Data Link Layer Flashcards

1
Q

What is a data frame and what components does it have?

A

A data frame is the data that is being sent over a network.
Components:
- Starting Flag (describes the start of the frame)
- Header (Meta info)
- Payload (Data from the upper layers)
- Checksum
- Ending Flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the flow control and what are 2 protocols?

A

Helps preventing the flooding of a slower receiver. Sender and receiver use buffer memory to work with. The sender has to respect the size of the receiver memory so no data gets lost transmitting. The receiver tells the sender his size. Sender also has to check that his buffer doesn’t get overloaded by the upper layers.

  • Stop and Wait
  • Sliding Window
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Sliding Window protocol.

A
  • Uses buffer
  • Send number of frames that have space in buffer.
  • Sender knows how many frames he sent and how many he can send until buffer is full because of sequence number of each frame
  • After the receiver processed his buffer he sends an ACK to the sender
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Error correction: Parity: How does it work and what is the problem?

A

For every char (7bit) an eight bit is added which is the parity bit. With the parity bit number of 1s have to be even. If because of an error one bit has flipped the parity bit is incorrect and therefore the error can be corrected.
- If 2 bits have flipped the parity bit notices nothing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Error detection: Checksum: How does it work and does detect malicious attacks?

A

Checksum is sent with every frame. The receiver can calculate the checksum of the frame on his end and compare with the sent checksum. Therefore he knows if all of the message is there.
- No it doesn’t be cause an attacker can easily change the checksum of the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 error control protocols?

A

They base on ARQ (Automatic Repeat Request). It bases on the resending a frame on error by either receiving an NAK or Timeout.
- Stop and wait ARQ
- Go back -n ARQ
- Selective Repeat ARQ
Have a look at the slides in the 100_exam_papers folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

We have a token-ring network of multiple devices. Each of them wants to send data to another one. How can we give each of them a fair chance to send data? Name 3 access schemes you know

A

Multiple apps want to transfer data over a link. So we have to be careful and want every device to have the chance to send an that there are no collisions.

  • Orthogonal access scheme: Scheduled.
  • Controlled access scheme: Round Robin
  • Random access scheme: Random.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a collision domain?

A

Where collisions between packets may happen. Connected to a hub everything is a collision domain because he broadcasts every packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

2 Types of switches:

A

Cut-Through Switch: Reads DST mac and sends frame

Store-and-forward: Reads the whole frame and detects errors and sends the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the spanning tree protocol?

A

Protocol to detect loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the ethernet frame

A

Look at the slides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is a mac address constructed?

A
  • 6 Bytes
  • First 3 Bytes: Identifies the constructor, Organizationally Unique Identifier
  • Last 3 Bytes: Network Interface Controller Specific
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the meaning of the 2 least significant bits (of the first byte) of a mac address?

A

1: U/L Bit (Universal / Local): isset -> Working with local addresses
2: I/G Bit (Individual / Group) isset -> Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a VLAN and what is a “Trunk port”?

A

VLANs separate a physical switch into multiple, separate broadcasts domain (vlans). This can be done over multiple switches, so there is the trunk port to communicate between them. The ethernet frame is extended with a VLAN Tag to show to which VLAN the frame belongs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the process of connection to a WLAN.

A

Describe with the sequence diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly