Data Link Layer Flashcards

1
Q

Discuss pure Aloha

A

Pure ALOHA lets users transmit upstream frames whenever they like, reducing latency. However, this results in collisions making the frames garbage. When the checksum isn’t correct at the receiving side, the packet won’t be retransmitted via the downstream. The user waits a random time interval to retransmit, because otherwise synchronous retransmissions will keep colliding. To fix this issue, they came up with Slotted Aloha. Users can only send a frame at the beginning of a time slot. Now collision only occurs when two frames are sent in the same time slot, improving performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss hidden and exposed terminals

A

When terminals are hidden from eachother, they won’t hear eachothers transmissions. Therefore, they can transmit at the same time resulting in collisions.

When terminals are exposed to eachother, one can back off its transmission because the other terminal started a transmission. It is however possible that the terminal backed off even thought the two terminals wanted to transmit a frame to different destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discuss non-persistent CSMA

A

To avoid the hidden and exposed terminals problem, we only sample the channel when data is ready. If the channel is idle, the data is transmitted. If the channel is already in use, the sender waits a random period of time and tries again. If a collision occurs the node waits a random time and retransmits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discuss p-persistent CSMA

A

Sample the channel when data is ready. If the channel is idle, there is a probability of p to transmit the data. If no ACK is received, the frame is retransmitted with a probability of 1-p.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discuss BMAC

A

BMAC has no time-synchronization, so joining the network is quick and low-cost. Transmits of the senders are random, so we spend a little more energy when transmitting (= Low Power Listening). Nodes listen for short sample periods. If traffic is detected, the nodes stay active and listen for incoming packets. Long preamables are added to the messages so that the node is ready to receive the packet when it arrives. The length of the preamble must be greater than the length of the sampling period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss TSMP

A

Time Synchronized Mesh Protocol uses synchronized time slots to transmit frames. This is done with a centralised clock using Time Division Medium Access. This centralised clock is bad for resilience and because of load centralization. The collisions are minimized because the time slots aren’t overlapping. Less collisions means less retransmissions, saving a lot of power. However, a bad fine grained clock reduces performance. That’s why a guard time is added to compensate for this problem.
When a node joins the network it listens to transmissions so it can learn when the node itself can transmit data without colliding. The nodes can hop through different frequency channels. Packets are acknowledged at each hop to reduce overhead. Extra redundancy is added through spatial and temporal redundancy. The synchronized approach results in high latency for sporadic traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the problem with classic Ethernet?

A

All devices are connected to the same Ether cable. If something goes wrong in the cable, the entire system shuts down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the preamble used for in the Ethernet frame?

A

The preamble is used to synchronize the sender and receiver clocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the padding do in Ethernet frames?

A

Padding is required to ensure collision detection for shorter frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is the Ethernet max frame size 1500 bytes?

A

DIX uses a length field, while IEEE 802.3 uses a type field. All the type values are greater than 1500. This means that if the field is smaller than 1500, it denotes a size. Otherwise, it denotes a type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is a minimum frame size required for Ethernet?

A

Distinguishing valid packets from failed chunks.
Distinguishing packets from noise bursts from collisions.
Small packets can be sent across a cable before collision is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is exponential back-off?

A

If collision occurs, Ethernet uses exponential slotted back-off. Each station waits a random number between 0 and 2^i-1, with i the amount of collisions of the station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the problem with persistent channel sampling?

A

Everyone can ready all the traffic and see who the senders and the receivers are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What problem of classic Ethernet do hubs solve?

A

A hub is a place where different links come together through different ports. If one link is broken, the other ones still function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why would we use Switched Ethernet?

A

A switch analyzes MAC addresses of frames, sending them to their corresponding port via the right link. This saves a lot of bandwidth and improves the performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens when we simply reduce the bit transmit time to make the protocol faster?

A

The maximum cable length would reduce with the same factor as the reduction in bit transmit time, because of collision detection.

17
Q

How did Gigabit Ethernet fix the limited cable length?

A

This problem is fixed by adding two hardware features:

  • Carrier extensions that pad all packets to 512 bytes.
  • Frame bursting which concatenates small frames into a single > 512 byte transmission.
18
Q

What’s the difference between infrastructure mode and ad-hoc mode?

A

In the infrastructure mode, wired access points provide access to wireless hosts. All communication goes via this acces point.
In ad-hoc mode, a network between wireless hosts is created on the spot in a peer-to-peer fashion

19
Q

Why does IEEE 802.11 use starting back-off?

A

Collisions are very expensive in wireless connections. Acknowledgements are used to make sure that a frame has been delivered. Sometimes, an acknowledgement needs to be retransmitted. The starting back-off prevents collision of an acknowledgement with another frame.

20
Q

Discuss NAV

A

Network Allocation Vector is used for virtual channel sensing in IEEE 802.11. Each frame has a NAV field that says how long the entire transmission sequence will take. Nodes overhear eachtother and will wait transmitting until the NAV field is done executing.

21
Q

How is power saved in WiFi systems?

A

It’s based on periodic beacon frames. It functions like a clock, implementing a fixed schedule. Nodes synchronize to this schedule, going in low power sleep mode until the next beacon arrives. Also, there are buffers for the client traffic. The data is sent on different beacon points. The client itself can sleep between these points.