CISSP - Switching_Remote_Access_Ethernet_and_Token_Ring

  1. two technologies used for quick transmission of data across networks
    Circuit-switching and packet-switching
  2. ______ creates a physical circuit path between the sender and the
    receiver devices on a WAN.
    Circuit-switched networks
  3. connections for a single transmission, they provide uniform transmission with no loss or interference.
    circuit networks use exclusive connections for a single transmission
  4. _____ network fragments large messages, and encapsulates them into small packets having
    frame check sequence numbers
    A packet-switched network
  5. these network technologies do not establish a connection
    Packet-switched networks
  6. they make optimal utilization
    of network resources and transmit data packets using any available circuit path on the network
    Packet-switched networks
  7. there are five different technologies used by packet switched networks
    • • X.25
    • • LAPB
    • • Frame Relay
    • • SMDS
    • • ATM
  8. - is a high speed networking technology that is connectionoriented
    - uses a cell-switching method
    - transmits data in fixed sized cells of 53 bytes
    Asynchronous transfer mode (ATM)
  9. - was developed as an upgrade from X.25 and LAPB
    - functions at the physical and
    data link layers of the OSI model.
    - does not unpack frames at each node
    Frame Relay
  10. - was developed to be used with X.25
    - can retransmit, exchange, and acknowledge frames
    - ensures that the frames are correctly
    sequenced and error free
    Link access procedure balanced (LAPB)
  11. - uses carrier switches to enable computers on different public networks
    to communicate
    - defines communication between data terminal equipment (DTE) and the data
    circuit-terminating equipment (DCE) devices
    X.25
  12. - is a high speed, datagram-based WAN technology that is used for communication over public data networks
    - connectionless protocol
    Switched multimegabit data service (SMDS)
  13. Different remote access protocols are used to authenticate users and establish a reliable connection
    • • SLIP
    • • PPP
    • • CHAP
    • • PAP
    • • EAP
  14. - designed to work on serial ports and dial-up connections
    - encapsulates IP packets by appending special framing characters to them
    Serial Line Internet Protocol (SLIP)
  15. - designed as a successor of SLIP
    - enables systems to communicate through a serial link connection
    point-to-point protocol (PPP)
  16. - enables user authentication over PPP lines
    - process is referred to as a two way hand shake
    Password authentication protocol (PAP)
  17. - is a PPP authentication protocol that
    facilitates remote logon between a client and a server or between a web browser and a web server
    Challenge handshake authentication protocol (CHAP)
  18. - is not an authentication mechanism
    - supports multiple authentication techniques, such as Kerberos, one time passwords, token cards, public key authentication, biometrics, and smart cards
    Extensible Authentication Protocol (EAP)
  19. what do these have in common:
    • 10Base2
    • 10Base5
    • 10BaseT
    • Fast Ethernet
    • Gigabit Ethernet
    These are the common implementations of Ethernet
  20. - known as Thinnet
    - maximum cable length of 185 meters and provides transmission rates of 10 Mbps
    10Base2
  21. - is commonly implemented
    using a star topology,
    - operates at 10 Mbps speed, and
    - uses RJ-45 connectors to connect the
    cables to the computers
    10BaseT
  22. - called Thicknet
    - maximum cable length of 500 meters
    - data transmission speed of 10 Mbps
    10Base5
  23. - referred to as 100 Base-T
    - data transfer rates of 100 Mbps
    - follows the traditional CSMA/CD access method
    Fast Ethernet
  24. - supports data transfer rates of 1Gbps
    - primarily used as the backbone in
    large enterprise networks
    Gigabit Ethernet
  25. which layer of the OSI model does ethernet reside on?
    it resides on layer 2, the data access layer, which is divided into two sub-layers, the Media Access Control (MAC) layer and the MAC-client sublayer
Author
Toreuse
ID
108782
Card Set
CISSP - Switching_Remote_Access_Ethernet_and_Token_Ring
Description
Switching_Remote_Access_Ethernet_and_Token_Ring
Updated