Chapter 05 Reading Organizer
Chapter 05 Reading Organizer
Reading Organizer
After completion of this chapter, you should be able to:
14. What are the minimum and the maximum frame sizes as defined by Ethernet II
and IEEE802.3?
Minimum: ___64 bytes_____
Maximum: ___1518 bytes___
15. Explain what a "collision fragment" or "runt frame" is and what happens to it on
the network.
Any frame less than 64 bytes in length is automatically discarded by
receiving stations.
16. What happens to frames that are larger than the maximum size?
It is discarded
17. Label the primary fields in an Ethernet frame.
7
Preamble
Start of
Frame
Delimiter
Destinati
on
MAC
Address
6
Source
MAC
Address
46 t0
1500
Length
802.2
Header
and Data
18. Write in the correct Ethernet frame field name with its description.
4
Frame
Check
Sequence
19. Convert the decimal number 15 to hexadecimal and show the two different
ways it can be correctly represented in text.
a. 0x0F
b. 0FH
20. On a Windows host, what command can be used to identify the MAC address
of an Ethernet adapter?
ipconfig /all
arp -a
32. List and explain two potential issues with ARP.
a. Overhead on the Media
As a broadcast frame, an ARP request is received and processed by every
device on the local network. If a large number of devices were to be powered
up and all start accessing network services at the same time, there could be
some reduction in performance for a short period of time
b. Security
ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject
the wrong MAC address association into a network by issuing fake ARP
requests. An attacker forges the MAC address of a device and then frames
can be sent to the wrong destination.
40. List and explain the two types of switch packet forwarding methods.
a. Store-and-forward switching
The switch receives the frame, it stores the data in buffers until the complete
frame has been received. During the storage process, the switch analyzes
the frame for information about its destination. In this process, the switch
also performs an error check using the Cyclic Redundancy Check (CRC)
trailer portion of the Ethernet frame.
b. Cut-through
A cut-through switch forwards the frame before it is entirely received. At a
minimum, the destination address of the frame must be read before the
frame can be forwarded.
41. List and explain the two variants of cut-through switching.
a. Fast-forward switching
Fast-forward switching offers the lowest level of latency. Fast-forward
switching immediately forwards a packet after reading the destination
address. Because fast-forward switching starts forwarding before the entire
packet has been received, there may be times when packets are relayed with
errors.
b. Fragment-free switching
In fragment-free switching, the switch stores the first 64 bytes of the frame
before forwarding. Fragment-free switching can be viewed as a compromise
between store-and-forward switching and fast-forward switching. The reason
fragment-free switching stores only the first 64 bytes of the frame is that
most network errors and collisions occur during the first 64 bytes.
42. Descriptions of switch frame forwarding methods are provided in the table.
Check in the Store-and-Forward or Cut-Through fields to match the methods to the
descriptions.
In port-based memory buffering, frames are stored in queues that are linked
to specific incoming and outgoing ports.
b. Shared Memory Buffering
Shared memory buffering deposits all frames into a common memory buffer
that all the ports on the switch share.
45.
46.
47.
10
48.
49. Explain the differences between fixed configuration switches and modular
switches.
a. Fixed configuration switches
Features and options are limited to those that originally come with the
switch.
b. Modular switches
The chassis accepts line cards that contain the ports.
50. Explain how a layer 2 switch operates.
A Layer 2 LAN switch performs switching and filtering based only on the OSI
data link layer (Layer 2) MAC address and depends upon routers to pass data
between independent IP subnetworks
51. Explain how a layer 3 switch differs from a layer 2 switch.
Instead of using only the Layer 2 MAC address information for forwarding
decisions, a Layer 3 switch can also use IP address information.
52. Cisco devices which support Layer 3 switching utilize what Cisco forwarding
method?
Cisco Express Forwarding (CEF).
53. What are the two main components of CEF operation?
a. Forwarding Information Base (FIB)
b. Adjacency tables
54. List and describe the major types of Layer 3 interfaces.
a. Switch Virtual Interface (SVI)
Logical interface on a switch associated with a virtual local area network
(VLAN).
b. Routed Port
Physical port on a Layer 3 switch configured to act as a router port.
c. Layer 3 EtherChannel
Logical interface on a Cisco device associated with a bundle of routed ports.
55. A switch port can be configured to be a Layer 3 routed port and behave like a
regular router interface. What is needed to accomplish this?
a. The no switchport command
b. Assign an IP address to the port
12