DATA LINK LAYER Flashcards

1
Q

What role does the data link layer (Layer 2) play in the OSI model, and what are its main responsibilities?

A

The data link layer prepares network data for the physical network and is responsible for NIC to NIC communications. Its main responsibilities include enabling upper layers to access the media, encapsulating data into Layer 2 frames, controlling data placement and reception on the media, exchanging frames between endpoints, directing encapsulated data to the proper upper-layer protocol, and performing error detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define what a node is in the context of computer networks, and provide examples of both end devices and intermediary devices.

A

In computer networks, a node is a device that can receive, create, store, or forward data along a communications path. Examples of nodes include end devices like laptops and mobile phones, as well as intermediary devices like Ethernet switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is the data link layer essential in computer networks, particularly for network layer protocols like IP?

A

Without the data link layer, network layer protocols such as IP would need to account for connecting to every type of media along a delivery path. The data link layer abstracts these details and provides a consistent interface for upper-layer protocols to access the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is two sublayers?

A

The IEEE 802 LAN/MAN data link layer consists of the following two sublayers:
* Logical Link Control (LLC) - This IEEE 802.2 sublayer communicates between the
networking software at the upper layers and the device hardware at the lower layers. It
places information in the frame that identifies which network layer protocol is being used
for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6,
to use the same network interface and media.
* Media Access Control (MAC) – Implements this sublayer (IEEE 802.3, 802.11, or
802.15) in hardware. It is responsible for data encapsulation and media access control. It
provides data link layer addressing and it is integrated with various physical layer
technologies.
The LLC sublayer takes the network protocol data, which is typically an IPv4 or IPv6 packet, and
adds Layer 2 control information to help deliver the packet to the destination node.
The MAC sublayer controls the NIC and other hardware that is responsible for sending and
receiving data on the wired or wireless LAN/MAN medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main functions provided by the MAC sublayer in data encapsulation?

A

The MAC sublayer provides frame delimiting to identify fields within a frame, addressing for source and destination, and error detection using a trailer to detect transmission errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the MAC sublayer manage media access control in network environments?

A

he MAC sublayer allows multiple devices to communicate over a shared (half-duplex) medium by controlling access. Full-duplex communications, however, do not require access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the MAC sublayer handle packet transmissions in different network environments, such as Ethernet LANs and serial links?

A

In Ethernet LANs with many hosts contending for access, the MAC sublayer resolves access. In serial links with only two devices, like routers, direct connection occurs, bypassing IEEE 802 MAC sublayer techniques. Routers encapsulate packets into appropriate frames and use suitable media access control methods for each link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What functions does a router perform at the data link layer during packet exchange along a network path?

A

At each hop along the path, a router accepts a frame from a medium, de-encapsulates the frame, re-encapsulates the packet into a new frame, and forwards the new frame appropriate to the medium of that segment of the physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are data link layer protocols typically handled in comparison to protocols of upper layers in the TCP/IP suite?

A

Unlike upper layer protocols defined by RFCs, data link layer protocols are generally not defined by RFCs. The IETF maintains functional protocols and services for the TCP/IP protocol suite in the upper layers but does not define the functions and operation of the TCP/IP network access layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the data link layer do in relation to network data and physical networks?

A

The data link layer prepares network data for physical networks by understanding the logical topology of a network, determining what is necessary to transfer frames between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of topologies used to describe LAN and WAN networks?

A

The two types of topologies are physical topology and logical topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is physical topology defined?

A

Physical topology identifies the physical connections between network devices, including intermediary devices like routers, switches, and access points. It may also include specific device locations such as room numbers and positions on equipment racks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is logical topology?

A

Logical topology refers to how a network transfers frames between nodes, identifying virtual connections using device interfaces and Layer 3 IP addressing schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the data link layer interact with the logical topology of a network?

A

The data link layer governs data access to the media based on the logical topology, influencing the type of network framing and media access control used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the point-to-point topology commonly found in WANs.

A

It consists of a permanent link between two endpoints, offering a direct connection between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the WAN version of the star topology?

A

The WAN version of the star topology involves a central site connecting branch sites through point-to-point links, with branch sites unable to exchange data directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain the physical requirements and characteristics of a full mesh topology.

A

A full mesh topology requires every end system to be interconnected to every other system, offering high availability but incurring significant administrative and physical costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the features of a physical point-to-point topology?

A

Physical point-to-point topologies directly connect two nodes without sharing media with other hosts, often using protocols like Point-to-Point Protocol (PPP) for simplicity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the logical data link protocol work in a point-to-point topology?

A

In a point-to-point topology, logical data link protocols are simple as all frames on the media can only travel to or from the two connected nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do intermediary devices affect the logical topology of a network?

A

Intermediary physical connections may not change the logical topology, as the logical point-to-point connection remains the same regardless of physical devices added to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the characteristics of multiaccess LAN topologies?

A

Multiaccess LANs typically employ star or extended star topologies, with end devices interconnected using central intermediary devices such as Ethernet switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What advantages do star and extended star topologies offer?

A

They are easy to install, highly scalable, and facilitate troubleshooting due to their structured nature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give an example of Ethernet used in a point-to-point topology.

A

Two interconnected routers on an Ethernet LAN represent an example of Ethernet used in a point-to-point topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the role of the data link layer in network communication?

A

The data link layer prepares network data for the physical network, ensuring efficient transfer of frames between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does the data link layer interact with different logical network topologies?

A

The data link layer works with logical network topologies to control data access to the media, influencing network framing and media access control methods.

26
Q

What are the two types of topologies commonly used in LAN and WAN networks?

A

The two types of topologies are physical topology and logical topology.

27
Q

Describe the characteristics of a point-to-point topology in WAN networks.

A

Point-to-point topology involves a permanent link between two endpoints, providing a direct connection.

28
Q

What is the significance of physical point-to-point topologies?

A

Physical point-to-point topologies directly connect two nodes without sharing media with other hosts, simplifying data transfer.

29
Q

How do intermediary devices affect the logical topology of a network?

A

Intermediary physical connections do not alter the logical topology, maintaining the same logical point-to-point connections.

30
Q

What are the characteristics of multiaccess LAN topologies?

A

Multiaccess LANs use star or extended star topologies, connecting end devices to a central intermediary device like an Ethernet switch.

31
Q

What are the different modes of duplex communication?

A

The modes are half-duplex and full-duplex communication.

32
Q

How do Ethernet switches operate in terms of duplex communication?

A

Ethernet switches typically operate in full-duplex mode by default, allowing simultaneous transmission and reception.

33
Q

What are the access control methods for shared media in multiaccess networks?

A

The two basic access control methods are contention-based access and controlled access.

34
Q

Can you provide examples of contention-based access networks?

A

Examples include legacy bus-topology Ethernet LANs using CSMA/CD and Wireless LANs using CSMA/CA.

35
Q

What happens if two devices transmit simultaneously in a contention-based network?

A

A collision occurs, and both devices will detect the collision, leading to data corruption and the need for retransmission.

36
Q

What is the purpose of carrier sense multiple access/collision avoidance (CSMA/CA) in wireless environments?

A

CSMA/CA is used to avoid collisions by having devices wait before transmitting, and each device includes the time duration needed for its transmission, allowing other devices to know when the medium will be unavailable.

37
Q

How does the data link layer handle error detection in frames?

A

The data link layer adds error detection by including a logical or mathematical summary of the bits in the frame, typically in the form of a cyclic redundancy check (CRC) value placed in the frame check sequence (FCS) field.

38
Q

What is the purpose of Layer 2 addressing in the data link layer?

A

Layer 2 addressing, also known as physical addressing, specifies the frame’s destination node on the local network, facilitating local delivery of frames.

39
Q

How do Layer 2 addresses differ from Layer 3 addresses?

A

Layer 2 addresses are unique to individual devices within the same local network, while Layer 3 addresses indicate the network location of devices and are used for communication across different networks.

40
Q

Why are Ethernet protocols commonly used in wired LANs?

A

Ethernet protocols are preferred for wired LANs due to their high bandwidth capacity, cost-effectiveness, and suitability for high-density user environments.

41
Q

How are Layer 2 protocols selected for a network topology?

A

The choice of Layer 2 protocol depends on factors such as the size and geographic scope of the network, as well as the services required, with different technologies used for LANs and WANs.

42
Q

What are some examples of Layer 2 protocols used in networking?

A

Examples include Ethernet, 802.11 Wireless, Point-to-Point Protocol (PPP), and High-Level Data Link Control (HDLC).

43
Q

What are the main responsibilities of the data link layer in the OSI model?

A

The data link layer (Layer 2) prepares network data for the physical network, handling NIC-to-NIC communications and providing data encapsulation, addressing, and error detection.

44
Q

Name three common types of physical WAN topologies.

A

Point-to-point, hub and spoke, and mesh.

45
Q

What happens when more than one device transmits at the same time in contention-based multi-access networks?

A

There is a process to resolve collisions.

46
Q

What is the function of the data link layer in preparing encapsulated data for transport across the local media?

A

Encapsulating it with a header and a trailer to create a frame.

47
Q

What are the two basic services provided by the data link layer?

A

Accepting Layer 3 packets and encapsulating them into frames, and providing media access control and error detection.

48
Q

What is the function of the Media Access Control (MAC) sublayer within the data link layer?

A

Data encapsulation and accessing the media.

49
Q

What does the MAC sublayer do when a frame enters a switch?

A

It examines the source MAC address of the frame and the port number where the frame entered the switch.

50
Q

What are the two frame forwarding methods used by switches to switch data between network ports?

A

Store-and-forward switching and cut-through switching.

51
Q

What is a significant advantage of store-and-forward switching?

A

A significant advantage of store-and-forward switching is that it determines if a frame has errors before propagating the frame.

52
Q

How does store-and-forward switching handle frames with errors?

A

When an error is detected in a frame, the switch discards the frame.

53
Q

How does store-and-forward switching contribute to bandwidth conservation?

A

Discarding frames with errors reduces the amount of bandwidth consumed by corrupt data.

54
Q

In what scenarios is store-and-forward switching necessary?

A

Store-and-forward switching is required for quality of service (QoS) analysis on converged networks where frame classification for traffic prioritization is necessary.

55
Q

What is cut-through switching and how does it differ from store-and-forward switching?

A

Cut-through switching acts upon the data as soon as it is received, unlike store-and-forward switching, which waits for the complete frame.

56
Q

What are the two variants of cut-through switching and how do they differ?

A

The two variants are fast-forward switching, which forwards packets immediately after reading the destination address, and fragment-free switching, which stores the first 64 bytes of the frame before forwarding.

57
Q

How does fast-forward switching impact latency?

A

Fast-forward switching offers the lowest level of latency, measured from the first bit received to the first bit transmitted.

58
Q

Why does fragment-free switching store only the first 64 bytes of the frame?

A

Fragment-free switching stores only the first 64 bytes because most network errors and collisions occur during this portion of the frame.

59
Q

What is the purpose of autonegotiation in Ethernet switches?

A

Autonegotiation enables devices to automatically negotiate the best speed and duplex capabilities for communication.

60
Q

What is the significance of the auto-MDIX feature in modern switch devices?

A

The auto-MDIX feature allows switches to automatically detect and configure the interfaces based on the type of cable attached, eliminating the need for crossover or straight-through cables.