?

the minimum frame size as 64 bytes and the maximum as 1518 bytes


What is the new maximum size for a frame?

1522 bytes


What happens if the size of a transmitted frame is less than the minimum or greater than the maximum?

It is dropped

What are the six portions of an Ethernet frame discussed?

Preamble, start frame delimiter, destination address, source address, length/type, 802.2 header and data, frame check sequence

What is the Frame Check Sequence (FCS)?

(4 bytes) used to detect errors in a frame


What is the algorithm used in determining the value of the FCS?

Cyclical redundancy check


What happens if the FCS values do not match?

The frame is dropped


What was created to assist in determining the source and destination address?

Media Access Control (MAC) address


How is an Ethernet MAC address represented?

a 48-bit binary value expressed as 12 hexadecimal digits

Define the two parts of an Ethernet MAC address?

All MAC addresses assigned to a NIC or other Ethernet device must use that vendor's assigned OUI as the first 3 bytes.

All MAC addresses with the same OUI must be assigned a unique value (vendor code or serial number) in the last 3 bytes.


What is another name for the MAC address?

Burned-in address


As an Ethernet frame passes through a network what happens if that devices MAC address matches the destination MAC address?

the NIC passes the frame up the OSI layers, where the decapsulation process take place


As an Ethernet frame passes through a network what happens if that devices MAC address does not match the destination MAC address?

The frame is discarded

Where can you find your computerís MAC address?

Ipconfig/all or ipconfig


What is the problem with physical addressing?

No meaning outside the local network


What is the difference between physical (Network Layer) and logical (Data Link Layer) addressing?

The Network layer address enables the packet to be forwarded toward its destination.

The Data Link layer address enables the packet to be carried by the local media across each segment.


When a unicast transmission used?

when a frame is sent from a single transmitting device to single destination device

When is a broadcast transmission used?

all hosts on that local network (broadcast domain) will receive and process the packet


How is a broadcast IP address represented?

All 1ís in the host portion of the IP address


How is a broadcast MAC address represented?


When is a multicast transmission used?

When a frame is sent to a group of computers


How can a multicast packet only be used?

as the destination of a packet


What type of address does the source have?



What is the multicast MAC address?

Begins with 01-00-5E The value ends by converting the lower 23 bits of the IP multicast group address into the remaining 6 hexadecimal characters of the Ethernet address. The remaining bit in the MAC address is always a "0".


How does a shared media environment operate?

all devices have guaranteed access to the medium, but they have no prioritized claim on it. If more than one device transmits simultaneously, the physical signals collide and the network must recover in order for communication to continue.


When does a device on a shared environment transmit?

When it detects that no other computer is sending a frame, or carrier signal


Define latency.

The time delay between when a process is started and that same process is detected


Define collision.

When two stations transmit at the same time


How does collision detection occur?

When a device is in listening mode it can detect an increase in amplitude of the signal above the normal level


What happens when all devices on a shared medium detect a collision?

they send out a jamming signal


What is invoked after a device receives a jamming signal?

The backoff algorithm


How does a backoff algorithm work?

All devices stop transmitting for a random amount of time


What mode does a device return to after the backoff algorithm has expired?


What are the three reasons given that the growth of the Internet has resulted in more collisions?

More devices are being connected to the network.

Devices access the network media more frequently.

Distances between devices are increasing.


Define a collision domain?

The media within a network where collsions can occur


What does the connection of hubs and repeaters do to collision domains?

They increase the collision domain size


What happens when the number of collisions increases significantly?

reduces the network's efficiency and effectiveness until the collisions become a nuisance to the user


Which devices extend the latency in the medium?

Hubs and repeaters


Why would an increased latency cause more collisions?

The other device may not hear the signal before it begins to transmit

What is sent before an entire Ethernet frame is sent?

The preamble


What does asynchronous communication mean?

each receiving device will use the 8 bytes of timing information to synchronize the receive circuit to the incoming data and then discard the 8 bytes


What does synchronous communication mean?

the timing information is not required

What is a bit time?

a period of time is required for a bit to be placed and sensed on the media


What is the slot time?

The time it takes for an electronic pulse to travel the length of the maximum theoretical distance between two nodes.


What is interframe spacing?

time measured from the last bit of the FCS field of one frame to the first bit of the Preamble of the next frame


What happens to interframe spacing as the network speed increases?

The time reduces

What happens when the MAC layer is unable to send a frame after 16 attempts?

it gives up and generates an error to the Network layer


What are the four data rates are currently defined for operation over optical fiber and twisted-pair cables?

10 Mbps - 10Base-T Ethernet

100 Mbps - Fast Ethernet

1000 Mbps - Gigabit Ethernet

10 Gbps - 10 Gigabit Ethernet


What are the three principal 10 Mbps implementations of Ethernet?

10BASE5 using Thicknet coaxial cable

10BASE2 using Thinnet coaxial cable

10BASE-T using Cat3/Cat5 unshielded twisted-pair cable

What are the most popular implementations of 100 Mbps Ethernet?

100BASE-TX using Cat5 or later UTP

100BASE-FX using fiber-optic cable


What is Gigabit Ethernet more susceptible to because of its speed?



What type of transmission does 1000Base-T allow for?

the transmission and reception of data in both directions - on the same wire and at the same time


What is the maximum number of voltages used on the media at the same during transmission?



What are the two main causes of noise on the line?

cable and termination problems


What are the ways that 10Gbps can be compared to other varieties of Ethernet?

Frame format is the same, allowing interoperability between all varieties of legacy, fast, gigabit, and 10 gigabit Ethernet, with no reframing or protocol conversions necessary.

Bit time is now 0.1 nS. All other time variables scale accordingly.

Because only full-duplex fiber connections are used, there is no media contention and CSMA/CD is not necessary.

The IEEE 802.3 sublayers within OSI Layers 1 and 2 are mostly preserved, with a few additions to accommodate 40 km fiber links and interoperability with other fiber technologies.


What is the problem associate with the classic Ethernet implementation using hubs?

high levels of collisions on the LAN


List the four problems related to the implementation of classic Ethernet?

Scalability, Latency, Network Failure, and Collisions


How do switches segment a LAN?

Separate collision domains


What does the separation of collision domains mean for the bandwidth to the device?

Full media bandwidth to each device

What are the three reasons that bandwidth increases dramatically when each device is connected to a switch port?

Dedicated bandwidth to each port

Collision-free environment

Full-duplex operation


What are the three reasons that hubs are still being used?

Availability, Economics, and Requirements


Describe selective forwarding?

establishing a momentary point-to-point connection between the transmitting and receiving nodes


What is the process called when the switch holds the frame until the receiving node is available called?



Describe the store-and-forward operation mode of a switch?

The switch receives the entire frame and checks the FCS before forwarding the frame


How does a switch use a MAC table?

The incoming frame destination MAC address is compared to the MAC table to decide which port to forward the frame to

What are the five basic operations of a switch?




Selective Forwarding



How does a switch learn a MAC address?

The source address of the incoming frame


What happens when an addresses countdown reaches 0?

The address is removed from the MAC table


What happens when a switch does not know the destination address?

The frame is flooded out all but the incoming port


What type of frames will not be forwarded?

A frame with a destination of the same port, a corrupt frame, and security reasons


What are the two basic functions of ARP?

Resolving IPv4 addresses to MAC addresses

Maintaining a cache of mappings


What are the names of the tables that store the list of MAC addresses with the network address?

ARP table or ARP Cache


What are the two ways a computer can gather MAC addresses?

From an incoming frame or using an ARP request


What are the 2 destination addresses in an ARP Request?

Broadcast MAC address and the destination MAC address


If the destination is on the local network segment, what MAC address is used?

The device MAC address


If the destination is on a remote network, what MAC address is used?

The gateway MAC address


If the MAC address of the gateway is unknown, what process is used?

ARP Request

What is the most common reason for using a proxy ARP?

When the device can not determine if the host is on the same network or not


How long are addresses held in the ARP table?

2 minutes unless used again in those 2 minutes and then 10 minutes


How could ARP requests impact performance on a network?

Too many broadcasts at once that each host receives and processes therefore slowing down the network


What is another problem that may be associated with ARP?

Security- ARP spoofing which causes errors on the network