Chapter 4 Flashcards
What is the data link layer responsible for?
- moving a message from one computer or network device to the next computer or network device.
- controls the way messages are sent on the physical media
- determines who can transmit at what time, where a message begins and ends, and how a receiver reconizes and corrects a transmission error.
Describe the LLC layer
- data link layer’s connection to the network layer aboiv it.
- responsible for communicating with the network layer software and putting packet inside a frame
Desribe the MAC layer.
- controls the physical hardware.
- controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit.
What three functions does a data link protocol perform?
- controls when computers transmit(MAC)
- detects and corrects transmission errors(error control)
- identifies the start and end of a message by using a PDU(message delineation).
When is MAC unecessary?
-point-to-point, full-duplex connections.
Describe contention.
-computers wait until the circuit is free and then transmit whenever they have data to send.
Describe controlled access.
- most wireless LANs use this
- WAP controls the circuit and determines which clients can transmit at what time.
Describe the access request technique.
- client computers request to transmit to the device that is controlling the circuit.
- controlling device grants permission to only one device at a time.
Describe polling.
- send a signal to a client computer that gives it permission to transmit.
- client stores all messages that need to be transmitted.
Describe roll-call polling.
- controller works consecutively through a list of clients.
- can increase the priority of different clients.
Describe hub polling.
- aka token passing
- one device starts the poll and passes it to the next computer.
Which MAC method works best?
- contention: works better for small networks with low usage.
- controlled access: better for large networks with high usage.
What are the two types of network errors?
- corrupted data
- lost data.
What three things should networkds do in regards to errors.
-prevent, detect, and correct both corrupted and lost data.
What is a burst error?
-more than 1 data bit is changed by the error-causing condition.
Describe noise.
noise manifests itself as extra bits, missing bits, or bits that have been flipped.
Describe white/Gaussian noise.
- familiar background hiss or static on radios and telephones.
- caused by thermal agitation of electrons.
Describe impulse noise.
- primary source of errors in data communications.
- click or crackling noise.
- voltage changes in adjacent lines, lightning flashes, fluorescent lights.
Describe cross talk.
-one circuit picks up signals in another.
Describe echos.
-result of poor connections that cause the signal to reflect back to transmitting equipment.