Local Area Networking Technology Quiz
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a key characteristic of token ring networks compared to Ethernet?

  • Access is deterministic (correct)
  • Supports direct cable connections
  • Utilizes CSMA/CD protocol
  • Access is non-deterministic

Which of the following statements about data transfer rates of token ring networks is true?

  • Token ring networks exclusively operate at 32 Mbps.
  • Token ring networks do not have defined speed options.
  • Data transfer rates can range from 4, 16 to 100 Mbps. (correct)
  • Token ring networks only support rates up to 10 Mbps.

What is a disadvantage of token ring networks compared to Ethernet?

  • Less expensive hardware requirements
  • Generally more expensive to implement (correct)
  • Requires direct cable connections between NICs
  • More susceptible to collisions

How do token ring networks prevent data collisions?

<p>By implementing a single-use token system (B)</p> Signup and view all the answers

Which statement is true regarding the current use of token ring networks?

<p>They are still used in some IBM locations. (B)</p> Signup and view all the answers

What happens when a node wants to transmit data in a token ring network?

<p>It waits for the free token and removes it from the ring. (D)</p> Signup and view all the answers

What is the main consequence of a node failure in a token ring network?

<p>It can cause the entire ring operation to be disrupted. (B)</p> Signup and view all the answers

Which token indicates that it is busy in a token ring network?

<p>01111111 (A)</p> Signup and view all the answers

What mechanism is used for collision resolution in a token ring network?

<p>Nodes create new tokens with a randomized delay. (C)</p> Signup and view all the answers

What is a characteristic of Traditional Ethernet (IEEE 802.3)?

<p>It utilizes a 1-persistent CSMA/CD method. (B)</p> Signup and view all the answers

What type of address is a source address in a network?

<p>Unicast address (C)</p> Signup and view all the answers

Which Ethernet cabling type supports a maximum segment length of 100 meters?

<p>10Base-F (A), 10Base-T (B)</p> Signup and view all the answers

What is the consequence of having more stations in a network segment?

<p>Reduced network performance (C)</p> Signup and view all the answers

What topology is used in both 10Base-T and 10Base-F Ethernet?

<p>Star topology (D)</p> Signup and view all the answers

How many possible LAN addresses can be provided by NICs?

<p>248 (B)</p> Signup and view all the answers

What is the primary function of segmentation in a network?

<p>To isolate broadcast traffic (D)</p> Signup and view all the answers

What is the main characteristic of a NIC's address?

<p>It is permanently assigned at manufacturing (A)</p> Signup and view all the answers

When does a router transfer data from one network segment to another?

<p>When the destination is on a different segment (D)</p> Signup and view all the answers

What is the primary characteristic of Pure ALOHA?

<p>It is a true free-for-all access method. (A)</p> Signup and view all the answers

What is the maximum utilization rate of the channel in Pure ALOHA?

<p>18% (B)</p> Signup and view all the answers

Which method organizes time into uniform slots for transmission?

<p>Slotted ALOHA (D)</p> Signup and view all the answers

In CSMA, what is the initial step a station must take before transmitting?

<p>Listen to the medium. (B)</p> Signup and view all the answers

What happens if a station in Pure ALOHA fails to receive an acknowledgment after repeated transmissions?

<p>It gives up and ceases transmission. (D)</p> Signup and view all the answers

What does the CSMA method aim to minimize?

<p>The chance of collision. (D)</p> Signup and view all the answers

What technique is needed to prevent unwanted collisions in Slotted ALOHA?

<p>Time synchronization among stations. (D)</p> Signup and view all the answers

Which of the following statements is true regarding collisions in CSMA?

<p>Collisions can still occur despite listening before transmitting. (C)</p> Signup and view all the answers

What is the primary function of a Local Area Network (LAN)?

<p>To enable communications and resource sharing in a confined area (B)</p> Signup and view all the answers

Which layers of the OSI model do LAN protocols primarily address?

<p>Physical and Data Link layers (A)</p> Signup and view all the answers

What is the role of the MAC sub-layer in a LAN?

<p>To govern access to the shared media (A)</p> Signup and view all the answers

What are broadcast channels commonly referred to as in LAN communications?

<p>Multi-access channels (C)</p> Signup and view all the answers

During data transmission, what initial action must be performed to prepare data for sending over a LAN?

<p>Assemble data into a frame with appropriate addressing (B)</p> Signup and view all the answers

What is a consequence of computers sharing a LAN?

<p>Reduced costs associated with infrastructure (C)</p> Signup and view all the answers

Which of the following is NOT a function at the physical layer of the IEEE 802 reference model?

<p>Frame assembly for transmission (D)</p> Signup and view all the answers

How do higher layer protocols relate to LAN networks within the OSI model?

<p>They function independently of the network architecture (D)</p> Signup and view all the answers

What is a characteristic of non-persistent collision detection?

<p>It waits a random amount of time before sending. (A), It reduces the chance of collision but increases delays. (C)</p> Signup and view all the answers

In a p-persistent strategy, what happens if the line is idle?

<p>The station sends based on a predetermined probability p. (A)</p> Signup and view all the answers

In CSMA/CD, what happens after a collision is detected?

<p>The sender waits a random amount of time to attempt sending again. (C)</p> Signup and view all the answers

What is the purpose of the exponential backoff method in CSMA/CD?

<p>To increase the initial wait time after each collision. (A)</p> Signup and view all the answers

How does CSMA/CA handle data transmission?

<p>By waiting an interframe gap followed by a random time before sending. (A)</p> Signup and view all the answers

What is the role of a 'jam' signal in collision detection?

<p>To alert other stations about the collision. (B)</p> Signup and view all the answers

What is the primary function of token passing in networking?

<p>To authorize a station to send data. (D)</p> Signup and view all the answers

What mechanism is specifically associated with wireless LANs to avoid collisions?

<p>CSMA/CA (C)</p> Signup and view all the answers

Flashcards

What is a WAN?

A communication network that spans a large geographical area, using point-to-point links and satellite networks for connectivity.

What is Pure ALOHA?

The earliest packet radio network access method, where stations can transmit at any time, leading to high chances of collisions.

How does Slotted ALOHA work?

A method to improve Pure ALOHA by dividing time into slots. Stations can only transmit at the beginning of a slot, reducing collisions.

How does CSMA (Carrier Sense Multiple Access) work?

A method to minimize collisions in data transmission, where a station listens for activity before transmitting, allowing for communication if the medium is free.

Signup and view all the flashcards

What is propagation delay?

Time taken for a signal to travel from one point to another in a network.

Signup and view all the flashcards

What is a collision in network communication?

When two or more stations transmit data at the same time, leading to data corruption.

Signup and view all the flashcards

What is the random backoff strategy?

A strategy used in CSMA where a station waits for a random amount of time after a collision before attempting to transmit again, reducing the chance of repeated collisions.

Signup and view all the flashcards

What is channel utilization?

A measurement of how efficiently a network communication channel is utilized. In Pure ALOHA, the maximum utilization is about 18% due to collisions.

Signup and view all the flashcards

What is a Local Area Network (LAN)?

A data communication network connecting users within a limited area, often using high speed connections like 10 mbps to gigabits per second.

Signup and view all the flashcards

What's the shared medium in a LAN?

A single communication medium, typically a cable, that multiple computers connect to, allowing them to share data and resources.

Signup and view all the flashcards

What are the benefits and challenges of sharing a single medium in a LAN?

Sharing a single medium for communication allows for cost reduction, but it also requires coordination and rules to manage access, preventing devices from interfering with each other.

Signup and view all the flashcards

At what layers of the OSI model do LANs operate?

LANs function at the physical and data link layers of the OSI model, handling low-level details like encoding data, transmitting bits, and managing access to the shared channel.

Signup and view all the flashcards

Do LANs use the same protocols at all levels of the OSI model?

While LANs use specific protocols for the physical and data link layers, they can utilize higher level protocols (layer 3 and above) designed for different network types, like MANs or WANs.

Signup and view all the flashcards

What is the IEEE 802 reference model?

The IEEE 802 reference model describes a simplified model of network architecture, focusing on the physical and data link layers, which are critical for LANs.

Signup and view all the flashcards

What are the core functions of the physical layer in the IEEE 802 model?

At the lowest level of the IEEE 802 model, the physical layer handles the physical transmission of data bits, including encoding, synchronization signals, and bit-by-bit transmission.

Signup and view all the flashcards

What are the key functions of the data link layer in LANs?

The data link layer handles functions like assembling data into frames (packages), adding addresses and error detection information, disassembling frames on reception, and managing access to the shared communication channel.

Signup and view all the flashcards

Non-persistent CSMA

A network access method where a station senses the line and sends data only if it's idle. If the line is busy, it waits a random amount of time before attempting to send again. This helps reduce collisions but can lead to network inefficiency and longer delays.

Signup and view all the flashcards

Persistent CSMA

A network access method where a station senses the line and sends data if it's idle. If the line is busy, it continues to listen. This method improves efficiency compared to non-persistent CSMA by reducing the chance of collisions.

Signup and view all the flashcards

p-persistent CSMA

A variation of persistent CSMA where a station sends data with a probability 'p' when the line is idle. The probability 'p' determines how often the station attempts to send, with higher 'p' increasing the chance of sending but also increasing the risk of collisions.

Signup and view all the flashcards

CSMA/CD

A network access method that combines CSMA with collision detection. If a collision is detected, the station waits a random amount of time before re-transmitting. The waiting time increases with each subsequent collision, helping to prevent persistent collisions.

Signup and view all the flashcards

Jamming signal in CSMA/CD

When a collision is detected in CSMA/CD, a jamming signal is sent to alert other stations and discard any data that was received during the collision.

Signup and view all the flashcards

CSMA/CA

A network access method that combines CSMA with collision avoidance. It uses a combination of persistent strategies, interframe gaps, and random backoff times to minimize the chance of collisions.

Signup and view all the flashcards

Token Passing

A network access method where stations take turns sending data by passing a special frame called a token. The station holding the token is the only one allowed to send data, ensuring that only one station transmits at a time, preventing collisions.

Signup and view all the flashcards

MAC Address

A unique identifier for a network interface card (NIC) burned onto its ROM during manufacturing. It's a 6-byte hexadecimal address that's permanent.

Signup and view all the flashcards

Unicast Address

A type of network address that is transmitted to a single destination device. It's like sending mail to a specific person.

Signup and view all the flashcards

Multicast Address

A type of network address that is transmitted to multiple destinations simultaneously. It's like sending an email to a group.

Signup and view all the flashcards

Broadcast Address

A type of network address that is sent to all devices on a network. It's like sending a message to everyone in the room.

Signup and view all the flashcards

10Base-T

A type of Ethernet cabling that uses twisted-pair wire and supports a speed of 10 Mbps. It's commonly used for shorter distances, up to 100 meters.

Signup and view all the flashcards

10Base-F

A type of Ethernet cabling that uses fiber optic cable and supports a speed of 10 Mbps. It's often used for longer distances, up to 2 kilometers.

Signup and view all the flashcards

Hub (Ethernet)

A device used to connect multiple devices on a network. It's a simple device that broadcasts data to all connected devices, regardless of its intended destination.

Signup and view all the flashcards

Network Segmentation

A method of dividing a large network into smaller segments. It's used to reduce network traffic congestion and improve performance by limiting the number of devices contending for network access.

Signup and view all the flashcards

Token (in a ring network)

A bit sequence that circulates around a ring network, allowing nodes to transmit data. It exists in two states: free (01111110) when no transmission is happening and busy (01111111) when a node is transmitting.

Signup and view all the flashcards

CSMA/CD (Carrier Sense Multiple Access/Collision Detection)

A method used in Ethernet to prevent data collisions, where nodes listen for traffic before sending, but if a collision occurs, they wait a random time before trying again.

Signup and view all the flashcards

Ethernet Frame

A data packet that contains information about the source and destination nodes, as well as the data itself. In Ethernet, it has several fields, including preamble, SFD, destination MAC address, source MAC address, type, data, and CRC.

Signup and view all the flashcards

Minimum and Maximum Ethernet Frame Lengths

The smallest and largest allowable sizes of an Ethernet frame without the preamble and SFD, ensuring consistent data transmission.

Signup and view all the flashcards

Ethernet Frame Padding

Used to fill in the gap when a data packet size is smaller than the minimum Ethernet frame length, ensuring consistency in frame size.

Signup and view all the flashcards

Token Ring Network

A network technology where data packets are transferred in a circular manner using a "token" to control access, preventing collisions and ensuring orderly communication.

Signup and view all the flashcards

Ethernet Network

A network technology that uses a contention-based access method where devices compete for access to the network, leading to potential collisions.

Signup and view all the flashcards

Deterministic Access

A type of network access method where the order of access is predetermined and predictable, reducing the chance of collisions.

Signup and view all the flashcards

Non-Deterministic Access

A type of network access method where access is not guaranteed and devices compete for network resources, leading to potential collisions.

Signup and view all the flashcards

Study Notes

Local Area Networking Technology

  • A local area network (LAN) is a data communication network that serves users in a confined geographic area. It uses high transmission speeds, typically from 10 Mbps to several Gbps.
  • LANs are designed for communication and resource sharing in local work environments like rooms, campuses, or buildings.
  • A LAN often uses a single shared medium (usually a cable) that computers can connect to. This sharing of resources leads to lower costs.
  • LANs operate at the physical and data link layers of the OSI model.
  • Higher-layer protocols (layers 3 and 4 or above) are independent of the network architecture; they can be used in LANs, MANs (Metropolitan Area Networks), and WANs (Wide Area Networks).
  • LAN protocols primarily focus on the lower layers (1 and 2) of the OSI model.
  • The lowest layer of the IEEE 802 reference model correlates with the physical layer, which includes encoding/decoding of signals, preamble generation/removal for synchronization, and bit transmission/reception.

Access Methods

  • Broadcast channels, also known as multi-access or random access channels, are used in some LANs.
  • Access methods decide how shared media is utilized in a multi-access channel. Protocols determine which device goes next.
  • Media Access Control (MAC) acts as a sub-layer within the data link layer and plays a vital role in LANs. It's a key mechanism for multi-access channels.
  • WANs (Wide Area Networks), in contrast, often use point-to-point links.

Pure ALOHA

  • The earliest access method, often used in packet radio networks.
  • It's considered a "true free-for-all" system.
  • Stations wait for a time equal to the maximum round-trip propagation delay plus a small fixed increment.
  • Stations only send if there's no acknowledgement after repeated transmissions; otherwise, it gives up.
  • Collisions are frequent. The channel utilization is low, maxing out at about 18%.

Slotted ALOHA

  • The channel is slotted, with each slot having a duration equivalent to the frame transmission time.
  • A central clock is needed for synchronization (to maintain timing).
  • Collisions are still possible, and retransmission occurs after a random delay.

CSMA (Carrier Sense Multiple Access)

  • Stations "listen before talk," sensing the medium's status before transmitting.
  • If the channel is busy, the station waits; otherwise, it transmits.
  • Collisions still occur due to propagation delay. Stations do not know if another transmission is starting at the same moment.

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

  • The system adds a collision detection to CSMA.
  • If a collision is detected, the sender waits a random amount of time before trying to transmit again. Backoff time increases with consecutive collisions.
  • The backoff times are calculated exponentially. The waiting time between 0 and 2N x maximum propagation time, where N is the number of attempted transmissions.
  • A jamming signal alerts other stations to the collision and discards the affected frame.

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

  • Collision avoidance is preferred over collision detection.
  • Uses one of the persistent strategies
  • After the line is idle, it waits for an interframe gap (IFG).
  • Then it waits for another random amount of time.
  • Sends the frame, sets a timer. If an acknowledgment (ACK) is received before the timer expires, the transmission is successful. (Otherwise, there's a frame/ACK issue, so retry).
  • Used for wireless LANs.

Token Passing

  • A station is authorized to send data after it receives a token (a special frame).
  • Stations are arranged in a ring.
  • A token circulates around the ring when no data is being transmitted.
  • Tokens are bit sequences. A "free token" is 01111110 and a "busy token" is 01111111.
  • When a node needs to transmit, it waits for the free token.
  • When done transmitting, it releases the busy token back into the ring and replaces it with a free token.

Token Bus

  • Stations on the bus form a logical ring.
  • The physical ordering of stations on the bus is irrelevant.
  • Token passing medium access control protocol is used.

Token Ring

  • Introduced by IBM in the early 1980s.
  • Logical topology is a ring (or sometimes a star).
  • Token-passing media access control is used.
  • Only a station with the token can send data, and the token is released only when the data's receipt is confirmed.

Ethernet

  • The most popular LAN physical architecture.
  • Originally created in 1976 at Xerox's Palo Alto Research Center.
  • Operates at 10 Mbps, with later iterations increasing to 100 Mbps, 1000 Mbps, and higher rates.
  • Uses CSMA/CD or CSMA/CA (in newer versions).
  • Ethernet frames are defined as 7 fields that include preamble, start field delimiter, destination address, source address, length/type, data and padding, and the cyclic redundancy check (CRC),
  • Provides minimum and maximum frame lengths. Padding is used for packets smaller than the minimum size.
  • Uses MAC (Media Access Control) addressing. Addresses are permanently burned into Network Interface Cards (NICs).

Fast Ethernet

  • Enhanced Ethernet to provide higher data rates at 100 Mbps using similar architectures. A significant feature is Auto-negotiation, which allows incompatible devices to communicate.

Gigabit Ethernet

  • Further advancement to 1000 Mbps.
  • Uses protocols and interfaces that remain compatible with previous Ethernet standards.

Ethernet vs. Token Ring

  • Ethernet's access is non-deterministic (contention-based); Token Ring is deterministic.
  • Ethernet supports direct cable connections between NICs, while Token Ring does not.
  • Ethernet uses CSMA/CD or CSMA/CA, and Token ring uses tokens to regulate access to the network media.
  • Ethernet is generally less expensive than Token Ring.

Segmentation

  • Used to split a large Ethernet network into smaller segments connected by routers.
  • Reduces collisions and improves network performance by limiting the number of stations contending for access.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on Local Area Networking (LAN) technologies and protocols. This quiz covers key concepts such as transmission speeds, OSI model layers, and the role of LAN in resource sharing. Perfect for students and professionals looking to enhance their understanding of networking fundamentals.

More Like This

Ethernet LAN Technology
12 questions

Ethernet LAN Technology

ComplimentaryBigfoot avatar
ComplimentaryBigfoot
Wireless LAN Technology Overview
43 questions
Token Ring Protocol Overview
32 questions

Token Ring Protocol Overview

AmazingNeptunium3354 avatar
AmazingNeptunium3354
Use Quizgecko on...
Browser
Browser