0% found this document useful (0 votes)
84 views11 pages

Solved Quetions For Data Link & Ethernet

ختىعخىخغىخغر

Uploaded by

Mo Mohamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
84 views11 pages

Solved Quetions For Data Link & Ethernet

ختىعخىخغىخغر

Uploaded by

Mo Mohamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
4. What are two services performed by the data link layer of the OSI model? (Choose two.) + Itencrypts data packets. It determines the path to forward packets. + Itaccepts Layer 3 packets and encapsulates them into frame: ‘It provides media access control and performs error detection. ‘+ It monitors the Layer 2 communication by building a MAC address table. Explanation: The data link layer is responsible for the exchange of frames between nodes. over a physical network media. Specifically the data link layer performs two basic services: = Itaccepts Layer 3 packets and encapsulates them into frames. + Itprovides media access control and performs error detection Path determination is a service provided at Layer 3. A Layer 2 switch builds a MAC address table as part of its operation, but path determination is not the service that is provided by the data link layer. 2. What does a router do after de-encapsulating a received frame? + determines the best path + de-encapsulates the frame + re-encapsulates the packet into @ new frame = forwards the new frame onto the network medium Explanation: Routers are responsible for encapsulating a frame with a proper format for the physical network media the routers connect. At each hop along the path, a router does the following: 1. Accepts a frame from a medium 2. De-encapsulates the frame 3. Determines the best path to forward the packet 4, Re-encapsulates the packet into a new frame 5. Forwards the new frame appropriate to the medium of that segment of the physical network 3, What attribute of a NIC would place it at the data link layer of the OSI model? + attached Ethemet cable + IP address MAC address + RJ-45 port + TCPIIP protocol stack Explanation: The data link layer describes media access and physical addressing, The encoding of a MAC address on a NIC places it at that layer. Ports and cables are placed at the physical layer of the OSI model. IP addresses are placed at the network layer. The TCP/IP protocol stack describes a different model. 4, Although CSMA/CD is still a feature of Ethernet, why no longer necessary? = the virtually unlimited availability of IPV6 addresses = the use of CSMA/CA + the use of full-duplex capable Layer 2 switches + the development of half-duplex switch operation the use of Gigabit Ethemet speeds Explanation: The use of Layer 2 switches operating in full-duplex mode eliminates collisions, thereby eliminating the need for CSMAICD. ‘5. What type of physical topology can be created by connecting all Ethernet cables toa central device? = bus ring «star = mesh Explanation: Devices connected to the Ethernet star topology connect to elther a hub or a switch, 6. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? = bus + hierarchical = mesh ring = star Explanation: The mesh topology provides high availability because every node is connected to all other nodes. Mesh topologies can be found in WANs. A partial mesh topology can also be used where some, but not all, end points connect to one another. 7. Which statement describes the half-duplex mode of data transmission? + Data that is transmitted over the network can only flow in one direction. + Data that is transmitted over the network flows in one direction at a time. = Data that is transmitted over the network flows in one direction to many different destinations simultaneously. ‘Data that is transmitted over the network flows in both directions at the same time, Explanation: The data that is transmitted over the network can flow using one of three modes: = Simplex — Deta can only flow in one direction. = Half-duplex ~ Data flows in one direction at a time. + Full-duplex — Data flows in both directions at the same time. 8, Which is a function of the Logical Link Control (LLC) sublayer? + todefine the media access processes that are performed by the hardware = to provide data link layer addressing + to identify which network layer protocol is being used = to accept segments and package them into data units that are called packets Explanation: Defining the media access processes that are performed by the hardware and providing deta link layer addressing are functions of the MAC sublayer. The deta link layer accepts Layer 3 packets and packages them into data units that are called frames. 9. Which data link layer media access control method does Ethernet use? + CSMAICD = determinism = tum taking + token passing Explanation: CSMAICD is used by Ethernet networks. CSMA/CA is used by 802.11-based wireless networks. 10. What are the two sublayers of the OS! model data link layer? (Choose two.) = internet = physical = LLC = transport = MAC = network access Explanation: The data link layer of the OS! model is divided into two sublayers: the Media ‘Access Control (MAC) sublayer and the Logical Link Control (LLC) sublayer. 11. What method is used to manage contention-based access on a wireless network? = CSMAICD = priority ordering = CSMA/CA = token passing Explanation: Carrier sense multiple access with colision avoidance (CSMAJCA) is used with wireless networking technology to mediate media contention. Carrier sense multiple ‘access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control. 12, What identifier is used at the data link layer to uniquely identify an Ethernet device? + IP address = MAC address = sequence number + TCP port number + UDP port number Explanation: Ethemet frames are identified at the data link layer by their MAC addresses, which are unique to each NIC. IP addresses are used at the network layer, and TCP and UDP port numbers are used at the transport layer. Sequence numbers are fields in TCP headers. 43. Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) + International Organization for Standardization (ISO) + Internet Assigned Numbers Authority (IANA) + International Telecommunication Union (ITU) + Electronic Industries Alliance (EIA) + Internet Society (ISOC) Explanation: The IANA is responsible for overseeing and managing IP address allocation, ‘domain name management, and protocol identifiers. The EIA is an intemational standards and trade alliance for electronics organizations, and is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment. ‘The ISOC promotes the open development, evolution, and use of the Internet throughout the world. 14. Which lay used for spe ‘of the OSI model is responsible for specifying the encapsulation method ic types of media? = application + transport + data link = physical Explanation: Encapsulation is a function of the data link layer. Different media types require different data link layer encapsulation. 15. What is true concerning physical and logical topologies? +The logical topology is always the same as the physical topology. ‘+ Physical topologies are concerned with how a network transfers frames. + Physical topologies display the IP addressing scheme of each network. + Logical topologies refer to how a network transfers data between devices. Explanation: Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes. 4. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? = [twill discard the fram ‘= [twill forward the frame to the next host = [twill remove the frame from the media. = Itll strip off the data-link frame to check the destination IP address. Explanation: In an Ethemet network, each NIC in the network checks every arriving frame to see if the destination MAC address in the frame matches its own MAC address. If there is ‘no match, the device discards the frame. If there is a match, the NIC passes the frame up to the next OSI layer. 2. What is auto-MDIX? = a type of Cisco switch = an Ethernet connector type = a type of port on a Cisco switch + a feature that detects Ethernet cable type Explanation: Auto-MDIX is a feature that is enabled on the latest Cisco switches and that allows the switch to detect and use whatever type of cable is attached to a specific port. 3. Which two functions or operations are performed by the MAC sublayer? (Choose two.) + Itis responsible for Media Access Control = It performs the function of NIC driver software. + Itadds a header and trailer to form an OSI Layer 2 PDU. = Ithandles communication between upper and lower layers. + It adds control information to network protocol layer data. Explanation: The MAC eublayer is the lower of the two data link sublayers and is closest to the physical layer. The two primary functions of the MAC sublayer are to encapsulate the data from the upper layer protocols and to control access to the medi 4. What type of address is 01-00-5E-0A-00-027 + an address that reaches every host inside a local subnet + an address that reaches one spacific host = an address that reaches every host in the network + an address that reaches a specific group of hosts Explanation: The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal. It allows a source device to send a packet to a group of devices. 5. What happens to runt frames received by a Cisco Ethernet switch? + The frame is dropped. + The frame is returned to the originating network device. = The frame is broadcast to all other devices on the same network + The frame is sent to the default gateway. Explanation: In an attempt to conserve bandwidth and not forward useless frames, Ethemet. devices drop frames that are considered to be runt (less than 64 bytes) or jumbo (greater than 1500 bytes) frames. 6. What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.) + 56 bytes + G4 bytes + 128 bytes = 1024 bytes = 1518 bytes Explanation: The minimum Ethernet frame is 64 bytes. The maximum Ethernet frame is 1518 bytes, A network technician must know the minimum and maximum frame size in order to recognize runt and jumbo frames. 7. What addressing information is recorded by a switch to bulld its MAC address table? ‘+ the destination Layer 3 address of incoming packets ‘the destination Layer 2 address of outgoing frames. + the source Layer 3 address of outgoing packets + the source Layer 2 address of incoming frames Explanation: A switch builds a MAC address table by inspecting incoming Layer 2 frames land recording the source MAC address found in the frame header. The discovered and recorded MAC address is then associated with the port used to receive the frame. 8, Which two characteristics describe Ethernet technology? (Choose two.) + Itis supported by IEEE 802.3 standards. ‘+ Itis supported by IEEE 802.5 standards. + Ittypically uses an average of 16 Mb's for data transfer rates. + Ituses the CSMA/CD access control method. + Ituses a ring topology. Explanation: The 802.3 Ethernet standard specifies that a network implement the CSMAICD access control method. 9. What statement describes a characteristic of MAC addresses? + They must be globally unique. = They ere only routable within the private network. + They are added as part of a Layer 3 PDU. + They have a 32-bit binary value. Explanation: Any vendor selling Ethernet devices must register with the IEEE to ensure the vendor is assigned a unique 24-bit code, which becomes the first 24 bits of the MAC. address. The last 24 bits of the MAC address are generated per hardware device. This helps ‘to ensure globally unique addresses for each Ethernet device. 410. What is the special value assigned to the first 24 bits of a multicast MAC address? * 01-5E-00 + FF00-5E + FRFR-FE + 01-00-5E Explanation: Just as with multicast |P addresses, there is a special assigned value for multicast MAC addresses. The first 24 bits are set in hex to: 01-00-5E. The remaining 6 hex digits are derived from the lower 23 bits of the IP multicast. 41. Which network device makes forwarding deci address that is contained in the frame? + repeater = hub = switch = router Explanation: Switches are the central connection point for a LAN and they maintain a MAC. address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC. ‘address. The switch then looks in its MAG address table and if that MAC address is found, the ewitch forwards the data to the port that is associated with that particular MAC address. 42, Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table? = hub = router = switch = modem Explanation: if a MAC address is found in the MAC address table, then data is sent to the ‘associated switch port. Ifthe MAC address is not found in the MAC address table, the data is sent to all switch ports that have devices attached to the same network. 43. Which function or operation is performed by the LLC sublayer? + It performs data encapsulation, + Itcommunicates with upper protocol layers. + Itis responsible for media access control. + Itadds @ header and trailer to a packet to form an OSI Layer 2 PDU. Explanation: The Ethemet LLC sublayer hes the responsibility to handle communication between the upper layers and the lower layers of the protocol stack. The LLC is implemented in software and communicates with the upper layers of the application to transition the Packet to the lower layers for delivery. 44, Which statement is true about MAC addresses? + MAC addresses are implemented by software, + ANIC only needs a MAC address if connected to a WAN. + The first three bytes are used by the vendor assigned OUI. ‘+ The ISO is responsible for MAC addresses regulations. Explanation: A MAC address is composed of 6 bytes. The first 3 bytes are used for vendor identification and the last 3 bytes must be assigned a unique value within the same OUI. MAC addresses are implemented in hardware. A NIC needs a MAC address to communicate over the LAN. The IEEE regulates the MAC addresses.

You might also like