Local Area Networking Technology Quiz
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a key characteristic of token ring networks compared to Ethernet?

  • Access is deterministic (correct)
  • Supports direct cable connections
  • Utilizes CSMA/CD protocol
  • Access is non-deterministic
  • Which of the following statements about data transfer rates of token ring networks is true?

  • Token ring networks exclusively operate at 32 Mbps.
  • Token ring networks do not have defined speed options.
  • Data transfer rates can range from 4, 16 to 100 Mbps. (correct)
  • Token ring networks only support rates up to 10 Mbps.
  • What is a disadvantage of token ring networks compared to Ethernet?

  • Less expensive hardware requirements
  • Generally more expensive to implement (correct)
  • Requires direct cable connections between NICs
  • More susceptible to collisions
  • How do token ring networks prevent data collisions?

    <p>By implementing a single-use token system</p> Signup and view all the answers

    Which statement is true regarding the current use of token ring networks?

    <p>They are still used in some IBM locations.</p> Signup and view all the answers

    What happens when a node wants to transmit data in a token ring network?

    <p>It waits for the free token and removes it from the ring.</p> Signup and view all the answers

    What is the main consequence of a node failure in a token ring network?

    <p>It can cause the entire ring operation to be disrupted.</p> Signup and view all the answers

    Which token indicates that it is busy in a token ring network?

    <p>01111111</p> Signup and view all the answers

    What mechanism is used for collision resolution in a token ring network?

    <p>Nodes create new tokens with a randomized delay.</p> Signup and view all the answers

    What is a characteristic of Traditional Ethernet (IEEE 802.3)?

    <p>It utilizes a 1-persistent CSMA/CD method.</p> Signup and view all the answers

    What type of address is a source address in a network?

    <p>Unicast address</p> Signup and view all the answers

    Which Ethernet cabling type supports a maximum segment length of 100 meters?

    <p>10Base-F</p> Signup and view all the answers

    What is the consequence of having more stations in a network segment?

    <p>Reduced network performance</p> Signup and view all the answers

    What topology is used in both 10Base-T and 10Base-F Ethernet?

    <p>Star topology</p> Signup and view all the answers

    How many possible LAN addresses can be provided by NICs?

    <p>248</p> Signup and view all the answers

    What is the primary function of segmentation in a network?

    <p>To isolate broadcast traffic</p> Signup and view all the answers

    What is the main characteristic of a NIC's address?

    <p>It is permanently assigned at manufacturing</p> Signup and view all the answers

    When does a router transfer data from one network segment to another?

    <p>When the destination is on a different segment</p> Signup and view all the answers

    What is the primary characteristic of Pure ALOHA?

    <p>It is a true free-for-all access method.</p> Signup and view all the answers

    What is the maximum utilization rate of the channel in Pure ALOHA?

    <p>18%</p> Signup and view all the answers

    Which method organizes time into uniform slots for transmission?

    <p>Slotted ALOHA</p> Signup and view all the answers

    In CSMA, what is the initial step a station must take before transmitting?

    <p>Listen to the medium.</p> Signup and view all the answers

    What happens if a station in Pure ALOHA fails to receive an acknowledgment after repeated transmissions?

    <p>It gives up and ceases transmission.</p> Signup and view all the answers

    What does the CSMA method aim to minimize?

    <p>The chance of collision.</p> Signup and view all the answers

    What technique is needed to prevent unwanted collisions in Slotted ALOHA?

    <p>Time synchronization among stations.</p> Signup and view all the answers

    Which of the following statements is true regarding collisions in CSMA?

    <p>Collisions can still occur despite listening before transmitting.</p> Signup and view all the answers

    What is the primary function of a Local Area Network (LAN)?

    <p>To enable communications and resource sharing in a confined area</p> Signup and view all the answers

    Which layers of the OSI model do LAN protocols primarily address?

    <p>Physical and Data Link layers</p> Signup and view all the answers

    What is the role of the MAC sub-layer in a LAN?

    <p>To govern access to the shared media</p> Signup and view all the answers

    What are broadcast channels commonly referred to as in LAN communications?

    <p>Multi-access channels</p> Signup and view all the answers

    During data transmission, what initial action must be performed to prepare data for sending over a LAN?

    <p>Assemble data into a frame with appropriate addressing</p> Signup and view all the answers

    What is a consequence of computers sharing a LAN?

    <p>Reduced costs associated with infrastructure</p> Signup and view all the answers

    Which of the following is NOT a function at the physical layer of the IEEE 802 reference model?

    <p>Frame assembly for transmission</p> Signup and view all the answers

    How do higher layer protocols relate to LAN networks within the OSI model?

    <p>They function independently of the network architecture</p> Signup and view all the answers

    What is a characteristic of non-persistent collision detection?

    <p>It waits a random amount of time before sending.</p> Signup and view all the answers

    In a p-persistent strategy, what happens if the line is idle?

    <p>The station sends based on a predetermined probability p.</p> Signup and view all the answers

    In CSMA/CD, what happens after a collision is detected?

    <p>The sender waits a random amount of time to attempt sending again.</p> Signup and view all the answers

    What is the purpose of the exponential backoff method in CSMA/CD?

    <p>To increase the initial wait time after each collision.</p> Signup and view all the answers

    How does CSMA/CA handle data transmission?

    <p>By waiting an interframe gap followed by a random time before sending.</p> Signup and view all the answers

    What is the role of a 'jam' signal in collision detection?

    <p>To alert other stations about the collision.</p> Signup and view all the answers

    What is the primary function of token passing in networking?

    <p>To authorize a station to send data.</p> Signup and view all the answers

    What mechanism is specifically associated with wireless LANs to avoid collisions?

    <p>CSMA/CA</p> Signup and view all the answers

    Study Notes

    Local Area Networking Technology

    • A local area network (LAN) is a data communication network that serves users in a confined geographic area. It uses high transmission speeds, typically from 10 Mbps to several Gbps.
    • LANs are designed for communication and resource sharing in local work environments like rooms, campuses, or buildings.
    • A LAN often uses a single shared medium (usually a cable) that computers can connect to. This sharing of resources leads to lower costs.
    • LANs operate at the physical and data link layers of the OSI model.
    • Higher-layer protocols (layers 3 and 4 or above) are independent of the network architecture; they can be used in LANs, MANs (Metropolitan Area Networks), and WANs (Wide Area Networks).
    • LAN protocols primarily focus on the lower layers (1 and 2) of the OSI model.
    • The lowest layer of the IEEE 802 reference model correlates with the physical layer, which includes encoding/decoding of signals, preamble generation/removal for synchronization, and bit transmission/reception.

    Access Methods

    • Broadcast channels, also known as multi-access or random access channels, are used in some LANs.
    • Access methods decide how shared media is utilized in a multi-access channel. Protocols determine which device goes next.
    • Media Access Control (MAC) acts as a sub-layer within the data link layer and plays a vital role in LANs. It's a key mechanism for multi-access channels.
    • WANs (Wide Area Networks), in contrast, often use point-to-point links.

    Pure ALOHA

    • The earliest access method, often used in packet radio networks.
    • It's considered a "true free-for-all" system.
    • Stations wait for a time equal to the maximum round-trip propagation delay plus a small fixed increment.
    • Stations only send if there's no acknowledgement after repeated transmissions; otherwise, it gives up.
    • Collisions are frequent. The channel utilization is low, maxing out at about 18%.

    Slotted ALOHA

    • The channel is slotted, with each slot having a duration equivalent to the frame transmission time.
    • A central clock is needed for synchronization (to maintain timing).
    • Collisions are still possible, and retransmission occurs after a random delay.

    CSMA (Carrier Sense Multiple Access)

    • Stations "listen before talk," sensing the medium's status before transmitting.
    • If the channel is busy, the station waits; otherwise, it transmits.
    • Collisions still occur due to propagation delay. Stations do not know if another transmission is starting at the same moment.

    CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

    • The system adds a collision detection to CSMA.
    • If a collision is detected, the sender waits a random amount of time before trying to transmit again. Backoff time increases with consecutive collisions.
    • The backoff times are calculated exponentially. The waiting time between 0 and 2N x maximum propagation time, where N is the number of attempted transmissions.
    • A jamming signal alerts other stations to the collision and discards the affected frame.

    CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

    • Collision avoidance is preferred over collision detection.
    • Uses one of the persistent strategies
    • After the line is idle, it waits for an interframe gap (IFG).
    • Then it waits for another random amount of time.
    • Sends the frame, sets a timer. If an acknowledgment (ACK) is received before the timer expires, the transmission is successful. (Otherwise, there's a frame/ACK issue, so retry).
    • Used for wireless LANs.

    Token Passing

    • A station is authorized to send data after it receives a token (a special frame).
    • Stations are arranged in a ring.
    • A token circulates around the ring when no data is being transmitted.
    • Tokens are bit sequences. A "free token" is 01111110 and a "busy token" is 01111111.
    • When a node needs to transmit, it waits for the free token.
    • When done transmitting, it releases the busy token back into the ring and replaces it with a free token.

    Token Bus

    • Stations on the bus form a logical ring.
    • The physical ordering of stations on the bus is irrelevant.
    • Token passing medium access control protocol is used.

    Token Ring

    • Introduced by IBM in the early 1980s.
    • Logical topology is a ring (or sometimes a star).
    • Token-passing media access control is used.
    • Only a station with the token can send data, and the token is released only when the data's receipt is confirmed.

    Ethernet

    • The most popular LAN physical architecture.
    • Originally created in 1976 at Xerox's Palo Alto Research Center.
    • Operates at 10 Mbps, with later iterations increasing to 100 Mbps, 1000 Mbps, and higher rates.
    • Uses CSMA/CD or CSMA/CA (in newer versions).
    • Ethernet frames are defined as 7 fields that include preamble, start field delimiter, destination address, source address, length/type, data and padding, and the cyclic redundancy check (CRC),
    • Provides minimum and maximum frame lengths. Padding is used for packets smaller than the minimum size.
    • Uses MAC (Media Access Control) addressing. Addresses are permanently burned into Network Interface Cards (NICs).

    Fast Ethernet

    • Enhanced Ethernet to provide higher data rates at 100 Mbps using similar architectures. A significant feature is Auto-negotiation, which allows incompatible devices to communicate.

    Gigabit Ethernet

    • Further advancement to 1000 Mbps.
    • Uses protocols and interfaces that remain compatible with previous Ethernet standards.

    Ethernet vs. Token Ring

    • Ethernet's access is non-deterministic (contention-based); Token Ring is deterministic.
    • Ethernet supports direct cable connections between NICs, while Token Ring does not.
    • Ethernet uses CSMA/CD or CSMA/CA, and Token ring uses tokens to regulate access to the network media.
    • Ethernet is generally less expensive than Token Ring.

    Segmentation

    • Used to split a large Ethernet network into smaller segments connected by routers.
    • Reduces collisions and improves network performance by limiting the number of stations contending for access.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on Local Area Networking (LAN) technologies and protocols. This quiz covers key concepts such as transmission speeds, OSI model layers, and the role of LAN in resource sharing. Perfect for students and professionals looking to enhance their understanding of networking fundamentals.

    More Like This

    Ethernet Technology
    10 questions

    Ethernet Technology

    DiligentCactus avatar
    DiligentCactus
    Ethernet LAN Technology
    12 questions

    Ethernet LAN Technology

    ComplimentaryBigfoot avatar
    ComplimentaryBigfoot
    Wireless LAN Technology Overview
    43 questions
    Token Ring Protocol Overview
    32 questions

    Token Ring Protocol Overview

    AmazingNeptunium3354 avatar
    AmazingNeptunium3354
    Use Quizgecko on...
    Browser
    Browser