Chapter 8 Flashcards
(91 cards)
What does a layer 2 protocol include?
MAC
Data delineation
Error Control (transmission)
What does MAC do?
It decides whether a node is allowed to transmit data (on the medium that connects it to another node)
What is the MAC’s decision based on? (whether a node can transmit or not)
Whose turn it is to transmit data
What are the 3 solutions for MAC?
1: Access is controlled by a controlling node (aka master-slave)
2: Access is controlled by possession of a token (token passing protocols)
3: Any node transmit data whenever he want to(Multiple access protocols)
What is the difference between point to point and multipoint connections in master slave protocols?
Point-to-point = connection between 2 nodes
Multipoint = connection between “smart” node and 2+ “dumb” nodes
Multipoint needs to identify slave it wants to send messages to.
How does master slave protocols work?
Master polls salve to see if it wants to send a message. Slave either responds with data or negative ack.
If master wants to send something it just sends it to the destination
Problem with master slave protocols?
Latency ( slave has to be polled before it can send anything )
Single point of failure
What is the best example of master slave protocols?
SDLC (Synchronous Data Link Control)
How does token ring protocols differ from master slave protocols?
All nodes in token ring is seen as equals
When can a node send a message in a token ring protocol?
When it has access to the token
Does all nodes have to be equal in a token ring protocol?
Technically no, since you can implement a priority scheme such that more important nodes can get the token before less important nodes. Can lead to starvation?
How is data transferred in the token ring?
It is sent all around the ring until it reaches the destination node, which copies it and sends it to layer 3.
Data goes around back to sender and then it takes the data off the network
In a priority schema token ring protocol. How does a node know if it can “take” the token?
It checks the priority on the token. If priority on token is higher it sends it along without data.
What happens if 2 nodes have the same priority level in a token ring protocol??
The one at which the token arrives first will get the token
What is the problem with token ring protocol?
Token may be lost ( use active monitor node)
What does a active monitor node do in a token ring protocol?
Checks that the token regularly passes it to ensure it stays active and isnt lost
What happens when the active monitor goes down in a token ring protocol?
Get an election for new monitor. Uses bully algorithm
How does the bully algorithm work to get a new active monitor?
1: call an election
2: Pass a frame with the highest MAC address inside. Check if your address is higher. If it is place yours inside the frame.
3: Highest MAC address wins
What should you do to the token ring protocols if the network becomes large enough?
Use multiple tokens aka empty slots, to put data in.
The ….. is an example of a protocol in the large token ring protocols
FDDI ( Fibre Distributed Data Interface)
What is IBM’s token ring standardized as?
IEEE 802.5
What is the standard example of a token bus?
IEEE 802.4
When does Multiple access networks work?
On a quiet network
How does Multiple access protocols work?
Any node may transmit data whenever it wants