Networks Part 4 (Datalink Layer in Broadcast Networks) Flashcards
What are the assumptions of “Multiple Access Protocols”?
- All hosts can transmit frames on the channel and all can receive from it.
- Each frame sent is received by all hosts.
- Hosts have to contend for use of the channel.
- If two hosts send data simultaneously, the data will be damaged.
And, depending on the system:
5. Hosts may or may not be able to detect when collisions occur.
6. Timing of frame transmissions may be assumed continuous or slotted.
7. A network may have carrier sensing, or not have it.
What are examples of contention protocols?
- ALOHA
- Carrier Sense Multiple Access
What is an example of a collision free protocol?
The bit-map protocol.
What are examples of limited-contention protocols?
- Adaptive Tree Walk protocol.
- Binary exponential back-off protocol.
What is an example of a wireless LAN protocol?
The MACA protocol.
What is the Pure ALOHA protocol? How does slotted ALOHA differ?
In pure ALOHA:
1. Hosts transmit whenever they want. Colliding frames are destroyed.
2. If a frame is destroyed, the sender waits a random amount of time and sends its again.
Utilisation of pure ALOHA is bad under high load (around 18%)
Slotted ALOHA splits up the time that transmitters can send data into sections, and each transmitter is assigned to a section. It can only transmit within this section. This doubles the efficiency of ALOHA (up to 37%)
What are CSMA protocols?
“Carrier Sense Multiple Access” protocols, where hosts are typically capable of listening for other hosts currently transmitting, and change their behaviour accordingly.
What is 1-Persistent CSMA?
When about to send data, host listens to channel.
If channel is busy, keep listening until it is free.
Immediately transmit complete frame.
If frame gets damaged, wait random amount of time, then retransmit whole frame.
Better than ALOHA, but still bad as it causes greedy waiting, which can cause collisions if more than 1 transmitter is waiting.
What is Non-Persistent CSMA?
When about to send data, host listens to channel.
If channel is busy, wait for a random amount of time, then listen again.
If not busy, transmit a full frame.
Better than 1-Persistent as there is less data collision under high load, but it comes at the cost of longer delays before sending.
What is P-Persistent CSMA?
When about to send data, host listens to channel.
If channel is idle, transmit with probability P.
If did not transmit, after waiting, transmit again with P, repeat ect..
If slot is busy wait a random amount of time then try again.
Similar to Non-Persistent CSMA, but with better performance under high load but more delay.
What is CSMA/CD?
A variation on typical CSMAs but with collision detection.
Does not transmit a full frame, but aborts sending a frame if it detects that it has been damaged. It then waits a random amount of time and tries again.
What is the Bit-map protocol?
A protocol that is arranged in a way where collisions simply can not occur.
The communication channel is divided up timewise between hosts. This is done by presenting a “contention period” where hosts submit a “1” if they want to host.
After the contention period is finished, the hosts will then submit data in numerical order. This prevents collisions as all hosts transmit at different times.
Under light loads, some transmission capacity is wasted, however is very efficient at high loads.
Why might contention be preferable/avoided?
Networks that have low load prefer contention heavy systems as it provides low delay times.
As load increases, contention becomes less attractive, and collision free protocols become better for utilisation.
Limited contention protocols switch between these methods depending on load.
What are examples of “limited contention” protocols?
- Adaptive Tree Walk Protocol
- Binary Exponential Back-off Protocol (used in classic ethernet)
How does the “Adaptive Tree Protocol” work?
- Hosts are divided up into a binary tree.
- Hosts attempt to communicate on the top node.
- If node is conflicted, move back down binary tree.
- Only nodes stemming off the closest non-conflicting binary node can transmit.