4.1 - Media Access Control Flashcards

1
Q

The _______________ layer (Layer 2 of the OSI Model) is responsible for moving a message from one computer or network device to the next in the overall path from sender to receiver

A

data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _______________ determines:
1. Media access
2. Message delineation
3. Error control

A

data link protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who can transmit at what time

A

Media access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where the message begins and ends

A

Message delineation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How a receiver recognizes and correctes a transmission error

A

Error control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The data link layer performs two main functions and therefore is often divided into two sublayers:

A
  1. Logical Link Control (LLC)
  2. Media Access Control (MAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The data link layer’s connection to the network layer above it

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Responsible for communicating with the network layer software (IP) and for taking the packet, surrounding it with data link PDU, to become a frame

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls the physical hardware

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This software at the sending device controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit; receiver does the opposite

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refers to the need to control WHEN computers transmit

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________ becomes important when several computers share the same communication circuit (point-to-point, half-duplex configuration)

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Contention
  2. Controlled access
A

Two approaches to media access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computers wait until the circuit is free (no other computers are transmitting) and transmit whenever they have data to send

A

Contention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With _____________, all nodes are operating in half-duplex (two-way traffic, but taking turns) mode, competing for the use of the medium

A

contention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
  2. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A

Examples of contention

17
Q

Used on legacy bus-topology Ethernet

18
Q

Used on Wireless LANS

19
Q

One device controls the circuit and determines which clients can transmit at what time

A

Controlled

20
Q

Two commonly used controlled access techniques:

A
  1. Access request
  2. Polling
21
Q

Controlled access is a ____________ type of access — each node has its own time on the medium

A

deterministic

22
Q

Controlled access is used on legacy networks such as ____________ and __________

A

Token Ring… ARCNET

23
Q

This technique is similar to a situation in which the instructor calls on students who raise their hands

A

Controlled access

24
Q

With _______________ technique, client computers that want to send a request to transmit to the device controlling the circuit (e.g., wireless access point)

A

access request

25
Q

_______________ grants permission for one computer at a time. All other computers wait until that computer has finished

A

Controlling device

26
Q

The process of sending a signal to a client computer that gives it permission to transmit

27
Q

The client stores all messages that need to be transmitted

28
Q

Periodically, the controlling device (e.g., WAP) ______ the client to see if it has data to send

29
Q

Types of Polling

A
  1. Roll-call polling
  2. Hub polling (Token Passing)
30
Q

The controller works consecutively through a list of clients until all are polled

A

Roll-call polling

31
Q

This type of polling can be modified to select clients in priority

A

Roll-call polling

32
Q

This type of polling involves some waiting time because the controlled has to poll a client and then wait for a response

A

Roll-call polling

33
Q

One device starts the poll and passes it to the next computer on the multipoint circuit, which sends its message and passes the poll (or token) to the next

A

Hub polling (Token Passing)