Annex C11 OSI Data Link Layer Flashcards

0
Q

Examples of valid Media Access Control Addresses

A

The two layer addressing uses local addresses called the MAC address. A MAC address is a 48 bit hexadecimal address that is imprinted on every network interface card.

Commonly shown as 6 groups of 2 hex digits divided by colons.

00:05:9A:3C:78:00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Intermediary Devices used in the datalink layer

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyclic Redundancy Check (CRC)

A

The receiving station will compare the value in the FCS field to the bits that it received from the frame. This check is called a Cyclic Redundancy Check (CRC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logical Link Control (LLC)

A

Software process that provides support and services to the network layer protocols. LLC uses the datalink layer protocol to frame the PDU from the network layer and identify the network layer protocol contained within the frame. This allows multiple layer 3 protocols can use the same network interface card and media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purpose of the Media Access Control sub layer of the Data Link Layer of the OSI Model

A

A hardware process used to address the frame PDU utilizing hardware MAC addresses. It also controls the start and ending of each frame, and determines how the data gains access to the physical media as it is sent out on the physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of the broadcast Media Access (MAC)

A

Broadcast layer 2 address is all Fs, or FF:FF:FF:FF:FF:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

Carrier Sense: Each node monitors the media for the presence of a data signal. If data signals are absent, indicating taht the media is free, the device transmits the data

Collision Detection: While nodes are listening, if they detect that another device was transmitting at the same time, or that two devices were transmitted at the same time, all devices stop sending and wait and randomized amount (backoff time) of time before attempting to resend their data or to transmit for the first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

Carrier Sense: Each node monitors the media for the presence of a data signal. If data signals are absent, indicating taht the media is free, the device transmits the data

Collision Avoidance: Each node sends out a warning before transmitting IOT attempt to prevent collisions before they send actual data traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Topology and types

A

Bus Topology: 1 media or cable connects all of the hosts and share 1 collision domain

Ring Topology: Each computer is connected to another computer via cable and shares 1 collision domain

Star Topology: Every device in the network is connected to a central device like a switch or a hub, either multiple collision domains or a sing collision domain

P2P Topology: Two nodes are directly connected. Collision domain is the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frame

A

Independent of the media on which the data will follow, when the network layer packet is encapsulated in its layer two protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Topology

A

Focuses not on how the devices are physically connected, but on data actually moves between nodes

Bus: 1 collision domain among devices on the network

Ring: Only topology that follows the physical topology

P2P: for a computer to talk across the switch to a server, it will act like a p2p connection and allow unimpeded full duplex comm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly