The Link Layer and LANs
50 questions available
Questions
Which of the following describes the function of a network adapter on the sending side?
View answer and explanationIn a two-dimensional even parity scheme, how does a receiver identify and correct a single-bit error?
View answer and explanationWhat is the maximum efficiency of the slotted ALOHA protocol under the condition of a large number of active nodes?
View answer and explanationHow does the CSMA/CD algorithm handle a situation where a node detects a collision while transmitting a frame?
View answer and explanationIn a switched LAN environment, what is 'switch poisoning'?
View answer and explanationWhat is the length in bytes of a MAC address used in Ethernet and 802.11 wireless LANs?
View answer and explanationWhat is the hexadecimal MAC broadcast address used in LANs like Ethernet?
View answer and explanationAccording to the text, what is a typical expiration time for an entry in a host's ARP table?
View answer and explanationIn an Ethernet frame, what is the total size of the preamble field, and what is its primary purpose?
View answer and explanationWhat is the primary difference between a network hub and a link-layer switch?
View answer and explanationHow does a link-layer switch build its forwarding table?
View answer and explanationWhat is the function of the 'aging time' in a switch table?
View answer and explanationIn a port-based VLAN, how is traffic between different VLANs isolated?
View answer and explanationWhat information is added to an Ethernet frame when it crosses a VLAN trunk, according to the 802.1Q standard?
View answer and explanationThe 802.1Q VLAN tag contains a 12-bit VLAN identifier field. How many unique VLANs can this field theoretically represent?
View answer and explanationWhat is the primary role of Multiprotocol Label Switching (MPLS) in the context of the link layer?
View answer and explanationIn a data center architecture, what is a Top of Rack (TOR) switch?
View answer and explanationWhat is the role of a load balancer in a data center network?
View answer and explanationWhat problem in hierarchical data center architectures is solved by increasing connectivity between tiers, such as connecting each TOR switch to multiple tier-2 switches?
View answer and explanationIn the 'Day in the Life of a Web Page Request' scenario, what is the first network-related protocol a laptop runs after connecting to the Ethernet cable to get an IP address?
View answer and explanationWhen a laptop sends its initial DHCP request message, what values are used for the source IP address in the IP datagram and the destination MAC address in the Ethernet frame?
View answer and explanationWhy does a checksumming method at the transport layer often differ from an error-detection method at the link layer, such as CRC?
View answer and explanationIn the CRC error-detection scheme, if the d-bit data is D and the r+1 bit generator is G, how is the r-bit remainder R calculated by the sender?
View answer and explanationWhat is the primary drawback of channel partitioning protocols like TDM and FDM?
View answer and explanationWhat is a 'taking-turns' protocol, and what is one of its primary advantages over random access protocols?
View answer and explanationWhat is a significant drawback of the polling protocol for multiple access?
View answer and explanationIn the DOCSIS standard for cable Internet access, how does a cable modem request upstream transmission slots from the CMTS?
View answer and explanationHow does the Address Resolution Protocol (ARP) resolve an IP address for a host on the same subnet?
View answer and explanationWhen a host needs to send a datagram to a destination off its local subnet, what destination MAC address does it use in the Ethernet frame?
View answer and explanationWhat is the maximum transmission unit (MTU) of Ethernet, and what happens if an IP datagram exceeds this size?
View answer and explanationWhat is the purpose of the Type field in the Ethernet frame structure?
View answer and explanationIn a modern switch-based Ethernet LAN with full-duplex links, is a MAC protocol like CSMA/CD still necessary?
View answer and explanationWhat is one key difference between a link-layer switch and a router?
View answer and explanationHow many bits are in the CRC field of a standard Ethernet frame?
View answer and explanationAccording to the text, what is the 'hidden terminal problem' in wireless networks?
View answer and explanationWhat is the maximum data rate of the IEEE 802.11g standard?
View answer and explanationIn the 802.11 architecture, what is a Basic Service Set (BSS)?
View answer and explanationWhy does the 802.11 MAC protocol use collision avoidance (CSMA/CA) instead of collision detection (CSMA/CD)?
View answer and explanationWhat is the purpose of the RTS and CTS frames in the 802.11 MAC protocol?
View answer and explanationHow many address fields are there in an IEEE 802.11 frame, and why are more than two needed for infrastructure networks?
View answer and explanationWhen a mobile host H1 moves from being associated with AP1 to AP2 within the same IP subnet, how can AP2 help update the forwarding table of the upstream switch?
View answer and explanationIn a Bluetooth piconet, what is the role of the master node?
View answer and explanationHow many active devices can a Bluetooth piconet support, and what is this type of network also known as?
View answer and explanationWhat does a mobile device in a 4G LTE network do to find and attach to a base station?
View answer and explanationIn the 4G LTE architecture, which element is responsible for authenticating a device, setting up data path tunnels, and tracking the device's cell location?
View answer and explanationWhat is the primary difference between direct and indirect routing for a mobile device?
View answer and explanationWhat is the 'triangle routing problem' associated with indirect routing for mobile devices?
View answer and explanationDuring a handover in a 4G/5G network, what is the role of the target base station after it receives a Handover Request from the source base station?
View answer and explanationAccording to Table 7.3, what is the Mobile IP equivalent of the 4G/5G Home Subscriber Server (HSS)?
View answer and explanationWhy can TCP's congestion-control response be problematic in a wireless setting?
View answer and explanation