Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
145 Cards in this Set
- Front
- Back
At the data link level Hosts and routers are ____ and networks in between them are _____ |
nodes, Links |
|
What are the two types links |
Point-to-point with dedicated medium broadcast link with a shared medium |
|
What does the data link layer do |
-Receives services from the physical layer -provides services to the network layer -Handles node-to-node communication across individual links |
|
Frames(or called data link packets)..... -The source node will ______ -The destination node will______ -All in-between nodes most _______ then ________ |
encapsulate decapsulate decapsulate re-encapsulate |
|
Framing |
The packaging of network datagrams into data link frames |
|
Flow Control |
At a minimum, dealing with the case of an incoming packet when receive buffer is full |
|
Error Control |
Detecting, discarding, and possibly requesting the re-transmission of corrupted frames |
|
Why link layer Addresses? ▪Recallthat the TCP/IP model of networking is a layered model ▪Fora network packet to reach its destination, it has to proceed through a numberof actual “hops” ▪Each hop by definition is a data link communication
|
▪Eachnode to have its own link layer address▪Linklayer addresses can also be called physicaladdresses,linkaddresses,orMACaddresses▪Thesource and destination link addresses change with each hop; the IP addressesnever do |
|
Unicast addresses |
Point to a single host |
|
Multicast addresses |
Point to multiple hosts
|
|
Broadcast Address |
Point to all hosts |
|
IPv4 Bits? Layer? function? |
-32-bit IP address -Network-Layer address -Used to get datagram to destination IP subnet |
|
IPv6 Bits? |
128 bit IP address |
|
Mac address Function? bits? Who allocates addresses? |
-Get frame from one interface to another physically-connected interface(same network) -48 bit address -IEEE |
|
Does each adapter have unique mac address |
Yes |
|
Hubs Layer? Bits coming in on link go out _____ other links at same time. Frame buffering? ____ detect collisions |
physical layer all yes host NICs |
|
Switch Layer? Are host aware of presence of switch? Do switches need to be configured |
-Link-layer device: Smarter than hubs, Take active roll -No, switch is transparent -No, switches are plug-and-play, self-learning |
|
Switch: allows multiple simultaneous transmissions Not question just info. |
▪hostshave dedicated, direct connection to switch ▪switchesbuffer packets ▪eachlink is its own collision domain ▪switching:A-to-A’ and B-to-B’ simultaneously, without collisions ▪notpossible with dumb hub |
|
▪howdoes switch know that A’ reachable via interface 4, B’ reachable via interface5? |
eachswitch has a switchtable, : eachentry is a tuple (MAC address of host, interface toreach host, time stamp) |
|
Where does switch record sender/location pair |
The switch table |
|
sending from A to F - how does S1 know to forward frame destinedto F via S4 and S2? |
self learning! (works exactly the same asin single-switch case!) |
|
Switch vs Router |
-Both store and forward devices -routers" network layer device -switchers are link layer device -routers maintain routing tables, implement routing algorithms -switches maintain switch tables, implement filtering, learning algorithms. |
|
hubs traffic isolation? plug and play? optimal routing? |
no yes no |
|
routers traffic isolation? plug and play? optimal routing? |
yes no yes |
|
switches traffic isolation? plug and play? optimal routing? |
yes yes no |
|
Arethe link layer addresses changed at each hop? |
yes |
|
Doeseach switch port have a unique MAC address? |
no |
|
Whydo routers need IP addresses? |
Routershave IP addresses because they sometimes need to send IP packets |
|
Address Resolution protocol's Job? |
-To take an IP address and turn it into a data link address -It does this by broadcasting a packet over the local network asking for the owner of the ip address to respond |
|
ARP packet identify: |
▪Thehardwaretype(i.e., which link layer protocol) ▪Theprotocoltype(i.e., which network protocol)▪Thesize of each address ▪Notethat each address is not necessarily 32 bits, or even a multiplethereof ▪Whetherthe packet is a request or a reply ▪Theaddresses involved |
|
single-bit error |
only one bit in the data unit was corrupted, or has changed |
|
burst error |
Any number of bits have changed |
|
What is more difficult correction or detection |
Correction |
|
What is central concept in both detecting and correcting errors |
Redundancy ▪Sendextra bits with the data ▪Usethe extra bits to detect and/or correct corruption |
|
Dataword |
smallest black of data in block coding |
|
Codeword |
encoded dataword
|
|
When we reveive and invalid codeword we ______ it |
discard |
|
Parity bit |
bit added to a string of binary code that indicates whether the number of 1-bits in the string is even or odd |
|
Hamming distance(x,y) |
-Number of difference in corresponding bits between same-sized word x and y -equal to the number of corrupted bits |
|
Minimum hamming distance |
smallest hamming between all valid codewords |
|
Frames can be ____ or ___ in size |
fixed variable |
|
Framing |
packages a single network level datagram into a set of one or more link level frames |
|
Frames |
discrete units of bits that are addressed from a sender to a destination |
|
Are large datagrams typically broken into many frames |
yes |
|
Character oriented framing |
-in this mode of framing, data are always in chunks of characters(or 8 bits) -flag is used to indicate where the frame begins and ends |
|
escape character |
indicates that next character is not a flog |
|
in a connectionless protocol, every frame is ______ |
independent ▪Thevast majority of LANs are like this |
|
in connection-oriented protocol, there is a _______ |
logical connection between two nodes ▪Thisincludes at the very least a connection state, and may even include packetordering▪Somenetworks that aren’t LANs use this |
|
What does point to point protocol(ppp) define or provide |
▪Theframe format ▪Link-establishmentnegotiation ▪Dataexchange ▪Authentication ▪Networkaddress configuration |
|
What does point to point protocol(ppp) not define or provide |
▪Flowcontrol ▪Sequencing ▪Errorcontrol beyond detect-and-discard |
|
PPP's frames are _____ oriented |
character |
|
Link control protocol |
Used to establish, maintain, configure and terminate links |
|
Communication at the data link layer is ___. |
node-to-node |
|
Communication at the network layer is _____. |
Host to Host |
|
T/F: Address Resolution Protocol's ARP job is to take a data link address and turn it into an IP address |
false |
|
T/F: We need to always keep the arp program running on a host or router |
true |
|
An ARP request is normally |
Broadcast |
|
An ARP reply is normally |
Unicast |
|
Packet at the data-link layer is normally called |
Frame |
|
Which error detection method uses one's complement arithmetic |
Checksum |
|
in cyclic redundancy checking what forms the check bits are |
the remainder |
|
at the CRC checker, _______ means that the data word is damaged. |
a nonzero remainder |
|
IN CRC, if the remainder is only three bits, the divisor should be _____ bits |
4 |
|
To detect five errors, the hamming distance between each pair of codewords should be at least ___ |
6 |
|
To correct five errors, the hammering distance between each pair of codewords should be at least_____ |
11 |
|
If 3 bits are used for the frame sequence number in Go-back-n ARQ, the size of the sender's window size can have the following value |
5 frames |
|
Consider a Stop-and-wait ARQ protocol that uses a time-out period of 18 ms (milliseconds). The round trip times between the sender and receiver is 10 ms. The transmission time of a frame is 2ms. The value of the utilization of this protocol in an error free channel is____ |
2/12 |
|
The timeout counter in the go-back-n ARQ protocol is used to ______ |
initiate frame retransmission |
|
In go-Back-n, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 6, the value of Sf is ____ |
6 |
|
T/F: ARQ protocols can be used only on the data link layer |
false |
|
In the 1-persistent approach of CSMA, When a station finds an idle line it ______. |
Sends immediately |
|
_______ is(are) a channelization protocal FDMA TDMA CDMA |
None |
|
_____ is a local address, Its jurisdiction is over a local network |
Link-layer address |
|
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______. |
The Destination IP address in the datagram header |
|
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______. |
the IP address of the router found in the routing table |
|
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______. |
The IP address of the router found in the routing table |
|
The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______. |
the destination IP address in the datagram header |
|
In a _______ link, the link is not shared between devies |
Point to point |
|
In a _____ link, the link is shared between many devices |
broadcast |
|
Data-link layer of broadcast link had _____ sublayers |
2 |
|
Data-link layer of point to point link had ______ sublayers |
1 |
|
Media access control can be present only in a _____ link |
multicast |
|
Which of the following best describes a single-bit error? A)A single bit is inverted B)A single bit per transmission is inverted C)A single bit per data unit is inverted D)All of the choices are correct |
A single bit per data unit is inverted |
|
Which error detection method uses one's complement arithmetic? |
Checksum |
|
Which error detection method consists of just one redundant bit per data unit? |
Simple parity check |
|
Which error detection method involves polynomials |
CRC |
|
If the ASCII character g is sent and the character d is received, what type of error is this |
burst error |
|
If the ascii character H is sent and the character and the character L is received, what type of error is this |
single bit |
|
In Cyclic redundancy checking, what forms the check bits? |
the remainder |
|
In CRC, if the dataword is 111111, the divisor 1010, and the remainder 110, what is the codeword at the receiver? |
dataword plus remainder = 111111110 |
|
At the CRC generator, _______ is (are) added to the dataword after the division process to create the codeword. |
the remainder |
|
The sum of the checksum and data at the receiver is _______ if no error is detected. |
-0 |
|
In CRC, the quotient at the sender _____ |
is discarded |
|
At the CRC checker, _____ means that the dataword is damaged |
a nonzero remainder |
|
A codeword of 10 bits has only four 0s, how many terms are in the polynomial representation of this code? |
6 |
|
In CRC, if the remainder is only three bits, the divisor should be __________ bits. |
4 |
|
A checksum can _________ errors. A)only detect B)only correct C)both detect and correct D)None of the choices are correct |
both detect and correct |
|
HDLC is an acronym for |
High Level Data Link Control |
|
The shortest frame in HDLC protocol is usually the _____ Frame |
supervisory |
|
The address field of the frame in HDLC protocol contains the address of the _____ station |
secondary |
|
The HDLC _____ field defines the beginning and end of a frame |
flag |
|
what is present in all HDLC control fields |
P/f bit |
|
According to the PPP transition-phase-diagram, options are negotiated in the _____ state |
establishing |
|
According to the PPP transition phase diagram, verification of user identification occurs in the _____ state |
authenticating |
|
In the PPP frame, the _____ field defines the contents of the data field |
protocol |
|
in the PPP frame, the ____ field is similar to that of the U-frame in HDLC |
control |
|
In the PPP frame, the ____ field has a vallue of 11111111 to indicate the broadcast address of HDLC |
address |
|
In PPP, what is the purpose of LCP packets A)Configuration B)Termination C)Option negotiation D)All of the choices are correct |
All of above |
|
In PPP frame, the ____ field is for error control |
FCS |
|
For CHAP authentication, the user takes the system’s _______ and its own _______ to create a result that is then sent to the system. |
challenge value; password |
|
In byte stuffing, we need sometimes to add a (an) _____ in the payload |
ESC byte |
|
In bit stuffing, we sometimes need to add an extra ___________ bit in the payload. |
0's |
|
HDLC is a _____ oriented protocol |
byte |
|
PPP is a ______ oriented protocol |
byte |
|
In PPP, the address field defines ____ of the packets. A)the sender B)the receiver C)either the sender or the receiver D)None of the choices are correct |
none are correct |
|
int PPP, the ______ field defines the type of payload encapsulated in the frame |
Protocol |
|
In PPP, the Chap protocol uses _____ steps to authenticate the parties in communication |
three |
|
In the _______ random-access method collision is avoided.
|
CSMA/CA |
|
In the 1-persistent approach, when a station finds an idle line, it _______. |
sends immediaately |
|
_______ requires one primary station and one or more secondary stations. |
Polling |
|
In the p-persistent approach, when a station finds an idle line, it _______. |
sends with probability p |
|
The 1-persistent approach can be considered a special case of the p-persistent approach with p equal to _______. |
1.0 |
|
In the reservation access method, if there are 10 stations on a network, then there are _______ reservation minislots in the reservation frame. |
10 |
|
_______ is a controlled-access protocol. |
Reservation |
|
_______ is (are) a channelization protocol. A)FDMA B)TDMA C)CDMA D)All the choices are correct |
All of the above |
|
In the _______ random-access method, stations do not sense the medium. |
ALOHA |
|
Which of the following is an example of a random-access protocol? A)Polling B)FDMA C)Token passing D)None of the choices are correct |
None |
|
Which of the following is an example of a controlled-access protocol? |
Token Passing |
|
The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA. |
greater than |
|
The vulnerable time for CSMA is ___________. |
2 x Tp |
|
We need RTS and CTS packets in ____________ protocol. |
CDMA/CA |
|
TIn FDMA, we use different ___________ to achieve channelization. |
frequency ranges |
|
In CDMA, we use different ___________ to achieve channelization. |
codes |
|
In TDMA, we use different ___________ to achieve channelization. |
time slots |
|
Walsh tables are used in _________________. |
TDMA |
|
A VLAN is a locol area network configured by _______ |
Software |
|
A Repeater is a connected device that operates in the ___ layer |
physical |
|
a link-layer switch is a connecting device that operates in the ______ layer |
physical and data-link |
|
a router is a connecting device that operates in the ___ layer |
physical, data-link, and network |
|
A _________ has no filtering capability. |
repeater |
|
A three-layer switch is a __________. |
router |
|
A router filters packets based on the __________ destination addresses. |
Network layer |
|
-A link-layer switch filters packets based on the __________ destination addresses. |
data-link |
|
Looping problems in a set of swtiches can be eliminated using ___________ algorithm. |
spanning-tree |
|
Membership in a VLAN can be based on ________. A)interface numbers B)MAC addresses C)IP addresses D)All of the choices are correct |
All of the above |