Question | Answer |
---|
What are the 3 main functions of the Data Link Layer? |
|
What are some protocols used on the Data Link Layer? | Ethernet, ARP (Address Resolution Protocol) |
What is the purpose of medium access control? | To detect and minimize errors/collisions. |
What are the two types of medium access controls? | Fixed (a node is given a fixed time slot to send) or Variable (can be central or decentralized) |
What is the difference between centralized and decentralized (distributed) medium access controls? | Central (for e.g. a controllers polls each station in a pre-specified order to provide access to the channel). In distributed schemes there is no master. |
Do normally central or distributed schemes provide a lower access delay? | Distributed schemes have usually less overhead. |
What is the Carrier Sense protocol?h4> | A networks protocol that listens before transmitting any data. |
What is meant by No Carrier Sense? | A station only knows whetehr a transmission has been successful or not (sends without listening first). |
What is CSMA? | Carrier Sense Multiple Access. Listens on the medium/carrier before transmitting and only sends when no other station is sending. CMS is part of Media Access Control and implemented by Ethernet. |
What does CSDMA/CD stand for? | CSMA with Collision Detection |
Why is CSMA not always reliable? | Because of a propagation speed. => CSDMA/CD needed |
In CSMA. What does a station do if it detects that another node is sending? | It waits till the other station has finished its transmission. |
What are the two sublayers of the Data Link layer? | LLC (Logical Link Control), MAC (Medium Access Control) |
What is framing? | The process where the data link layer breaks down the datagrams from the higher layers and converts them into frames that are ready to being transmissioned. |
In CSMA/CD, what is the back-off algorithm? | The back-off algorithm manages the waiting time after a detected collision. In for e.g. Binary exponential back-off, randomly a waiting time between 0 and 2^n is chosen which is with a high probability different from the other station. |
CSMA/CD: Why does the time slot last exactly 51 micro seconds (64 Byte at 10 MBit/s)? | To guarantee the detection of collision. This is exactly the signal propagation time of an ethernet segment. |
What are the different variations of CSMA? | 1-persistent, non-persistent, and p-persistent CSMA |
What do the different variations (1-persistent, non-persistent and p-persistent) CSMA protocols have in common? | In each of these protocols, a station only transmit if it detects that the channel is idle. |
Persistence: When do the different variations of CSMA differ in their behavior? | When the channel is detected to be busy. |
Describe 1-persistent CSMA. | Waits until the medium is available and then transmits. If a collision occurs, wait a random amount of time. |
Describe non-persistent CSMA. | If channel is idle, transmit. If channel is busy, wait a random amount of time. |
Describe p-persistent CSMA. | 1) Listen with probability p until medium is free, or restart the backoff algorithm with probability 1-p. 2) If channel is busy wait till idle and then repeat 1). |
What is an advantage and a disadvantage of 1-persistent CSMA? | A short waiting time, but there is the possibility of a second collision. |
What is an advantage and a disadvantage of non-persistent CSMA? | less collision but longer waiting times |
CSMA What back-off algorithm does Ethernet use? | 1-persistent CSMA |
Where is CSMA/CD and where is CSMA/CA used? | CSMA/CD in Ethernet and CSMA with Collision Avoidance in WLANs |
Unlike TCP what does UDP not have to send for each packet? | UDP doesn't need to send an acknowledgement to the transmitted side. |
What is a frame (Ethernet)? | In Ethernet, the sent data units are called frames. One frame is 64 bytes. |
What is the structure of an Ethernet frame (64 bytes)? | preamble (8), destination address (6), source address (6), length (2), payload (0-1454), pad (0-46), CRC (4) |
Frame: What is the preamble? | The preamble is an oscillation used to synchronize the transmitter with the receive so that the receiver can "hear" the frequency. |
Frame: Does the length field include the pad? | Yes. |
What is the pad field in an Ethernet frame? | If the size of a frame is less than 64 bytes it is invalid. Therefore, a padding is added to smaller frames so that the full size of the frame becomes 64 bytes. |
Frame: What is the CRC field? | The CRC (Cyclic Redundancy Check) is a FCS (frame check sequence) algorithm. This is a control sequence that allows detection of corrupted data. |
What are the three wireless modes (IEEE 802.11)? | Ad Hoc (mesh), Infrastructure and station mode. |
What is the difference between WLAN Infrastructure mode vs Adhoc (Mesh) mode? |
|
Describe the Hidden Node Problem (hidden terminal problem). | The hidden node problem occurs when a station is visible to a wireless access point, but hidden from other nodes communicating with the same access point. Given three stations (wireless): A - B - C. Since station A and C are out of range of each other, they cannot communicate with each other. |
What is the Exposed Node Problem? | Given four nodes: B1 - A1 - B2 - A2. The exposed node problem occurs when A1 is sending to B1 and B2 wants to send to A2. B2 thinks according to carrier sense that it cannot sense as its neighbor A2 is sending even though it couldn't without a problem. |