Medium Access Control

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How does Frequency Division Multiplexing (FDM) allocate bandwidth among users?

  • It dynamically assigns bandwidth based on user demand.
  • It assigns bandwidth randomly to users.
  • It divides the bandwidth into equal-sized bands, assigning each to a user. (correct)
  • It allocates the entire bandwidth to a single user at a time.

What is a primary limitation of using Time Division Multiplexing (TDM) for channel allocation?

  • It requires sophisticated error detection and correction mechanisms.
  • It cannot support a variable number of users.
  • It is complex to implement in hardware.
  • Bandwidth is not fully utilized if users have nothing to transmit during assigned slots. (correct)

Which of the following is a key characteristic of the ALOHA protocol?

  • A central controller manages channel access.
  • Channel access is determined through a contention-free method.
  • Users transmit whenever they have a frame to send. (correct)
  • Users must wait for a specific time slot before transmitting.

How does a sender detect a collision in the ALOHA protocol?

<p>By listening to the channel or via acknowledgement. (A)</p> Signup and view all the answers

What does the 'offered load' (G) represent in the context of the ALOHA protocol?

<p>The average number of frames generated, including new transmissions and retransmissions, per frame time. (C)</p> Signup and view all the answers

According to the content, what is the maximum throughput (S) of pure ALOHA when the offered load (G) is optimized?

<p>$S = 1/(2e) \approx 0.184$ (D)</p> Signup and view all the answers

What is a key difference between slotted ALOHA and pure ALOHA?

<p>Slotted ALOHA divides time into discrete slots, and users can only transmit at the beginning of a time slot. (C)</p> Signup and view all the answers

In slotted ALOHA, what action does a user take if a collision occurs?

<p>Waits for a random number of time slots and then retransmits the frame. (C)</p> Signup and view all the answers

What is the maximum throughput of slotted ALOHA?

<p>36.8% (C)</p> Signup and view all the answers

Why does Carrier Sense Multiple Access (CSMA) improve upon ALOHA in channel utilization?

<p>Because CSMA requires users to listen for ongoing transmissions before transmitting. (C)</p> Signup and view all the answers

In 1-persistent CSMA, what does a station do if it senses the channel is busy?

<p>It waits until the channel becomes idle, then transmits immediately. (D)</p> Signup and view all the answers

How does non-persistent CSMA differ from 1-persistent CSMA in handling a busy channel?

<p>Non-persistent CSMA waits a random period before sensing the channel again, rather than continuously sensing it. (C)</p> Signup and view all the answers

How does p-persistent CSMA operate on a slotted channel when the channel is sensed as idle?

<p>It transmits with probability <em>p</em> and defers to the next time slot with probability 1-<em>p</em>. (C)</p> Signup and view all the answers

What is the primary advantage of CSMA/CD (Collision Detection) over other CSMA protocols?

<p>Stations stop transmitting as soon as a collision is detected, reducing wasted bandwidth. (D)</p> Signup and view all the answers

What phenomenon makes standard CSMA protocols unsuitable for wireless LANs?

<p>The hidden station problem. (B)</p> Signup and view all the answers

In the 'hidden station problem', what is the fundamental issue that leads to collisions?

<p>Stations are unaware of each other’s transmissions due to range limitations. (A)</p> Signup and view all the answers

In the 'exposed station problem', why does a station unnecessarily defer transmission?

<p>It overhears a transmission that will not actually interfere with its intended receiver. (B)</p> Signup and view all the answers

What is the primary goal of Multiple Access with Collision Avoidance (MACA)?

<p>To reduce collisions by using RTS and CTS frames. (D)</p> Signup and view all the answers

In MACA, what is the purpose of the RTS (Request to Send) frame?

<p>To request permission to transmit from the receiver. (B)</p> Signup and view all the answers

How does a station hearing a CTS (Clear to Send) frame but not the RTS frame respond in MACA?

<p>It must remain silent during the upcoming data transmission. (D)</p> Signup and view all the answers

Under what circumstances can collisions still occur when using MACA?

<p>When RTS frames from multiple senders collide at the receiver. (D)</p> Signup and view all the answers

Which multiple access protocol is used by Ethernet, according to the text?

<p>CSMA (D)</p> Signup and view all the answers

What is the transmission medium of Classic Ethernet?

<p>Coaxial cable (D)</p> Signup and view all the answers

Classic Ethernet uses a coaxial cable capped at 2.5 km long. How often are repeaters placed in Classic Ethernet's coaxial implementations?

<p>every 500 meters (A)</p> Signup and view all the answers

What distinguishes 'switched Ethernet' from earlier forms of Ethernet?

<p>It utilizes hubs or switches. (A)</p> Signup and view all the answers

At which layer of the TCP/IP model do repeaters operate?

<p>Physical Layer (B)</p> Signup and view all the answers

Within the context of Ethernet, what constitutes a collision domain in a network using hubs?

<p>The entire hub and all connected devices. (B)</p> Signup and view all the answers

How do switches forward frames in a network?

<p>By reading the destination MAC address and consulting a forwarding table. (C)</p> Signup and view all the answers

What is the role of bridges in networking?

<p>Interconnecting multiple LANs (Ethernets) to create an extended LAN. (A)</p> Signup and view all the answers

Which fields are included in the DIX Ethernet frame format?

<p>Preamble, Destination address, Source address, Type, Data, Pad, Checksum. (C)</p> Signup and view all the answers

What is the purpose of the 'Preamble' field in the DIX Ethernet frame format?

<p>To provide synchronization for the receiver. (A)</p> Signup and view all the answers

In the DIX Ethernet frame format, what is the maximum size of the 'Data' field?

<p>1500 bytes (C)</p> Signup and view all the answers

What is the purpose of the 'Pad' field in the DIX Ethernet frame format?

<p>To ensure a minimum frame length for collision detection. (B)</p> Signup and view all the answers

How is a 'learning bridge' is able to determine the port on which a host resides?

<p>By dynamic inspection of the source address of incoming frames. (A)</p> Signup and view all the answers

What action does a learning bridge take in regard to a frame if the destination of a frame that arrives at port 1 also resides on port 1?

<p>The frame is not forwarded. (B)</p> Signup and view all the answers

How does a learning bridge handle table entries for hosts that might have moved to a different network?

<p>A timer is associated, that deletes the table entry after timeout.. (D)</p> Signup and view all the answers

According to the information provided, what does the completeness of a bridge's forwarding table indicate?

<p>Optimization of the forwarding process. (D)</p> Signup and view all the answers

In an example how to build a LAN, what components were used?

<p>hubs, switches (B)</p> Signup and view all the answers

To connect each machine/computer to the hub, what type of cable is needed?

<p>twisted pair cable (D)</p> Signup and view all the answers

What are LAN switches also refered to as?

<p>LAN bridges (C)</p> Signup and view all the answers

In the context of channel allocation, what is the key difference between static and dynamic channel allocation methods?

<p>Static allocation assigns fixed bandwidth to users, while dynamic allocation allocates bandwidth based on demand. (D)</p> Signup and view all the answers

Why might non-persistent CSMA be preferred over 1-persistent CSMA in certain network environments?

<p>Non-persistent CSMA avoids continuous sensing and reduces collisions when the channel is busy, at the cost of potentially increased delay. (A)</p> Signup and view all the answers

What is the vulnerability period in pure ALOHA, and how does it affect the protocol's efficiency?

<p>The vulnerability period is two frame times, and it increases he chance of collisions. (A)</p> Signup and view all the answers

How does the MACA protocol attempt to solve the hidden and exposed station problems in wireless networks?

<p>By using RTS and CTS frames to ensure neighboring stations are aware of ongoing transmissions. (A)</p> Signup and view all the answers

If a learning bridge's forwarding table is incomplete, what is the bridge's behaviour when it receives a frame with a destination address not present in its forwarding table?

<p>The bridge floods the frame to all ports except the incoming port. (D)</p> Signup and view all the answers

Flashcards

Network Categories

Networks divided into point-to-point links and broadcast channels.

MAC Sublayer

Protocols resolving multiple access issue in the data link layer.

Offered Load (G)

Total number of frames (new + retransmissions) per frame time.

Throughput (S)

Successfully delivered frames per frame time.

Signup and view all the flashcards

Pure ALOHA

Users transmit anytime they have a frame to send.

Signup and view all the flashcards

Slotted ALOHA

Time is divided into discrete time slots.

Signup and view all the flashcards

Carrier Sense Multiple Access (CSMA)

Listens for ongoing transmissions before sending.

Signup and view all the flashcards

1-Persistent CSMA

If idle, station transmits; if busy, waits until idle then transmits.

Signup and view all the flashcards

Nonpersistent CSMA

If idle, station transmits; if busy, waits random time, repeats algorithm.

Signup and view all the flashcards

p-Persistent CSMA

Applies to slotted channels; transmits with probability 'p' if idle.

Signup and view all the flashcards

CSMA/CD

Stops transmitting if collision detected.

Signup and view all the flashcards

Wireless LAN

Mobile devices communicate using radio channel.

Signup and view all the flashcards

Hidden Station Problem

Station can't detect competitor due to distance.

Signup and view all the flashcards

Exposed Station Problem

Detects ongoing transmission and falsely concludes it can't send.

Signup and view all the flashcards

MACA Protocol

Uses RTS/CTS frames to avoid collisions.

Signup and view all the flashcards

RTS (Request to Send)

Short frame requesting permission to send data.

Signup and view all the flashcards

CTS (Clear to Send)

Response to RTS, grants permission to send data.

Signup and view all the flashcards

Ethernet

Important networking tech. based on CSMA/CD.

Signup and view all the flashcards

Classic Ethernet

Coaxial cable, up to 2.5 km, repeaters every 500 m.

Signup and view all the flashcards

Switched Ethernet

Built using hubs or switches.

Signup and view all the flashcards

Repeaters

Sends signals between cable segments, doesn't examine addresses.

Signup and view all the flashcards

Hubs

Connected by twisted pair cable, copies data simultaneously.

Signup and view all the flashcards

Switches

Forwards by reading MAC address, maintains lookup table.

Signup and view all the flashcards

Bridges

switches interconnecting LANs to create extended LANs.

Signup and view all the flashcards

Ethernet Preamble

Used to synchronize transmissions.

Signup and view all the flashcards

Source and Destination Addresses

48-bit MAC addresses identifying the sender and receiver.

Signup and view all the flashcards

Ethernet Type field

Tells the type of protocol to hand the frame to.

Signup and view all the flashcards

Ethernet Pad field

Adds extra bytes needed for min 64 byte frame length.

Signup and view all the flashcards

Ethernet Checksum field

Used for error detection.

Signup and view all the flashcards

Learning Bridge

Maintains forwarding table to specify port for each host.

Signup and view all the flashcards

Bridges and LAN switches

LAN switches, or older bridges.

Signup and view all the flashcards

Create Table

Switches used to create the table.

Signup and view all the flashcards

Guaranteed time.

For protection, every entry has time-out.

Signup and view all the flashcards

Study Notes

Medium Access Control Sublayer

  • Networks are divided into point-to-point links or broadcast channels
  • With broadcast networks, the core challenge is to determine channel usage during competition

Static Channel Allocation

  • In Frequency Division Multiplexing (FDM) with N users, bandwidth is divided into N equal bands, each assigned to a user
  • FDM works when the user base N is small, constant with a high traffic load per user
  • FDM demonstrates inefficiency with larger user numbers because when the spectrum is divided into N bands, and there are more than N users seeking communication, some are excluded even if assigned users are not transmitting
  • Even holding the user number constant at N, FDM proves inefficient, as idle users' frequency bands are wasted
  • Time Division Multiplexing (TDM) divides time into N slots, assigning each to a user
  • TDM is also inefficient if a user has nothing to transmit during their assigned slot
  • A solution exists in Dynamic Channel Allocation through methods such as ALOHA and CSMA

ALOHA

  • Developed by Norman Abramson and colleagues at the University of Hawaii
  • There are two versions of ALOHA: pure and slotted

Pure ALOHA

  • Users transmit whenever they have a frame to send
  • On collision, the sender waits randomly before retransmission
  • Collisions can be detected by listening to the channel or by using acknowledgement

Performance of pure ALOHA

  • Offered load (G) is the average number of generated frames (new and retransmissions) per frame time
  • Throughput(S) is the average number of frames successfully delivered per frame time
  • Throughput in relation to offered load is S = Ge−2G
  • The maximum throughput occurs at G = 0.5, with S = approximately 0.184
  • Consequently, the best channel utilization achievable with ALOHA is 18%

Slotted ALOHA

  • Time is divided into discrete slots
  • Users are only allowed to transmit at the beginning of a time slot
  • This is the sender algorithm for slotted ALOHA:
    • First, when a user has a frame to send, it waits until the start of the next time slot
    • Next, If there is a collision, the user will wait a random amount of time before sending the same frame again
  • Throughput where S = Ge-G, for slotted ALHOA is better than Pure ALOHA
  • Maximum throughput happens when G = 1, with S = around 0.368, doubling pure ALOHA's capacity

Carrier Sense Multiple Access (CSMA)

  • Best channel utilization that can be achieved with ALOHA is 36%
  • This is because users transmit without considering the actions of others
  • An improvement is achieved by listening for ongoing transmissions for ongoing transmissions and acting accordingly

1-persistent CSMA

  • A station with data first listens to the channel to see if anyone is transmitting:
    • If the channel is idle, the station transmits
    • If the channel is busy, the station waits until the channel is idle, then transmits
  • If there is a collision, the station waits a random amount of time and iterates again
  • Intuitively, this protocol performs better than ALOHA
  • Collisions occur if 2 stations are waiting and both see the channel become idle at the same time

Nonpersistent CSMA

  • A station with data first listens to the channel
    • When the channel is idle, the station transmits
    • When the channel is busy, the station does not continuously sense, but waits a random period and repeats the process
  • This method results in better channel use but longer delays than 1-persistent CSMA

P-persistent CSMA

  • Applies to slotted channels and involves the station sensing the channel when it becomes ready
  • If the channel is idle, the station transmits with probability p or defers to the next slot with probability (1-p), repeating until transmission or another station transmits
  • If the channel is busy, the station waits until the next time slot before retrying

CSMA/CD (Collision Detection)

  • In CSMA, stations may transmit simultaneously, so an advancement is to employ:
    • Collision detection, which causes a station to sense the channel while transmitting and stop transmitting as soon as congestion is detected

Wireless LAN protocols

  • Mobile devices can communicate using a shared radio channel
  • the configurations is known as wireless LAN
  • Two users can communicate within radio range of each other
  • Collision is when a receiver is in range of 2 active transmitters

The hidden station problem

  • CSMA cannot be used in wireless LANs
  • A and B are within each other range, and they can potentially interfere with one another.
  • C can also interfere with B and D, but not with A.
  • A is transmitting to B.
  • If C senses the medium but cannot hear A as A is out of range, and C may falsely conclude it can transmit to B, but Collision will transpire.
  • The problem of a station not being able to detect a competitor for the medium because they are too far away is called the hidden station problem

The exposed station problem

  • Consider a reverse situation in which B is transmitting to A
  • If C senses the medium and hears a transmission and falsely concludes it cannot send to D.
  • A transfer, however, from C to D wont interfere with the transmission from B to A, because A wont sense transission from C direction
  • In Wireless LAN what matters is the interference at the receiver, not the sender

Collision Avoidance (MACA)

  • Transmitting station A first sends a RTS (request to send) frame to the destination station B:
    • This frame tells the length of the data frame that will be sent soon
    • B replies with a CTS(clear to send frame that contains the length of data copied from the RTS frame)
    • Once A gets CTS framne it begins transmisson.
  • If a station hears the RTS is near station A therefore, must remain quite enough for CTS to be transferred back to A without conflict
  • Should any station hear the CTS is likely close to be and must remain quite throughout data transmission, it could obtain data transmission length to examined frame, length

CSMA/CA collision avoidance

  • If a station hears an RTS but not a CTS, then it is near the sender but far from the receiver, so it will not collide with the CTS, and can transmit itself

Example use of (MACA)

  • C is close to station A but is not in the range of station B, so C only hears RTS but doesn’t hear CTS. Therefore C transmit.
  • D is close to station B, yet is not in range of Station A. Thus D will hear CTS with nothing else.
  • E is close to both A and B, so E is unable to transmit

Collision still can happen

  • Station B and Station C could both transmit at same time, thus be wasted.
  • The transmitter will be aware of the RTS if it doesn’t get a CTS.
  • If there is collision, the transmitter waits random amounts of time, and will keep trying again

Ethernet

  • Ethernet (now IEEE 802.3 standard) employs CSMA
  • Ethernet was introduced and it is an important networking technology

Classic Ethernet

  • In Classic Ethernet (1978 standardized a medium of coaxial cable (the ether, up to 2.5 km long, with repeaters every 500 m.
  • up to 256 machines connected
  • Transmission rate 2.94 Mbps
  • In 1978 Dec, intel and Xerox standardized 10 m bps Ethernet. Now 100 m bps and 1 gbps Ethernets exist.

Switched Ethernet

  • Can Be built by using hubs or switches

Repeaters

  • Are analog devices.
  • Connect two cable segments, a signal appearing on one cable is amplified and put out on the other one.
  • Are physical layer devices, meaning they do not look at any address.
  • They Dont understand frames, packets, or headers, or volts

Hubs

  • Each machine is connected to hub by a separate twisted pair cable.
  • Hubs all have lines are sent out without buffering or looking at the address
  • If two frames arrive at the , the entire hub forms a single collision domain

Switches

  • Switches: where frame coming on port line are forwarded to the right output port, by reading the MAC addrrss in the Ethernet frame header, where to send the fram.
  • Bridges switches used to connect several LANS (Ethernets, and create expandedlans

Ethernet Frame format

  • The two frame format styles are:
    • (a)DIX (DEC, Intel, Xerox) Ethernet.
    • (b) IEEE 802.3.

DIX Ethernet frame format

  • Each element listed below in order as it appears:
    • Preamble Is 8 bytes. The pattern 10101010 (repeated)8 times, used for extracting clock with manychester coding
    • Source and destination Addressed 48 bit data link layer MAC address. Any Ethernet board has 48 MAC address:
    • Type tells the receiver which net work protocol to hand frame over to:
    • Data is up to 1500 bytes of data:
    • The pad is when frames with fewer that sixty four are packed out. It does not
    • checksum is for eroor detection.

Bridges and LAN switches

  • Switches can be used to forward packets between shared-media LANs such as Ethernets.
  • These switches are LAN switches, sometimes referred to bridges:
  • If the frame arrives at port it will be sent through other ports:

Learning bridges

  • A gets sent port , but does not forward a frame to other lan:
  • The forwarding able determines which host is on each port, and the destination and the forwarding table determine whether the frame is forwarded:

Learning bridge (created dynamically by the bridge)

  • When the bridge boots, the table is empty:
  • Bridge table includes source of all frames.
  • If a frame is received at port, the , bridge will make the first entry of the table

Learning bridges (contd)

  • With learning bridges is that there is a, every associated entry has a timeout, after a timeout the entry gets removed
  • The table is not always completed
  • The complete table is not as important as the operations:

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser