Module 10: Application Layer Multicast and Link Layer Services Flashcards

1
Q

Application Layer Multicast (ALM)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of ALM?

A

No need for changes to IP or routers

No need for ISP cooperation

End hosts can prevent other hosts from sending

Easy to implement reliability: use hop-by-hop retransmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the disadvantages of ALM?

A

lack of knowledge about network:
-does not have direct access to unicast routing
-does not know about network topology

stretch: ratio of latency in the overlay to the latency in the underlying network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is the disadvantage of Stress in ALM solved?

A

stress: number of duplicate packets sent over by the same physical link

solution: periodically probe overlay neighbors to pick best neighbor that meets application-level utility function (e.g. latency, available bandwidth, both)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHT multicast tree formation

A

group is associated with key

root of group is node that owns key

any node that wants to joins ends message to root, leaving forwarding state along path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a multicast tree, if the root wants to broadcast to n leaves of a subtree, it has to send n messages to the root of that subtree.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO OSI Reference Model for Layers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following layers use end-to-end protocols?

A

Transport (TCP) and Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adaptors communicating

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Link Layer Servives

A

Encoding
Framing
Error detection
Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encoding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

problem with simple approach to encoding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

simple approach to address the long strings of 0s and 1s

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encoding alternatives (NRZI and Manchester)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

encoding alternatives (4B/5B)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Framing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

More Framing

A
18
Q

What is a potential downside with the counter-based approach?

A

count field gets corrupted

19
Q

Error Detection

A
20
Q

Techniques for error detection

A

parity checking
checksum
cyclic redundancy check

21
Q

Parity Check

A
22
Q

link-layer broadcast media

A
23
Q

Methods to handle contention in end-to-end layers is similar to that in the link layer.

A

True

24
Q

Multiple Access Protocol

A

Single shared broadcast channel
- avoid having multiple nodes speaking at once
- otherwise, collisions

MAP
- distributed algo for sharing the channel
- algo determines which node can transmit

25
Q

classes of techniques

A

channel partitioning

taking turns

random access

26
Q

Which of the following is false about TDMA?

A

packet transmission can span multiple slots

true stuff:
Each machine can only occupy one time slot at a time
Transmission channel gets partitioned into fixed length slots

27
Q

channel partitioning: FDMA

A
28
Q

Taking Turns MAC protocols

A

used in bluetooth

29
Q

Which of the following MAC protocols utilize the technique of “taking turns”?

A

Token Passing

30
Q

key ideas of random access

A
31
Q

Which of the following is incorrect about random access concepts?

A

Carrier sense means that the receiver should check if anyone else is already sending data to it before accepting data sent from a source

correct stuff:
Collision detection means that when a node discovers that other nodes are sending data after its data is sent out, it stops sending data and retries at a later time
Randomness refers to nodes backing off and restarting after a random amount of time

32
Q

aloha transmissions strategy

A
33
Q

variation: slotted aloha

A
34
Q

slotted aloha example

A
35
Q

efficiency of slotted aloha

A
36
Q

ethernet uses CSMA/CD

A
37
Q

Explain CSMA/CD Random Access: exponential backoff

A
38
Q

ethernet frame structure

A
39
Q

Minimum Packet Size

A
40
Q

Limitations on Ethernet Length

A