daily pastebin goal
53%
SHARE
TWEET

Untitled

a guest Feb 22nd, 2019 67 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. - broadly speaking there are three classes of multiple access protocols:
  2.   - channel partitioning (including CDMA)
  3.   - random access
  4.   - taking turns
  5.  
  6. - This random access protocol is referred to as CSMA with collision avoidance, or more succinctly as CSMA/CA. As with Ethernet’s CSMA/CD, the “CSMA” in CSMA/CA stands for “carrier sense multiple access,” meaning that each station senses the channel before transmitting, and refrains from transmitting when the channel is sensed busy
  7.  
  8. - CSMA/CA(802.11) vs CDMA(Ethernet???)
  9.   - Collision avoidance vs collision detection
  10.   - senses before transmitting vs transmits as soon as  channel is sensed to be idle
  11.   - link layer based ack
  12.  
  13. - 802.11 MAC protocol does not implement collision detection because:
  14.   - costly to build hardware that can detect collisions
  15.   - even if hardware built, it couldn't recognize all collisions due to hidden terminal problem and fading
  16.  
  17. - when the destination station receives a frame that passes the CRC, it   waits a short period of time known as the Short Inter-frame Spacing (SIFS) and then sends back an acknowledgment frame.
  18.  
  19. - DIFS : Distributed Inter Frame Space
  20.   SIFS : Short Inter Frame Space
  21.   CTS : Clear To Send
  22.  
  23. - The CSMA/CA can fail when:
  24.   - random backoff can be close enough that the first one's transmission doesn't reach the second one before it starts transmitting
  25.   - the two networks could be hidden from each other
  26.  
  27. - Normal CSMA protocol:
  28.   1. if the channel is initially idle, it waits a DIFS period of time
  29.   2. if it isn't idle, it backsoff a random amount of time using binary exponentiation backsoff. Timer only ticks when the medium is idle
  30.   3. when the timer rings and the medium is idle, the station closes its ears and transmits the whole frame no matter what and then waits for an acknowledgment
  31.   4. if ack received, move on. Else go to step 2.
  32.  
  33. - CSMA with hidden terminals:
  34.   - sender waits dfs and send RTS to AP
  35.   - AP waits SIFS and sends CTS to all stations
  36.   - sender waits SIFS and sends data while others defer their access till ACK
  37.   - After data is transferred, AP waits SIFS and transfers ACK to all stations
  38.  
  39. - RTS CTS good cuz:
  40.   - RTS CTS are small enough that collisions are ok
  41.   - hidden station problem is mitigated
  42.  
  43. # Virtual Circuits
  44. - Computer networks that provide only a connection service at the network layer are called virtual-circuit (VC) networks; computer networks that provide only a connectionless service at the network layer are called datagram networks.
  45. - A VC consists of :
  46.   1. a path (that is, a series of links and routers) between the source and destination hosts
  47.   2. VC numbers, one number for each link along the path, and
  48.   3. entries in the forwarding table in each router along the path
  49.  
  50. - Why are the VC links different:
  51.   1. putting different ones from link to link reduces the range of VC numbers
  52.   2. It's difficult to agree on one VC number
  53.  
  54. - Difference between VC at network layer and connection oriented TCP at Transport Layer:
  55.   a VC network layer, routers along the path between the two end systems are involved in VC setup, and each router is fully aware of all the VCs passing through it.
  56.  
  57. - Nomenclature:
  58.   - Application : packets
  59.   - Transport : segment
  60.   - Network : datagram
  61.   - Data Link: frame
  62.  
  63. # VLANs
  64. - Problems that VLANs address:
  65.   - Lack of traffic isolation needed for:
  66.       - security
  67.       - not congesting the network
  68.   - Inefficient use of switches
  69.   - Managing users (if an employee moves between groups, cabling will have to be changed)
  70.  
  71. - VLANs allows multiple virtual local area networks to be defined over a single physical local area network infrastructure. Hosts within a VLAN communicate with each other as if they (and no other hosts) were connected to the switch.
  72. - VLAN trunking: In the VLAN trunking approach shown in Figure 5.26(b), a special port on each switch (port 16 on the left switch and port 1 on the right switch) is configured as a trunk port to interconnect the two VLAN switches. The trunk port belongs to all VLANs, and frames sent to any VLAN are forwarded over the trunk link to the other switch.
  73. BUT: how does the switch know which VLAN the frame belongs to? The switch updates the frame with an additional field of VLAN group. This is removed at the receiving end of the trunk.
  74.  
  75. # Inter and Intra AS routing
  76. - Intra-AS routing protocols are also known as interior gateway protocols. Eg: RIP, OSPF, ISIS
  77. - OSPF is a link-state protocol that uses flooding of link-state information and a Dijkstra least-cost path algorithm. - OSPF creates a complete topological graph of the entire network With OSPF, a router broadcasts routing information   to all other routers in the autonomous system, not just to its neighboring routers. A router broadcasts linkstate information whenever there is a change in a link’s state (for example, a change in cost or a change in up/down status). It also broadcasts a link’s state periodically (at least once every 30 minutes), even if the link’s state has not changed.
  78. - Advances embodied by OSPF:
  79.   - Security: Exchanges between OSPF routers can be authenticated. Prevents malicious intruders from injecting incorrect information into the routing table.
  80.   - Multiple same cost paths: When multiple paths to a destination have the same cost, OSPF allows multiple paths to be used
  81.   - Integrated support for unicast and multicast
  82.   - Support for hierarchy within a single routing domain: Perhaps the most significant advance in OSPF is the ability to structure an autonomous system hierarchically
  83. - An OSPF autonomous system can be configured hierarchically into areas. Each area runs its own OSPF link-state routing algorithm, with each router in an area broadcasting its link state to all other routers in that area. Within each area, one or more area border routers are responsible for routing packets outside the area. Lastly, exactly one OSPF area in the AS is configured to be the backbone area.  
  84.  
  85. # Multiple Access Links and Protocols
  86. - TDM : Time Division Multiplexing
  87.   FDM : Frequency Division Multiplexing
  88. - There are two types of network links:
  89.   - point-to-point link: single sender at one end and single receiver at the other end. Eg: PPP, HDLC
  90.   - broadcast link: can have multiple sending and receiving nodes all connected to the same, shared, single broadcast channel. Eg: Ethernet and Wireless LAN
  91. - the multiple access problem: how to coordinate the access of multiple sending and receiving nodes to a shared broadcast channel
  92. - we can classify any multiple access protocol as belonging to one of three categories:
  93.   - channel partitioning protocols
  94.   - random access protocols
  95.  
  96. - A circuit in a link is implemented with either:
  97.   - FDM: the frequency spectrum of a link is divided up among the connections established across the link.
  98.   - TDM: time is divided into frames of fixed duration, and each frame is divided into a fixed number of time slots. When the network establishes a connection across a link, the network dedicates one time slot in every frame to this connection. These slots are dedicated for the sole use of that connection, with one time slot available for use (in every frame) to transmit the connection’s data.
  99. - Packet Switching vs Circuit Switching:
  100.   - Packet switching not good for real time services because of its variable and unpredictable end-to-end delays.
  101.   - Packet switching:
  102.     - offers better sharing of transmission capacity
  103.     - simpler
  104.     - more efficient
  105.     - less costly
  106.     compared to circuit swithcing
  107. - Drawback fo TDM:
  108.   - reduced bandwidth even when it's the only node
  109.   - long wait even when it's the only node
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top