ECM 1413 network layer Flashcards

1
Q

There are 2 sorts of multiple access control protocol

A
  • Carrier sense, multiple access/collision detection (CSMA/CD), for wired networks, such as ethernet
  • Carrier sense, multiple access/collision avoidance (CSMA/CA), for wireless networks, such as wifi
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a CSMA/CD wired network:

A
  • All computers are attached to a shared cable - multiple access (MA)
  • Any computer may transmit if the cable is unused - carrier sense (CS)
  • While transmitting, a computer may detect that it is receiving a message - Collision Detection (CD)
  • After detecting a collision, a computer waits for a random interval (chosen from an exponentially-doubling range), and then tries again
  • By using a random interval we avoid repeated collisions#an exponentially doubling range enables computers to adapt to the network load
  • CSMA/CD is seldom used today since modern ethernet variants avoid collisions by operating in full-duplex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Half duplex vs Full duplex

A

Full-duplex enables simultaneous two-way communication, which allows data to flow freely bidirectionally. Half-duplex enables two-way communication, but not simultaneously. Half-duplex requires switching between a sending and receiving mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CSMA/CA wireless network:

A
  • All computers use a shared frequency - multiple access (MA)
  • Any computer may transmit if the frequency is clear - carrier sense (CS)
  • A computer finding the frequency clear, transmits after an instant
  • A computer finding the frequency busy counts down from a random value (chosen from an exponentially doubling range) while the channel is clear; otherwise, the count is frozen - collision avoidance (CA)
  • A computer then transmits and receives an acknowledgement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Hidden Node problem (CSMA/CA)

A

A computer may be in range of the base station, but out of range of another computer - the hidden node problem. This may be solved by reservation using ready to send and clear to send messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collision-Free Protocols
There are protocols which are completely collision-free

A

1- Token ring
2- Bit-map protocols
3- Binary countdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Token ring

A

In a token ring wired network, a token continuously circulates, to which messages may be attached, and from which they can be removed

In a token bus, the token is passed around a virtual ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bit-map protocol

A

In a bit-map protocol, host n may announce that it has a frame to send by inserting a 1 bit into slot n. Following this, hosts begin to transmit frames in numerical order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Binary countdown

A

a collision-free protocol that operates in the Medium Access Control (MAC) layer of the OSI model

each station is assigned a binary address. The binary addresses are bit strings of equal lengths. When a station wants to transmit, it broadcasts its address to all the stations in the channel, one bit at a time starting with the highest order bit.

In order to decide which station gets the channel access, the addresses of the stations which are broadcasted are ORed. The higher numbered station gets the channel access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Collision

A

2 or more devices on a network attempting to send data at the same time. the data would then become garbled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly