Mod 6 - Data Link Layer Flashcards

1
Q

What is the purpose of the Datalink layer?

A

The Datalink layer is responsible for communication between end-point NICs. It allows upper layers to access physical layer media and encapsulates Layer 3 packets into Layer 2 Frames. It also performs error detection and rejects corrupt frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two sublayers does the Data link layer consists of?

A

Logical Link Control and Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the LLC (logical link control) sublayer?

A

The LLC sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the MAC (media access control) sublayer?

A

The MAC sublayer is responsible for data encapsulation and media access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 4 basic Layer 2 functions does a router perform when packets are exchanged between nodes?

A
  1. Accepts a frame from the network medium.
  2. De-encapsulates the frame to expose the encapsulated packet.
  3. Re-encapsulates the packet into a new frame.
  4. Forwards the new frame on the medium of the next network segment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are four engineering org. that have defined protocols?

A
  • IEEE
  • ITU
  • ISO
  • ANSI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does topology mean?

A

Topology is the arrangement and relationship of the network devices and the interconnections between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does physical topology show?

A

Physical topology shows the physical connections and how devices are interconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does logical topology show?

A

Logical topology shows the virtual connections between devices using device interfaces and IP addressing schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three common WAN topologies?

A
  1. Point-to-point: the simplest and most common WAN topology. Consists of a permanent link between two endpoints.
  2. Hub and spoke: similar to a star topology where a central site interconnects sites though point-to-point links.
  3. Mesh: provides high availability but requires every end system to be connected to every other end system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the common LAN topologies?

A

Usually through star or extended star topology, but early ethernet and legacy token ring used bus or ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does half-duplex mean?

A

Half-duplex communication only allows one device to send or receive at a time on a shared medium. Used on WLANs and legacy bus topologies with Ethernet hubs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does full-duplex mean?

A

Full-duplex communication allows both devices to simultaneously transmit and receive on a shared medium. Ethernet switches operate in full-duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two access control methods?

A

Contention-based access and controlled access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is contention-based access?

A

All nodes are operating in half-duplex, and are competing for use of the medium. Ex.: Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-topology ethernet, and carrier sense multiple access with collision avoidance (CSMA/CS) as used on WLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is controlled access?

A

Controlled access is deterministic access where each node has its own time on the medium. It is used on legacy network such as token ring and ARCNET.

17
Q

How does the collision detection process work in CSMA/CD?

A

When devices transmits simultaneously it can result in a signal collision on the shared media. The devices detect the collision, and then wait a random period of time and retransmit data.

18
Q

How does the collision avoidance process work in CSMA/CA?

A

When transmitting, devices also include the time duration needed for the transmission. Other devices on the shared medium receive the time duration information and know how long the medium will be unavailable. Inserts back-off slots to avoid collision.

19
Q

How is data encapsulated in the DLL?

A

Data is encapsulated by DLL with a header and trailer to form a frame. The fields of the header and trailer vary according to the DLL protocol, but here is a overview:
- Frame start and stop: identifies beginning and end of frame
- Addressing: Indicates source and destination nodes
- Type: Identifies encapsulated Layer 3 protocol
- Control: Identifies flow control services
- Data: Contains the frame payload
- Error detection: used to determine transmission errors.