Module 6 Cisco - Data Link Layer

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

. In contention-based multi-access networks,

, all nodes are operating in half-duplex.

ring

- End systems are connected to their respective neighbor forming this

What Layer 2 function does a router perform?

-Accepts a frame from a medium -de-encapsulates the frame -re-encapsulates the packet into a new frame

The media access control method used depends on which two criteria?

-Media Sharing -Topology

Examples of multiaccess networks that use controlled access include the following:

-legacy token ring -legacy ARCNET

What are the data link layer protocols?

802.11, ethernet, PPP

bus

All end systems are chained to each other and terminated in some form on each end. Infrastructure devices such as switches are not required to interconnect the end devices.

contention-based access

All nodes are operating in half-duplex, competing for the use of the medium. However, only one device can send at a time.

What method is used to manage contention-based access on a wireless network?

CSMA/CA

Which data link layer media access control method does Ethernet use with legacy Ethernet hubs?

CSMA/CD

full-duplex

Data flows in both directions at the same time.

Which organization defines standards for the network access layer?

IEEE

Which two engineering organizations define open standards and protocols that apply to the data link layer?

ITU, IEEE

physical topology

Identifies the physical connections and how end devices and intermediary devices (i.e, routers, switches, and wireless access points) are interconnected. The topology may also include specific device location such as room number and location on the equipment rack. usually point-to-point or star.

Media Access Control (MAC)

Implements this sublayer (IEEE 802.3, 802.11, or 802.15) in hardware. It is responsible for data encapsulation and media access control. It provides data link layer addressing and it is integrated with various physical layer technologies.

The IEEE 802 LAN/MAN data link layer consists of the following two sublayers:

LLC and MAc

What are the two sublayers of the OSI model data link layer?

LLC, MAC

What is another name for the OSI data link layer?

Layer 2

The IEEE 802 LAN/MAN data link layer consists of which two sublayers?

Logical Link Control Media Access Control

What identifier is used at the data link layer to uniquely identify an Ethernet device?

MAC Address

What attribute of a NIC would place it at the data link layer of the OSI model?

MAC address

addressing

Provides source and destination addressing for transporting the Layer 2 frame between devices on the same shared medium.

What is the responsibility of the MAC sublayer?

Provides the method to get the frame on and off the media

logical topology

Refers to the way a network transfers frames from one node to the next. This topology identifies virtual connections using device interfaces and Layer 3 IP addressing schemes.

Frame delimiting

The framing process provides important delimiters to identify fields within a frame. These delimiting bits provide synchronization between the transmitting and receiving nodes.

Logical Link Control (LLC)

This IEEE 802.2 sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to use the same network interface and media.

frame start and stop indicator flags

Used to identify the beginning and end limits of the frame.

What kind of network would use point-to-point, hub and spoke, or mesh topologies?

WAN

node

a device that can receive, create, store, or forward data along a communications path. can be either an end device such as a laptop or mobile phone, or an intermediary device such as an Ethernet switch.

cyclic redundancy check (CRC) value.

a logical summary of the contents of the frame. This value is placed in the frame check sequence (FCS) field to represent the contents of the frame.

hybrid

a variation or combination of any topology.

half-duplex

allows only one device to send or receive at a time on the shared medium

EIA

an international standards and trade alliance for electronics organizations, and is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.

Which media access control method is used in legacy Ethernet LANs?

carrier sense multiple action/collision detection

Layer 2 addresses are only used to

connect devices within the same shared media, on the same IP network.

data

contains the frame payload

There are two basic access control methods for shared media:

contention-based access, controlled access

simplex

data can only flow in one direction

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link

IEEE

defines open standards and protocols that apply to the network access layer.

Which lists the Layer 2 and Layer 3 address fields in the correct order?

destination NIC address, source NIC address, source IP address, destination IP address

point-to-point

directly connect two nodes

controlled access

each node has its own time to use the medium. These deterministic types of legacy networks are inefficient because a device must wait its turn to access the medium.

Which LAN topology is a hybrid topology?

extended star

QoS(Quality of service)

gives forwarding priority to certain types of messages, Voice over IP for example

Which duplex communication method is used in WLANs?

half-duplex

each frame type has three basic parts:

header, data, trailer

What does the data link layer add to a Layer 3 packet to create a frame?

header, trailer

this topology is a

hub and spoke

control

identifies special flow control services such as quality of service (QoS).

type

identifies the layer 3 protocol in the data field

Half-duplex communications exchange data

in one direction at a time

error detection

includes a trailer used to detect transmission errors

If the data must pass onto another network segment, an __________________, such as a router, is necessary.

intermediary device

What are two services performed by the data link layer of the OSI model?

it provides media access control and performs error detection, it accepts layer 3 packets and encapsulates them into frames

Path determination is a service provided at

layer 3

The data link layer address is only used for

local delivery

Which topology displays networking device layer IP addresses?

logical topology

The Internet Engineering Task Force (IETF)

maintains the functional protocols and services for the TCP/IP protocol suite in the upper layers, but they do not define the functions and operation of the TCP/IP network access layer.

This type of topology is a

mesh

Which physical topology requires that every node is attached to every other node on the network?

mesh

The data link layer is responsible for

network interface card (NIC) to network interface card communications.

The LLC sublayer takes the

network protocol data, which is typically an IPv4 or IPv6 packet, and adds Layer 2 control information to help deliver the packet to the destination node.

The data link layer prepares network data for the

physical network

The data link layer of the OSI model (Layer 2)

prepares network data for the physical network.

The MAC sublayer

provides data encapsulation through frame delimiting, addressing, and error detection.

mesh topology

provides high availability because every node is connected to all other nodes.

the IANA

responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers.

Full-duplex sends and receives data

simultaneously

What type of physical topology can be created by connecting all Ethernet cables to a central device?

star

Physical LAN topologies include:

star, extended star, bus, and ring.

The MAC sublayer controls

the NIC and other hardware that is responsible for sending and receiving data on the wired or wireless LAN/MAN medium.

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

the use of full-duplex capable layer 2 switches

What is the function of the last field in a data link layer frame?

to determine whether the frame experienced transmission errors

Which is a function of the Logical Link Control (LLC) sublayer?

to identify which network layer protocol is being used

Carrier sense multiple access with collision detection (CSMA/CD)

used with wired Ethernet technology to mediate media contention.

Carrier sense multiple access with collision avoidance (CSMA/CA)

used with wireless networking technology to mediate media contention.


Set pelajaran terkait

Differential Equations True or False

View Set

Intro to Crisis Intervention Mid-Term

View Set

Sociology Midterm 2 review (Chp 1-6)

View Set

ANT 104 - Revealing Archaeology - Provisioning Society

View Set

Advanced Accounting Chapter 12 Smartbook

View Set

Firefighter I - Chapter 6 - Extinguishers

View Set