L4 The Data Link Layer Flashcards

1
Q

Describe the data link layer

A

The datalink layer presents the physical layer as a reliable transmission service to the network layer.

  • repackaging upper layer into smaller chunks.
  • reassembling physical layer data into meaningful datagrams.
  • performs error detection and correction.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two sublayers to the data link layer?

A

LLC (logical Link control)

MAC (media access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the MAC layer (Media Access Control)

A

Media Access Control (MAC) responsible controlling what and when the network device transmits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two approaches to media access control (MAC)?

A

Contention

Controlled access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Media Access Control (MAC) approach: Contention

A

Contention is when data is only transmitted when the medium is free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Media Access Control: What are collisions and How does contention deal with collisions?

A

A collision occurs when two devices transmit data at the same time. Contention aims to detect when a collision occurred. Solution: random back off by both parties and try again.
Large # users = serious network degradation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the Media Access Control (MAC) approach: controlled access

A

Central mechanism controls access to medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Media Access Control (MAC) Controlled access: Describe roll call polling

A

Access controller makes clients take turns in round robin fashion: A, B, C, D; Arbitrary order: A, B, A, C, A, D. (Hub polling involving tokens is dead)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some sources of error?

A
Line distortion
White noise
Impulse noise
Crosstalk
Echoes
Attenuation
Intermodulation noise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Error: line distortion

A

different frequency components of the signal travel at different speeds through the medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Error: White noise

A

caused by the natural vibrations of electrons in matter. Sets limits on receiver sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error: impulse noise

A

Primary source of errors in data communications. Caused by sudden, substantial change in electrical state of perfecting entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Error: crosstalk

A

Occurs in electric media when the current flowing in one cable induces a current in a cable that is close to it. Guardbands may be too narrow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Error: Echoes

A

Signal propagates from the transmitter to far end of medium and then reflects from the far end back to the transmitter. Can occur with loosely connected cable, improper termination of cables and ports, and mismatched impedance (electrical resistance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Error: Attenuation

A

Signal becomes weaker the further troubles from the transmitter. It may be absorbed by matter such as water. Can be reduced by repeaters or amplifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Error: intermodulation noise

A

Occurs when the signals from two transmitters combine to produce a third signal.

17
Q

How are errors detected? What are the three error detection techniques?

A

By sending additional bits along with the data. Some common techniques include:

  • parity checking
  • checksum
  • cyclic redundancy check
18
Q

Error detection: Describe and draw Parity checking.

A

Used with low-speed serial links.
Odd parity: # transmitted 1 bits odd
even parity: # transmitted 1 bits even
Only catches 50% of bit errors.