Evaluation 3 Flashcards
______________ is the physical layer protocol that is most commonly used over the wide-area optical fiber links that make up the backbone of communications networks, including the telephone system.
SONET
Explain how a sliding window protocol works.
Sliding window protocols have a sender and a receiver. The sender maintains a set of sequence numbers for permitted frames to send within the sending window. While the receiver maintains a receiving window with permitted frames to accept. The sender and receiver windows’ do not need the same lower and upper limits, or the same size. Their sizes can be stagnant, or fluctuate over time when frames are sent and received.
When this protocol is used, a bad frame that is received is discarded, but any good frames received after it are accepted and buffered. When the sender times out, only the oldest unacknowledged frame is retransmitted. If that frame arrives correctly, the receiver can deliver to the network layer, in sequence, all the frames it has buffered. What is this protocol called?
Selective repeat
The data link layer uses the services of the physical layer to send and receive bits over communication channels. What is NOT a service on the data link layer?
A. Providing a well-defined service interface to the network layer.
B. Dealing with transmission errors.
C. Regulating the flow of data so that slow receivers are not swamped by fast senders.
D. Assigning an identifier for each frame.
Assigning an identifier for each frame
The data link layer takes the packets it gets from the network layer and encapsulates them into frames for transmission. Each frame contains three fields. What is NOT a field contained by each frame?
A. Preamble
B. Header
C. Payload
D. Trailer
Preamble
The sender’s data link layer inserts a special escape byte (ESC) just before each accidental flag byte in the data. A framing flag byte can be distinguished from one in the data by the absence or presence of an escape byte before it. The data link layer on the receiving end removes the escape bytes before giving the data to the network layer. What is this technique called?
A. byte padding
B. byte counting
C. byte stuffing
D. special byte
Byte stuffing
What is NOT an error-detecting code?
A. Parity
B. Checksums
C. Cyclic Redundancy Checks
D. Hamming codes
Hamming codes
What is NOT an error-correcting code?
A. Binary convolutional codes
B. Low-Density Parity Check codes
C. Reed-Solomon Codes
D. Checksums
Checksums
The physical layer process and some of the data link layer process run on dedicated hardware. What is this hardware called?
A. Physical Card
B. Network Driver
C. Network Interface Card
D. Network Acelerator
Network interface card
This strategy is for the receiver simply to discard all subsequent frames, sending no acknowledgements for the discarded frames. It corresponds to a receive window of size 1. In other words, the data link layer refuses to accept any frame except the next one it must give to the network layer. If the sender’s window fills up before the timer runs out, the pipeline will begin to empty. Eventually, the sender will time out and retransmit all unacknowledged frames in order, starting with the damaged or lost one. What is this strategy called?
A. pipelining
B. selective repeat
C. go-back-n
D. One-Bit Sliding Window
go-back-n