2.1.2-2.1.3 Layer 2 - DataLink

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does a Layer 2 network require to operate?

  • A functional Layer 3 network
  • Direct connection to the internet
  • A functional Layer 1 network (correct)
  • A software-defined networking (SDN) controller

What is the primary function of 'frames' in a Layer 2 network?

  • Formatting data for transmission (correct)
  • Controlling radio frequencies
  • Managing physical wavelengths
  • Defining voltage levels

What is the length, in bits, of a typical MAC address?

  • 32 bits
  • 128 bits
  • 64 bits
  • 48 bits (correct)

What is the purpose of the Organisationally Unique Identifier (OUI) in a MAC address?

<p>To identify the manufacturer of the network device. (B)</p> Signup and view all the answers

Which of the following is the main function of Layer 1 in relation to Layer 2 frames?

<p>Transmitting raw data onto the physical medium (C)</p> Signup and view all the answers

What is the function of the Preamble and Start Frame Delimiter (SFD) in a Layer 2 frame?

<p>To allow devices to identify the start of the frame (D)</p> Signup and view all the answers

What is the 'EtherType' field used for in a Layer 2 frame?

<p>To indicate which Layer 3 protocol is encapsulated in the frame (A)</p> Signup and view all the answers

What is the range of the payload size, in bytes, for standard Ethernet frames?

<p>46 to 1500 (B)</p> Signup and view all the answers

What is the process of 'encapsulation' in the context of the OSI model?

<p>Wrapping data in another protocol’s format (C)</p> Signup and view all the answers

What is the purpose of the Frame Check Sequence (FCS) in a Layer 2 frame?

<p>To detect errors that may have occurred during transmission (A)</p> Signup and view all the answers

What is the problem that the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol aims to solve?

<p>Reducing the likelihood of data collisions on a shared medium (B)</p> Signup and view all the answers

What happens when a collision is detected in a network using CSMA/CD?

<p>A jam signal is sent, and devices wait a random time before retransmitting. (D)</p> Signup and view all the answers

Which layer of the OSI model is responsible for collision detection?

<p>Layer 2 (C)</p> Signup and view all the answers

In networking, what is the purpose of 'carrier sense'?

<p>To detect if another device is transmitting (C)</p> Signup and view all the answers

What is the function of a network hub?

<p>To repeat any physical activity on one port to all other ports (C)</p> Signup and view all the answers

Why does using a hub potentially lead to more collisions compared to using a switch?

<p>Hubs repeat traffic to all ports, increasing the chance of collisions. (C)</p> Signup and view all the answers

At which layer of the OSI model does a network switch primarily operate?

<p>Layer 2 (D)</p> Signup and view all the answers

What is a MAC address table used for in a network switch?

<p>To store MAC addresses and their corresponding switch ports (A)</p> Signup and view all the answers

What happens when a switch receives a frame with a destination MAC address that is not in its MAC address table?

<p>It forwards the frame to all ports except the originating port. (B)</p> Signup and view all the answers

How does a switch improve network performance compared to a hub?

<p>By filtering and forwarding traffic based on MAC addresses (A)</p> Signup and view all the answers

What is a 'collision domain' in the context of network devices?

<p>A network segment where collisions can occur (A)</p> Signup and view all the answers

Which of the following best describes the term 'unicast' communication?

<p>Communication from one device to a specific device on a network (A)</p> Signup and view all the answers

What is the key advantage of using Layer 2 switches over Layer 1 hubs in a network?

<p>Switches improve network scalability and reduce collisions. (D)</p> Signup and view all the answers

What does the acronym 'CSMA/CD' stand for?

<p>Carrier Sense Multiple Access with Collision Detection (C)</p> Signup and view all the answers

If a network card's MAC address is 00:1A:2B:3C:4D:5E, and the OUI portion is 00:1A:2B, what does the 3C:4D:5E portion represent?

<p>The network interface controller (NIC) specific identifier (B)</p> Signup and view all the answers

A device on a CSMA/CD network detects a collision and initiates the jam signal. What is the primary purpose of this jam signal?

<p>To ensure that all devices on the network are aware of the collision (D)</p> Signup and view all the answers

A network engineer replaces a hub with a switch to improve network performance. How does this change affect the collision domains in the network?

<p>Each port on the switch becomes its own collision domain. (B)</p> Signup and view all the answers

In the context of data encapsulation, which action occurs first when sending data down the OSI model?

<p>Addition of the IP header (C)</p> Signup and view all the answers

Which of the following statements is correct regarding Layer 2 switches and hubs?

<p>Switches maintain a MAC address table, while hubs do not. (C)</p> Signup and view all the answers

A network administrator configures a switch port for port security with a limited number of MAC addresses. What security risk does this primarily mitigate?

<p>MAC address flooding (A)</p> Signup and view all the answers

A network consultant recommends implementing VLANs in a client’s network. Which Layer 2 benefit does this primarily address?

<p>Reducing the broadcast domain size for better security and performance (A)</p> Signup and view all the answers

A network engineer is troubleshooting a slow network and suspects a faulty network card is flooding the network with corrupted frames. Which Layer 2 feature can best help identify the source of this issue?

<p>MAC address table (D)</p> Signup and view all the answers

An organization uses a mix of VoIP phones and data workstations on the same network. What Layer 2 mechanism can be implemented to ensure that voice traffic is prioritized over data traffic?

<p>Quality of Service (QoS) (B)</p> Signup and view all the answers

A network administrator wants to prevent loops in a network with multiple switches. Which Layer 2 protocol is designed to achieve this?

<p>Spanning Tree Protocol (STP) (B)</p> Signup and view all the answers

In a Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) network, such as 802.11 wireless, what is the purpose of sending a Request to Send (RTS) frame before transmitting data?

<p>To reserve the channel and avoid collisions (C)</p> Signup and view all the answers

A company has multiple VLANs configured on a switch. How can devices in different VLANs communicate with each other?

<p>By using a router to route traffic between the VLANs (C)</p> Signup and view all the answers

You are tasked with designing a small office network. Knowing the differences between Layer 1 and Layer 2 devices, which setup offers better performance and collision management?

<p>Connecting all devices to a single switch for intelligent traffic management. (D)</p> Signup and view all the answers

A network technician suspects a rogue DHCP server is assigning incorrect IP addresses to devices on the network. Which Layer 2 security feature can prevent this?

<p>DHCP Snooping (B)</p> Signup and view all the answers

Which of the following is NOT a function or characteristic of Layer 2 of the OSI model?

<p>Routing (C)</p> Signup and view all the answers

A new network technology claims to improve speeds 100x by transmitting multiple frames simultaneously on a single medium using advanced multiplexing and collision avoidance techniques. How is this theoretically possible?

<p>Through advanced signal processing that allows orthogonal (independent) data streams to be transmitted concurrently, eliminating traditional collision domains (A)</p> Signup and view all the answers

In a quantum entangled network where data transmission is theoretically instantaneous, which Layer 2 technology becomes paradoxically obsolete while creating new challenges?

<p>Carrier Sense Multiple Access as instantaneous data means no collisions (B)</p> Signup and view all the answers

Flashcards

Layer Two

The data link layer; requires a functional layer one network to operate.

Frames

Are a format for sending information over a layer two network.

MAC Address

A unique hardware address for every device on a network; a hexadecimal address that's 48 bits long.

OUI (Organizationally Unique Identifier)

Assigned to companies who manufacture network devices; each company has a separate one.

Signup and view all the flashcards

Network Interface Controller (NIC)

Second part of the MAC address and is NIC specific; makes the MAC address on a network card globally unique.

Signup and view all the flashcards

Preamble and Start Frame Delimiter (SFD)

Allows devices to know that it's the start of the frame, so they can identify the various parts of that frame.

Signup and view all the flashcards

Destination and Source MAC Addresses

All devices on a layer two network have this and a frame can be sent to a specific device on a network by putting it's MAC address here.

Signup and view all the flashcards

EtherType

Specifies which layer three protocol is putting its data inside a frame.

Signup and view all the flashcards

MAC Header

A collection of the Destination MAC Address, Source MAC Address, and EtherType.

Signup and view all the flashcards

Payload

Anywhere from 46 to 1500 bytes in size for standard frames; contains the data that the frame is sending.

Signup and view all the flashcards

Encapsulation

When layer three generates something; often an IP packet; put inside an Ethernet frame.

Signup and view all the flashcards

Frame Check Sequence (FCS)

Used to identify any errors in the frame; a simple CRC (Cyclic redundancy check) check; it allows the destination to check if corruption has occurred or not.

Signup and view all the flashcards

Collision

Electrical signals will overlap and interfere with each other; impacts and corrupts both pieces of data.

Signup and view all the flashcards

CSMA

Layer 2 provides controlled access to the physical medium.

Signup and view all the flashcards

Hubs

A layer 1 device; they don't understand frames in any way, they just see physical data.

Signup and view all the flashcards

Multi-Port Repeater

Repeats any physical activity on one port to all other ports.

Signup and view all the flashcards

Single Collision Domain

If the top laptop sends a frame with a destination of the bottom laptop - the HUB repeats and all laptops receive the frame.

Signup and view all the flashcards

Switch

A layer 2 device; understands layer 2 and provides significant advantages.

Signup and view all the flashcards

MAC Address Table

Maintains a MAC address table; starts off empty; as the switch receives frames on its ports, it learns which devices are connected and populates the Mac address table

Signup and view all the flashcards

Store and Forward

Receives a frame; stores it and then they forward it based on the MAC address table and then they discard it.

Signup and view all the flashcards

Study Notes

  • Layer two runs over layer one and requires a functional layer one network for operation
  • Layer two utilizes frames as a format for sending information
  • It introduces MAC addresses for devices on a network
  • Higher layers in the OSI model build on lower layers, adding features and capabilities
  • Layer two networks are compatible with different types of layer one networks like copper, fiber, and Wi-Fi
  • Focus will be on Ethernet as a common protocol for local networks

MAC Addresses

  • MAC addresses uniquely identify each device on a network and are not assigned by software
  • MAC addresses are hexadecimal and 48 bits long
  • MAC addresses consist of two parts: the Organisationally Unique Identifier (OUI) and the Network Interface Controller (NIC) specific part
  • The OUI is assigned to companies that manufacture network devices, ensuring each has a separate OUI
  • These addresses are hard coded into the hardware

Frames

  • Frames are used for communication at layer two and contain several components
  • Preamble and Start Frame Delimiter (SFD) allow devices to identify the start of a frame
  • Destination and source MAC addresses enable sending frames to specific devices or broadcasting to all devices on a local network
  • EtherType specifies the layer three protocol used to encapsulate data within the frame, such as IP or the internet protocol
  • The MAC header includes the destination MAC address, source MAC address, and EtherType

Payload and Encapsulation

  • The payload of a frame ranges from 46 to 1500 bytes for standard frames and contains the data being sent
  • Layer three protocols generally provide this data, which is indicated in the EtherType field
  • Encapsulation is the process of wrapping layer three data, like an IP packet, inside an ethernet frame
  • This allows layer two to deliver the data to its intended destination, where the frame will be analyzed and the layer three packet extracted for use by the layer three protocol
  • Frame Check Sequence (FCS) identifies errors in the frame, allowing the destination to verify data integrity

Layer 1 vs Layer 2

  • Layer two uses layer one to transmit and receive signals
  • Layer two frames are transmitted over a shared physical medium by layer one, which converts the frame into voltages, RF, or light
  • Layer one handles the physical transmission and reception, while layer two manages framing and other functions
  • Layer one transmits raw data without understanding the frame's contents

Collisions

  • Layer one provides no media access control, so devices transmit data without checking if the medium is in use
  • Simultaneous transmissions can cause electrical signals to overlap and interfere with each other, resulting in a collision that corrupts data
  • Layer two solves this problem by providing controlled access to the physical medium to mitigate packet collisions

Carrier Sense Multiple Access (CSMA)

  • Layer two uses layer one for media access control in CSMA to check if a carrier signal can be detected.
  • Layer two avoids collisions by sensing for a carrier signal.
  • If no carrier is detected, the frame is passed to layer one for conversion to a physical signal across the shared medium.
  • On the receiving end, layer one passes the raw bit stream to layer two.
  • Layer two then reviews to ensure data is for the destination MAC address, which in turn passes the respective payload back to the game.

Layer 2+

  • Layer 2 adds MAC addresses for machine-to-machine communication and media access control
  • Should neither machines be able to detect carrier signals, the collision detection (CD) is required.
  • From that a jam signal is sent to the devices detecting the signal, and a random back-off occurs.
  • In CSMA/CD this is an essential function of Layer 2 that allows multiple decives to coexist

Additional Layer 2 information

  • The OSI model consists of seven layers, each with specific functions for data transmission
  • Layer 2, or the data link layer, ensures the reliable transfer of data between two nodes on the same network segment and defines access protocols for the physical network

Hubs vs Switches

  • In a network where layer two protocols are utilized, to have an active network, layer one and two are jointly used
  • Layer 2 uses MAC addresses while hubs forward traffic and behave in a layer 1 way
  • Layer 2 enabled devices use CSMA to limit collisions
  • Switches don't simply repeat anything a dumb layer one device does - it means it avoids those collisions
  • Each port on the switch is its own collision domain, so the transfer only happens one port at a time, avoiding the need to forward corrupted packets.

Layer 2 Benefits

  • Layer 2 adds media access control which lets devices reliably share access
  • Identifiable Devices (MAC addresses)
  • Collision Detection and Error Control
  • Unicast Communication (one-to-one)
  • Broadcast Communication (one-to-all)

Encapsulation

  • Data is encapsulated in a frame which is de-encapsulated upon delivery.
  • This concept will be repeated lower down the stack, with protocols building on previous protocols until the destination's Layer 7.

Switch MAC Table

  • The MAC address table is learned one the first laptop on each port transfers a frame.
  • From there, the switch knows which laptop and MAC address refers to the one port.
  • Because of this, each port is isolated to only traffic destined for that MAC.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Data Communications Module 3.3 Quiz
10 questions
Understanding MAC Addresses and Network Switches
18 questions
Use Quizgecko on...
Browser
Browser