What is the core responsibility of the Data Link Layer (Layer 2) in the OSI model?
A) To provide logical addressing and path determination between different networks.
B) To manage the conversion of data into electrical, radio, or light signals.
C) To prepare network data for the physical network and handle NIC-to-NIC communications.
D) To establish, manage, and terminate sessions between applications.
C) To prepare network data for the physical network and handle NIC-to-NIC communications.
Explanation: The text states that the data link layer “prepares network data for the physical network” and is “responsible for network interface card (NIC) to network interface card communications.” This defines its primary scope as local delivery on the same network segment.
What does the Data Link Layer encapsulate Layer 3 packets into?
A) Segments
B) Datagrams
C) Frames
D) Packets
C) Frames
Explanation: The text explicitly says the data link layer “accepts data, usually Layer 3 packets (i.e., IPv4 or IPv6), and encapsulates them into Layer 2 frames.” The frame header contains information like the source and destination MAC addresses.
How does the Data Link Layer enable upper layers to be independent of the physical media used?
A) By encrypting all data before transmission.
B) By converting IP addresses to MAC addresses.
C) By handling all media-specific preparation, so upper layers don’t have to.
D) By routing packets based on the media type.
C) By handling all media-specific preparation, so upper layers don’t have to.
Explanation: The text notes that a key function is to “enable upper layers to access the media.” It clarifies that “The upper layer protocol is completely unaware of the type of media that is used,” because the Data Link Layer handles all the details of placing data onto that specific media (e.g., Ethernet, Wi-Fi).
What action does the Data Link Layer take when it receives a corrupt frame?
A) It corrects the errors using the Frame Check Sequence.
B) It forwards the frame to a router for correction.
C) It performs error detection and rejects the corrupt frame.
D) It passes the frame up to the Network Layer for handling.
C) It performs error detection band rejects the corrupt frame.
Explanation: The text lists “Performs error detection and rejects any corrupt frame” as a core function. It uses the Frame Check Sequence (FCS) trailer to detect errors. It does not correct them; it simply discards bad frames.
Over what scope does the Data Link Layer exchange frames?
A) Between endpoints over the network media.
B) From the original source host to the final destination host anywhere on the internet.
C) Only between routers.
D) Only between switches on the same network.
A) Between endpoints over the network media.
Explanation: The text states the data link layer “exchanges frames between endpoints over the network media.” This emphasizes its role in the local delivery of data between devices on the same network segment (like between a PC and a switch, or between two switches).
After creating the frame, what is the final step the Data Link Layer takes to prepare the data for transmission?
A) It routes the frame to the final destination.
B) It converts the frame into a format supported by the Physical Layer.
C) It encrypts the frame for security.
D) It forwards the frame to the Transport Layer.
B) It converts the frame into a format supported by the Physical Layer.
Explanation: The text concludes the process by stating the data link layer then “convert[s] this information to a format supported by the physical layer (i.e., Layer 1).” This means it prepares the bits for transmission as electrical, optical, or radio signals.
What specific addressing information does the Data Link Layer add to a Layer 3 packet to create a frame?
A) Source and Destination IP addresses.
B) Source and Destination port numbers.
C) Source and Destination NIC (MAC) addresses.
D) Source and Destination hostnames.
C) Source and Destination NIC (MAC) addresses.
Explanation: The text describes the encapsulation process: “the data link layer adds Layer 2 Ethernet destination and source NIC information to a Layer 3 packet.” This NIC information is the MAC address, which is used for local delivery on the network segment.
According to the text, what would be a consequence for IP if a new network technology were developed and there was no Data Link Layer?
A) The new technology would be automatically compatible with all existing devices.
B) IP would have to be adapted to work with the new technology.
C) The new technology would be unable to connect to the internet.
D) The Data Link Layer would automatically update itself.
B) IP would have to be adapted to work with the new technology.
Explanation: The text states that without the data link layer, “every time a new network technology or medium was developed, IP would have to adapt.” The data link layer prevents this by providing a consistent interface for IP, making the network stack more modular and flexible.
What major problem does the Data Link Layer solve for upper-layer protocols like IP?
A) It provides global logical addressing.
B) It handles the physical connection to every type of media, so IP doesn’t have to.
C) It encrypts data to ensure secure transmission.
D) It establishes sessions between applications.
B) It handles the physical connection to every type of media, so IP doesn’t have to.
Explanation: The text explains that without the data link layer, network layer protocols like IP “would have to make provisions for connecting to every type of media.” The data link layer acts as an abstraction layer, allowing IP to work the same way over Ethernet, Wi-Fi, or any other media.
In a computer network, what is a “node”?
A) A device that can only create or receive data.
B) A device that can receive, create, store, or forward data along a path.
C) Only the end devices like laptops and servers.
D) Only the intermediary devices like routers and switches.
B) A device that can receive, create, store, or forward data along a path.
Explanation: The text provides a broad definition: a node is “a device that can receive, create, store, or forward data along a communications path.” This definition correctly includes both end devices (laptops, phones) and intermediary devices (switches, routers).
Which IEEE standard defines the MAC sublayer for a traditional Ethernet LAN?
A) IEEE 802.2
B) IEEE 802.11
C) IEEE 802.3
D) IEEE 802.1
C) IEEE 802.3
Explanation: The text provides examples, noting that the MAC sublayer is implemented in standards like “IEEE 802.3, 802.11, or 802.15.” IEEE 802.3 is the standard for Ethernet (wired) LANs.
What are the two primary responsibilities of the MAC sublayer?
A) Session management and data encryption.
B) Data encapsulation and media access control.
C) Logical addressing and path determination.
D) Protocol identification and error recovery.
B) Data encapsulation and media access control.
Explanation: The text clearly lists the MAC sublayer’s core duties: “It is responsible for data encapsulation and media access control.” Encapsulation involves framing, and media access control involves methods like CSMA/CD or CSMA/CA.
How is the Media Access Control (MAC) sublayer typically implemented?
A) As software in the operating system.
B) In hardware on the network interface card (NIC).
C) As a cloud-based service.
D) In the router’s configuration file.
B) In hardware on the network interface card (NIC).
Explanation: The text specifies that the MAC sublayer is “implemented… in hardware.” This is why it’s often associated directly with the physical NIC, allowing for high-speed, low-level frame handling.
How does the LLC sublayer allow a single network interface to be used by multiple Network Layer protocols (like IPv4 and IPv6)?
A) By assigning a unique MAC address for each protocol.
B) By encrypting the data from each protocol differently.
C) By placing information in the frame that identifies the Network Layer protocol being used.
D) By routing packets based on their size.
C) By placing information in the frame that identifies the Network Layer protocol being used.
Explanation: The text explains that the LLC “places information in the frame that identifies which network layer protocol is being used for the frame.” When the receiving device gets the frame, the LLC reads this information to determine which Network Layer protocol (e.g., the IPv4 stack or IPv6 stack) should receive the data.
What is the primary role of the Logical Link Control (LLC) sublayer?
A) To control access to the physical media.
B) To provide data link layer addressing.
C) To communicate between upper-layer software and lower-layer hardware.
D) To convert data into electrical signals.
C) To communicate between upper-layer software and lower-layer hardware.
Explanation: The text defines the LLC as the sublayer that “communicates between the networking software at the upper layers and the device hardware at the lower layers.” It acts as a translator or interface between the Network layer and the media-specific hardware.
What types of networks are defined by the IEEE 802 LAN/MAN standards?
A) Only Ethernet wired networks.
B) Only wireless local area networks (WLAN).
C) Only Wide Area Networks (WAN).
D) Various types, including Ethernet LANs, WLANs, and wireless personal area networks (WPAN).
D) Various types, including Ethernet LANs, WLANs, and wireless personal area networks (WPAN).
Explanation: The text states that the IEEE 802 standards are specific to “Ethernet LANs, wireless LANs (WLAN), wireless personal area networks (WPAN) and other types of local and metropolitan area networks.” This shows it’s a broad family of standards for local networking.
What is the primary function of the LLC sublayer regarding a network packet?
A) It controls the NIC hardware directly.
B) It adds Layer 2 control information to help deliver the packet.
C) It provides source and destination MAC addressing.
D) It converts the packet into electrical signals.
B) It adds Layer 2 control information to help deliver the packet.
Explanation: The text states that the LLC “takes the network protocol data… and adds Layer 2 control information to help deliver the packet.” This control information is used to manage the flow of data and identify the upper-layer protocol.
What hardware component does the MAC sublayer directly control?
A) The CPU and system RAM
B) The hard drive and storage controller
C) The Network Interface Card (NIC)
D) The monitor and graphics card
C) The Network Interface Card (NIC)
Explanation: The text explicitly says the “MAC sublayer controls the NIC and other hardware that is responsible for sending and receiving data.” This is consistent with its implementation in hardware.
What is the purpose of “frame delimiting” performed by the MAC sublayer?
A) To encrypt the data payload for security.
B) To identify fields within a frame and provide synchronization between nodes.
C) To assign a unique IP address to the frame.
D) To compress the data to save bandwidth.
B) To identify fields within a frame and provide synchronization between nodes.
Explanation: The text explains that frame delimiting provides “important delimiters to identify fields within a frame” and that these bits provide “synchronization between the transmitting and receiving nodes,” ensuring they agree on where the frame starts and ends.
The addressing provided by the MAC sublayer is used for transporting frames between devices on what scope?
A) Between any two devices on the global internet.
B) Between devices on different IP subnets.
C) Between devices on the same shared medium (local network).
D) Between an application and a server.
C) Between devices on the same shared medium (local network).
Explanation: The text specifies that MAC addressing provides “source and destination addressing for transporting the Layer 2 frame between devices on the same shared medium.” This highlights the local nature of Layer 2 communication.
When is media access control provided by the MAC sublayer NOT required?
A) When communicating over a wireless LAN (WLAN).
B) When using a legacy hub-based network.
C) During full-duplex communications.
D) When using half-duplex communications.
C) During full-duplex communications.
Explanation: The text concludes by stating that media access control is for “multiple devices to communicate over a shared (half-duplex) medium,” and explicitly notes that “Full-duplex communications do not require access control.” In full-duplex, a dedicated channel eliminates the need for contention protocols.
Why do different network environments require different Data Link Layer handling?
A) Because all networks use the same type of cables.
B) Because each environment can have different characteristics, like the number of devices contending for access.
C) Because the Network Layer packet changes at every hop.
D) Because routers can only process one type of frame.
B) Because each environment can have different characteristics, like the number of devices contending for access.
Explanation: The text begins by stating that “each network environment… can have different characteristics,” using the example of a busy Ethernet LAN versus a simple two-device serial link. This variability is why the Data Link Layer must adapt.
What is the purpose of the MAC sublayer in a network like an Ethernet LAN?
A) To provide a direct connection between two routers.
B) To resolve contention when many hosts are competing for access to the network medium.
C) To assign IP addresses to end devices.
D) To encrypt data for secure transmission.
B) To resolve contention when many hosts are competing for access to the network medium.
Explanation: The text directly states that in a multi-host Ethernet environment, “The MAC sublayer resolves this” contention for access. It manages how devices share the medium to prevent collisions (in half-duplex) or coordinates transmission.
Why does a serial link between two routers NOT require complex MAC techniques like CSMA/CD?
A) Because serial links are much faster than Ethernet.
B) Because it consists of a direct connection between only two devices with dedicated access.
C) Because routers do not have MAC addresses.
D) Because serial links use a different version of IP.
B) Because it consists of a direct connection between only two devices with dedicated access.
Explanation: The text contrasts Ethernet with serial links, noting that serial links “consist of a direct connection between only two devices.” There is no contention because the link is dedicated, eliminating the need for access control methods.