L5 Flashcards

1
Q

Types of multi-access protocols

A
  • Random access: pure ALOHA, slotted ALOHA
  • Controlled access: reservation, polling
  • Channelized access: FDMA, TDMA, CDMA, SDMA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain time division multiple access (TDMA) and draw schematic (L5 4)

A
  • Each user/node shares the whole channel bandwidth
  • Each user/node is assigned a different timeslot to access the channel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain frequency division multiple access (FDMA) and draw schematic (L5 5)

A
  • Each user/node shares the whole transmission time
  • Each user/node is assigned a different frequency band to access the channel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code/space division multiple access (C/SDMA)

A
  • Each user/node shares the whole channel bandwidth and transmission time
  • Each user/node is assigned a different code to access the channel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Write main ideas of pure ALOHA access protocol

A
  • Each node has freedom to transmit whenever it receives a packet
  • When 2 frames arrive within the vulnerable period a collision occurs. Data packets are corrupted and marked by CRC process.
  • Nodes have to wait a random period and try again.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Draw a schematic of transmission with pure ALOHA (L5 8)

A

write on paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the probability of no collision in pure ALOHA protocol and is it sufficient? (L5 10)

A
  • 18%
  • enough for IoT systems since data exchange rate is usually low
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Main ideas of slotted ALOHA

A
  • modifies pure ALOHA to minimize collision rates
  • transmission attempts of all nodes are synchronized to a certain time point where the channel is slotted
  • vulnerable time is only Tf instead of 2Tf, which increases probability of no collision to 36%
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Main ideas of carrier sense multiple access (CSMA) protocol

A
  • To minimize collision rate, nodes in CSMA need to first sense the channel before transmitting
  • If channel is idle, node can start transmission. Otherwise, must wait a random time and try again.
  • Collision rate depends on channel propagation delay. Vulnerable time is channel propagation delay.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Basic ideas of 1-persistent CSMA (draw an schematic) (L5 15)

A
  • Node X is always sensing the channel
  • When channel is free node X initiates transmission immediately
  • Collisions might still occur, because more than one node can initiate transmission immediately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Basic ideas of non-persistent CSMA (draw schematic and flowchart) (L5 17,18)

A
  • Node X is always sensing the channel, if busy it waits a random time and sense again
  • Node X senses the channel if idle it starts transmission right away
  • Chances of collision are less probable because each node senses channel with different random period, but sacrifices throughput
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Basic ideas of P-persistent CSMA (draw schematic and flowchart) (L5 19,20)

A
  • Channel is slotted similar to that of slotted ALOHA with equal time slots
  • Node keeps sensing the channel until it is idle.
  • Then it calculates a probability P and starts transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Main functions of network layer

A
  • IP addressing
  • routing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of network topologies

A
  • Ring topology
  • Bus topology
  • Star topology
  • Mesh topology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Main ideas of ring topology (draw schematic) (L5 22)

A
  • nodes are arranged in circular manner
  • token ring protocol is used so that each node is passing data token to the neighbouring one
  • no collisions can occur
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Main ideas of bus topology (draw schematic) (L5 23)

A
  • simplest and most common. Good for small or simple networks.
  • passive topology, nodes only listen for data being sent, they do not move data from one compute to the next
  • common for coaxial-cable Ethernet network
17
Q

Main ideas of start topology (draw schematic) (L5 24)

A
  • Each node is connected to the other one through a hub or host.
  • Host addresses incoming packet to desired destination.
18
Q

Main ideas of mesh topology (draw schematic) (L5 25)

A
  • Every device has a point-to-point link to every other device
  • fully connected mesh has n(n-1)/2 physical channels and n devices
  • each device needs n-1 input/output ports