• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/145

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

145 Cards in this Set

  • Front
  • Back

At the data link level Hosts and routers are ____ and networks in between them are _____

nodes, Links

What are the two types links

Point-to-point with dedicated medium




broadcast link with a shared medium

What does the data link layer do

-Receives services from the physical layer




-provides services to the network layer




-Handles node-to-node communication across individual links

Frames(or called data link packets).....




-The source node will ______


-The destination node will______


-All in-between nodes most _______ then ________

encapsulate


decapsulate


decapsulate


re-encapsulate

Framing

The packaging of network datagrams into data link frames

Flow Control

At a minimum, dealing with the case of an incoming packet when receive buffer is full

Error Control

Detecting, discarding, and possibly requesting the re-transmission of corrupted frames

Why link layer Addresses?


▪Recallthat the TCP/IP model of networking is a layered model


▪Fora network packet to reach its destination, it has to proceed through a numberof actual “hops”


▪Each hop by definition is a data link communication


▪Eachnode to have its own link layer address▪Linklayer addresses can also be called physicaladdresses,linkaddresses,orMACaddresses▪Thesource and destination link addresses change with each hop; the IP addressesnever do

Unicast addresses

Point to a single host

Multicast addresses

Point to multiple hosts

Broadcast Address

Point to all hosts

IPv4


Bits?


Layer?


function?

-32-bit IP address


-Network-Layer address


-Used to get datagram to destination IP subnet

IPv6


Bits?

128 bit IP address

Mac address


Function?


bits?


Who allocates addresses?

-Get frame from one interface to another physically-connected interface(same network)


-48 bit address


-IEEE

Does each adapter have unique mac address

Yes

Hubs


Layer?


Bits coming in on link go out _____ other links at same time.


Frame buffering?


____ detect collisions

physical layer


all


yes


host NICs

Switch


Layer?


Are host aware of presence of switch?


Do switches need to be configured

-Link-layer device: Smarter than hubs, Take active roll


-No, switch is transparent


-No, switches are plug-and-play, self-learning

Switch: allows multiple simultaneous transmissions


Not question just info.

▪hostshave dedicated, direct connection to switch


▪switchesbuffer packets


▪eachlink is its own collision domain


▪switching:A-to-A’ and B-to-B’ simultaneously, without collisions


▪notpossible with dumb hub

▪howdoes switch know that A’ reachable via interface 4, B’ reachable via interface5?

eachswitch has a switchtable, :


eachentry is a tuple (MAC address of host, interface toreach host, time stamp)

Where does switch record sender/location pair

The switch table

 sending from A to F - how does S1 know to forward frame destined
to F via S4 and S2?

sending from A to F - how does S1 know to forward frame destinedto F via S4 and S2?

self learning! (works exactly the same asin single-switch case!)

Switch vs Router

-Both store and forward devices


-routers" network layer device


-switchers are link layer device


-routers maintain routing tables, implement routing algorithms


-switches maintain switch tables, implement filtering, learning algorithms.



hubs


traffic isolation?


plug and play?


optimal routing?

no


yes


no

routers


traffic isolation?


plug and play?


optimal routing?

yes


no


yes

switches


traffic isolation?


plug and play?


optimal routing?

yes


yes


no

Arethe link layer addresses changed at each hop?

yes

Doeseach switch port have a unique MAC address?

no

Whydo routers need IP addresses?

Routershave IP addresses because they sometimes need to send IP packets

Address Resolution protocol's Job?

-To take an IP address and turn it into a data link address




-It does this by broadcasting a packet over the local network asking for the owner of the ip address to respond

ARP packet identify:

▪Thehardwaretype(i.e., which link layer protocol)


▪Theprotocoltype(i.e., which network protocol)▪Thesize of each address


▪Notethat each address is not necessarily 32 bits, or even a multiplethereof


▪Whetherthe packet is a request or a reply


▪Theaddresses involved

single-bit error

only one bit in the data unit was corrupted, or has changed

burst error

Any number of bits have changed

What is more difficult correction or detection

Correction

What is central concept in both detecting and correcting errors

Redundancy


▪Sendextra bits with the data


▪Usethe extra bits to detect and/or correct corruption

Dataword

smallest black of data in block coding

Codeword

encoded dataword

When we reveive and invalid codeword we ______ it

discard

Parity bit

bit added to a string of binary code that indicates whether the number of 1-bits in the string is even or odd

Hamming distance(x,y)

-Number of difference in corresponding bits between same-sized word x and y


-equal to the number of corrupted bits

Minimum hamming distance

smallest hamming between all valid codewords

Frames can be ____ or ___ in size

fixed


variable

Framing

packages a single network level datagram into a set of one or more link level frames

Frames

discrete units of bits that are addressed from a sender to a destination

Are large datagrams typically broken into many frames

yes

Character oriented framing

-in this mode of framing, data are always in chunks of characters(or 8 bits)


-flag is used to indicate where the frame begins and ends

escape character

indicates that next character is not a flog

in a connectionless protocol, every frame is ______

independent




▪Thevast majority of LANs are like this

in connection-oriented protocol, there is a _______

logical connection between two nodes




▪Thisincludes at the very least a connection state, and may even include packetordering▪Somenetworks that aren’t LANs use this

What does point to point protocol(ppp) define or provide

▪Theframe format


▪Link-establishmentnegotiation


▪Dataexchange


▪Authentication


▪Networkaddress configuration

What does point to point protocol(ppp) not define or provide

▪Flowcontrol


▪Sequencing


▪Errorcontrol beyond detect-and-discard

PPP's frames are _____ oriented

character

Link control protocol

Used to establish, maintain, configure and terminate links

Communication at the data link layer is ___.

node-to-node

Communication at the network layer is _____.

Host to Host

T/F: Address Resolution Protocol's ARP job is to take a data link address and turn it into an IP address

false

T/F: We need to always keep the arp program running on a host or router

true

An ARP request is normally

Broadcast

An ARP reply is normally

Unicast

Packet at the data-link layer is normally called

Frame

Which error detection method uses one's complement arithmetic

Checksum

in cyclic redundancy checking what forms the check bits are

the remainder

at the CRC checker, _______ means that the data word is damaged.

a nonzero remainder

IN CRC, if the remainder is only three bits, the divisor should be _____ bits

4

To detect five errors, the hamming distance between each pair of codewords should be at least ___

6

To correct five errors, the hammering distance between each pair of codewords should be at least_____

11

If 3 bits are used for the frame sequence number in Go-back-n ARQ, the size of the sender's window size can have the following value

5 frames

Consider a Stop-and-wait ARQ protocol that uses a time-out period of 18 ms (milliseconds). The round trip times between the sender and receiver is 10 ms. The transmission time of a frame is 2ms. The value of the utilization of this protocol in an error free channel is____

2/12

The timeout counter in the go-back-n ARQ protocol is used to ______

initiate frame retransmission

In go-Back-n, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 6, the value of Sf is ____

6

T/F: ARQ protocols can be used only on the data link layer

false

In the 1-persistent approach of CSMA, When a station finds an idle line it ______.

Sends immediately

_______ is(are) a channelization protocal




FDMA


TDMA


CDMA

None

_____ is a local address, Its jurisdiction is over a local network

Link-layer address

If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

The Destination IP address in the datagram header

If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.

the IP address of the router found in the routing table

The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.

The IP address of the router found in the routing table

The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.

the destination IP address in the datagram header

In a _______ link, the link is not shared between devies

Point to point

In a _____ link, the link is shared between many devices

broadcast

Data-link layer of broadcast link had _____ sublayers

2

Data-link layer of point to point link had ______ sublayers

1

Media access control can be present only in a _____ link

multicast

Which of the following best describes a single-bit error?




A)A single bit is inverted


B)A single bit per transmission is inverted


C)A single bit per data unit is inverted


D)All of the choices are correct

A single bit per data unit is inverted

Which error detection method uses one's complement arithmetic?

Checksum

Which error detection method consists of just one redundant bit per data unit?

Simple parity check

Which error detection method involves polynomials

CRC

If the ASCII character g is sent and the character d is received, what type of error is this

burst error

If the ascii character H is sent and the character and the character L is received, what type of error is this

single bit

In Cyclic redundancy checking, what forms the check bits?

the remainder

In CRC, if the dataword is 111111, the divisor 1010, and the remainder 110, what is the codeword at the receiver?

dataword plus remainder = 111111110

At the CRC generator, _______ is (are) added to the dataword after the division process to create the codeword.

the remainder

The sum of the checksum and data at the receiver is _______ if no error is detected.

-0

In CRC, the quotient at the sender _____

is discarded

At the CRC checker, _____ means that the dataword is damaged

a nonzero remainder

A codeword of 10 bits has only four 0s, how many terms are in the polynomial representation of this code?

6

In CRC, if the remainder is only three bits, the divisor should be __________ bits.

4

A checksum can _________ errors.


A)only detect


B)only correct


C)both detect and correct


D)None of the choices are correct

both detect and correct

HDLC is an acronym for

High Level Data Link Control

The shortest frame in HDLC protocol is usually the _____ Frame

supervisory

The address field of the frame in HDLC protocol contains the address of the _____ station

secondary

The HDLC _____ field defines the beginning and end of a frame

flag

what is present in all HDLC control fields

P/f bit

According to the PPP transition-phase-diagram, options are negotiated in the _____ state

establishing

According to the PPP transition phase diagram, verification of user identification occurs in the _____ state

authenticating

In the PPP frame, the _____ field defines the contents of the data field

protocol

in the PPP frame, the ____ field is similar to that of the U-frame in HDLC

control

In the PPP frame, the ____ field has a vallue of 11111111 to indicate the broadcast address of HDLC

address

In PPP, what is the purpose of LCP packets


A)Configuration


B)Termination


C)Option negotiation


D)All of the choices are correct

All of above

In PPP frame, the ____ field is for error control

FCS

For CHAP authentication, the user takes the system’s _______ and its own _______ to create a result that is then sent to the system.

challenge value; password

In byte stuffing, we need sometimes to add a (an) _____ in the payload

ESC byte

In bit stuffing, we sometimes need to add an extra ___________ bit in the payload.

0's

HDLC is a _____ oriented protocol

byte

PPP is a ______ oriented protocol

byte

In PPP, the address field defines ____ of the packets.


A)the sender


B)the receiver


C)either the sender or the receiver


D)None of the choices are correct

none are correct

int PPP, the ______ field defines the type of payload encapsulated in the frame

Protocol

In PPP, the Chap protocol uses _____ steps to authenticate the parties in communication

three

In the _______ random-access method collision is avoided.

CSMA/CA

In the 1-persistent approach, when a station finds an idle line, it _______.

sends immediaately

_______ requires one primary station and one or more secondary stations.

Polling

In the p-persistent approach, when a station finds an idle line, it _______.

sends with probability p

The 1-persistent approach can be considered a special case of the p-persistent approach with p equal to _______.

1.0

In the reservation access method, if there are 10 stations on a network, then there are _______ reservation minislots in the reservation frame.

10

_______ is a controlled-access protocol.

Reservation

_______ is (are) a channelization protocol.


A)FDMA


B)TDMA


C)CDMA


D)All the choices are correct

All of the above

In the _______ random-access method, stations do not sense the medium.

ALOHA

Which of the following is an example of a random-access protocol?


A)Polling


B)FDMA


C)Token passing


D)None of the choices are correct

None

Which of the following is an example of a controlled-access protocol?

Token Passing

The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.

greater than

The vulnerable time for CSMA is ___________.

2 x Tp

We need RTS and CTS packets in ____________ protocol.

CDMA/CA

TIn FDMA, we use different ___________ to achieve channelization.

frequency ranges

In CDMA, we use different ___________ to achieve channelization.

codes

In TDMA, we use different ___________ to achieve channelization.

time slots

Walsh tables are used in _________________.

TDMA

A VLAN is a locol area network configured by _______

Software

A Repeater is a connected device that operates in the ___ layer

physical

a link-layer switch is a connecting device that operates in the ______ layer

physical and data-link

a router is a connecting device that operates in the ___ layer

physical, data-link, and network

A _________ has no filtering capability.

repeater

A three-layer switch is a __________.

router

A router filters packets based on the __________ destination addresses.

Network layer

-A link-layer switch filters packets based on the __________ destination addresses.

data-link

Looping problems in a set of swtiches can be eliminated using ___________ algorithm.

spanning-tree

Membership in a VLAN can be based on ________.


A)interface numbers


B)MAC addresses


C)IP addresses


D)All of the choices are correct

All of the above