Week 10 Flashcards
When do Network Communications work badly?
Network Communication works badly if two or more computers send messages at
the same time.
When do Network Communications work well?
Network Communication work well if one computer sends a message at a time (for a limited period of time)
What are the 2 sorts of Multiple Access Protocol?
- Carrier sense, multiple access/ collision detection (CSMA/ CD), for wired networks, such as Ethernet
- Carrier sense, multiple access/ collision avoidance (CSMA/ CA), for wireless networks such as WiFi
What are the properties of a CSMA/ CD wired network?
All computers are attached to a shared cable - Multiple Access (MA)
Any computer may transmit if the cable is unused - Carrier Sense (CS)
What is the Collision Detection and Waiting Time of CSMA/CD?
While transmitting, a computer may detect that it is receiving a message - Collision Detection (CD)
After detecting a collision, a computer waits for a random interval (chosen from an exponentially-doubling range), and then tries again
What is Random Waiting Time of CSMA/CD?
By using random interval we avoid repeated collisions
What is Exponentially-Doubling Range of CSMA/CD?
An exponentially-doubling range enables computers to adapt to the network load
Why is CSMA/CD not used today?
Not used today because modern Ethernet variants avoid collisions by operating in full duplex mode
What are the properties of a CSMA/ CA wireless network?
All computers use a shared frequency - Multiple Access (MA)
Any computer may transmit if the frequency is clear - Carrier Sense (CS)
What is Collision Avoidance in CSMA/CA?
a computer finding the frequency clear, transmits after an instant
a computer finding the frequency busy counts down from a random value
(chosen from an exponentially-doubling range) while the channel is clear;
otherwise, the count is frozen — Collision Avoidance (CA)
a computer then transmits and (hopefully) receives an acknowledgement
What is the Hidden Node Problem?
A computer may be in range of the base station, but out of range of another
computer — the hidden node problem
How is the Hidden Node Problem Resolved?
The hidden node problem may be solved by reservation using ready to send and
clear to send messages
What are the 3 Collision-Free Protocols?
- Token Ring
- Bit-map Protocols
- Binary Countdown
What is Token Ring?
In a token ring wired network, a token continuously circulates, to which
messages may be attached, and from which they may be removed
What is Token Bus?
In a token bus, the token is passed around a virtual ring