06 Datalink Layer-QA Flashcards

1
Q

What is the purpose of the datalink layer?

A

Purpose is to prepare network data for the physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the datalink layer ultimately responsible for?

A

NIC-to-NIC communications within the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the datalink layer do (6 things)?

A
  1. Enables upper layers to access the media
  2. Accepts data and encapsulates it into L2 frames
  3. Controls how data is placed/received on the media
  4. Exchanges frames between endpoints on the network media
  5. Receives encapsulated data, directing it to upper-layer protocol
  6. Performs error detection, rejection of bad frames
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How would not having the datalink layer impact network communications?

A

Network layer protocols would have to make provisions for every type of media that could exist along the path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two major functions of the LLC?

A
  1. Communicates between network software at upper layers and device hardware at lower layers
  2. Places information in the frame identifying the L3 protocol used within the frame; adds L2 control information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the major functions of the MAC sublayer?

A
  1. controls the NIC hardware
  2. provides encapsulation. incl. delimiting, addressing, error detection
  3. provides media access control (required for half-duplex)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What access control methods are available for shared media?

A
  1. contention-based access
  2. controlled access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main flaw with contention-based access control methods?

A

all devices operate in half-duplex—only one device can transmit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controlled-access networks can also be described as …

A

deterministic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do controlled-access networks function?

A

each node has its own time to use the medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are controlled-access networks considered inefficient?

A

each device must wait its turn to access the medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do modern Ethernet networks not require an access method?

A

Modern Ethernet networks operate in full-duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe CSMA/CD

A
  1. Nodes operate in half-duplex
  2. If two devices send at the same time, both nodes notice the collision
    - jamming signal
    - random backoff timer
  3. If one device wants to send, it will look for a carrier signal on the wire.
  4. If the device does not detect a carrier signal, it assumes the network is available.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe CSMA/CA

A
  1. Nodes operate in half-duplex
  2. devices attempt to avoid collisions by waiting before transmitting
  3. Each transmission includes the time required to complete the transmission.
  4. other nodes “hear” this information, thus know how long each xmit should take
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List common datalink layer protocols

A

Ethernet
802.11 wireless
PPP
HDLC
Frame relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly