Q1.
(a) Give a term that related to upper sublayer of Data Link Layer and briefly describe that
term.
(3 marks)
● Logical Link Control (LLC)
● It communicates between the networking software at the upper layers and the device
hardware at the lower layers.
● It can ensure a smooth data transfer without worrying about broadcast, framing,
addressing and error detection schemes used in LAN protocols like Ethernet.> LLC also
includes error detection schemes, and rejects corrupted frames when detected.
(b) Identify a sublayer of Data Link Layer that defines the media access processes
performed by the hardware. (1 mark)
● Media Access Control (MAC) sublayer
Q2. (a) The Figure 2 shows a network topology on how computers can communicate across
LAN and WAN via different types of physical media and Layer 2 protocols. Answer the following
questions based on the Figure 2.
Figure 2: Network Topology
(i) “A” and “B” are two different popular network connection methods for LAN. Identify the
type of connecting media and the IEEE Networking Standard of LAN “A” and “B” respectively.
(4 marks)
Label Connecting Media IEEE Networking Standard
A Radio or microwave 802.11
+(Wireless)
B Ethernet Straight-Through 802.3
Cable + (Copper Cable)
(ii) There are two types of access method in LAN topology. Which access method is used
for LAN “A”? (1 mark)
● Contention-based Access
(iii) Explain the types of access method mentioned in Q2(a)(ii). (6 marks)
● Via Contention-based Access, the stations can transmit at any time.
● However, the collision might occur in contention-based access if no prevention is made
to avoid the collision. Collision might occur /exists in contention-based access.
● There are mechanisms to resolve contention for the media.
> Above 3 answers are explanations for the characteristics of Contention-based access.
While below are examples of contention-based technologies.
● Contention-based Access uses wireless LAN technology which applies CSMA/CA with
IEEE 802.11 WLANs. This technology can effectively use a collision avoidance process
to govern when a device can send and what happens if multiple devices send at the
same time. It can also prevent the collision through the way of waiting before
transmitting.
● It also uses Legacy bus-topology Ethernet LAN which applies CSMA/CD. It operates in
half-duplex mode where only one device sends or receives at a time. In order to avoid
collision happens, it will detect the collision and wait a random period of time and
retransmit data.
> Explanation above is good, but can simplify it.
(b) What are the TWO (2) basic services of the Data Link Layer? (4 marks)
● The Data Link Layer is responsible for communications between end-device and network
interface cards.
● It also allows upper layer protocols to access the physical layer media and encapsulates
Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames.
(d) There are two types of duplex communication systems: full-duplex (FDX) and half-duplex
(HDX). Differentiate between these two communication systems. (4 marks)
Full-duplex Communication (FDX) Half-duplex Communication (HDX)
Full-duplex communication (FDX) only Half-duplex communication (HDX) allows
allows one device to send or receive at a both devices to simultaneously transmit
time on a shared medium. and receive on a shared medium.
Full-duplex communication (FDX) is used Half-duplex communication (HDX) is used
on WLANs and legacy bus topologies with on Ethernet switches.
Ethernet hubs. > This explanation is for FDX
> This explanation is for HDX
Extra questions: (may use google classroom/forum, etc to do discussion)
Question 2 (continued) (29 SEPTEMBER 2020)
b) Figure 2-1 below shows one of the famous media access technology used in LAN.
Identify and describe the characteristics of the mentioned access method. (6 marks)
Figure 2-1: A Media Access Technology
● The access method used in this figure is Controlled Access.
● It only allows one station to transmit data at a time.
● The other devices must wait for their turn before they are allowed to transmit data.
● No collision will occur on the Controlled Access Method.
● It uses a token passing method so only the one which gains the token is allowed to
transmit data. After that, the access token will be passed to the next device, and it will be
allowed to transmit data.