Chapter 3 Multiple Access Protocols and Layer 2 Networks Flashcards

(67 cards)

1
Q

FDMA (Frequency Division Multiple Access)

A

Gives each user a seperate frequency band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TDMA

A

gives each user separate slot assignment on a time slotted machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are multiple access protocols used for?

A

To dynamically allocate shared communication channel among multiple competing users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How dynamic allocation different from FDMA/TDMA

A

Dynamic allocation adjusts to traffic in real TIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What factors affect protocol design for multiple access

A

Prop Delay (short v long)
Wether Nodes can hear another
Ability to detect collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three Main Categories of Multiple access protocols

A
  • Contention-based (ALOHA, CSMA)
  • Collision-free (Polling, token passing)
  • Limited Contention (Hybrid protocols) low delay under light load
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pure ALOHA

A

user nodes shared same upstream radio frequency band

A protocol where users transmit whenever they want and retransmit after random delays if no ACK is recieved.

Used for IoT Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pure ALOHA vulnerable period?

A

Vulnerable period for Frame Transmission is “2t”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Slotted ALOHA

A

Improvement upon ALOHA by requiring each user to transmit a frame at the beginning of a time slot. Reducing vunerablility period to t.
2 frame transmissions with either overlap entirely or not at all. Used in satellite channels, Cable, Cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CSMA (Carrier sense multiple access) protocol

A

“sense before send”, nodes can hear other nodes transmissions. Useful when propagation delay is small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

nonpersitent CSMA

A

Listen to channel and transmit only if the channel is idle. If unsucessful send after random delay.
Vulnerable period = 2T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1-Persistent CSMA

A

Where channel is sensed busy; itll wait until the channel becomes idle then transmits. Doesn’t wait keeps sensing, Ethernet

Lower delay, but more collisions if load increases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1-Persistent CSMA with Collision Detection (CSMA/CD)

A

Works best when able to listen while transmitting and abort is a collision is detected. Very good for small T/t but poorly when it gets too big.
used in Classic Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

p-persistent CSMA

A

After sensing an idle channel, transmit with probability p or wait with 1-p using minislots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collision-free protocols

A

They are highly efficent under heavy load since no time is wasted on collisions. Utilize some form of subchannel. Cost of nodes having to incur delayes before transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three collision free protocols

A

Polling - central controller
Token Bus
Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Limited Contention Protocols

A

Achieve both low delay under the load of the contention-based protoclols
- Capatanakis Adaptive Tree Walk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Capetanakis Tree Walk Protocol

A

Nodes “walk” a binary tree corresponding to the time interval in which any node and transmit. If a collision occurs the nodes are divided into two groups. Try to deperate transmitters. Traversal depth first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens during a collision in the capetanakis protocol

A

The node group is divided and each subgroup is tested recusively to isolate transmitters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Two Enchancements to Capetanakis protocol

A

Skip Predictable Collisions: Skip subgroups known to have multiple nodes
Start at lower tree levels: Where load is likely high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IEEE 802.3

A

Working group produced physical layer and link later MAC standards for the eternet. Dominant wired LAN tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Classic Ethernet

A
  • Single cable to whcih all nodes attached.
  • 1-Persistent CSMA/CD
  • No ACK, but do retransmit if collision during transmission detected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is binary exponential backoff?

A

An algorithm used to determine the duration of a random delay until attemp transmission again after a collison. used for 802.11 wifi.
After i-th colltiions node waits a chosen random time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is classic Ethernet not used anymore?

A

Breaks down at larger r/t ratios; point-to-point links replaced it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Modern Eternet
Supports high data transfer speeds with capabilities reaching up to 10 gigabits per second.
26
Why do we use switches in Ethernet
The LAN becomes a network of full-duplex point-to-point links avoid using CSMA entirely
27
DIX Ethernet Frame Format
Preamble Dest MAC Src MAC Type Payload Pad CRC
28
Purpose of preamble and SFD
Allows reciever to detect the start of the frame
29
What is the perpuse of the pad field
Ensures frame is atleast 64 bytes long to detect collions reliably
30
What does type field indicate
The upper layer protocol (IPv4, ARP)
31
Difference between IEEE 802.3 frame format and DIX
IEEE replaces type field with a "length" field; requires overhead of an additional header inside payload field to specific type.
32
What does a switch use to forward ethernet frames?
A destination MAC address
33
How does a switch build its forwarding table
Using backward learning: Records source MAC and incoming port with a timestamp older than threshold value.
34
Forwarding table
Records MAC address, port ID pairs when receiving an incoming frame.
35
If frame recieved with a dest MAC address for which there is no entre in the table?
Broadcast on all other ports other than the one on which the frame was recieved.
36
How do switches avoid loops in Topology
by running a spanning tree algorithm to create a acyclic forwarding path
37
Virtual LANS (VLANs)
Provide capability for multiple local LANs to share a phsyical LAN; seperate VLANs for security/performance isolation
38
How are VLAN's implemented
Using a modified ethernet fram with a VLAN ID field
39
What are the two main Wi-Fi modes
- Infrastructure Mode: Nodes connect through an access point - Ad Hoc Mode: nodes communicate peer-to-peer
40
Insfrastructure Mode
Used to connect wireless clients via accesspoint with all traffic sent and received via AP
41
Ad Hoc Mode
No access point, the nodes communicate among themselves.
42
WiFi Direct
A software standard addressing the need for Wifi nerworking capabilities where there is no hardware AP
43
Wifi Variants?
5 GHz, ISM Freuqnecy Band, OFDM 2.4/5 GHz, ISM freuency Band, MIMO 2.4 Ghz, DSSS
44
Purpose of Mutliple Frequency channels in Wifi?
Avoid interference and improve performanve
45
Point Coordination Function (PCF)
Channel access is controlled with polling by the access point.
46
Distributed Coordination Function
Mode is used in practice. Vairant of CSMA/CA, (Collision Avoidance)/ New frame ready to send, if the channel has been idle for period of time called DIFS and node ha completed post-backoff, frame may be send immediately.
47
What happens after transmission fails in CSMA/CA
Use binary exponetial backoff, increasing delay before retrying.
48
Virutal Sensing
Nodes use NAV field to determine how long to consider a channel busy even if the cant hear the sender.
49
RTS/CTS mechanism
A node wanting to transmit a frame first sends a short request to send control frame and the reciever replies with a clear to send controle frame. AVOIDS HIDDEN TERMINAL PROBLEM
50
Hidden Terminal Problem
When two nodes cant hear each other but transmit to the same reciever.
51
Why is RTS/CTS not used in practice?
Adds extra overhead.
52
Exposed Terminal Problem
A node refrains from transmitting unnecessarily because it effects activity on the channel even though its own transmission will not cause a collision
53
(MACA) Multiple Access with Collision Avoidance
MACA used RTS/CTS but no carrier sense or ACKS allowing simultaneous transmissions that 802.11 sensing might prevent.
54
Goal of IEEE 802.11e
Add quality of service support with traffic class-based params and transmission opportuinty.
55
What is TXOP mechanism in 802.11e
A node gets a particular interval of time to send multiple frames based on traffic types. Solves RATE ANOMALY problem.
56
Block Acknowledgments
A single ACK that confirms the receipts of multiple frames using a bitmap to indicate success/failures
57
How does wifi manage power
If nodes have no data to send, the radio goes into sleep more. To wake up, the AP has buffer data and wakes up to recieve the AP's beacon frames to indicate wether buffered Traffic is waiting or not.
58
Two Main Types of Bluetooth
Classic Bluetooth Bluetooth Low Energy - Lower power/cost
59
piconet in bluetooth?
A group of devices where one controler manages up to 7 active works with others in a parked low power state
60
Scatternet
A network formed by connecting multiple piconets
61
ACL and SCO channels in Bluetooth
All communication is done between controller & workers Asynchronous connectionless: for packet switched data Synchronous connection oriented: for Real time data
62
Radio frequency Identification (RFID)
Technology that employs tags that can be attached to objects and readers that can read/write information stored on tags for tracking/ID purposes.
63
3 Main Types of Tags
Passive: Energy required to operate tah supplied by the reader VIA readers transmission of radio Active: Tag as a battery Batter-assisted Passice: Requires signal from reader to wake up.
64
UHF RFID Tag
Most common variant of Passive Tag, uses frequency hopping within a freuqnceis to limit interferance between readers
65
HF RFID
a shorter-range technology using a frequency band that is used for applications such as passports and payments.
66
IoT Internet of Things
A growing network of connected phsyical devices.
67