Documente Academic
Documente Profesional
Documente Cultură
CCNA 1 PART 1
Data Networks
Businesses needed a solution that would successfully address the following three problems: Duplication of equipment and resources Implementation of effective communication Network management
Businesses realized that networking technology could increase productivity while saving money.
Mobile Users
Branch Office
Main Office
3
connect
the
end-user
devices
Network Topology
Network Topology Defines the structure of the network. Network Topology Types
Token Ring
Star
Ring
Bus Topology
Uses a single backbone cable that is terminated at both ends. All the hosts connect directly to this backbone.
Ring Topology
Connects one host to the next and the last host to the first. This creates a physical ring of cable.
Star Topology
Connects all cables to a central point of concentration.
10
11
Mesh Topology
Implemented to provide as much protection as possible from interruption of service. Each host has its own connections to all other hosts. Although the Internet has multiple paths to any one location, it does not adopt the full mesh topology.
12
One early solution was the creation of LAN standards which provided an open set of guidelines for creating network hardware and software, making equipment from different companies compatible.
What was needed was a way for information to move efficiently and quickly, not only within a company, but also from one business to another. The solution was the creation of metropolitan-area networks (MANs) and wide-area networks (WANs).
13
LANs
Operate within a limited
geographic area
14
WANs
Operate within a large
geographic area
15
VPNs
A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuters PC and a VPN router in the headquarters.
16
Bandwidth
17
Measuring Bandwidth
18
19
20
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Memorize it!
22
OSI Model
Application Application (Upper) Layers Presentation Session Transport Network Data-Link Physical
23
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
25
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Half Duplex
It uses only one wire pair with a digital signal running in both
directions on the wire.
percent efficient because a large 10BaseT network will usually only give you 3 to 4Mbpsat most.
27
Full Duplex
Full duplex, in twisted-pair cabling, uses two pairs of wire for simultaneous transmission and reception.
28
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
29
Network
IP
IPX
30
TCP vs UDP
31
20 Bytes
Bit 1 0
33
Port Numbers
Application Layer
F T P
T E L N E T
23 TCP
S M T P
D N S
T F T P
S N M P
R I P
21 Transport Layer
25
53
69
UDP
161
520
Port Numbers
34
Source Port
Destination Port
Telnet Z
Host A
Host Z
SP 1028
DP 23
35
36
Host A
Host B
Send SYN
SYN Received
Send ACK
37
Reliable Service
Sender
Receiver
Synchronize
Acknowledge, Synchronize Acknowledge
Connection Established
Data Transfer (Send Segments)
38
39
Windowing
Windowing in networking means the quantity of data segments
that a machine can transmit/send on the network without receiving an acknowledgement.
Example:
There are two window sizesone set to 1 and one set to 3. When youve configured a window size of 1, the sending
machine waits for an acknowledgment for each data segment.
40
Window Size = 1
Sender Send 1 Receive ACK 2 Receiver
Receive 1
Send ACK 2
Send 2
Receive ACK 3 Send 3
Receive ACK 4
41
Windowing
42
Source Port
Destination Port
Sequence
Acknowledgment
Source Dest. Seq. Ack. 1028 23 11 101 Source Dest. Seq. Ack. 23 1028 101 12
43
44
Flow Control
Flow control is used to ensure that networking devices dont send too much information to the destination, overflowing its receiving buffer space, and causing it to drop the sent information
45
Flow Control
A SEQ 1024 SEQ 2048 SEQ 3072 3 3072 B
46
47
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
and
Packet
48
Network
Data-Link
Defines logical source and destination addresses associated with a specific protocol Defines paths through network
IP, IPX
802.2
Physical
802.3
EIA/TIA-232 V.35
49
Layer 3 : (cont.)
Network Layer End-Station Packet
IP Header Logical Address Source Address Destination Address Data
172.15.1.1
Network Node or Host
Route determination occurs at this layer, so a packet must include a source and destination address. Network-layer addresses have two components: a network component for internetwork routing. a node number for a device-specific address. The example in the figure is an example of an IP packet and IP address.
50
Layer 3 (cont.)
Address
Mask
172.16.122.204 255.255.0.0
172 16 122 204
Binary Mask
11111111 11111111
Network
00000000 00000000
Host
51
Bit 15 Bit 16 Priority &Type of Service (8) Flags (3) Total Length (16)
Bit 31
Source IP Address (32) Destination IP Address (32) Options (0 or 32 if Any) Data (Varies if Any)
52
Protocol Field
Transport Layer
TCP 6
Internet Layer
53
Destination Unreachable
Data-Link Physical
54
Broadcast control Multicast control Optimal path determination Traffic management Logical addressing Connects to WAN services
55
Type of Transmission
Unicast Multicast Broadcast
56
Type of Transmission
57
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Preamble DMAC
MAC Layer802.3
8 *Preamble 6 DMAC 6 SMAC 2 Length Variable Data 4 FCS
xx.xxxx
Vendor Assigned
* **
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host. Move bits between devices Encoding
PDU - Bits
60
Physical Layer
Defines
Media type
Connector type
Signaling type
802.3 is responsible for LANs based on the carrier sense multiple access collision detect (CSMA/CD) access methodology. Ethernet is an example of a CSMA/CD network.
Physical
802.3
61
Host Hub
10BaseTTwisted Pair
Hosts
62
Data Encapsulation
Application
Presentation Upper-Layer Data TCP Header Upper-Layer Data Session
PDU
Segment
Transport
IP Header
Data
Network
Packet
LLC Header
Data
FCS
Data-Link
Frame
MAC Header
Data
FCS
0101110101001000010
Physical
Bits
63
Data Encapsulation
64
78
Layer 3 2 1
Broadcast Domain ? ? ?
Collision Domain ? ? ?
79
Broadcast Domain
Encompasses a group of devices receiving broadcast frames initiating from any device within the group. Routers do not forward broadcast frames, broadcasts are not forwarded from one broadcast domain to another.
80
Collision Domain
The network area in Ethernet over which collision of frames are expected to transpire. extended by hubs and repeaters. divided by switches, routers, or bridges
Q: Which is better, a network with 10 collision domains or a network with 1 collision domain? Q2: a network with 3 broadcast domains or a network with 10 broadcast domains?
81
Collision
The effect of two nodes simultaneously in Ethernet. sending transmissions
When the electrical signals meet on the physical media, the frames from each node collide and are damaged. Q: What is the role of communication?
82
Physical
All devices are in the same collision domain. All devices are in the same broadcast domain. Devices share the same bandwidth.
83
84
Data-Link
OR
Each segment has its own collision domain. All segments are in the same broadcast domain.
85
Switches
Switch
Memory
Each segment is its own collision domain. Broadcasts are forwarded to all segments.
86
Router
Routers are used to connect networks together Route packets of data from one network to another Cisco became the de facto standard of routers because of their high-quality router products Routers, by default, break up a broadcast domain
87
Internetworking Devices
88
90
Distribution Layer
Access Layer
91
92
93
94
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war.
95
7 6 5 4 3 2 1
Transport
3
Internet
2
Data-Link
Physical
Data-Link
Physical
1
96
File Transfer - TFTP* - FTP* - NFS E-Mail - SMTP Remote Login - Telnet* - rlogin* Network Management - SNMP* Name Management - DNS* *Used by the Router
97
ConnectionOriented Connectionless
98
Transport
Internet Data-Link Physical
Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP)
In the OSI reference model, the network layer corresponds to the TCP/IP Internet layer.
99
I heard that broadcast. The message is for me. Here is my Ethernet address.
100
Reverse ARP
What is my IP address?
101
IEEE 802.3: Defines the MAC layer for bus networks that use
CSMA/CD. This is the basis of the Ethernet standard.
IEEE 802.4: Defines the MAC layer for bus networks that use a
token-passing mechanism (token bus networks).
102
103
Origin of Ethernet
Found by Xerox Palo Alto Research Center (PARC) in 1975 Original designed as a 2.94 Mbps system to connect 100 computers on a 1 km cable
Later, Xerox, Intel and DEC drew up a standard support 10 Mbps Ethernet II
Basis for the IEEEs 802.3 specification Most widely used LAN technology in the world
104
10BaseT 10 Mbps, baseband, over Twisted-pair cable Running Ethernet over twisted-pair wiring as specified by IEEE 802.3 Configure in a star pattern Twisting the wires reduces EMI Fiber Optic has no EMI
Unshielded twisted-pair
105
Used for backbone cabling, adds several layers of protective layer used to counter the effects of EMI
Maximum length = 25 m
107
Br
Br
108
Baseband VS Broadband
Baseband Transmission
Entire channel is used to transmit a single digital signal Complete bandwidth of the cable is used by a single signal The transmission distance is shorter The electrical interference is lower
Use analog signaling and a range of frequencies Continuous signals flow in the form of waves Support multiple analog transmission (channels)
Broadband Transmission
Baseband Transmission
Network Card
Modem
Straight-through cable
110
111
Crossover cable
112
Crossover cable
113
Rollover cable
114
115
Straight-through or Crossover
Use straight-through cables for the following cabling: Switch to Router Switch to PC or server Hub to PC or server
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server? a. b. c. d. denial of service brute force reconnaissance Trojan horse
117
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server? a. b. c. d. denial of service brute force reconnaissance Trojan horse
118
Which of the following are associated the application layer of the OSI model? (Choose Two) a. b. c. d. e. ping telnet ftp tcp ip
119
Which of the following are associated the application layer of the OSI model? (Choose Two) a. b. c. d. e. ping telnet ftp tcp ip
120
Which troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message Request timed out is displayed. At which layer of the OSI model does the problem most likely exist? a. b. c. d. e. f. The session layer The protocol layer The data link layer The access layer The network layer The application layer
121
Which troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message Request timed out is displayed. At which layer of the OSI model does the problem most likely exist? a. b. c. d. e. f. The session layer The protocol layer The data link layer The access layer The network layer The application layer
122
Which topologies are using the correct type of twisted pair cables? Choose Two.
123
Which topologies are using the correct type of twisted pair cables? Choose Two.
124
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm? a. b. c. d. The PC has connectivity with a local host. The PC has connectivity with a layer 3 device The PC has a gateway correctly configured The PC has connectivity up to layer 5 of the OSI model e. The PC has the TCP/IP protocol stack correctly installed
125
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm? a. b. c. d. The PC has connectivity with a local host. The PC has connectivity with a layer 3 device The PC has a gateway correctly configured The PC has connectivity up to layer 5 of the OSI model e. The PC has the TCP/IP protocol stack correctly installed
126
What are some of the advantages of using a router to segment a network? a. b. c. d. e. f. Filtering can occur based on Layer 3 information Broadcasts are eliminated Routers generally cost less than switches Broadcasts re not forwarded across the router Adding a router to the network decreases latency Addresses licensed to enterprises or ISPs by an internet registry organization
127
What are some of the advantages of using a router to segment a network? a. b. c. d. e. f. Filtering can occur based on Layer 3 information* Broadcasts are eliminated Routers generally cost less than switches Broadcasts re not forwarded across the router* Adding a router to the network decreases latency Addresses licensed to enterprises or ISPs by an internet registry organization
128
Which of the following statements are true regarding bridges and switches? (Choose 3) a. Switches are primarily software based while bridges are hardware based b. Both bridges and switches forward layer 2 broadcasts c. Bridges are frequently faster than switches d. Switches have a higher number of ports than most bridges e. Bridges define broadcast domains while switches define collision domains f. Both bridges and switches make forwarding based on layer 2 addresses
129
Which of the following statements are true regarding bridges and switches? (Choose 3) a. Switches are primarily software based while bridges are hardware based b. Both bridges and switches forward layer 2 broadcasts c. Bridges are frequently faster than switches d. Switches have a higher number of ports than most bridges e. Bridges define broadcast domains while switches define collision domains f. Both bridges and switches make forwarding based on layer 2 addresses
130
a. Broadcasts only use network layer addressing b. A broadcast frame is never forwarded by a switch c. A broadcast address will never be the source of a frame d. Broadcast addresses use an incorrect format for the switching table e. Broadcast frames are never sent to switches
131
a. Broadcasts only use network layer addressing b. A broadcast frame is never forwarded by a switch c. A broadcast address will never be the source of a frame d. Broadcast addresses use an incorrect format for the switching table e. Broadcast frames are never sent to switches
132
Which of the following statements describe the network shown in the graphic? (choose two) a. b. c. d. e. f. There are two broadcast domains in the network There are four broadcast domains in the network There are six broadcast domains in the network There are four collision domains in the network There are five collision domains in the network There are seven collision domains in the network
133
Which of the following statements describe the network shown in the graphic? (choose two) a. b. c. d. e. f. There are two broadcast domains in the network There are four broadcast domains in the network There are six broadcast domains in the network There are four collision domains in the network There are five collision domains in the network There are seven collision domains in the network
134
At which OSI layer is a logical path created between two host systems? a. b. c. d. e. Session Transport Network Data link Physical
135
At which OSI layer is a logical path created between two host systems? a. b. c. d. e. Session Transport Network Data link Physical
136
a. b. c. d. e. f.
Packet switching Access layer security Path selection VLAN membership assignment Bridging between LAN segments Microsegmentation of broadcast domains
137
a. b. c. d. e. f.
Packet switching Access layer security Path selection VLAN membership assignment Bridging between LAN segments Microsegmentation of broadcast domains
138
At which layers of the OSI model do WANs operation? (Choose two) a. b. c. d. e. f. Application Session Transport Network Data link Physical
139
At which layers of the OSI model do WANs operation? (Choose two) a. b. c. d. e. f. Application Session Transport Network Data link Physical
140
Why does the data communication industry use the layered OSI reference model?
a. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting b. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds c. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers d. It encourages industry standardization by defining what functions occur at each layer of the model e. It provides a means by which changes in functionality in one layer require changes in other layers 141
Why does the data communication industry use the layered OSI reference model?
a. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting b. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds c. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers d. It encourages industry standardization by defining what functions occur at each layer of the model e. It provides a means by which changes in functionality in one layer require changes in other layers 142
Which of the following is true regarding the use of switches and hubs for network connectivity? a. Switches take less time to process frames than hubs take. b. Switches do not forward broadcasts c. Hubs can filter frames d. Using hubs can increase the amount of bandwidth available to hosts e. Switches increase the number of collision domains in the network
143
Which of the following is true regarding the use of switches and hubs for network connectivity? a. Switches take less time to process frames than hubs take. b. Switches do not forward broadcasts c. Hubs can filter frames d. Using hubs can increase the amount of bandwidth available to hosts e. Switches increase the number of collision domains in the network
144
The network administrator must complete the connection between the RTA of the XYZ company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop of the central office of the provider? (choose two) a. b. c. d. e. f. WAN switch PVC ATM switch Multiplexer CSU/DSU Modem
145
The network administrator must complete the connection between the RTA of the XYZ company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop of the central office of the provider? (choose two) a. b. c. d. e. f. WAN switch PVC ATM switch Multiplexer CSU/DSU Modem
146
Acknowledgements, sequencing, and flow control are characteristics of which OSI later? a. b. c. d. e. f. 2 3 4 5 6 7
147
Acknowledgements, sequencing, and flow control are characteristics of which OSI later? a. b. c. d. e. f. 2 3 4 5 6 7
148
Which of the following are types of flow control? (choose three) a. b. c. d. e. Buffering Cut through Windowing Congestion avoidance Load balancing
149
Which of the following are types of flow control? (choose three) a. b. c. d. e. Buffering Cut through Windowing Congestion avoidance Load balancing
150
Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection? a. b. c. d. UTP cable STP cable Coaxial cable Fiber optic cable
151
Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection? a. b. c. d. UTP cable STP cable Coaxial cable Fiber optic cable
152
What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (choose three) a. b. c. d. e. f. Default gateway DNS servers FTP server Helper address Subnet mask TFTP server
153
What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (choose three) a. b. c. d. e. f. Default gateway DNS servers FTP server Helper address Subnet mask TFTP server
154
Host 1 sends a request for a file to remote server 1. Which destination does Host 1 place the packet containing the request? a. b. c. d. e. The MAC address of the NIC in server1 The IP address of server 1 The MAC address of the s0/0/0 interface of router R2 The IP address of s0/0/0 interface of router R1 The IP address of fa0/0 interface of router R1
155
156
Host 1 sends a request for a file to remote server 1. Which destination does Host 1 place the packet containing the request? a. b. c. d. e. The MAC address of the NIC in server1 The IP address of server 1 The MAC address of the s0/0/0 interface of router R2 The IP address of s0/0/0 interface of router R1 The IP address of fa0/0 interface of router R1
157
Host 1 sends an ICMP echo request to remote server 1. Which destination address does Host 1 place in the header of the frame containing the ping packet?
a. The IP address of server 1 b. The MAC address of the NIC in server1 c. The IP address of fa0/0 interface of router R1 d. The MAC address of fa0/0 interface of router R1 e. The MAC address of the s0/0/0 interface of router R2 f. The IP address of s0/0/0 interface of router R1
158
159
Host 1 sends an ICMP echo request to remote server 1. Which destination address does Host 1 place in the header of the frame containing the ping packet?
a. The IP address of server 1 b. The MAC address of the NIC in server1 c. The IP address of fa0/0 interface of router R1 d. The MAC address of fa0/0 interface of router R1 e. The MAC address of the s0/0/0 interface of router R2 f. The IP address of s0/0/0 interface of router R1
160
R1 forwards a packet from Host 1 to remoter Server 1. Which describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1? a. The frame does not have MAC addresses b. The source MAC address in the frame is the MAC address of the NIC of Host 1 c. The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1
d. The destination MAC address in the frame is the MAC address of the NIC of Server 1
e. The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
161
162
R1 forwards a packet from Host 1 to remoter Server 1. Which describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1? a. The frame does not have MAC addresses b. The source MAC address in the frame is the MAC address of the NIC of Host 1 c. The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1
d. The destination MAC address in the frame is the MAC address of the NIC of Server 1
e. The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
163
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1? a. The MAC address of the NIC in Host 1
164
165
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1? a. The MAC address of the NIC in Host 1
166
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2? (choose two) a. Host 1 addresses the frames to the MAC address of router R1 b. Host 1 looks in its ARP cache for the MAC address of router R1 c. Host 1 addresses the frames to the MAC address of web server 2
168
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2? (choose two) a. Host 1 addresses the frames to the MAC address of router R1 b. Host 1 looks in its ARP cache for the MAC address of router R1 c. Host 1 addresses the frames to the MAC address of web server 2
A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer? a. b. c. d. e. f. Send ACK 1 to 3 Send ACK 3 Send ACK 4 Send ACK 4 -6 Send ACK 6 Send ACK 7
170
A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer? a. b. c. d. e. f. Send ACK 1 to 3 Send ACK 3 Send ACK 4 Send ACK 4 -6 Send ACK 6 Send ACK 7
171
What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (choose two) a. The number of collision domains would remain the same b. The number of collision domains would decrease c. The number of collision domains would increase d. The number of broadcast domains would remain the same e. The number of broadcast domains would decrease f. The number of broadcast domains would increase
172
What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (choose two) a. The number of collision domains would remain the same b. The number of collision domains would decrease c. The number of collision domains would increase d. The number of broadcast domains would remain the same e. The number of broadcast domains would decrease f. The number of broadcast domains would increase
173
a. To map all the devices on a network b. To display the current TCP/IP configuration values c. To see how a device MAC address is mapped to its IP address d. To see the path a packet will take when travelling to a specified destination e. To display the MTU values for each router in a specified network path from a source to a destination
176
a. To map all the devices on a network b. To display the current TCP/IP configuration values c. To see how a device MAC address is mapped to its IP address d. To see the path a packet will take when travelling to a specified destination e. To display the MTU values for each router in a specified network path from a source to a destination
177
Drag and drop the network user application to the appropriate description of its primary use. (not all options are used)
180
181
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? a. b. c. d. e. Session Transport Network Data link Physical
182
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? a. b. c. d. e. Session Transport Network Data link Physical
183
A network interface port has CSMA/CD enabled on a shared twisted pair network. From this statement, what is known about the network interface port? a. b. c. d. e. This is a 10Mbps switch port This is a 100Mbps switch port This is an Ethernet port operating at half duplex This is an Ethernet port operating at full duplex This is a port on a network interface card in a PC
184
A network interface port has CSMA/CD enabled on a shared twisted pair network. From this statement, what is known about the network interface port? a. b. c. d. e. This is a 10Mbps switch port This is a 100Mbps switch port This is an Ethernet port operating at half duplex This is an Ethernet port operating at full duplex This is a port on a network interface card in a PC
185
Refer to the exhibit. What is the meaning of the output MTU 1500 bytes? a. The maximum number of bytes that can traverse this interface per second is 1500 b. The minimum segment size that can traverse this interface is 1500 bytes c. The maximum segment size that can traverse this interface is 1500 bytes d. The minimum packet size that can traverse this interface is 1500 bytes e. The maximum packet size that can traverse this interface is 1500 bytes f. The maximum frame size that can traverse this interface is 1500 bytes 186
Refer to the exhibit. What is the meaning of the output MTU 1500 bytes? a. The maximum number of bytes that can traverse this interface per second is 1500 b. The minimum segment size that can traverse this interface is 1500 bytes c. The maximum segment size that can traverse this interface is 1500 bytes d. The minimum packet size that can traverse this interface is 1500 bytes e. The maximum packet size that can traverse this interface is 1500 bytes f. The maximum frame size that can traverse this interface is 1500 bytes 187
Which statement is true about full duplex Ethernet in comparison to half duplex Ethernet?
a. Full duplex Ethernet consists of a shared cable segment. Half duplex Ethernet provides a point to point link. b. Full duplex Ethernet uses a loopback circuit to detect collisions. Half duplex Ethernet uses a jam signal. c. Full duplex Ethernet can provide higher throughput than can half duplex Ethernet of the same bandwidth. d. Full duplex Ethernet uses two wires to send and receive. Half duplex Ethernet uses one wire to send and receive.
188
Which statement is true about full duplex Ethernet in comparison to half duplex Ethernet?
a. Full duplex Ethernet consists of a shared cable segment. Half duplex Ethernet provides a point to point link. b. Full duplex Ethernet uses a loopback circuit to detect collisions. Half duplex Ethernet uses a jam signal. c. Full duplex Ethernet can provide higher throughput than can half duplex Ethernet of the same bandwidth. d. Full duplex Ethernet uses two wires to send and receive. Half duplex Ethernet uses one wire to send and receive.
189