4.1 - Media Access Control Flashcards

1
Q

The _______________ layer (Layer 2 of the OSI Model) is responsible for moving a message from one computer or network device to the next in the overall path from sender to receiver

A

data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _______________ determines:
1. Media access
2. Message delineation
3. Error control

A

data link protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who can transmit at what time

A

Media access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where the message begins and ends

A

Message delineation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How a receiver recognizes and correctes a transmission error

A

Error control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The data link layer performs two main functions and therefore is often divided into two sublayers:

A
  1. Logical Link Control (LLC)
  2. Media Access Control (MAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The data link layer’s connection to the network layer above it

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Responsible for communicating with the network layer software (IP) and for taking the packet, surrounding it with data link PDU, to become a frame

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls the physical hardware

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This software at the sending device controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit; receiver does the opposite

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refers to the need to control WHEN computers transmit

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________ becomes important when several computers share the same communication circuit (point-to-point, half-duplex configuration)

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Contention
  2. Controlled access
A

Two approaches to media access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computers wait until the circuit is free (no other computers are transmitting) and transmit whenever they have data to send

A

Contention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With _____________, all nodes are operating in half-duplex (two-way traffic, but taking turns) mode, competing for the use of the medium

A

contention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
  2. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A

Examples of contention

17
Q

Used on legacy bus-topology Ethernet

18
Q

Used on Wireless LANS

19
Q

One device controls the circuit and determines which clients can transmit at what time

A

Controlled

20
Q

Two commonly used controlled access techniques:

A
  1. Access request
  2. Polling
21
Q

Controlled access is a ____________ type of access — each node has its own time on the medium

A

deterministic

22
Q

Controlled access is used on legacy networks such as ____________ and __________

A

Token Ring… ARCNET

23
Q

This technique is similar to a situation in which the instructor calls on students who raise their hands

A

Controlled access

24
Q

With _______________ technique, client computers that want to send a request to transmit to the device controlling the circuit (e.g., wireless access point)

A

access request

25
_______________ grants permission for one computer at a time. All other computers wait until that computer has finished
Controlling device
26
The process of sending a signal to a client computer that gives it permission to transmit
Polling
27
The client stores all messages that need to be transmitted
Polling
28
Periodically, the controlling device (e.g., WAP) ______ the client to see if it has data to send
polls
29
Types of Polling
1. Roll-call polling 2. Hub polling (Token Passing)
30
The controller works consecutively through a list of clients until all are polled
Roll-call polling
31
This type of polling can be modified to select clients in priority
Roll-call polling
32
This type of polling involves some waiting time because the controlled has to poll a client and then wait for a response
Roll-call polling
33
One device starts the poll and passes it to the next computer on the multipoint circuit, which sends its message and passes the poll (or token) to the next
Hub polling (Token Passing)