Podcast
Questions and Answers
How does Frequency Division Multiplexing (FDM) allocate bandwidth among users?
How does Frequency Division Multiplexing (FDM) allocate bandwidth among users?
- It dynamically assigns bandwidth based on user demand.
- It assigns bandwidth randomly to users.
- It divides the bandwidth into equal-sized bands, assigning each to a user. (correct)
- It allocates the entire bandwidth to a single user at a time.
What is a primary limitation of using Time Division Multiplexing (TDM) for channel allocation?
What is a primary limitation of using Time Division Multiplexing (TDM) for channel allocation?
- It requires sophisticated error detection and correction mechanisms.
- It cannot support a variable number of users.
- It is complex to implement in hardware.
- Bandwidth is not fully utilized if users have nothing to transmit during assigned slots. (correct)
Which of the following is a key characteristic of the ALOHA protocol?
Which of the following is a key characteristic of the ALOHA protocol?
- A central controller manages channel access.
- Channel access is determined through a contention-free method.
- Users transmit whenever they have a frame to send. (correct)
- Users must wait for a specific time slot before transmitting.
How does a sender detect a collision in the ALOHA protocol?
How does a sender detect a collision in the ALOHA protocol?
What does the 'offered load' (G) represent in the context of the ALOHA protocol?
What does the 'offered load' (G) represent in the context of the ALOHA protocol?
According to the content, what is the maximum throughput (S) of pure ALOHA when the offered load (G) is optimized?
According to the content, what is the maximum throughput (S) of pure ALOHA when the offered load (G) is optimized?
What is a key difference between slotted ALOHA and pure ALOHA?
What is a key difference between slotted ALOHA and pure ALOHA?
In slotted ALOHA, what action does a user take if a collision occurs?
In slotted ALOHA, what action does a user take if a collision occurs?
What is the maximum throughput of slotted ALOHA?
What is the maximum throughput of slotted ALOHA?
Why does Carrier Sense Multiple Access (CSMA) improve upon ALOHA in channel utilization?
Why does Carrier Sense Multiple Access (CSMA) improve upon ALOHA in channel utilization?
In 1-persistent CSMA, what does a station do if it senses the channel is busy?
In 1-persistent CSMA, what does a station do if it senses the channel is busy?
How does non-persistent CSMA differ from 1-persistent CSMA in handling a busy channel?
How does non-persistent CSMA differ from 1-persistent CSMA in handling a busy channel?
How does p-persistent CSMA operate on a slotted channel when the channel is sensed as idle?
How does p-persistent CSMA operate on a slotted channel when the channel is sensed as idle?
What is the primary advantage of CSMA/CD (Collision Detection) over other CSMA protocols?
What is the primary advantage of CSMA/CD (Collision Detection) over other CSMA protocols?
What phenomenon makes standard CSMA protocols unsuitable for wireless LANs?
What phenomenon makes standard CSMA protocols unsuitable for wireless LANs?
In the 'hidden station problem', what is the fundamental issue that leads to collisions?
In the 'hidden station problem', what is the fundamental issue that leads to collisions?
In the 'exposed station problem', why does a station unnecessarily defer transmission?
In the 'exposed station problem', why does a station unnecessarily defer transmission?
What is the primary goal of Multiple Access with Collision Avoidance (MACA)?
What is the primary goal of Multiple Access with Collision Avoidance (MACA)?
In MACA, what is the purpose of the RTS (Request to Send) frame?
In MACA, what is the purpose of the RTS (Request to Send) frame?
How does a station hearing a CTS (Clear to Send) frame but not the RTS frame respond in MACA?
How does a station hearing a CTS (Clear to Send) frame but not the RTS frame respond in MACA?
Under what circumstances can collisions still occur when using MACA?
Under what circumstances can collisions still occur when using MACA?
Which multiple access protocol is used by Ethernet, according to the text?
Which multiple access protocol is used by Ethernet, according to the text?
What is the transmission medium of Classic Ethernet?
What is the transmission medium of Classic Ethernet?
Classic Ethernet uses a coaxial cable capped at 2.5 km long. How often are repeaters placed in Classic Ethernet's coaxial implementations?
Classic Ethernet uses a coaxial cable capped at 2.5 km long. How often are repeaters placed in Classic Ethernet's coaxial implementations?
What distinguishes 'switched Ethernet' from earlier forms of Ethernet?
What distinguishes 'switched Ethernet' from earlier forms of Ethernet?
At which layer of the TCP/IP model do repeaters operate?
At which layer of the TCP/IP model do repeaters operate?
Within the context of Ethernet, what constitutes a collision domain in a network using hubs?
Within the context of Ethernet, what constitutes a collision domain in a network using hubs?
How do switches forward frames in a network?
How do switches forward frames in a network?
What is the role of bridges in networking?
What is the role of bridges in networking?
Which fields are included in the DIX Ethernet frame format?
Which fields are included in the DIX Ethernet frame format?
What is the purpose of the 'Preamble' field in the DIX Ethernet frame format?
What is the purpose of the 'Preamble' field in the DIX Ethernet frame format?
In the DIX Ethernet frame format, what is the maximum size of the 'Data' field?
In the DIX Ethernet frame format, what is the maximum size of the 'Data' field?
What is the purpose of the 'Pad' field in the DIX Ethernet frame format?
What is the purpose of the 'Pad' field in the DIX Ethernet frame format?
How is a 'learning bridge' is able to determine the port on which a host resides?
How is a 'learning bridge' is able to determine the port on which a host resides?
What action does a learning bridge take in regard to a frame if the destination of a frame that arrives at port 1 also resides on port 1?
What action does a learning bridge take in regard to a frame if the destination of a frame that arrives at port 1 also resides on port 1?
How does a learning bridge handle table entries for hosts that might have moved to a different network?
How does a learning bridge handle table entries for hosts that might have moved to a different network?
According to the information provided, what does the completeness of a bridge's forwarding table indicate?
According to the information provided, what does the completeness of a bridge's forwarding table indicate?
In an example how to build a LAN, what components were used?
In an example how to build a LAN, what components were used?
To connect each machine/computer to the hub, what type of cable is needed?
To connect each machine/computer to the hub, what type of cable is needed?
What are LAN switches also refered to as?
What are LAN switches also refered to as?
In the context of channel allocation, what is the key difference between static and dynamic channel allocation methods?
In the context of channel allocation, what is the key difference between static and dynamic channel allocation methods?
Why might non-persistent CSMA be preferred over 1-persistent CSMA in certain network environments?
Why might non-persistent CSMA be preferred over 1-persistent CSMA in certain network environments?
What is the vulnerability period in pure ALOHA, and how does it affect the protocol's efficiency?
What is the vulnerability period in pure ALOHA, and how does it affect the protocol's efficiency?
How does the MACA protocol attempt to solve the hidden and exposed station problems in wireless networks?
How does the MACA protocol attempt to solve the hidden and exposed station problems in wireless networks?
If a learning bridge's forwarding table is incomplete, what is the bridge's behaviour when it receives a frame with a destination address not present in its forwarding table?
If a learning bridge's forwarding table is incomplete, what is the bridge's behaviour when it receives a frame with a destination address not present in its forwarding table?
Flashcards
Network Categories
Network Categories
Networks divided into point-to-point links and broadcast channels.
MAC Sublayer
MAC Sublayer
Protocols resolving multiple access issue in the data link layer.
Offered Load (G)
Offered Load (G)
Total number of frames (new + retransmissions) per frame time.
Throughput (S)
Throughput (S)
Signup and view all the flashcards
Pure ALOHA
Pure ALOHA
Signup and view all the flashcards
Slotted ALOHA
Slotted ALOHA
Signup and view all the flashcards
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
Signup and view all the flashcards
1-Persistent CSMA
1-Persistent CSMA
Signup and view all the flashcards
Nonpersistent CSMA
Nonpersistent CSMA
Signup and view all the flashcards
p-Persistent CSMA
p-Persistent CSMA
Signup and view all the flashcards
CSMA/CD
CSMA/CD
Signup and view all the flashcards
Wireless LAN
Wireless LAN
Signup and view all the flashcards
Hidden Station Problem
Hidden Station Problem
Signup and view all the flashcards
Exposed Station Problem
Exposed Station Problem
Signup and view all the flashcards
MACA Protocol
MACA Protocol
Signup and view all the flashcards
RTS (Request to Send)
RTS (Request to Send)
Signup and view all the flashcards
CTS (Clear to Send)
CTS (Clear to Send)
Signup and view all the flashcards
Ethernet
Ethernet
Signup and view all the flashcards
Classic Ethernet
Classic Ethernet
Signup and view all the flashcards
Switched Ethernet
Switched Ethernet
Signup and view all the flashcards
Repeaters
Repeaters
Signup and view all the flashcards
Hubs
Hubs
Signup and view all the flashcards
Switches
Switches
Signup and view all the flashcards
Bridges
Bridges
Signup and view all the flashcards
Ethernet Preamble
Ethernet Preamble
Signup and view all the flashcards
Source and Destination Addresses
Source and Destination Addresses
Signup and view all the flashcards
Ethernet Type field
Ethernet Type field
Signup and view all the flashcards
Ethernet Pad field
Ethernet Pad field
Signup and view all the flashcards
Ethernet Checksum field
Ethernet Checksum field
Signup and view all the flashcards
Learning Bridge
Learning Bridge
Signup and view all the flashcards
Bridges and LAN switches
Bridges and LAN switches
Signup and view all the flashcards
Create Table
Create Table
Signup and view all the flashcards
Guaranteed time.
Guaranteed time.
Signup and view all the flashcards
Study Notes
Medium Access Control Sublayer
- Networks are divided into point-to-point links or broadcast channels
- With broadcast networks, the core challenge is to determine channel usage during competition
Static Channel Allocation
- In Frequency Division Multiplexing (FDM) with N users, bandwidth is divided into N equal bands, each assigned to a user
- FDM works when the user base N is small, constant with a high traffic load per user
- FDM demonstrates inefficiency with larger user numbers because when the spectrum is divided into N bands, and there are more than N users seeking communication, some are excluded even if assigned users are not transmitting
- Even holding the user number constant at N, FDM proves inefficient, as idle users' frequency bands are wasted
- Time Division Multiplexing (TDM) divides time into N slots, assigning each to a user
- TDM is also inefficient if a user has nothing to transmit during their assigned slot
- A solution exists in Dynamic Channel Allocation through methods such as ALOHA and CSMA
ALOHA
- Developed by Norman Abramson and colleagues at the University of Hawaii
- There are two versions of ALOHA: pure and slotted
Pure ALOHA
- Users transmit whenever they have a frame to send
- On collision, the sender waits randomly before retransmission
- Collisions can be detected by listening to the channel or by using acknowledgement
Performance of pure ALOHA
- Offered load (G) is the average number of generated frames (new and retransmissions) per frame time
- Throughput(S) is the average number of frames successfully delivered per frame time
- Throughput in relation to offered load is S = Ge−2G
- The maximum throughput occurs at G = 0.5, with S = approximately 0.184
- Consequently, the best channel utilization achievable with ALOHA is 18%
Slotted ALOHA
- Time is divided into discrete slots
- Users are only allowed to transmit at the beginning of a time slot
- This is the sender algorithm for slotted ALOHA:
- First, when a user has a frame to send, it waits until the start of the next time slot
- Next, If there is a collision, the user will wait a random amount of time before sending the same frame again
- Throughput where S = Ge-G, for slotted ALHOA is better than Pure ALOHA
- Maximum throughput happens when G = 1, with S = around 0.368, doubling pure ALOHA's capacity
Carrier Sense Multiple Access (CSMA)
- Best channel utilization that can be achieved with ALOHA is 36%
- This is because users transmit without considering the actions of others
- An improvement is achieved by listening for ongoing transmissions for ongoing transmissions and acting accordingly
1-persistent CSMA
- A station with data first listens to the channel to see if anyone is transmitting:
- If the channel is idle, the station transmits
- If the channel is busy, the station waits until the channel is idle, then transmits
- If there is a collision, the station waits a random amount of time and iterates again
- Intuitively, this protocol performs better than ALOHA
- Collisions occur if 2 stations are waiting and both see the channel become idle at the same time
Nonpersistent CSMA
- A station with data first listens to the channel
- When the channel is idle, the station transmits
- When the channel is busy, the station does not continuously sense, but waits a random period and repeats the process
- This method results in better channel use but longer delays than 1-persistent CSMA
P-persistent CSMA
- Applies to slotted channels and involves the station sensing the channel when it becomes ready
- If the channel is idle, the station transmits with probability p or defers to the next slot with probability (1-p), repeating until transmission or another station transmits
- If the channel is busy, the station waits until the next time slot before retrying
CSMA/CD (Collision Detection)
- In CSMA, stations may transmit simultaneously, so an advancement is to employ:
- Collision detection, which causes a station to sense the channel while transmitting and stop transmitting as soon as congestion is detected
Wireless LAN protocols
- Mobile devices can communicate using a shared radio channel
- the configurations is known as wireless LAN
- Two users can communicate within radio range of each other
- Collision is when a receiver is in range of 2 active transmitters
The hidden station problem
- CSMA cannot be used in wireless LANs
- A and B are within each other range, and they can potentially interfere with one another.
- C can also interfere with B and D, but not with A.
- A is transmitting to B.
- If C senses the medium but cannot hear A as A is out of range, and C may falsely conclude it can transmit to B, but Collision will transpire.
- The problem of a station not being able to detect a competitor for the medium because they are too far away is called the hidden station problem
The exposed station problem
- Consider a reverse situation in which B is transmitting to A
- If C senses the medium and hears a transmission and falsely concludes it cannot send to D.
- A transfer, however, from C to D wont interfere with the transmission from B to A, because A wont sense transission from C direction
- In Wireless LAN what matters is the interference at the receiver, not the sender
Collision Avoidance (MACA)
- Transmitting station A first sends a RTS (request to send) frame to the destination station B:
- This frame tells the length of the data frame that will be sent soon
- B replies with a CTS(clear to send frame that contains the length of data copied from the RTS frame)
- Once A gets CTS framne it begins transmisson.
- If a station hears the RTS is near station A therefore, must remain quite enough for CTS to be transferred back to A without conflict
- Should any station hear the CTS is likely close to be and must remain quite throughout data transmission, it could obtain data transmission length to examined frame, length
CSMA/CA collision avoidance
- If a station hears an RTS but not a CTS, then it is near the sender but far from the receiver, so it will not collide with the CTS, and can transmit itself
Example use of (MACA)
- C is close to station A but is not in the range of station B, so C only hears RTS but doesn’t hear CTS. Therefore C transmit.
- D is close to station B, yet is not in range of Station A. Thus D will hear CTS with nothing else.
- E is close to both A and B, so E is unable to transmit
Collision still can happen
- Station B and Station C could both transmit at same time, thus be wasted.
- The transmitter will be aware of the RTS if it doesn’t get a CTS.
- If there is collision, the transmitter waits random amounts of time, and will keep trying again
Ethernet
- Ethernet (now IEEE 802.3 standard) employs CSMA
- Ethernet was introduced and it is an important networking technology
Classic Ethernet
- In Classic Ethernet (1978 standardized a medium of coaxial cable (the ether, up to 2.5 km long, with repeaters every 500 m.
- up to 256 machines connected
- Transmission rate 2.94 Mbps
- In 1978 Dec, intel and Xerox standardized 10 m bps Ethernet. Now 100 m bps and 1 gbps Ethernets exist.
Switched Ethernet
- Can Be built by using hubs or switches
Repeaters
- Are analog devices.
- Connect two cable segments, a signal appearing on one cable is amplified and put out on the other one.
- Are physical layer devices, meaning they do not look at any address.
- They Dont understand frames, packets, or headers, or volts
Hubs
- Each machine is connected to hub by a separate twisted pair cable.
- Hubs all have lines are sent out without buffering or looking at the address
- If two frames arrive at the , the entire hub forms a single collision domain
Switches
- Switches: where frame coming on port line are forwarded to the right output port, by reading the MAC addrrss in the Ethernet frame header, where to send the fram.
- Bridges switches used to connect several LANS (Ethernets, and create expandedlans
Ethernet Frame format
- The two frame format styles are:
- (a)DIX (DEC, Intel, Xerox) Ethernet.
- (b) IEEE 802.3.
DIX Ethernet frame format
- Each element listed below in order as it appears:
- Preamble Is 8 bytes. The pattern 10101010 (repeated)8 times, used for extracting clock with manychester coding
- Source and destination Addressed 48 bit data link layer MAC address. Any Ethernet board has 48 MAC address:
- Type tells the receiver which net work protocol to hand frame over to:
- Data is up to 1500 bytes of data:
- The pad is when frames with fewer that sixty four are packed out. It does not
- checksum is for eroor detection.
Bridges and LAN switches
- Switches can be used to forward packets between shared-media LANs such as Ethernets.
- These switches are LAN switches, sometimes referred to bridges:
- If the frame arrives at port it will be sent through other ports:
Learning bridges
- A gets sent port , but does not forward a frame to other lan:
- The forwarding able determines which host is on each port, and the destination and the forwarding table determine whether the frame is forwarded:
Learning bridge (created dynamically by the bridge)
- When the bridge boots, the table is empty:
- Bridge table includes source of all frames.
- If a frame is received at port, the , bridge will make the first entry of the table
Learning bridges (contd)
- With learning bridges is that there is a, every associated entry has a timeout, after a timeout the entry gets removed
- The table is not always completed
- The complete table is not as important as the operations:
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.