Ch. 6 | Data Link Layer

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Routers are responsible for encapsulating a frame. This process is done in five steps, arrange these steps from first to last. Forwards the new frame appropriate to the medium Re-encapsulates the packet into a new frame De-encapsulates the frame Determines the best path to forward the packet Accepts a frame from a medium

1. Accepts a frame from a medium 2. De-encapsulates the frame 3. Determines the best path to forward the packet 4. Re-encapsulates the packet into a new frame 5. Forwards the new frame appropriate to the medium

Which of the following are data link layer protocols? (choose three) A. 802.11 B. Ethernet C. IP D. PPP E. UDP

A. 802.11 B. Ethernet D. PPP

What Layer 2 function does a router perform? (choose three) A. Accepts a frame from a medium B. De-encapsulates the frame C. Re-encapsulates the packet into a new frame D. Refers to its Layer 3 routing table for a matching destination network

A. Accepts a frame from a medium B. De-encapsulates the frame C. Re-encapsulates the packet into a new frame

Which data link layer media access control method does Ethernet use? A. CSMA/CD B. Determinism C. Turn taking D. Token passing

A. CSMA/CD

What is the function of the last field in a data link layer frame? A. To determine whether the frame experienced transmission errors. B. To identify special flow control services C. To identify the beginning and end limits of the frame D. To identify the Layer 3 protocol in the data field

A. To determine whether the frame experienced transmission errors.

Which LAN topology is a hybrid topology? A. Bus B. Extended star C. Ring D. Star

B. Extended star

The media access control method used depends on which two criteria? A. Layer 3 IP protocol B. Media sharing C. Topology D. Transport layer protocol E. Type of data

B. Media Sharing C. Topology

A legacy topology system where all systerms were chained to each other and terminated in some form on each end.

Bus

What method is used to manage contention-based access on a wireless network? A. CSMA/CD B. Priority ordering C. CSMA/CA D. Token passing

C. CSMA/CA

What does the data link layer add to a Layer 3 packet to create a frame? (Choose two.) A. Flags B. Sequence number C. Header D. Trailer E. Nachos

C. Header D. Trailer

What are two services performed by the data link layer of the OSI model? (Choose two.) A. It encrypts data packets B. It determines the path to forward packets C. It accepts Layer 3 packets and encapsulates them into frames D. It provides media access control and performs error detection E. It monitors the Layer 2 communication by building a MAC address table.

C. It accepts Layer 3 packets and encapsulates them into frames D. It provides media access control and performs error detection

What attribute of a NIC would place it at the data link layer of the OSI model? A. Attached Ethernet cable B. IP address C. MAC address D. RJ-45 Port E. TCP/IP protocol stack

C. MAC address

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? A. Bus B. Hierarchical C. Mesh D. Ring E Star

C. Mesh

What is the responsibility of the MAC sublayer? A. Adds Layer 3 address to the frame B. Communicates with the network layer (Layer 3) C. Provides the method to get the frame on and off the media D. Transmits the bits on the media.

C. Provides the method to get the frame on and off the media

What type of physical topology can be created by connecting all Ethernet cables to a central device? A. Bus B. Ring C. Star D. Mesh

C. Star

________ does not detect collisions but attempts to avoid them by waiting before transmitting. Each device that transmits includes the time duration that it needs for the transmission. All other wireless devices receive this information and know how long the medium will be unavailable.

Carrier Sense Multiple Access/Collision avoidance (CSMA/CA)

In _________-____ multiaccess networks, all nodes are operating in half-duplex, competing for the use of the medium.

Contention-based

Portion of a frame that identifies special flow control services such as quality of service (Qos).

Control

In a ________-_____ multiaccess network, each node has its own time to use the medium.

Controlled-Based

Which media access control method is used in legacy Ethernet LANs? A. Carrier sense multiple access/collision annoyance B. Carrier sense multiple access/collision avoidance C. Carrier sense multiple access/collision destruction D. Carrier sense multiple access/collision detection

D. Carrier sense multiple access/collision detection

Which lists the Layer 2 and Layer 3 address fields in the correct order? A. Destination NIC, Source NIC, Destination IP, Source IP B. Source NIC, Destination NIC, Destination IP, Source IP C. Source NIC, Destination NIC, Source IP, Destination IP D. Destination IP, Source NIC, Source IP, Destination IP

D. Destination IP, Source NIC, Source IP, Destination IP

What kind of network would use point-to-point, hub and spoke, or mesh topologies? A. PAN B. LAN C. WLAN D. WAN

D. WAN

What two pieces are contained within the trailer portion of a frame?

Error detection Frame stop

What four pieces are contained within the header portion of a frame?

Frame start Addressing Type Control

Which duplex communication method is used in WLANs?

Half-duplex

What are the three basic parts of each frame type?

Header Data Trailer

A WAN version of the star topology in which a central site interconnects branch sites through the use of point-to-point links.

Hub and Spoke

Which organization defines standards for the network access layer (i.e., the OSI physical and data link layers)?

IEEE

Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

International Organization for standards (ISO) International Telecommunication Union (ITU)

This sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. It places information in the frame that identifies which network layer protocol is being used for the frame.

Logical Link Control (LLC), (IEEE 802.2)

This type of topology refers to the way a network transfers frames from one node to the next. It identifies virtual connections using device interfaces and Layer 3 IP addressing schemes.

Logical topology

What identifier is used at the data link layer to uniquely identify an Ethernet device?

MAC address

This sublayer controls the NIC and other hardware that is responsible for sending and receiving data on the wired or wireless LAN/MAN medium.

Media Access Control (MAC)

This topology provides high availability but requires that every end system is interconnected to every other system.

Mesh

This type of topology identifies how end devices and intermediary devices (i.e., routers, switches, and wireless access points) are interconnected.

Physical topology

The simplest and most common WAN topology. It consists of a permanent link between two endpoints.

Point-to-point

A flow control service that gives forwarding priority to certain types of messages.

Quality of Service (QoS)

A legacy topology system where end systems were connected to their respective neighbor forming a circle.

Ring

True or False? The MAC sublayer also provides media access control, allowing multiple devices to communicate over a shared (half-duplex) medium. Full-duplex communications do not require access control.

True

True or False? There is no one frame structure that meets the needs of all data transportation across all types of media?

True

True or False? Today, Ethernet networks operate in full-duplex and do not require an access method.

True

A transmitting node creates a logical summary of the contents of the frame, known as the ___ value.

cyclic redundancy check (CRC)

The CRC valur is placed in the ___ field to represent the contents of the frame. This provides a method for the receiving node to determine whether the frame experienced transmission errors.

frame check sequence (FCS)

In computer networks, a ____ is a device that can receive, create, store, or forward data along a communications path.

node


Set pelajaran terkait

Chapter 4 - Individual Income Tax Overview

View Set

ATI Targeted Med Surg - Cardiovascular

View Set

Chapter 33 Quiz (AP Macroeconomics)

View Set

ECON 102 Chapter 12 (Firms in Perfectly Competitive Markets)

View Set

Hip replacmt; health promo Nclex

View Set

Module 3 - Adjustable Rate Mortgages (ARMs)

View Set

Unit 4 Objective Knowledge Check

View Set

CCNA2 Chapter 10 Device Discovery, Management, and Maintenance

View Set