Computer Network Flashcards

1
Q

List the five components of a data communication system.

A

Message, information that can be communicated
Sender, the device that sends the message
Receiver, the device that receives the message
Transmission medium, the physical path of which the message will travel from sender to receiver
Protocol, the rules that govern data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What are the three most important network criteria that must be met for an effective and efficient network?
A

Performance, performance is measured by transmit time and response time. The performance of a network depends on the number of users, the type of transmission medium, the capacities of the connected hardware and, the efficiency of the software.
Reliability, reliability is measured by the frequency of failures.
Security, protection of data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What are two types of line configurations?
A

Point-to-point, it provides a dedicated link between 2 devices, the capacity of the link is reserved for transmission between these 2 devices.
Multipoint, more than 2 devices share a link, the capacity of the link is shared spatially or temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 characteristics of effectiveness

A

1) delivery - the system must deliver the data to the correct destination
2) Accuracy - the system must deliver the data correctly
3) Timeliness - the system must deliver the data in a timely manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data flow types

A

4) Simplex – only one can transmit, and the other receives
5) Half-duplex – both can transmit and receive but not at the same time
6) Full-duplex – both can transmit and receive simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State the Physical topologies

A

Mesh topology
Star topology
Bus topology
Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Mesh Topology

A

each device has a point-to-point link to every other device resulting in
n(n-1)/2 links with n devices and (n-1) I/O ports per device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Star Topology

A

each device has a point-to-point link to the hub, the hub acts as an exchange between nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Bus Topology

A

it is a multipoint connection, A long cable acts as the backbone to link all devices in one network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Ring Topology

A

Each device has a point-to-point connection with 2 devices on each side of it. The signal is passed along the ring in one direction, from device to device until it reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

advantages of mesh topology

A

The use of dedicated links eliminates traffic problems.
Privacy and security.
Easy fault identification and fault isolation.
Robustness. If one link becomes unusable, it does not incapacitate the entire topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

disadvantages of mesh topology

A

Big amount of cabling makes installation and reconnection difficult.
Wiring can be greater than available space (walls, ceiling, floors).
Big number of I/O ports required. Hardware required will be very expensive.
Mesh is implemented in a limited fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

advantages of star topology

A

Less expensive than mesh topology. Each device needs only one link and one I/O.
Easy to install and reconfigure.
Far less cabling needs to be housed compared with mesh topology and additions, moves, and deletions involve only the connection between a node and the hub.
Robustness.
Easy fault identification and fault isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advantages of bus topology

A

Ease of installation
Less cabling than mesh or star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of bus topology

A

Difficult to add devices
Signal reflection in taps can cause degradation in quality
A fault or break in the bus cable stops all transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

advantages of ring topology

A

Easy to install and reconfigure
The only constraints are media and traffic considerations
Fault isolation is simplified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

disadvantages of ring topology

A

In a simple ring (unidirectional), a disabled station can disable an entire network. This can be solved by using a dual ring or a switch capable of closing off the break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

pros and cons of hybrid (star of busses)

A

Pros: Better domain separation management, one hop delay.
Cons: better robustness than the “star”, but still vulnerable to Hub failure!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Categories of Networks

A

A category of a network is determined by its size, its ownership, the distance it covers, and its physical architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State the Categories of Networks

A

Local Area Netwok (LAN)
Metropolitan-Area Network (MAN)
Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is The Internet

A

Huge number of interconnected Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

state the key elements of a protocol

A

Syntax: structure or format of the data
Semantics: Meaning of each portion of bits
Timing: When and how fast data should be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are standards

A

Standards provide guidelines to manufacturers, vendors, government agencies, and other providers to ensure the kind of interconnectivity necessary in today’s marketplace and in international communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

state the 2 types of standards

A
  1. De facto: Standards that have not been approved by an organized body but have been adopted as standards through widespread use.
  2. De Jure: Standards that have been legislated by an officially recognized body.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

concept of protocol layering

A
  • When communication is simple, we only need one simple protocol
  • When the communication is complex, we need a protocol at each layer, or protocol layering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

principles of protocol layering

A
  1. In bidirectional communication, each layer has to be able to perform 2 opposite tasks, one in each direction.
  2. the two objects under each layer at both sites should be identical.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

describe TCP/IP PROTOCOL SUITE

A
  • It is a protocol suite which is used in the Internet today.
  • Hierarchical protocol made up of interactive modules, each of which provides a specific functionality.
  • Each upper level protocol is supported by the services provided by one or more lower level protocols.
  • Original TCP/IP protocol suite was defined as four software layers built upon the hardware
  • Today, TCP/IP is thought of as a five-layer model.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Encapsulation at source

A

o The message is passed to the transport layer.
o The transport layer takes the message as the payload. It adds the transport layer header to the payload. The header contains the identifiers of source and destination application programs that want to communicate and additional information that is needed for the end-to-end delivery of the message. The transport layer passes the packet to the network layer.
o Network layers take the packet as payload and add its own header. The header contains addresses of source and destination hosts and additional information needed for error checking of the header, fragmentation information, etc. The resulting network layer packet is called a datagram. The network layer then passes the packet to the data link layer.
o The data link layer takes the network layer packet as a payload and adds its own header. The header contains link-layer addresses of the host or next hop. Result is the link-layer packet is called as a frame. Frame is passed to the physical layer for transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Decapsulation and Encapsulation at the Router

A

o After the set of bits are delivered to the data-link layer, this layer decapsulates the datagram from the frame and passes it to the network layer.
o The network layer inspects the source and destination addresses in the datagram header and consults the forwarding table to find the next hop to which the datagram is to be delivered. The datagram is then passed to the data-link layer of the next link
o Data-link layer of the next link encapsulates the datagram in a frame and passes it to the physical layer for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Decapsulation at the Destination

A

o At the destination host, each layer decapsulates the packet received, removes the payload, and delivers the payload to the next-higher layer protocol until the message reaches the application layer
o Decapsulation in the host involves error checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

the 7 layers in OSI model

A

Layer 7: Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data link
Layer 1: Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

layers in TCP/IP protocol suite

A

Layer 5: Application
Layer 4: Transport
Layer 3: Network
Layer 2: Data link
Layer 1: Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Where is the Transmission media Located?

A

located below the physical layer and directly controlled by the physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

how does the transmission media transmit signals?

A

Signals are transmitted from one device to another through electromagnetic energy propagated through transmission media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

transmission media can be divided into two broad categories, which are?

A

Guided media include twisted-pair cable, coaxial cable, and fiber-optic cable.
Unguided media is wireless, such as radio wave, microwave and infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

describe transmission impairment

A

signals travel through transmission media, which are not perfect. The imperfection causes signal impairment.
the signal at the beginning of the medium is not the same as the signal at the end of the medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

List the causes of impairment in transmission

A

Attenuation
Distortion
Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

describe Attenuation

A

Attenuation means a loss of energy.
When a signal travels through a
medium, it loses some of its energy in overcoming the resistance of the medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

describe distortion

A

Distortion means that the signal changes its form or shape.
Distortion can occur in a composite signal made of different frequencies.
Each signal component has its own propagation speed through a medium and, therefore, its own delay in arriving at the final destination.
Differences in delay may create a difference in phase if the delay is not exactly the same as the period duration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Describe noise

A

Noise is another cause of impairment.
Several types of noise, such as thermal noise, induced noise, crosstalk, and impulse noise, may corrupt the signal.

41
Q

List the classes of transmission media

A

guided
1. Twisted-pair
2. Coaxial cable
3. Fiber-optic cable

unguided
1. Radio wave
2. Microwave
3. Infared

42
Q

describe guided media

A

A signal traveling along any guided media is directed and constrained by the physical limits of the medium.

43
Q

describe twisted-pair cable

A

A twisted-pair consist of two conductors (normally copper), each with its own plastic insulation, twisted together.
One of the wires is used to carry signals to the receiver, and
the other is used only as a ground reference. The receiver uses the difference between the two levels.
Interference may affect both wires and create unwanted signals. The receiver at the end, however, operates only on the difference between these unwanted signals.
If the two wires are affected by interference equally, the receiver is immune

44
Q

Describe Coaxial cable

A

Coaxial cable carries signals of higher frequency ranges than twisted-pair cable.
Coaxial cable (or coax) has a central core conductor of solid wire enclosed in an insulating sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a combination of the two.
The outer metallic wrapping serves both as a shield against noise and as the second conductor, which completes the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole cable is protected by a plastic cover.

45
Q

State The Application of Coaxial Cable

A

Coaxial cable was used in analog telephone networks where a single coaxial network could carry 10000 voice signals.
Later it was used in digital telephone networks where a single coaxial cable could carry digital data up to 600 Mbps.
However, coaxial cable in telephone networks has largely been replaced today with fiber-optic cable.
Cable TV networks also use coaxial cables.
Another common application of coaxial cable is in traditional Ethernet LANs.

46
Q

Describe fiber-optic cable

A

Optical fibers use reflection to guide light through a channel. A glass or plastic case is surrounded by a cladding of less dense glass or plastic.
The difference in density of the two materials must be such that a beam of light moving through the core is reflected off the cladding instead of being refracted into it.

47
Q

Describe coaxial cable

A

The coaxial cable carries signals of higher frequency ranges than twisted-pair cable.
Coaxial cable (or coax) has a central core conductor of solid wire enclosed in an insulating sheath, which is, encased in an outer conductor of metal foil, braid, or a combination of the two.
The outer metallic wrapping serves both as a shield against noise and as the second conductor, which completes the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole cable is protected by a plastic cover.

48
Q

describe fiber-optic cable

A

fiber-optic cable consists of 2 modes: a multimode and a single mode.
multimode has 2 forms: step-index and graded-index.
In the step-index, the density of the core remains constant from the center to the edges.
A beam of light moves through this constant density in a straight line until it reaches the interface of the core and the cladding.
At the interface, there is an abrupt change to a lower density that alters the angle of the beam’s motion.
A graded-index fiber is one with varying densities. Density is highest at the center of the core and decreases gradually to its lowest at the edge.
single-mode fiber: Single-mode uses step-index fiber and a highly focused source of light that limits beams to a small range of angles. it is manufactured with a much smaller diameter than that of multimode fiber, and with substantially lower density (index of refraction).

49
Q

state the application of fiber-optic cable

A

Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-effective.
Some cable TV companies use a combination of optical fiber and coaxial cable, thus creating a hybrid network.
Local area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X also use fiber-optic cable.

50
Q

Describe ungiuded media

A

Unguided media transport electromagnetic waves without using a physical conductor. this type of communication is known as wireless communication.

51
Q

describe radio waves

A

Radio waves can travel long distances. This makes radio waves a good candidate for long-distance broadcasting such as AM radio.
Radio waves of low and medium frequencies can penetrate walls.

52
Q

Advantages and disadvantages of radio waves

A

advantage:
Radio waves, can travel long distances.
an AM radio can receive signals inside a building
The omnidirectional characteristics of radio waves make them useful for multicasting, in which there is one sender but many receivers.
disadvantage:
We cannot isolate communication just inside or outside a building.
The radio waves transmitted by one antenna are susceptible to interference by another antenna that sends signals using the same frequency or band.

53
Q

describe microwaves

A

Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwave waves, they can be narrowly focused.
This means that the sending and receiving antennas need to be aligned.
Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to be in direct sight of each other, towers that are far apart need to be very tall.

54
Q

state the application of microwaves

A

Microwaves, due to their unidirectional properties, are very useful when unicast (one-to-one) communication is needed between the sender and the receiver. They are used in cellular phones , satellite networks, and wireless LANs

55
Q

State the application of infrared

A

the infrared band, almost 400 THz has an excellent potential for data transmission.
Such a wide bandwidth can be used to transmit digital data with a very high data rate. Some manufacturers provide a
special port called the Infrared Data Association (IrDA) port
that allows a wireless keyboard to communicate with a PC.

56
Q

describe infrared

A

Infrared signals, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770 nm), can be used for short-range communication.
Infrared signals, having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and another. However, this same characteristic makes infrared signals useless for long-range communication.
we cannot use infrared waves outside a building because the sun’s rays contain infrared waves that can interfere with communication.

57
Q

State the Services provided by Data Link Layer

A

Farming
- A packet at the data-link layer is called a frame
- The data-link layer at each node must encapsulate the datagram (packet received from the network layer) in a frame before sending it to the next node.
- The node must also decapsulate the datagram from the frame received on the logical channel.
Flow control
- Different data-link-layer protocols use different strategies for flow control:
- Drop the frames if its buffer is full
- Send feedback to the sending data-link layer to stop or slow down
Error control
- Error need to be detected and corrected at the receiver node or discarded and retransmitted by the sending node
Congestion control
- Link may be congested with frames, which may result in frame loss.

58
Q

Describe framing

A

A packet at the data-link layer is called a frame
The data-link layer at each node must encapsulate the datagram (packet received from the network layer) in a frame before sending it to the next node.
The node must also decapsulate the datagram from the frame received on the logical channel.

59
Q

state the 2 categories of links

A

Point-to-Point link
- Link is dedicated to two devices
- Data-link layer that uses the whole capacity of the medium
Broadcast link
- Link is shared between several pairs of devices
- Data-link layer that uses only part of the capacity of the link.

60
Q

state the 2 sublayers

A

Data link Control (DLC) sub layer
- Deal with all issues common to both point-to-point and broadcast links
Media access Control sublayer
- Deal with issues specific to broadcast links

61
Q

state the 3 types of addresses

A

Unicast Address (IPv4 and IPv6)
- One-to-one communication
- A frame with a unicast address destination is destined for only one entity in the link
- Each host or each interface of a router is assigned a unicast address
Multicast Address (IPv4 and IPv6)
- One-to-many communication
Broadcast Address (IPv4)
- One-to-all communication
- A frame with a destination broadcast address is sent to all entries in the link

62
Q

Define the type of the following destination addresses:
a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF

A

look at the second hexadecimal digit. If it is odd, the address is multicast. If all digits are F’s, the address is broadcast. Therefore, we have the following:
a. This is a unicast address because A in binary is 1010.
b. This is a multicast address because 7 in binary is 0111.
c. This is a broadcast address because all digits are F’s.

63
Q

Show how the address 47:20:1B:2E:08:EE is sent out on line.

A

The address is sent left-to-right, byte by byte; for each byte, it is sent right-to-left, bit by bit, as shown below:

11100010 00000100 11011000 01110100 00010000 01110111

64
Q

A digital signal has eight levels. How many bits are needed per level? We calculate the number of bits from the following formula. Each signal level is represented by 3 bits.

A

Number of bits per level = log2(8) = 3

65
Q

describe latency

A

The latency defines how long it takes for an entire message to completely arrive at the destination from the time the first bit is sent out from the source.

66
Q

describe jitter

A

jitter is a problem if different packets of data encounter different delays and the application using the data at the receiver site is time-sensitive

67
Q

State the problem that can occur if different packets of data arrive at different times at the receiving end.

A

jitter

68
Q

state the solution to critical-section problem

A

Mutual Exclusion - If a process is executing in its critical section, then no other processes can be executing in their critical sections
Progress - If no process is executing in its critical section and there exist some processes that wish to enter their critical section, then the selection of the processes that will enter the critical section next cannot be postponed indefinitely
Bounded Waiting - A bound must exist on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted

69
Q

what is the propose of semaphore implementation

A

Must guarantee that no two processes can execute wait () and signal () on the same semaphore at the same time

70
Q

state the type of semaphores

A

Counting semaphore – integer value can range over an unrestricted domain. it is used to control access to a resource that has multiple instances
Binary semaphore (Mutex lock) – integer value can range only between 0 and 1; can be simpler to implement

71
Q

state the types of errors

A

single-bit error: only 1 bit in the data unit is changed from 1 to 0 or from 0 to 1
burst error: 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1.

72
Q

Detection vs Correction

A

The correction of errors is more difficult than the detection.
In error detection, we only look to see if any error has occurred.
We are not interested in the number of corrupted bits. A single-bit error is the same for us as a burst error.
In error correction, we need to know the exact number of corrupted bits
and, more importantly, their location in the message.

73
Q

Process of error detection in block coding

A

the sender sends the data.
then, the generator generates a redundant bit
the receiver receives the data and gives the data to the checker
the checker decides whether to discard or extract the data

74
Q

describe cyclic codes

A

Cyclic codes are special linear block codes with one extra property.

75
Q

describe flow control

A

Flow control refers to a set of procedures used to restrict the amount of data that the sender can send
before waiting for an acknowledgment.

76
Q

describe error control

A

Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender.

77
Q

how does Stop-and-Wait ARQ work

A

Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and retransmitting the frame when the timer expires

78
Q

Taxonomy of protocols

A

for noiseless channel
- Simplest
- channel
for noisy channel
- Stop-and-Wait ARQ
- Go-Back-N ARQ
- Selective Repeat ARQ

79
Q

describe redundancy

A

The central concept in detecting or correcting errors is redundancy.
the sender adds redundant bits to our data and the receiver removes them.
Their presence allows the receiver to detect or correct corrupted bits.

80
Q

state the hamming distance of d(000, 011)

A

2 because (000 xor 011) = two 1s

81
Q

advantage of two-dimensional parity check

A

increases the likelihood of detecting burst errors.

82
Q

describe CRC encoder

A

In the encoder, the dataword has k bits (4 here); the codeword has n bits (7 here).
The size of the dataword is augmented by adding n − k (3 here) 0s to the right-hand side of the word.
The n-bit result is fed into the generator.
The generator uses a divisor of size n − k + 1 (4 here).
The generator divides the augmented dataword by the divisor.
The quotient of the division is discarded.
the remainder (r2r1r0) is appended to the dataword to create the codeword.

83
Q

describe CRC decoder

A

The decoder receives the codeword.
A copy of all n bits is fed to the checker, which is a replica of the generator.
The remainder produced by the checker is a syndrome of n − k (3 here) bits, which is
fed to the decision logic analyzer.
The analyzer has a simple function. If the syndrome bits are all 0s, the 4 left- most bits of the codeword are accepted as the dataword (interpreted as no error); otherwise, the 4 bits are discarded (error).

84
Q

Advantages of Cyclic Codes

A

Cyclic codes have a very good performance in detecting single-bit errors, double errors, an odd number of errors, and burst errors.

They can easily be implemented in hardware and software.

They are fast when implemented in hardware.

This makes cyclic codes a good candidate for many networks.

85
Q

describe checksum

A

Checksum is an error-detecting technique that can be applied to a message of any length.

86
Q

list the steps of checksum

A

At the source, the message is first divided into m-bit units.
The generator then creates an extra m-bit unit called the checksum, which is sent with the message.
At the destination, the checker creates a new checksum from the combination of the message and sent checksum.
If the new checksum is all 0s, the message is accepted; otherwise, the message is discarded

87
Q

Describe Forward Error Correction Process

A

The incoming signal is demodulated at the receiver to produce a bit string similar to the original codeword but may contain errors. This block is passed through an FEC decoder, with one of four possible outcomes:

No errors: If there are no bit errors, the input to the FEC decoder is identical to the original codeword, and the decoder produces the original data block as output.

Detectable, correctable errors: For certain error patterns, the decoder can detect and correct those errors. Thus, even though the incoming data block differs from the transmitted codeword, the FEC decoder can map this block into the original data block.

Detectable, not correctable errors: For certain error patterns, the decoder can detect but not correct the errors. In this case, the decoder simply reports an uncorrectable error.

Undetectable errors: typically rare error patterns, the decoder does not detect the error and maps the incoming n-bit data block into a k-bit block that differs from the original k-bit block.

88
Q

Describe piggybacking

A

piggybacking is a method to combine a data frame with an acknowledgment.

Piggybacking can save bandwidth because the overhead from a data frame and an ACK frame can be combined into just one frame.

89
Q

describe Bidirectional Transmission

A

we can have bidirectional transmission if the two parties have 2 separate channels for full-duplex transmission or share the same channel for half-duplex transmission

90
Q

HDLC defines three types of frames, describe them

A

I-frames are used to transport user data and control information relating to user data (piggybacking).
S-frames are used only to transport control information.
U-frames are reserved for system management.

91
Q

state the type of multiple-access protocols

A

Random-access protocols
Controlled-access protocols
Channelization protocols

92
Q

describe random-access

A

no station is superior to another station and
none is assigned control over another.
At each instance, a station with data to send uses a procedure defined by the protocol to decide whether to send.
This decision depends on the state of the medium (idle or busy).

93
Q

state the methods of random-access protocols

A

ALOHA
CSMA/CD
CSMA/CA

94
Q

describe the nonpersistent strategy in CSMA

A

a station senses the line. If the line is idle, the station sends the frame immediately.
If the line is not idle, the station waits for a random period of time and then senses the line again.

95
Q

describe the 1-persistent strategy in CSMA

A

In a persistent strategy, a station continuously senses the line. If the line is idle, the station sends a frame. This method has two variations: 1-persistent and p-persistent.
In the 1-persistent method, if the station finds the line idle, the station sends its frame immediately (with a probability of 1).

96
Q

describe the p-persistent strategy in CSMA

A

The p-persistent is used if the channel has time slots with a slot duration equal to or greater than the propagation time.
In this method, if the station finds the line idle, the station may or may not send it.
It sends with probability p and refrains from sending with probability (1-p).

97
Q

describe ALOHA

A

ALOHA transmits data whenever they have data to be sent.
No carrier sensing.
No collision detection
when the station sends data it waits for acknowledgment.
when data from the two stations collide and become garbled, retransmit the data after the collision

98
Q

State the Differences between ALOHA and CSMA/CD

A

In ALOHA, the station sends the frame without sensing it. In CSMA/CD, the station senses the channel before sending a frame.
In ALOHA, we first transmit the entire frame and then wait for an acknowledgment.
In CSMA/CD, transmission and collision detection are simultaneous processes.
In ALOHA, there is no collision detection. In CSMA/CD, the station sends a short jamming signal to make sure that all other stations become aware of the collision.

99
Q
A