L7 Flashcards

(32 cards)

1
Q

What does MAC stand for?

A

Medium Access Control
MAC techniques describe the method for
access to the communications channel, frame
transmission and channel release for each
computer.The available bandwidth of the
channel decreases with the redundancy due to
the MAC technique.

MAC techniques manage access to the communications channel in networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two categories of MAC techniques?

A
  • Contention-based
  • Token passing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of contention-based MAC techniques?

A

Simple implementation

  • simple implementation
  • small redundancy
  • for a small number of computers the transfer rate is high
  • for high traffic, the usage of the channel is high
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the disadvantages of contention-based MAC techniques?

A
  • Access time cannot be guaranteed- (is a
    matter of probability, depending on the other
    computers willing to transmit at the same time)
  • priorities cannot be established
  • when the number of computers increases, the
    number of collisions increases exponentially
    and also the number of retransmissions needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the operation principle of contention-based techniques?

A

Each computer may attempt transmission every
time data transmission is requested by the upper
layer (the network layer), without waiting for prior
authorization. Collisions may appear when two or
more computers start to send at the same time. In
this unwanted situation, all sending computers
must stop and then must attempt again the
transmission, at a later time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two methods to resolve collisions in contention-based MAC techniques?

A
  • Collision detection - during
    frame transmission, the sender monitors the
    transmission line in order to detect different
    voltages that indicate a collision; in the case of
    a collision, the transmission is attempted again
    after a random amount of time
  • Collision avoidance - the
    collisions occur over the transmission of control
    frames
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a MAC technique that uses collision detection?

A

CSMA/CD (Carrier Sense, Multiple Access with Collision Detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What MAC technique uses collision avoidance?

A

CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the fundamental operation of token-based MAC techniques?

A

A special frame called token (jeton), that contains
an authorization message for the next computer
that is authorised to transmit (usually it is the
MAC address of the next computer). This token
travels the network in a certain order, usually in a
logical ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two methods to generate a token in token-based techniques?

A
  • centralized token where we have a central
    entity that coordinates the activity by issuing in
    a controlled way the tokens
  • distributed token where the computers are
    taking turns in generating a new token
    containing the MAC address of the next
    computer, in la logical ring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the advantages of token-based MAC techniques?

A
  • deterministic (there is a maximum time after a
    computer will receive again the right to
    transmit)
  • flexible because different options may be
    implemented, including priorities
  • with the increase of the number of computers,
    the total transfer rate increases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the disadvantages of token-based MAC techniques?

A
  • complex technique, difficult to implement
  • there is a constant redundancy due to the
    token passing method ( even when the
    computer has nothing to transmit it will still
    receive the token)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CSMA/CD stand for?

A

Carrier Sense, Multiple Access with Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of the IEEE 802 standard?

A

Specifies one MAC option, frame structure, and physical layer options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two sublayers of the Data Link layer defined by IEEE?

A
  • MAC (Medium Access Control)
  • LLC (Logical Link Control)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the frame structure of IEEE 802.3/Ethernet?

A

Includes preamble, SFD, destination address, source address, length/type, data, PAD, and FCS

17
Q

What is the purpose of the preamble in an Ethernet frame?

A

Bit synchronization at the receiver

18
Q

What type of address is used for broadcasting in Ethernet frames?

A

Special broadcast address (ff ff ff ff ff ff h)

19
Q

What does FCS stand for in the Ethernet frame structure?

A

Frame Check Sequence

20
Q

What is the maximum segment length for 10BaseT Ethernet?

21
Q

What topology is used with 10BaseT Ethernet?

A

Star topology

22
Q

What is the significance of the 5-4-3 rule in bus topologies?

A

Limits the number of segments and repeaters in the network

23
Q

Fill in the blank: The MAC address is used to identify the _______ of the frame.

24
Q

True or False: In contention-based MAC techniques, the number of collisions increases exponentially as more computers join the network.

25
What is the main advantage of using switches in modern networks?
Transforms shared media into switched media
26
What is the maximum data field size for IEEE 802.3 frames?
1500 bytes
27
What are the two encoding methods mentioned for physical layer options?
* BASE (baseband encoding) * BROAD (broadband)
28
What is the purpose of the PAD field in an Ethernet frame?
To ensure the data field is at least 46 bytes in size
29
Describe the topology for 10 Base2
- thin coaxial cable - Z = 50 ohms - 185 m/segment - Bus topology - 5-4-3 rule
30
Describe the topology for 10 Base5
-thick coaxial table - 500 m/segment - bus topology - 5-4-3 rule
31
Describe the topology for 10 BaseT
- UTP/FTP cable - RJ-45 connector - max 100 m/segment -star topology - a hub is needed - structured cabling
32