Podcast
Questions and Answers
What is a requirement for nodes in slotted ALOHA?
What is a requirement for nodes in slotted ALOHA?
- Nodes require a centralized control.
- Frames must be of variable size.
- Time must be divided into equal size slots. (correct)
- Nodes must transmit at any time.
What happens when two or more nodes transmit in the same slot in slotted ALOHA?
What happens when two or more nodes transmit in the same slot in slotted ALOHA?
- Only one node succeeds in transmission.
- A collision occurs, affecting all nodes transmitting. (correct)
- Transmission is delayed by one slot for each node.
- All nodes receive their frames successfully.
What is the maximum efficiency of slotted ALOHA as the number of nodes approaches infinity?
What is the maximum efficiency of slotted ALOHA as the number of nodes approaches infinity?
- 1
- 0.25
- 1/e (approximately 0.37) (correct)
- 0.5
What is a disadvantage of slotted ALOHA?
What is a disadvantage of slotted ALOHA?
Which of the following is NOT an example of a random access MAC protocol?
Which of the following is NOT an example of a random access MAC protocol?
What is the main strategy used in random access MAC protocols to handle collisions?
What is the main strategy used in random access MAC protocols to handle collisions?
What is a key characteristic of slotted ALOHA operation?
What is a key characteristic of slotted ALOHA operation?
What is the primary purpose of DHCP in the scenario described?
What is the primary purpose of DHCP in the scenario described?
Which protocol is used to encapsulate DHCP requests?
Which protocol is used to encapsulate DHCP requests?
What action does the DHCP server take after receiving a DHCP request?
What action does the DHCP server take after receiving a DHCP request?
Before an HTTP request can be sent, what must be obtained?
Before an HTTP request can be sent, what must be obtained?
Which layer of the network stack is responsible for encapsulating the DNS query?
Which layer of the network stack is responsible for encapsulating the DNS query?
What is the function of a MAC address in a network?
What is the function of a MAC address in a network?
What type of addressing is associated with ARP?
What type of addressing is associated with ARP?
Which MAC protocol is used in Ethernet technology?
Which MAC protocol is used in Ethernet technology?
What does DOCSIS stand for?
What does DOCSIS stand for?
In the context of cable access networks, what does FDM stand for?
In the context of cable access networks, what does FDM stand for?
Which of the following best describes the concept of Time Division in MAC protocols?
Which of the following best describes the concept of Time Division in MAC protocols?
How are MAC address spaces typically allocated?
How are MAC address spaces typically allocated?
What is the primary concern related to token overhead in network protocols?
What is the primary concern related to token overhead in network protocols?
What type of multiple access method is used for upstream channels in cable networks?
What type of multiple access method is used for upstream channels in cable networks?
What is the main goal of Multiprotocol Label Switching (MPLS)?
What is the main goal of Multiprotocol Label Switching (MPLS)?
What does the Tag Control Information in an 802.1Q frame include?
What does the Tag Control Information in an 802.1Q frame include?
Which of the following is NOT a characteristic of MPLS?
Which of the following is NOT a characteristic of MPLS?
What element allows for quick lookups in MPLS?
What element allows for quick lookups in MPLS?
What does the data payload in an 802.1 frame primarily include?
What does the data payload in an 802.1 frame primarily include?
Which component is NOT typically part of a link-layer frame?
Which component is NOT typically part of a link-layer frame?
What field does the fixed length label in MPLS contain?
What field does the fixed length label in MPLS contain?
In data communication, what do VLANs help to achieve?
In data communication, what do VLANs help to achieve?
How does MPLS differ from traditional IP routing?
How does MPLS differ from traditional IP routing?
What is indicated by the 802.1 frame's CRC?
What is indicated by the 802.1 frame's CRC?
What is the primary function of a load balancer in a data center network?
What is the primary function of a load balancer in a data center network?
Which of the following is NOT listed as a challenge in managing data center networks?
Which of the following is NOT listed as a challenge in managing data center networks?
What type of routing does a load balancer perform?
What type of routing does a load balancer perform?
What benefit does increased interconnection among switches provide in a data center?
What benefit does increased interconnection among switches provide in a data center?
Which component typically directs client requests to specific servers within a data center?
Which component typically directs client requests to specific servers within a data center?
What does the term 'TOR switches' refer to in a data center network?
What does the term 'TOR switches' refer to in a data center network?
Which of the following protocols is related to error detection and correction in link layer networking?
Which of the following protocols is related to error detection and correction in link layer networking?
What does the acronym ARP stand for in LAN addressing?
What does the acronym ARP stand for in LAN addressing?
Which of these describes the journey of a web request within the protocol stack?
Which of these describes the journey of a web request within the protocol stack?
What is meant by 'link virtualization' in the context of LANs?
What is meant by 'link virtualization' in the context of LANs?
Flashcards
Slotted ALOHA
Slotted ALOHA
A random access MAC protocol where nodes transmit in equal-sized time slots. If a node transmits and there's no collision, the node can transmit again in the next slot. If there's a collision, the node retransmits with a probability until there's no collision.
Random Access MAC Protocol
Random Access MAC Protocol
A method for nodes to access a shared communication channel without prior coordination. Collisions may happen, with a protocol to detect and recover from them.
Collision Detection
Collision Detection
The ability of nodes to recognize when two or more nodes transmit simultaneously on the shared channel.
Slotted ALOHA Efficiency
Slotted ALOHA Efficiency
Signup and view all the flashcards
Collision
Collision
Signup and view all the flashcards
Maximum Efficiency (Slotted ALOHA)
Maximum Efficiency (Slotted ALOHA)
Signup and view all the flashcards
CSMA/CD
CSMA/CD
Signup and view all the flashcards
Token Message
Token Message
Signup and view all the flashcards
Cable Access Network
Cable Access Network
Signup and view all the flashcards
CMTS (Cable Modem Termination System)
CMTS (Cable Modem Termination System)
Signup and view all the flashcards
DOCSIS (Data Over Cable Service Interface Specification)
DOCSIS (Data Over Cable Service Interface Specification)
Signup and view all the flashcards
MAC Address
MAC Address
Signup and view all the flashcards
ARP (Address Resolution Protocol)
ARP (Address Resolution Protocol)
Signup and view all the flashcards
Multiple Access Protocol
Multiple Access Protocol
Signup and view all the flashcards
MAC Protocol (Channel Partitioning)
MAC Protocol (Channel Partitioning)
Signup and view all the flashcards
MAC Protocol (random access)
MAC Protocol (random access)
Signup and view all the flashcards
DHCP
DHCP
Signup and view all the flashcards
DHCP Request
DHCP Request
Signup and view all the flashcards
DHCP Server
DHCP Server
Signup and view all the flashcards
First-hop Router
First-hop Router
Signup and view all the flashcards
DNS Server
DNS Server
Signup and view all the flashcards
Data Center Network
Data Center Network
Signup and view all the flashcards
Load Balancer
Load Balancer
Signup and view all the flashcards
Border Router
Border Router
Signup and view all the flashcards
Tier 1 Switch
Tier 1 Switch
Signup and view all the flashcards
Tier 2 Switch
Tier 2 Switch
Signup and view all the flashcards
TOR Switch
TOR Switch
Signup and view all the flashcards
Rich Interconnection
Rich Interconnection
Signup and view all the flashcards
Increased Throughput
Increased Throughput
Signup and view all the flashcards
Redundancy
Redundancy
Signup and view all the flashcards
Link Virtualization
Link Virtualization
Signup and view all the flashcards
MPLS Goal
MPLS Goal
Signup and view all the flashcards
MPLS Label
MPLS Label
Signup and view all the flashcards
MPLS and IP Addresses
MPLS and IP Addresses
Signup and view all the flashcards
Virtual Circuit (VC)
Virtual Circuit (VC)
Signup and view all the flashcards
MPLS-capable Router
MPLS-capable Router
Signup and view all the flashcards
Label Switching
Label Switching
Signup and view all the flashcards
MPLS Header
MPLS Header
Signup and view all the flashcards
Exp (Experimental) bits
Exp (Experimental) bits
Signup and view all the flashcards
S (Stack) Bit
S (Stack) Bit
Signup and view all the flashcards
TTL (Time-To-Live)
TTL (Time-To-Live)
Signup and view all the flashcards
Study Notes
Chapter 5: Link Layer
- The link layer is responsible for transferring datagrams from one node to another physically adjacent node over a link.
- It encapsulates datagrams in frames.
- Hosts and routers are nodes.
- Communication channels that connect adjacent nodes along communication paths are links (wired links, wireless links).
- Link layer services cover framing, link access for encapsulating datagrams into frames, adding headers, and trailers, channel access if needed, and MAC addresses in frame headers to identify source and destination.
- Reliable delivery is between adjacent nodes.
- Flow control paces adjacent sending and receiving nodes.
- Link layer services include error detection, error correction, and half-duplex and full-duplex.
- Error detection and correction are crucial for handling signal attenuation, noise.
- Receivers detect and signal for retransmission or drop frames.
- Receivers identify and correct bit errors (without resorting to retransmission) with flow control.
Link Layer Implementation
- Link layer is implemented in network interface cards (NICs) or on a chip in each host.
- Ethernet cards, 802.11 cards, and Ethernet chipsets implement link and physical layers.
- These attach to the host's system buses.
- They combine hardware, software, and firmware.
Adaptors Communication
- Sending side encapsulates datagrams in frames, adds error checking bits, rdt, flow control, etc.
- Receiving side looks for errors, rdt, flow control, etc. Extracts the datagram, and passes it up to the receiver’s upper layer.
MAC Protocols: Taxonomy
- Three classes of MAC protocols include channel partitioning, random access, and taking turns.
- Channel partitioning divides the channel into smaller pieces (time slots, frequency, code).
- Random access allows collisions.
- Taking turns involves nodes taking turns; nodes with more to send might take longer turns.
Channel Partitioning MAC Protocols: TDMA and FDMA
- TDMA (Time Division Multiple Access) access channel in rounds. Each station receives a fixed length slot in each round, and unused slots are idle.
- FDMA (Frequency Division Multiple Access) divides the channel spectrum into frequency bands with each station assigned to a fixed frequency band. Unused time goes idle.
Random Access Protocols
- When a node wants to send a packet, it transmits at full channel data rate R; no prior coordination.
- Two or more nodes transmitting → collision. Random access MAC protocol specifies how to detect and recover from collisions.
Slotted ALOHA
- All frames have the same size, and time is divided into equal size slots (time for transmitting one frame).
- Nodes start to transmit at the beginning of a slot.
- Nodes are synchronized.
- If two or more nodes transmit in the same slot, all nodes detect collision.
Slotted ALOHA Efficiency
- Maximizes efficiency by finding the probability that maximizes the long run fraction of successful slots given many nodes with many frames to send.
- The max efficiency is 1/e = .37
Pure (Unslotted) ALOHA
- Simpler than slotted ALOHA with no synchronization.
- When a frame arrives, the node transmits immediately.
- Collision probability increases when the frame sent at tâ‚€ collides with other frames sent in [to-1,tâ‚€+1].
Pure ALOHA Efficiency
- Probability of success by a given node is the probability of no other node transmitting in [tâ‚€-1,tâ‚€].
- The efficiency is worse than Slotted ALOHA with a value of 1/(2e) = .18.
CSMA (Carrier Sense Multiple Access)
- Listen before transmission.
- If the channel is sensed idle, transmit the entire frame, otherwise, defer the transmission to prevent collisions from occurring.
- Human analogy: don’t interrupt others.
CSMA Collisions
- Collisions can occur because propagation delays occur.
- Two nodes may not hear each other's transmission, and thus, the entire packet transmission time is wasted.
CSMA/CD (Collision Detection)
- Collisions are detected in a short time.
- Colliding transmissions are aborted, reducing channel wastage.
- Easily done with wired LANs.
- Difficult with wireless LANs.
Ethernet CSMA/CD Algorithm
- Step 1: NIC receives, creates frame.
- Step 2: If NIC senses idle, transmits; if busy, waits until idle and transmits.
- Step 3: If NIC transmits the entire frame and no more transmissions occur, NIC is done with frame.
- Step 4: If NIC detects transmission while transmitting, it aborts the transmission.
- Step 5: After aborting the transmission, the NIC enters binary (exponential) backoff.
CSMA/CD Efficiency
- The efficiency is 1/(1+5 * (propagation delay / transmission time))
- Efficiency increases as propagation delay decreases and transmission time increases.
- Better performance than ALOHA.
"Taking Turns" MAC Protocols
- Channel partitioning MAC protocols share the channel efficiently in a high load.
- Inefficient at low load due to delays in channel access.
- Random access MAC protocols are efficient at low load because a single node fully utilizes the channel.
- High load with collision overhead.
Polling
- The master node invites slave nodes to transmit in turn.
- Typically used with dumb slave devices.
- Concerns include polling overhead, latency, and single point of failure.
Token Passing
- Control token is passed sequentially.
- Considers token overhead and latency, and single point of failure.
Cable Access Network
- Internet frames, TV channels, and controls are transmitted downstream at different frequencies.
- Multiple 40 Mbps downstream channels and single CMTS transmissions are present.
- Multiple 30 Mbps upstream channels allow multiple access.
DOCSIS
- Data over Cable Service Interface Specification uses FDM over the upstream and downstream channels.
- TDM over upstream channels allows some slots for assignment with some contention.
- Downstream MAP frame assigns upstream slots, and requests for upstream slots (and data) are transmitted through random access (binary backoff).
Virtual LANs
- A switch (or switches) supports VLAN capabilities to define multiple virtual LANs over a single physical LAN infrastructure to group the ports.
- Port-based VLAN groups switch ports, so that single physical switches operate as multiple virtual switches. Using a combination of ports and MAC addresses of endpoints enables dynamic membership among VLANs.
Ethernet Switch
- A link-layer device takes on an active role, storing and forwarding Ethernet frames.
- It examines incoming frame MAC addresses.
- Selectively forwards frames based on outgoing links.
- It uses CSMA/CD to gain access to the segment.
- It is transparent, hosts are not aware of its presence, and plug-and-play.
Switch Forwarding Table
- A switch maintains a table to determine if a host is reachable through a specific interface.
- The table contains the MAC address of the host, the interface to reach the host, and a timestamp.
Switch (Self-Learning)
- Switches learn which hosts are reachable and through which interfaces.
- The switch learns this when frames arrive; the location of the sender is recorded.
- The sender/location pair is then stored in the switch table.
Self-Learning, Forwarding, Example
- When a frame’s destination location is unknown, the switch floods the frame to all ports.
- If the destination’s location is known, the switch selectively sends the frame on a single link.
Interconnecting Switches
- Switches can be connected together.
- The protocols enable self-learning to work exactly as in the single-switch case.
Data Center Networks
- Data center networks involve thousands of closely coupled hosts.
- Challenges involve managing/balancing the load among the applications.
- Load balancers are crucial for directing external requests to the appropriate workloads.
Synthesis: a Day in the Life of a Web Request
- Journey down the protocol stack is complete.
- A solid understanding of networking principles along with the practice can be gained by revisiting the protocols involved in a seemingly simple scenario, such as the request to receive www.google.com.
- A student connects to the campus network and requests a webpage from www.google.com
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.