Data Transmission on LAN
96 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of the Pad in a MAC Frame?

  • To provide error-checking assistance
  • To store destination addresses
  • To act as the end delimiter
  • To ensure the Information Field reaches a minimum size (correct)

Which component of a MAC Frame is used for error-checking?

  • Length field
  • Frame Check Sequence (correct)
  • Information Field
  • Pad

What is the maximum size, in octets, of the Information Field in a MAC Frame?

  • 46
  • 1526
  • 1500 (correct)
  • 7

How many octets does the Destination Address field in a MAC Frame occupy?

<p>6 (D)</p> Signup and view all the answers

What mechanism does CSMA/CD use to determine which station can transmit data?

<p>Carrier sensing (C)</p> Signup and view all the answers

What is the total minimum size of a MAC Frame in octets?

<p>72 (A)</p> Signup and view all the answers

Which of the following is not a part of the MAC Frame structure?

<p>Data Signal (C)</p> Signup and view all the answers

The Frame Check Sequence consists of how many octets?

<p>4 (B)</p> Signup and view all the answers

Which statement accurately describes the requirement for the original codeword in the given scenario?

<p>The original codeword must be the second one in the table. (C)</p> Signup and view all the answers

What is a defining characteristic of cyclic codes?

<p>A cyclic shift results in another valid codeword. (B)</p> Signup and view all the answers

What is the primary function of the primary station in a data communication link?

<p>Controlling the data link and initiating error recovery procedures (A)</p> Signup and view all the answers

In the process of creating a codeword using Cyclic Redundancy Check (CRC), what is added to the data word?

<p>The remainder. (B)</p> Signup and view all the answers

How does the checksum method help detect errors?

<p>By comparing the received numbers with the sent sum. (D)</p> Signup and view all the answers

What happens when a secondary station runs out of buffer space?

<p>It sends an RNR (receiver not ready) message to the primary station (C)</p> Signup and view all the answers

What is meant by the 'sliding window value' in a data communication context?

<p>The maximum number of frames that can be transmitted without acknowledgment (B)</p> Signup and view all the answers

What modification is made to the data before sending in the checksum method?

<p>The negative of the sum is sent as the checksum. (D)</p> Signup and view all the answers

Which statement about the supervisory frames is true?

<p>They may inform the primary station about the secondary's buffer status (D)</p> Signup and view all the answers

In the given example of CRC, what do you augment the data word with?

<p>A string of zeros equal to the number of bits in the data. (D)</p> Signup and view all the answers

How many Information frames can be unacknowledged by a secondary station at any one time?

<p>The maximum is typically two frames but can be negotiated (B)</p> Signup and view all the answers

Why is checksumming used in data transmission?

<p>To verify the accuracy of the transmitted data. (A)</p> Signup and view all the answers

What type of station is responsible for responding to the commands issued by the primary station?

<p>Secondary station (B)</p> Signup and view all the answers

What would happen if the sums do not match during checksumming?

<p>The receiver requests the data to be sent again. (A)</p> Signup and view all the answers

What are the two types of stations in a data transmission system?

<p>Primary and secondary stations (A)</p> Signup and view all the answers

Which frames must a secondary station process even when it cannot process incoming Information frames?

<p>Unnumbered frames and supervisory frames (B)</p> Signup and view all the answers

What does the variable 'k' represent in block coding?

<p>The length of each data word in bits (A)</p> Signup and view all the answers

In the 4b/5b coding scheme, how many code words are generated?

<p>32 (A)</p> Signup and view all the answers

What happens when the receiver receives a corrupted codeword that is valid?

<p>The receiver extracts the data word. (C)</p> Signup and view all the answers

How many data words are used for message transfer in the 4b/5b coding?

<p>16 (D)</p> Signup and view all the answers

What is the result if the codeword 111 is received during transmission?

<p>It is discarded as a valid codeword. (D)</p> Signup and view all the answers

What is the primary advantage of using stranded cable over solid cable?

<p>Smaller bend radius (B)</p> Signup and view all the answers

What role do redundant bits play in block coding?

<p>They help to create code words from data words. (C)</p> Signup and view all the answers

What is a common limitation of error-detecting codes?

<p>They can only detect specific types of errors. (C)</p> Signup and view all the answers

Which type of cable is typically used for backbone wiring?

<p>Solid cable (B)</p> Signup and view all the answers

For connecting similar devices directly, which type of cable is used?

<p>Crossed cable (A)</p> Signup and view all the answers

When the receiver cannot find the received codeword in its table, what does this indicate?

<p>An error has occurred. (C)</p> Signup and view all the answers

What feature do many switches or hubs incorporate to eliminate the need for crossed cables?

<p>Multiple uplink ports (A)</p> Signup and view all the answers

What is the maximum length of a network segment using Category 5 cable?

<p>100 meters (A)</p> Signup and view all the answers

Which category of UTP cable has a speed of 10 Mbps?

<p>CAT-3 (A)</p> Signup and view all the answers

What does Power over Ethernet (PoE) technology allow for?

<p>Both data connection and electrical power through a single cable (A)</p> Signup and view all the answers

Which standard is used for the wiring of crossed cables?

<p>TIA/EIA 568 Standard (C)</p> Signup and view all the answers

What is the primary role of VLANs in a network?

<p>Control traffic patterns and enhance security (A)</p> Signup and view all the answers

What does the term 'administrative VLAN' refer to?

<p>A VLAN used exclusively for management traffic (A), VLAN1, which includes all switch ports by default (D)</p> Signup and view all the answers

Which mode does a VLAN switch port operate in when connected to an end-user device?

<p>Access mode (B)</p> Signup and view all the answers

How can VLANs enhance network security?

<p>By limiting user access to broadcast domains (C)</p> Signup and view all the answers

What is a trunk link used for in a VLAN context?

<p>To connect multiple VLANs over a single physical link (C)</p> Signup and view all the answers

What is one consequence of creating VLANs in terms of broadcast domains?

<p>Limitation of users in each broadcast domain (C)</p> Signup and view all the answers

Why are trunk ports preferred for interconnecting switches?

<p>They eliminate the need for multiple access links (C)</p> Signup and view all the answers

What is the maximum number of VLANs that can be created?

<p>1001 (C)</p> Signup and view all the answers

How many different meanings can a single character hold in a bit-oriented protocol?

<p>256 (B)</p> Signup and view all the answers

What is the main component of a frame that contains the actual data to be transmitted?

<p>Body (A)</p> Signup and view all the answers

What happens when a station receives a frame that contains errors?

<p>The station will ask the previous station to resend the frame. (B)</p> Signup and view all the answers

When a station is transmitting frames, what action does it take once a frame has been acknowledged by the next station?

<p>It erases its copy of the confirmed frame. (D)</p> Signup and view all the answers

Which of the following protocols is considered to be a bit-oriented protocol?

<p>HDLC (B)</p> Signup and view all the answers

What is the primary function of a frame in a data communication system?

<p>To transport data to the next point. (B)</p> Signup and view all the answers

What indicates that a receiving station has reached its limit for storing incoming frames?

<p>It signals to other stations that it cannot receive more frames. (B)</p> Signup and view all the answers

In which model of communication does information travel the same route to the receiver?

<p>Virtual circuit (B)</p> Signup and view all the answers

What is a primary benefit of switches compared to hubs?

<p>They support full duplex communication. (D)</p> Signup and view all the answers

How do switches manage multiple simultaneous conversations?

<p>By creating separate collision domains for each port. (A)</p> Signup and view all the answers

What happens to frames with a known unicast address in switches?

<p>They are filtered if received on the same port. (D)</p> Signup and view all the answers

What is the maximum cable length for 10Base5 Ethernet as defined in IEEE 802.3?

<p>500m (D)</p> Signup and view all the answers

Which of the following best describes micro-segmentation in a switch?

<p>Providing dedicated bandwidth to single devices connected to switch ports. (D)</p> Signup and view all the answers

Which of the following methods is used to change maximum cable length restrictions in Ethernet networking?

<p>Networking devices like repeaters or bridges (D)</p> Signup and view all the answers

What protocol do switches utilize to prevent loops in the network?

<p>STP (Spanning Tree Protocol) (A)</p> Signup and view all the answers

What type of cabling does IEEE 802.3i utilize?

<p>Twisted pair Cat5 (B)</p> Signup and view all the answers

What is the maximum data rate supported by the 100BaseT Ethernet standard?

<p>100 Mbps (C)</p> Signup and view all the answers

What is one of the major distinctions between a hub and a switch regarding data transmission?

<p>Switches segment the LAN while hubs do not. (D)</p> Signup and view all the answers

What is the result if a switch receives a broadcast frame?

<p>It will flood the frame to all ports. (A)</p> Signup and view all the answers

Which of the following statements accurately describes the baseband transmission method?

<p>Only one stream of intelligence or data is transmitted. (B)</p> Signup and view all the answers

What does rate adaptation in switches facilitate?

<p>Communication between devices with differing Ethernet speeds. (B)</p> Signup and view all the answers

Which IEEE 802.3 variant supports a maximum transmission distance of 3600 meters?

<p>10Broad36 (C)</p> Signup and view all the answers

What is the primary encoding technique used in the baseband systems of Ethernet LANs?

<p>Manchester digital encoding (C)</p> Signup and view all the answers

What is the purpose of the CRC field in an Ethernet frame format?

<p>To provide error-checking functionality (A)</p> Signup and view all the answers

What is the primary advantage of active hubs over passive hubs?

<p>They can regenerate signals to reduce errors. (B)</p> Signup and view all the answers

Which feature distinguishes intelligent hubs from other types of hubs?

<p>Their ability to manage hub configurations remotely. (B)</p> Signup and view all the answers

What is the key function of a switching hub?

<p>To route packets only to the intended destination port. (C)</p> Signup and view all the answers

Which statement correctly describes the role of a multilayer switch?

<p>It functions across multiple OSI layers simultaneously. (A)</p> Signup and view all the answers

What is one of the main benefits of signal regeneration in active hubs?

<p>Ability to connect devices farther apart. (A)</p> Signup and view all the answers

How do active hubs compare to repeaters in network functionality?

<p>Active hubs function as multiport repeaters. (C)</p> Signup and view all the answers

What is a primary disadvantage of using active hubs compared to passive hubs?

<p>The cost of active hubs is generally higher. (C)</p> Signup and view all the answers

What role does a network switch primarily play in a LAN?

<p>Connecting multiple network segments and managing traffic. (A)</p> Signup and view all the answers

What must be true for a codeword to be classified as cyclic in a cyclic code?

<p>If a codeword is cyclically shifted, it still remains a codeword. (B)</p> Signup and view all the answers

During the cyclic redundancy check (CRC) process, what role does the remainder play in forming the codeword?

<p>It is combined with the data word to create the final codeword. (D)</p> Signup and view all the answers

What is the checksum method designed to accomplish during data transmission?

<p>To compare the server's calculations with the transmitted sum for error detection. (D)</p> Signup and view all the answers

What is one key reason for sending the negative of the sum in the checksum method?

<p>It allows the receiver to quickly identify mismatches. (D)</p> Signup and view all the answers

In the context of error detection, what does the term 'generator polynomial' refer to?

<p>A divisor used in cyclic codes during CRC. (A)</p> Signup and view all the answers

What happens if the results of the checksum verification do not match?

<p>The receiver assumes there is an error and rejects the data. (B)</p> Signup and view all the answers

In establishing a CRC codeword from a given data word, what additional steps are involved?

<p>Augmenting the data word with a specified number of zeros and calculating quotient and remainder. (B)</p> Signup and view all the answers

When using cyclic codes, which property allows for the effective identification of errors?

<p>The inclusion of redundant bits within the codeword. (D)</p> Signup and view all the answers

What role do VLANs play in addressing scalability issues within a network?

<p>VLANs segment the network to efficiently manage traffic and reduce collisions. (A)</p> Signup and view all the answers

Which statement correctly describes the relationship between VLANs and IP subnets?

<p>A single IP subnet can be spread across multiple VLANs. (C)</p> Signup and view all the answers

How do VLANs benefit network management?

<p>VLANs provide a way to segment traffic for easier troubleshooting. (B)</p> Signup and view all the answers

What assumption is made about frames in VLAN-aware networks that do not contain a VLAN tag?

<p>They are part of the native VLAN. (C)</p> Signup and view all the answers

What restriction do switches face regarding bridging IP traffic between VLANs?

<p>Switches are prohibited from bridging IP traffic to maintain VLAN integrity. (C)</p> Signup and view all the answers

What is the main purpose of VLAN tagging in Ethernet frames?

<p>To represent the VLAN membership of the frame in VLAN-aware networks. (C)</p> Signup and view all the answers

What happens when a DHCP server is connected to a switch using VLANs?

<p>Only hosts in the same VLAN can obtain addresses from the server since it is broadcast-based. (D)</p> Signup and view all the answers

In VLAN configurations, which of the following is crucial for maintaining traffic flow management?

<p>Routers perform address summarization and broadcast filtering. (D)</p> Signup and view all the answers

Flashcards

802.3 MAC Frame Length

The 802.3 MAC frame has a fixed length, determined by the sum of its fields (Preamble, Start Frame Delimiter, Destination Address, Source Address, Length, Information Field, Frame Check Sequence).

Information Field

The part of the MAC frame containing data from the Logical Link Control (LLC) layer. It has a minimum of 46 octets and maximum of 1500 octets.

Pad

Added octets to fulfill the minimum size requirement (46 octets) for the Information field if the data is less than 46 octets.

Frame Check Sequence (FCS)

Used at the bit level for error-checking, based on 32-bit Cyclic Redundancy Check (CRC) and consists of 4 octets.

Signup and view all the flashcards

CSMA/CD

Carrier Sense Multiple Access/Collision Detect; a protocol that controls which station talks on a network cable at a given moment.

Signup and view all the flashcards

MAC Frame Length Min/Max

The 802.3 MAC frame has a minimum length of 64 octets and a maximum length of 1526 octets defined by its fields' sizes.

Signup and view all the flashcards

Length Field

The length field specifies the size of the Information field (data) in the 802.3 MAC frame.

Signup and view all the flashcards

Bus Arbitration

The process of deciding which station on the network is permitted to transmit data.

Signup and view all the flashcards

Block Coding

A method of data transmission where data is divided into blocks, with redundant bits added to each block for error detection and correction.

Signup and view all the flashcards

Data Word

A block of bits representing the original message, with a length of k.

Signup and view all the flashcards

Code Word

An n-bit block formed by combining the data word and redundant bits.

Signup and view all the flashcards

4b/5b Coding

A specific block coding example where k=4 and n=5, converting 4-bit data words into 5-bit code words.

Signup and view all the flashcards

Error Detection

Checking for errors in transmitted data by using redundant bits.

Signup and view all the flashcards

Error Correction

Identifying and fixing errors that occur during data transmission.

Signup and view all the flashcards

Redundant Bits

Extra bits added to a data block for error detection and/or correction.

Signup and view all the flashcards

Error Undetectable

A situation where a corrupted codeword may still be accepted as valid, leading to undetected errors.

Signup and view all the flashcards

Cyclic Codes

Special linear block codes where cyclically shifting a codeword produces another valid codeword.

Signup and view all the flashcards

CRC

Cyclic Redundancy Check, a method of error detection using a generator polynomial to add redundant bits.

Signup and view all the flashcards

Generator Polynomial

A polynomial used in CRC calculations to create the redundant bits for error detection.

Signup and view all the flashcards

Checksum

Used to detect errors. Computes the sum of data and sends the sum along with the data.

Signup and view all the flashcards

Error Detection

Methods to find errors that have occurred during data transmission.

Signup and view all the flashcards

Codeword

A combination of data bits and redundant bits used for data transmission.

Signup and view all the flashcards

Redundant Bits

Extra bits added to a codeword for error detection. They are not part of the original data.

Signup and view all the flashcards

Checksum complement

The negative or complement of the sum calculated from the data, used to make error detection easier for the receiver.

Signup and view all the flashcards

Primary Station

The station that controls the data link, initiates error recovery, and manages data transmission to and from itself.

Signup and view all the flashcards

Secondary Station

The station that responds to the primary station's commands and may initiate transmission when needed, like when its buffer is full.

Signup and view all the flashcards

Sliding Window

The number of unacknowledged frames a secondary station can handle. It defaults to 2, but can be negotiated.

Signup and view all the flashcards

RNR (Receiver Not Ready)

A message from the secondary station to the primary when its buffer is full.

Signup and view all the flashcards

RR (Receiver Ready)

A message from the secondary station to the primary that it is ready to receive more frames.

Signup and view all the flashcards

Data Frames

Frames that hold data transmitted between stations on a LAN.

Signup and view all the flashcards

Supervisory Frames

Frames used by secondary stations to acknowledge or signal issues about a group of received data frames.

Signup and view all the flashcards

Information Frames

Data frames carrying the actual data or message to be transmitted.

Signup and view all the flashcards

Solid vs. Stranded Cable

Solid cable uses a single wire per conductor, while stranded cable uses multiple smaller wires. Stranded cable is more flexible and better for frequent plugging and unplugging.

Signup and view all the flashcards

VLAN

A virtual LAN is a logical grouping of devices on a network that behave as if they are on the same physical LAN, regardless of their physical location.

Signup and view all the flashcards

VLAN Creation

Creating VLANs lets administrators segment the network into broadcast domains, reducing network traffic and improving bandwidth.

Signup and view all the flashcards

UTP Cable Categories

Different categories of UTP (Unshielded Twisted Pair) cables, like Cat3, Cat5, and Cat6, are designed for different network speeds.

Signup and view all the flashcards

UTP Cable Length

The maximum length of a UTP cable segment is 100 meters for standard network implementations.

Signup and view all the flashcards

Broadcast Domain

A group of devices on a network that can communicate directly with each other without needing a router.

Signup and view all the flashcards

Straight vs. Crossed Cables

Straight cables connect dissimilar devices (e.g., computers to hubs), while crossed cables connect similar devices (e.g., hub to hub).

Signup and view all the flashcards

VLAN1

The default VLAN on a switch, often used for network management and configuration.

Signup and view all the flashcards

Power over Ethernet (PoE)

A technology that allows data and power transmission over a single Ethernet cable.

Signup and view all the flashcards

Access Mode (Port)

A switch port configuration that connects to a single VLAN, usually a device or server.

Signup and view all the flashcards

Trunk Mode (Port)

A switch port carrying traffic for multiple VLANs simultaneously, typically between switches.

Signup and view all the flashcards

TIA/EIA 568 Standards

Standards for wiring UTP cables, including 568A and 568B, specifying pin assignments for RJ45 connectors.

Signup and view all the flashcards

Category 5e UTP Cable

A type of UTP cable with color coding based on 568A and 568B standards, used for networking.

Signup and view all the flashcards

Bandwidth Contention

Competition for available network resources, which can lead to slower speeds and performance issues.

Signup and view all the flashcards

Deployment Flexibility

The ability to adapt network configurations to change and add devices effortlessly.

Signup and view all the flashcards

UpLink Ports

Special ports on hubs and switches designed to use straight cables for connecting other hubs or switches, avoiding the need for crossed cables.

Signup and view all the flashcards

Cyclic Codes

Special linear block codes where cyclically shifting a codeword produces another valid codeword.

Signup and view all the flashcards

CRC

Cyclic Redundancy Check, a method of error detection using a generator polynomial to add redundant bits.

Signup and view all the flashcards

Generator Polynomial

A polynomial used in CRC calculations to create the redundant bits for error detection.

Signup and view all the flashcards

Checksum

Used to detect errors. Computes the sum of data and sends the sum along with the data.

Signup and view all the flashcards

Codeword

A combination of data bits and redundant bits used for data transmission.

Signup and view all the flashcards

Redundant Bits

Extra bits added to a codeword for error detection. They are not part of the original data.

Signup and view all the flashcards

Checksum complement

The negative or complement of the sum calculated from the data, used to make error detection easier for the receiver.

Signup and view all the flashcards

Error Detection

Methods to determine if errors occurred during data transmission.

Signup and view all the flashcards

Ethernet Cable Length

The maximum distance a cable can transmit data in an Ethernet network.

Signup and view all the flashcards

10Base5

An Ethernet standard using thick coaxial cable for a backbone.

Signup and view all the flashcards

10Base-T

An Ethernet standard using twisted-pair cables for a star topology.

Signup and view all the flashcards

Baseband Signaling

A transmission method where a single data stream travels over the cable.

Signup and view all the flashcards

Ethernet Data Rates

The speed at which data is transmitted over an Ethernet network, ranging from 1 to 100 Mbps.

Signup and view all the flashcards

Ethernet Frame Format

The structure of data transmitted on Ethernet, containing preamble, destination/source, data, etc. specified by IEEE 802.3.

Signup and view all the flashcards

Networking Devices: Adapters

Devices (e.g., repeaters or bridges) that can extend the maximum cable length.

Signup and view all the flashcards

UTP Cable Category

Different types of twisted-pair cables (e.g., Cat5, Cat5e) supporting various Ethernet speeds.

Signup and view all the flashcards

Passive Hub

A network hub that simply transmits signals without amplification or cleaning. It is inexpensive and easy to configure.

Signup and view all the flashcards

Active Hub

A network hub that amplifies and cleans up network signals, making the network more robust and allowing longer distances.

Signup and view all the flashcards

Signal Regeneration

The process of cleaning up and amplifying network signals in a hub, improving signal quality, reliability, and distance.

Signup and view all the flashcards

Intelligent Hub

An active hub with added features including management protocols, enabling administrators to control network connections and monitor errors.

Signup and view all the flashcards

Switching Hub

An advanced hub featuring circuitry that routes signals directly to the destination port, leading to faster transfer rates.

Signup and view all the flashcards

Network Switch

A computer networking device connecting network segments, playing an essential role in Ethernet LANs. It can operate on multiple OSI layers.

Signup and view all the flashcards

Multilayer Switch

A networking device operating simultaneously on multiple OSI layers, including physical, data link, network, or transport.

Signup and view all the flashcards

Maximum Distance (Hub)

The limit of distance a network hub can support between any connected device.

Signup and view all the flashcards

Bit-Oriented Protocols

Protocols where each bit in a data stream has a specific function and meaning, determined by its position and value.

Signup and view all the flashcards

Frame

An envelope that packages data for transmission, containing header (routing), body (data), and tail (checksum).

Signup and view all the flashcards

Frame Validity Check

A process that checks a frame for errors before forwarding data to the next station on a network path.

Signup and view all the flashcards

Data Transmission (Intermediate Stations)

Data is encapsulated in frames and forwarded by intermediate stations until it reaches the final destination, each station checking and forwarding the frame.

Signup and view all the flashcards

Frame Acknowledgment

The verification step that a frame has been correctly processed by the next station in the transmission.

Signup and view all the flashcards

Buffer Space Limitation

A receiving station has a limited capacity to store incoming frames, signaling others when its buffer is full.

Signup and view all the flashcards

Half/Full Duplex Transmission

Methods for sending data over a network, where half-duplex allows only one station to transmit at a time, while full-duplex allows both ends to transmit simultaneously.

Signup and view all the flashcards

Datagram/Virtual Circuit Transmission

Two ways to send data across a network: datagram (different routes) and virtual circuit (same route).

Signup and view all the flashcards

Switch Benefits

Switches offer dedicated bandwidth per device, multiple simultaneous conversations, and full-duplex communication, improving network performance compared to hubs.

Signup and view all the flashcards

Collision Domain

A network segment where data packets can collide if multiple devices transmit simultaneously, which can lead to retransmissions, as compared to a switch's dedicated ports.

Signup and view all the flashcards

Switch Port

A physical connection point on a switch, which microsegments the network, providing dedicated bandwidth for the connected device

Signup and view all the flashcards

Full Duplex

A communication method that allows simultaneous transmission and reception of data on a single connection, effectively doubling the bandwidth compared to half-duplex.

Signup and view all the flashcards

MAC Address Table

A table maintained by a switch to track the MAC addresses of devices connected to each port, allowing the switch to selectively forward data frames to the correct destination.

Signup and view all the flashcards

Frame Forwarding

Switches forward data frames based on the destination MAC address. If unknown, the frame is broadcasted to all ports. If known, they selectively forward it to the correct port

Signup and view all the flashcards

Switch Filtering

A process in which a switch does not forward a frame if the destination MAC address is connected to the same port as the source.

Signup and view all the flashcards

Switch Flooding

A process in which a switch sends a data frame to all ports except the one it received from in case it doesn't know the destination MAC address. Used for broadcasts.

Signup and view all the flashcards

Network Reconfiguration

Changing network setup through software, without physically moving network devices.

Signup and view all the flashcards

Virtual LAN (VLAN)

A logical grouping of devices on a network, acting as one network, regardless of physical location.

Signup and view all the flashcards

IEEE 802.1Q

A networking standard supporting VLANs on Ethernet, defining VLAN tagging and switch handling procedures.

Signup and view all the flashcards

VLAN Tag

A label added to Ethernet frames to indicate the VLAN membership of the frame's port, often port/protocol combo.

Signup and view all the flashcards

VLAN-aware Network

A network segment that supports and uses VLAN tags.

Signup and view all the flashcards

Native/Default VLAN

The VLAN a frame on a VLAN-aware network is assigned to if it doesn't have a VLAN tag.

Signup and view all the flashcards

VLAN Purpose

To provide services like segmentation, scalability, security, and network management, originally done through routers.

Signup and view all the flashcards

VLANs and Routers

Routers in VLAN topologies filter broadcasts, improve security, summarize addresses, and manage traffic flow.

Signup and view all the flashcards

Study Notes

Data Transmission on LAN

  • This chapter discusses data transmission functions on Local Area Networks (LANs).
  • Key topics include Data Link Control (framing, line discipline, flow control, and error control), Media Access Control (Ethernet categories, wiring practices, and PoE), and connecting devices.
  • Framing: Data Link Layer packages bits into frames for identification.
    • Character-oriented frames are shown in Figure 3.1(a).
    • Bit-oriented frames are shown in Figure 3.1(b).
  • Line Discipline: Ensures devices transmit only when the receiver is ready to accept data.
  • Flow Control: Procedures to restrict the amount of data a sender can transmit before waiting for acknowledgment. Two methods are Stop-and-Wait and Sliding Window.
  • Error Control: Detects and corrects errors during transmission.
    • Single-bit errors and burst errors are discussed in Fig 3.2.
    • Error detection methods, like Block Coding, and Cyclic Redundancy Check (CRC) are included.

Flow Control

  • Flow control procedures enable the sender to know how much data can be transmitted before waiting for acknowledgment from the receiver.
  • Two issues in flow control are maintaining receiver resources and acknowledging data sent to the receiver. Methods discussed are Stop-and-Wait and Sliding Window.

Error Detection and Correction

  • Data can be corrupted during transmission.
  • Techniques used to detect and correct errors include:
    • Single-bit error detection
    • Burst error detection
  • Examples and relevant figures (Fig 3.2) are provided. Different coding methods (Block coding, CRC, Checksum) are covered.

LAN Protocols

  • Character-oriented protocols use 8-bit characters and ASCII code.
    • Characters are used to signal the meaning
  • Bit-orientated protocols are efficient, where each bit has significance in the data stream.
    • Examples are X.25, HDLC, and SDLC.

Media Access Control (MAC)

  • IEEE 802.3 standard defines Ethernet protocol.
  • MAC Layer: Used to control access to shared communication media efficiently.
    • Key functions associated with the MAC Layer are Carrier Sense Multiple Access with Collision Detection (CSMA/CD) and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Figures show the Ethernet frame format.
  • Ethernet Evolution: Standards include 10Base5, 10Base2, 10Base-T, 10Base-F, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet as highlighted in Figure 3.14.
    • Ethernet specifications are discussed in terms of data rates, cable types, and distance limits.

Cables

  • UTP (Unshielded Twisted Pair) and STP (Shielded Twisted Pair) cables are used in Ethernet.
  • UTP cables are categorized by their performance.
  • Color coding diagrams (Fig 3.18, 3.17) are provided for typical cable wiring schemes.

Power over Ethernet (PoE)

  • PoE is a technology enabling simultaneous data and power transmission over a single Ethernet cable.
  • Various PoE standards (IEEE 802.3af/15.4W, 802.3at/25.5W) for power supply are defined by figures and tables provided.

Connecting Devices

  • Hubs: Central connection points for multiple devices. Three types are available: (Passive, Active, and intelligent).
  • Switches: Enhance hubs by segmenting the network, improving speed, and facilitating multiple simultaneous data transfers.
  • Layer-2 switches: Provide hardware-based switching to segment collisions domains.
  • Layer-3 switches: Enhance Layer-2 switches using Routing protocols; able to route traffic between VLANs.

VLANs (Virtual LANs)

  • VLANs help group devices logically independent of their physical location.
  • VLAN creation is facilitated using IEEE 802.1Q standard.
  • Data traffic between VLANs can be regulated using routers.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Data Transmission on LAN PDF

Description

Explore the vital functions of data transmission in Local Area Networks (LANs). This quiz covers key concepts of Data Link Control, Media Access Control, and essential techniques such as framing, flow control, and error management. Understand how data is efficiently transferred and managed within a network.

More Like This

Use Quizgecko on...
Browser
Browser