KEMBAR78
Tutorial 4 | PDF | Computer Network | Duplex (Telecommunications)
0% found this document useful (0 votes)
45 views4 pages

Tutorial 4

The document discusses the Data Link Layer, focusing on its upper sublayer, Logical Link Control (LLC), which facilitates communication between networking software and hardware, ensuring smooth data transfer and error detection. It also identifies the Media Access Control (MAC) sublayer responsible for media access processes and describes various LAN connection methods and access methods, including contention-based and controlled access. Additionally, it differentiates between full-duplex and half-duplex communication systems.

Uploaded by

Sheueyin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views4 pages

Tutorial 4

The document discusses the Data Link Layer, focusing on its upper sublayer, Logical Link Control (LLC), which facilitates communication between networking software and hardware, ensuring smooth data transfer and error detection. It also identifies the Media Access Control (MAC) sublayer responsible for media access processes and describes various LAN connection methods and access methods, including contention-based and controlled access. Additionally, it differentiates between full-duplex and half-duplex communication systems.

Uploaded by

Sheueyin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Q1.

(a) Give a term that related to upper sublayer of Data Link Layer and briefly describe that
term.
(3 marks)
● Logical Link Control (LLC)

● It communicates between the networking software at the upper layers and the device
hardware at the lower layers.

● It can ensure a smooth data transfer without worrying about broadcast, framing,
addressing and error detection schemes used in LAN protocols like Ethernet.> LLC also
includes error detection schemes, and rejects corrupted frames when detected.

(b) Identify a sublayer of Data Link Layer that defines the media access processes
performed by the hardware. (1 mark)
● Media Access Control (MAC) sublayer

Q2. (a) The Figure 2 shows a network topology on how computers can communicate across
LAN and WAN via different types of physical media and Layer 2 protocols. Answer the following
questions based on the Figure 2.

Figure 2: Network Topology

(i) “A” and “B” are two different popular network connection methods for LAN. Identify the
type of connecting media and the IEEE Networking Standard of LAN “A” and “B” respectively.
(4 marks)

Label Connecting Media IEEE Networking Standard

A Radio or microwave 802.11


+(Wireless)

B Ethernet Straight-Through 802.3


Cable + (Copper Cable)

(ii) There are two types of access method in LAN topology. Which access method is used
for LAN “A”? (1 mark)
● Contention-based Access

(iii) Explain the types of access method mentioned in Q2(a)(ii). (6 marks)


● Via Contention-based Access, the stations can transmit at any time.

● However, the collision might occur in contention-based access if no prevention is made


to avoid the collision. Collision might occur /exists in contention-based access.

● There are mechanisms to resolve contention for the media.

> Above 3 answers are explanations for the characteristics of Contention-based access.
While below are examples of contention-based technologies.

● Contention-based Access uses wireless LAN technology which applies CSMA/CA with
IEEE 802.11 WLANs. This technology can effectively use a collision avoidance process
to govern when a device can send and what happens if multiple devices send at the
same time. It can also prevent the collision through the way of waiting before
transmitting.

● It also uses Legacy bus-topology Ethernet LAN which applies CSMA/CD. It operates in
half-duplex mode where only one device sends or receives at a time. In order to avoid
collision happens, it will detect the collision and wait a random period of time and
retransmit data.
> Explanation above is good, but can simplify it.

(b) What are the TWO (2) basic services of the Data Link Layer? (4 marks)
● The Data Link Layer is responsible for communications between end-device and network
interface cards.

● It also allows upper layer protocols to access the physical layer media and encapsulates
Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames.

(d) There are two types of duplex communication systems: full-duplex (FDX) and half-duplex
(HDX). Differentiate between these two communication systems. (4 marks)
Full-duplex Communication (FDX) Half-duplex Communication (HDX)

Full-duplex communication (FDX) only Half-duplex communication (HDX) allows


allows one device to send or receive at a both devices to simultaneously transmit
time on a shared medium. and receive on a shared medium.

Full-duplex communication (FDX) is used Half-duplex communication (HDX) is used


on WLANs and legacy bus topologies with on Ethernet switches.
Ethernet hubs. > This explanation is for FDX
> This explanation is for HDX

Extra questions: (may use google classroom/forum, etc to do discussion)


Question 2 (continued) (29 SEPTEMBER 2020)

b) Figure 2-1 below shows one of the famous media access technology used in LAN.
Identify and describe the characteristics of the mentioned access method. (6 marks)

Figure 2-1: A Media Access Technology

● The access method used in this figure is Controlled Access.

● It only allows one station to transmit data at a time.

● The other devices must wait for their turn before they are allowed to transmit data.

● No collision will occur on the Controlled Access Method.


● It uses a token passing method so only the one which gains the token is allowed to
transmit data. After that, the access token will be passed to the next device, and it will be
allowed to transmit data.

You might also like