Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
How does the data-link layer prepare packets for transmission?
|
It encapsulates with a header and a trailer to create a frame.
|
|
Describe four general data link layer media access methods
|
Controlled (like ring topology), or contention-based (compete for use). In point-to-point connections they can be half duplex (only one node can transmit at a time) or full duplex (can transmit and receive at same time)
|
|
Describe the features of a logical ring topology
|
Each node in a ring receives a frame, and it passes it along if it is not for that host. If there is no data being transmitted, a signal (known as a token) can be placed on the media. A node can place a frame on the media only when it has the token, this is a controlled media access control technique called token passing.
|
|
Name five layer two protocols
|
Ethernet, PPP, High-level data link control (HDLC), frame-relay, and ATM
|
|
List 5 header field types in data link frames
|
Start, Source-destination address, priority (QoS), Type, Logical connection control, physical link control, flow control, congestion control
|
|
If a node receives a frame and the calculated CRC does not match the CRC in the FCS, what action will the node take?
|
It will drop the frame
|
|
Which of the following protocols are typically used in WANs?
A) 802.11 B) Ethernet C) HDLC D) PPP |
HDLC and PPP. The others are LAN protocols.
|
|
What are the contents of the data field in a frame?
64 bytes, the network data layer PDU, the layer 2 source address, the data directly from the application that generated the data? |
The correct answer is network data layer PDU, which is encapsulated in the frame.
|
|
Which of the following is characteristic of contention-based MAC?
Used on non-shared media, nodes compete for use of the medium, leaves MAC to the upper layer, each node has a specific time to use the medium. |
Nodes compete for the medium
|
|
Which of the following are common data link sublayers used in LANs? (Choose two)
Protocol data unit, Logic Link Control, MAC, network interface card, carrier access multiaccess. |
Logic Link Control and MAC. LLC is the upper sublayer and MAC is the lower sublayer.
|
|
Which of the following describes a virtual circuit?
A) Is an error detection technique B) Provides an encapsulation technique C) Is used only with point-to-point topologies D) Establishes a logical connection between two network devices |
D. Virtual circuits establish a logical connection between two devices to provide a logical point-to-point topology. Virtual circuits can be used over multiple types of physical topologies.
|
|
Three basic parts that are common to all data link layer frames?
|
Header, data and trailer
|
|
Which of the following functions does the data link layer perform?
Provides user interfaces, ensures end-to-end delivery of data between hosts, connects the network software to the network hardware, establishes and maintains sessions between applications |
Provides the connection between hardware and software. User interfaces is the role of the application layer, and end-to-end delivery is the role of the network layer.
|
|
Which of the following is true about the logical topology of a network?
Is always multiaccess, provides the physical addressing, is determined by how the nodes in the network are connected, influences the type of MAC used in the network |
The logical topology influences MAC
|
|
Wireless uses what to avoid collisions?
|
CSMA/CA
|
|
Token-ring is deterministic or nondeterministic?
|
Deterministic
|
|
Contention-based access is deterministic or nondeterministic?
|
Nondeterministic
|
|
What does MAC provide to the data link layer?
|
Provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use
|
|
Ethernet uses what to avoid collisions?
|
CSMA/CD
|
|
LLC stand for what and does what?
|
Logical Link Control - places information in the frame that identifies which network layer protocol is being used for the frame
|
|
What are the two sublayers of the data link layer?
|
The upper sublayer defines the software processes that provide services to the network layer protocols, and the lower sublayer defines the media access processes performed by the hardware
|
|
A backoff procedure is for what purpose?
|
To avoid wireless collisions
|
|
The frame begins with a _________________ and Start of Frame (SOF) indicator and ends with a ____________________ .
|
Preamble and a cyclic redundancy check (CRC)
|