Notes Flashcards

1
Q

Data link layer

A

The layer 2 is responsible for moving a message from one computer or network device to the next computer. It controls the way messages are sent on the physical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data link protocol

A

A data link protocol determines who can transmit at what time, where a message begins and ends, and how a receiver recognizes and corrects a transmission error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The data link layer performs two main functions, and therefore is often divided into two sublayers …

A

Logical link control [LLC] sublayer &

Media access control [MAC] sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logical link control [LLC] sublayer

A

LLC is the data link layer’s connection to the network layer above it. At the sending computer, the LLC sublayer software is responsible for communicating with the network layer Protocol Data Unit (PDU) – usually an IP packet – and surrounding it with a data link layer PDU – often an ethernet frame. At the receiving computer, the LLC sublayer software removes the data link layer PDU and passes the message it contains to the network layer software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Media access control [MAC] sublayer

A

MAC controls the physical hardware. The MAC sublayer software at the sending computer controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit.

At the receiving computer, the MAC sublayer software takes the data link layer PDU from the LLC sublayer, converts it into a stream of bits, and controls when the physical layer actually transmits the bits over the circuit. At the receiving computer, the MAC sublayer receives a stream of bits from the physical layer and translates it into a coherent PDU, ensures that no errors have occurred in transmission, and passes the data link layer PDU to the LLC sublayer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A data link protocol performs three functions:

A
  1. Controls when computers transmit (media access control)
  2. Detects and corrects transmission errors (error control)
  3. Identifies the start and end of a message by using a PDU (message delineation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Media Access Control (MAC)

A

Refers to the need to control when computers transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is Media Access Control unnecessary with point-to-point full-duplex configurations?

A

Because there are only two computers on the circuit and full duplex permits either computer to transmit at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When does Media Access Control becomes important?

A

It becomes important when several computers share the same communication circuit, such as point-to-point configuration with a half duplex configuration that requires computers to take turns, or a multipoint configuration in which several computers share the same circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fundamental approaches to Media Access Control …

A
  1. Contention
  2. Controlled Access
      1. Access Requests
    1. 2 Polling
      2. 2.1. Roll-call polling
      2. 2. Hub polling (also called token passing)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Contention (Media Access Control) approach

A

With contention, computers wait until the circuit is free and then transmit whenever they have data to send. Contention is commonly used in Ethernet LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Controlled Access (Media Access Control) approach

A

Most wireless LANs use controlled access. In this case, the wireless access point controls the circuit and determines which clients can transmit at what time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controlled Access techniques:

A
  1. Access Requests
  2. Polling
      1. Roll-call polling
      1. Hub polling (also called token passing)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Requests (Controlled Access technique)

A

steps:

  1. Client computers that want to transmit send a request to transmit to the device that is controlling the circuit (e.g., the wireless access point).
  2. The controlling device grants permission for one computer at a time to transmit.
  3. When one computer has permission to transmit all other computers wait until that computer has finished, and then, if they have something to transmit, they use a contention technique to send an access request.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Polling (Controlled Access technique)

A

Polling is the process of sending a signal to a client computer that gives it permission to transmit. With polling, the clients store all messages that need to be transmitted. Periodically the controlling device (e.g., a wireless access) polls the client to see if it has data to send. If the client has data to send, it does so. If the client has no data to send, it responds negatively, and the controller asks another client if it has data to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Roll-call polling (Controlled Access technique - polling)

A

With roll-call polling, the controller works consecutively through a list of clients, first polling client 1, then client 2, and so on, until all are polled. Roll-call polling can be modified to select clients in priority so that some get polled more often than others. For example, one could increase the priority of client 1 by using a polling sequence such as 1, 2, 3, 1, 4, 5, 1, 5, 7, 1, 8, 9. The response might be an incoming message that was waiting to be sent, a negative response indicating nothing is to be sent, or the full “time-out-period” may expire because the client is temporarily out of service.

17
Q

Hub polling also called token passing (Controlled Access technique - polling)

A

One device starts the poll and passes it to the next computer on the multipoint circuit, which sends its message and passes the poll to the next. That computer then passes the poll to the next, and so on, until it reaches the first computer, which restarts the process again.

18
Q

Which media access control approach is best: controlled access or contention?

A

The key consideration is throughput – which approach will permit the most amount of user data to be transmitted through the network.

In general, contention approaches work better than controlled approaches for small networks that have low usage. In this case, each computer can transmit when necessary, without waiting for permission. Because usage is low, there is little chance of a collision. In contrast, computers in a controlled access environment must wait for permission, so even if no other computer needs to transmit, they must wait for the poll.

The reverse is true for large networks with high usage: controlled access works better. In high-volume networks, many computers want to transmit, and the probability of a collision using contention is high. Collisions are very costly in term of throughput because they waste circuit capacity during the collision and require both computers to retransmit later. Controlled access prevents collisions and makes more efficient use of the circuit, and although response time does increase, it does so more gradually.