Podcast
Questions and Answers
What does a Layer 2 network require to operate?
What does a Layer 2 network require to operate?
- A functional Layer 3 network
- Direct connection to the internet
- A functional Layer 1 network (correct)
- A software-defined networking (SDN) controller
What is the primary function of 'frames' in a Layer 2 network?
What is the primary function of 'frames' in a Layer 2 network?
- Formatting data for transmission (correct)
- Controlling radio frequencies
- Managing physical wavelengths
- Defining voltage levels
What is the length, in bits, of a typical MAC address?
What is the length, in bits, of a typical MAC address?
- 32 bits
- 128 bits
- 64 bits
- 48 bits (correct)
What is the purpose of the Organisationally Unique Identifier (OUI) in a MAC address?
What is the purpose of the Organisationally Unique Identifier (OUI) in a MAC address?
Which of the following is the main function of Layer 1 in relation to Layer 2 frames?
Which of the following is the main function of Layer 1 in relation to Layer 2 frames?
What is the function of the Preamble and Start Frame Delimiter (SFD) in a Layer 2 frame?
What is the function of the Preamble and Start Frame Delimiter (SFD) in a Layer 2 frame?
What is the 'EtherType' field used for in a Layer 2 frame?
What is the 'EtherType' field used for in a Layer 2 frame?
What is the range of the payload size, in bytes, for standard Ethernet frames?
What is the range of the payload size, in bytes, for standard Ethernet frames?
What is the process of 'encapsulation' in the context of the OSI model?
What is the process of 'encapsulation' in the context of the OSI model?
What is the purpose of the Frame Check Sequence (FCS) in a Layer 2 frame?
What is the purpose of the Frame Check Sequence (FCS) in a Layer 2 frame?
What is the problem that the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol aims to solve?
What is the problem that the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol aims to solve?
What happens when a collision is detected in a network using CSMA/CD?
What happens when a collision is detected in a network using CSMA/CD?
Which layer of the OSI model is responsible for collision detection?
Which layer of the OSI model is responsible for collision detection?
In networking, what is the purpose of 'carrier sense'?
In networking, what is the purpose of 'carrier sense'?
What is the function of a network hub?
What is the function of a network hub?
Why does using a hub potentially lead to more collisions compared to using a switch?
Why does using a hub potentially lead to more collisions compared to using a switch?
At which layer of the OSI model does a network switch primarily operate?
At which layer of the OSI model does a network switch primarily operate?
What is a MAC address table used for in a network switch?
What is a MAC address table used for in a network switch?
What happens when a switch receives a frame with a destination MAC address that is not in its MAC address table?
What happens when a switch receives a frame with a destination MAC address that is not in its MAC address table?
How does a switch improve network performance compared to a hub?
How does a switch improve network performance compared to a hub?
What is a 'collision domain' in the context of network devices?
What is a 'collision domain' in the context of network devices?
Which of the following best describes the term 'unicast' communication?
Which of the following best describes the term 'unicast' communication?
What is the key advantage of using Layer 2 switches over Layer 1 hubs in a network?
What is the key advantage of using Layer 2 switches over Layer 1 hubs in a network?
What does the acronym 'CSMA/CD' stand for?
What does the acronym 'CSMA/CD' stand for?
If a network card's MAC address is 00:1A:2B:3C:4D:5E, and the OUI portion is 00:1A:2B, what does the 3C:4D:5E portion represent?
If a network card's MAC address is 00:1A:2B:3C:4D:5E, and the OUI portion is 00:1A:2B, what does the 3C:4D:5E portion represent?
A device on a CSMA/CD network detects a collision and initiates the jam signal. What is the primary purpose of this jam signal?
A device on a CSMA/CD network detects a collision and initiates the jam signal. What is the primary purpose of this jam signal?
A network engineer replaces a hub with a switch to improve network performance. How does this change affect the collision domains in the network?
A network engineer replaces a hub with a switch to improve network performance. How does this change affect the collision domains in the network?
In the context of data encapsulation, which action occurs first when sending data down the OSI model?
In the context of data encapsulation, which action occurs first when sending data down the OSI model?
Which of the following statements is correct regarding Layer 2 switches and hubs?
Which of the following statements is correct regarding Layer 2 switches and hubs?
A network administrator configures a switch port for port security with a limited number of MAC addresses. What security risk does this primarily mitigate?
A network administrator configures a switch port for port security with a limited number of MAC addresses. What security risk does this primarily mitigate?
A network consultant recommends implementing VLANs in a client’s network. Which Layer 2 benefit does this primarily address?
A network consultant recommends implementing VLANs in a client’s network. Which Layer 2 benefit does this primarily address?
A network engineer is troubleshooting a slow network and suspects a faulty network card is flooding the network with corrupted frames. Which Layer 2 feature can best help identify the source of this issue?
A network engineer is troubleshooting a slow network and suspects a faulty network card is flooding the network with corrupted frames. Which Layer 2 feature can best help identify the source of this issue?
An organization uses a mix of VoIP phones and data workstations on the same network. What Layer 2 mechanism can be implemented to ensure that voice traffic is prioritized over data traffic?
An organization uses a mix of VoIP phones and data workstations on the same network. What Layer 2 mechanism can be implemented to ensure that voice traffic is prioritized over data traffic?
A network administrator wants to prevent loops in a network with multiple switches. Which Layer 2 protocol is designed to achieve this?
A network administrator wants to prevent loops in a network with multiple switches. Which Layer 2 protocol is designed to achieve this?
In a Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) network, such as 802.11 wireless, what is the purpose of sending a Request to Send (RTS) frame before transmitting data?
In a Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) network, such as 802.11 wireless, what is the purpose of sending a Request to Send (RTS) frame before transmitting data?
A company has multiple VLANs configured on a switch. How can devices in different VLANs communicate with each other?
A company has multiple VLANs configured on a switch. How can devices in different VLANs communicate with each other?
You are tasked with designing a small office network. Knowing the differences between Layer 1 and Layer 2 devices, which setup offers better performance and collision management?
You are tasked with designing a small office network. Knowing the differences between Layer 1 and Layer 2 devices, which setup offers better performance and collision management?
A network technician suspects a rogue DHCP server is assigning incorrect IP addresses to devices on the network. Which Layer 2 security feature can prevent this?
A network technician suspects a rogue DHCP server is assigning incorrect IP addresses to devices on the network. Which Layer 2 security feature can prevent this?
Which of the following is NOT a function or characteristic of Layer 2 of the OSI model?
Which of the following is NOT a function or characteristic of Layer 2 of the OSI model?
A new network technology claims to improve speeds 100x by transmitting multiple frames simultaneously on a single medium using advanced multiplexing and collision avoidance techniques. How is this theoretically possible?
A new network technology claims to improve speeds 100x by transmitting multiple frames simultaneously on a single medium using advanced multiplexing and collision avoidance techniques. How is this theoretically possible?
In a quantum entangled network where data transmission is theoretically instantaneous, which Layer 2 technology becomes paradoxically obsolete while creating new challenges?
In a quantum entangled network where data transmission is theoretically instantaneous, which Layer 2 technology becomes paradoxically obsolete while creating new challenges?
Flashcards
Layer Two
Layer Two
The data link layer; requires a functional layer one network to operate.
Frames
Frames
Are a format for sending information over a layer two network.
MAC Address
MAC Address
A unique hardware address for every device on a network; a hexadecimal address that's 48 bits long.
OUI (Organizationally Unique Identifier)
OUI (Organizationally Unique Identifier)
Signup and view all the flashcards
Network Interface Controller (NIC)
Network Interface Controller (NIC)
Signup and view all the flashcards
Preamble and Start Frame Delimiter (SFD)
Preamble and Start Frame Delimiter (SFD)
Signup and view all the flashcards
Destination and Source MAC Addresses
Destination and Source MAC Addresses
Signup and view all the flashcards
EtherType
EtherType
Signup and view all the flashcards
MAC Header
MAC Header
Signup and view all the flashcards
Payload
Payload
Signup and view all the flashcards
Encapsulation
Encapsulation
Signup and view all the flashcards
Frame Check Sequence (FCS)
Frame Check Sequence (FCS)
Signup and view all the flashcards
Collision
Collision
Signup and view all the flashcards
CSMA
CSMA
Signup and view all the flashcards
Hubs
Hubs
Signup and view all the flashcards
Multi-Port Repeater
Multi-Port Repeater
Signup and view all the flashcards
Single Collision Domain
Single Collision Domain
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
MAC Address Table
MAC Address Table
Signup and view all the flashcards
Store and Forward
Store and Forward
Signup and view all the flashcards
Study Notes
Layer 2 - Data Link Layer
- Layer two runs over layer one and requires a functional layer one network for operation
- Layer two utilizes frames as a format for sending information
- It introduces MAC addresses for devices on a network
- Higher layers in the OSI model build on lower layers, adding features and capabilities
- Layer two networks are compatible with different types of layer one networks like copper, fiber, and Wi-Fi
- Focus will be on Ethernet as a common protocol for local networks
MAC Addresses
- MAC addresses uniquely identify each device on a network and are not assigned by software
- MAC addresses are hexadecimal and 48 bits long
- MAC addresses consist of two parts: the Organisationally Unique Identifier (OUI) and the Network Interface Controller (NIC) specific part
- The OUI is assigned to companies that manufacture network devices, ensuring each has a separate OUI
- These addresses are hard coded into the hardware
Frames
- Frames are used for communication at layer two and contain several components
- Preamble and Start Frame Delimiter (SFD) allow devices to identify the start of a frame
- Destination and source MAC addresses enable sending frames to specific devices or broadcasting to all devices on a local network
- EtherType specifies the layer three protocol used to encapsulate data within the frame, such as IP or the internet protocol
- The MAC header includes the destination MAC address, source MAC address, and EtherType
Payload and Encapsulation
- The payload of a frame ranges from 46 to 1500 bytes for standard frames and contains the data being sent
- Layer three protocols generally provide this data, which is indicated in the EtherType field
- Encapsulation is the process of wrapping layer three data, like an IP packet, inside an ethernet frame
- This allows layer two to deliver the data to its intended destination, where the frame will be analyzed and the layer three packet extracted for use by the layer three protocol
- Frame Check Sequence (FCS) identifies errors in the frame, allowing the destination to verify data integrity
Layer 1 vs Layer 2
- Layer two uses layer one to transmit and receive signals
- Layer two frames are transmitted over a shared physical medium by layer one, which converts the frame into voltages, RF, or light
- Layer one handles the physical transmission and reception, while layer two manages framing and other functions
- Layer one transmits raw data without understanding the frame's contents
Collisions
- Layer one provides no media access control, so devices transmit data without checking if the medium is in use
- Simultaneous transmissions can cause electrical signals to overlap and interfere with each other, resulting in a collision that corrupts data
- Layer two solves this problem by providing controlled access to the physical medium to mitigate packet collisions
Carrier Sense Multiple Access (CSMA)
- Layer two uses layer one for media access control in CSMA to check if a carrier signal can be detected.
- Layer two avoids collisions by sensing for a carrier signal.
- If no carrier is detected, the frame is passed to layer one for conversion to a physical signal across the shared medium.
- On the receiving end, layer one passes the raw bit stream to layer two.
- Layer two then reviews to ensure data is for the destination MAC address, which in turn passes the respective payload back to the game.
Layer 2+
- Layer 2 adds MAC addresses for machine-to-machine communication and media access control
- Should neither machines be able to detect carrier signals, the collision detection (CD) is required.
- From that a jam signal is sent to the devices detecting the signal, and a random back-off occurs.
- In CSMA/CD this is an essential function of Layer 2 that allows multiple decives to coexist
Additional Layer 2 information
- The OSI model consists of seven layers, each with specific functions for data transmission
- Layer 2, or the data link layer, ensures the reliable transfer of data between two nodes on the same network segment and defines access protocols for the physical network
Hubs vs Switches
- In a network where layer two protocols are utilized, to have an active network, layer one and two are jointly used
- Layer 2 uses MAC addresses while hubs forward traffic and behave in a layer 1 way
- Layer 2 enabled devices use CSMA to limit collisions
- Switches don't simply repeat anything a dumb layer one device does - it means it avoids those collisions
- Each port on the switch is its own collision domain, so the transfer only happens one port at a time, avoiding the need to forward corrupted packets.
Layer 2 Benefits
- Layer 2 adds media access control which lets devices reliably share access
- Identifiable Devices (MAC addresses)
- Collision Detection and Error Control
- Unicast Communication (one-to-one)
- Broadcast Communication (one-to-all)
Encapsulation
- Data is encapsulated in a frame which is de-encapsulated upon delivery.
- This concept will be repeated lower down the stack, with protocols building on previous protocols until the destination's Layer 7.
Switch MAC Table
- The MAC address table is learned one the first laptop on each port transfers a frame.
- From there, the switch knows which laptop and MAC address refers to the one port.
- Because of this, each port is isolated to only traffic destined for that MAC.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.