ISDS 409 Exam 2 (chapter 4 & 5)

Ace your homework & exams now with Quizwiz!

Amplifier

- Boost both noise and signal for transmission - Typically used on analog circuits

Error Rate

- Example error rate: 1 in 500,000 meaning there is 1 bit in error for every 500,000 bits transmitted

Polling

- Process of transmitting to a client only if asked or permitted - Types of Polling 1. Roll call 2. Hub or Token

Hamming Code

- an example of forward error correction

IPv4 decimal equivalent example

- 128.192.56.1

IPv4 Header

- 192 Bits (24 Bytes) - uses 32 bit addresses

IPv6 Header

- 320 bits (40 Bytes) - uses 128 bits addresses - Flow name: packets are dedicated by name

Asynchronous Transmission Efficiency

- 7-bit ASCII (info bits), 1 parity bit, 1 stop bit, 1 start bit - Transmission Efficiency = 7/10 or 70% - e.g., V.92 modem with 56 Kbps 39.2 Kbps effective rate

Controlled Access Transmission Graphical Display

- A linear function, graph depicts a steady growth of traffic with response time - better with a network of 20+ computers

Network Layer is responsible for?

- Addressing and routing of messages - Selects the best path from computer to computer until the message reaches destination

Network Layer Functions

- Addressing: Assignment of (internet) addresses - Routing: Process of deciding what path a packet must take to reach destination

SDLC Transmission Efficiency

- Assume 100 info characters (800 bits), 2 flags (16 bits), Address (8 bits), Control (8 bits), CRC (32 bits) - Transmission Efficiency = 800/864 or 92.6% e.g., V.92 modem with 56 Kbps 51.9 Kbps effective rate

Checksum

- Calculated by adding decimal values of each character in the message then dividing the total by 255 then saving the remainder, typically of 1 byte and using it as the checksum - If the sender and receiver checksum values are equal, the message is presumed to contain no errors.

Cyclic Redundancy Check (CRC)

- Computed by calculating the remainder to a division problem. Similar to checksum technique but contain a different fixed number - Most powerful and most common

Logical Link Control (LLC) (top sublayer of Data Link)

- Connects to and communicates with network layer above 1. Transmitting end LLC: surround the PDU with the Ethernet frame. 2. Receiving End LLC: removes the data link layer PDU and passes the message it contains to Network Layer

Roll Call Polling

- Controller check each client periodically to see if it wants to transmit - Clients can also be prioritized so that they are polled more frequently.

Media Access Control (MAC) (bottom sublayer of Data Link)

- Controls the physical hardware 1. Transmitting End: takes data link layer PDU from LLC and convert into street of bits and control when to transmit those bits 2. Receiving End: receives bits from physical layer and translate into coherent PDU. Then passes the data link layer PDU to LLC

Data Link Protocols: Synchronous Transmission

- Data sent in a large block called a Frame - Includes a series of synchronization (SYN) characters. Used to help receiver recognize incoming data

Flow Control with ARQ: Continuous

- Ensuring that sender is not transmitting too quickly for the receiver - Both sides agree on the size of the "sliding window" - or number of messages that can be handled by receiver without causing significant delays

Flow Control with ARQ: Stop n Wait

- Ensuring that sender is not transmitting too quickly for the receiver - Receiver sends an ACK or NAK when it is ready

Synchronous Transmission Sub-Protocols: SDLC

- Frame begins and ends with a special bit pattern, known as the flag. -The address field identifies the destination. - The length of the address field is usually 8 bits but can be set at 16 bits; all computers on the same network must use the same length.

Functions of Transport Layer

- Linking to the Application Layer - Segmenting - Session management

Transmission Control Protocol (TCP)

- Links the app layer to the network layer - Performs segmenting and reassembly - 192 bits (24 bytes)

Synchronous Transmission Sub-Protocols: Ethernet II

- Marking the end of a frame with bipolar signaling, send 1s and 0s

Functions of a Data Link Layer

- Media Access Control - Error Control - Message Delineation

Implications for Management: Data Link Layer

- Minimize costly customization - Minimize costly translation among many protocols - Less training, simpler network management

TRIB efficiency

- Number of info bits accepted / total time required to get the bits - (Number of info bits) (Prob. of successful transmission) / (Time it takes to transmit these bits) + (Propagation delay)

Network Errors

- Occur during transmissions, controlled by network hardware and software - 2 categories of network error: 1. Corrupted data - data changed from what it was 2. Lost data - cannot locate the data at all.

Parity Checking

- Oldest and simplest error detection. - add a parity bit to the message, then the receiving end will check by calculating the parity bit (1 bit) to see if the message ends with an odd number of 1s or even number of 1s - can catch odd number of errors but miss even number in data block

Hub/Token Polling

- One computer starts the poll. 1. sends message (if any) 2. passes the token on to the next computer

Functions of TCP/IP (Transmission Control Protocol/Internet Protocol)

- Performs error checking - Transmits large files with end-to-end delivery assurance - Used by the Internet - Used by almost all backbone and wide area networks - Most commonly used protocol on LANs

User Datagram Protocol

- Protocol used when sender needs to send a single small packets to the receiver (e.g., DNS request), faster - Uses a small header ony 8 bytes containing 4 fields. 1. Source port 2. Destination port 3. Length 4. CRC-16 - Does not check for lost messages

Repeater

- Regenerate a clean signal for transmission. - Typically used on digital circuits

Case 3: Unknown Address

- Sends a DNS request (encapsulated by a UDP datagram) to the local DNS server

Automatic Repeat reQuest (ARQ) Retransmission

- Simplest, most effective, least expensive - 2 different types of ARQ 1. Stop N Wait 2. Continuous ARQ

IPv4 addressing

- The first n bits of an IP address represent the specific network - The last (32 - n) bits of the IP address identify the host on that specific network - These (32 - n) bits are often called the "host portion" - 2 ^ (32-n)

Contention transmission

- Transmit whenever the circuit is free. Prone to collisions when more than one computer tries to transmit at the same time. -used in Ethernet LANs

Case 2: Known Address, Different Subnet

- Use subnet mask to determine that the destination is NOT on the same subnet

Synchronous Transmission Sub-Protocols: Point-to-Point

- Used on dial-up lines from home PCs

Synchronous Transmission Sub-Protocols: HDLC

- Uses controlled access MAC - Basis for many other Data Link protocols - Longer addresses than SDLC -Larger sliding window size

Synchronous Transmission Sub-Protocols: Ethernet 802.3ac

- VLan tag

Contention Transmission Graphical Display

- an exponential function, graph depicts an exponential growth of traffic with response time - better with a network of 20 computers or less

Access Request

- client computers that want to transmit send a request to transmit to the device that is controlling the circuit - similar to a classroom situation in which the instructor calls on the students who raise their hands.

Controlled Access Transmission

- controls the circuit and determines which clients can transmit at what time. - there are 2 controlled access techniques 1. access request 2. polling

Centralized routing

- decisions made by 1 central comp. - used on small, host-based networks

decentralized routing

- decisions made by each router independently of one another - used on the internet

IP address

- does not change from end to end. Source and destination addresses stay the same so message communication can be send back and forth to the correct source/destination.

Data Link Protocols: Asynchronous Transmission

- each character is transmitted independently of all other characters. - start and stop bit are the opposite of each other. Typically, the start bit is a 0 and stop is a 1.

burst error

- errors are not uniformly distributed in time e.g. 1 in 500k is 100 bits error for every 50,000,000 bits transmitted

attenuation

- lose of power a signal suffers as it travels from transmitting computer to receiving computer.

Line noise and distortion

- major cause for errors in data transmission - manifestations: extra bits, flipped bits, and missing bits

Data Link Layer is responsible for?

- moving messages from one device to another - control the way messages are sent on the physical media.

Implications for Management: Transport & Network Layer

- moving toward a single standard based on TCP/IP - decreased cost of buying and maintaining network

Qos Routing

- provided RTP - Defines and assigns priorities to "classes of service" - Timely delivery of packets is important - Real-time app: - VoIP (high priority) - E-mail (low priority)

Connection-Oriented Messaging

- provided by TCP - TCP connection also called a session - packet deliveries are acknowledged

Connectionless Messaging

- provided by UDP - each packet is sent independently, more streamline and faster than TCP

Continuous ARQ (full duplex)

- sender does not wait for ACK after sending a message, it immediately sends the next on. - While transmitting messages, sender examines stream of returning ACK, if it receives an NAK, the sender retransmits the needed messages.

Stop N Wait ARQ (half duplex)

- sender stops and waits for a response from receiver after each data packet

errors prevention

- shielding cables - moving cables away from noise sources - install amplifiers or repeaters to prevent attenuation

How can TCP serve several App Layer protocols at the same time?

- standardized port numbers or addresses

Case 1: Known Address, Same subnet

- subnet mask to see that the destination is on the same subnet as itself

Throughput

- total number of info bits received per sec, after taking into account the overhead bits and the need to transmit frames contains errors. - More accurate definition of efficiency - Uses TRIB

Human errors

- typo of a number, controlled through the application programs

Dynamic routing algorithms: link state dynamic routing

- uses a variety of information types to decide how to route a packet (more sophisticated) - e.g., # of hops, congestion, speed

Dynamic routing algorithms: distance vector dynamic routing

- uses the least number of hops to decide how to route a packet

MAC address

- will change from node to node because it is device specific

IPv6 decimal equivalent example

2001:0890:0600:00d1:0000:0000:abcd:f010 convert to 2001:890:600:d1: :abcd:f010 - compressed notation eliminates leading 0s within each block and blocks that are all 0s


Related study sets

Exam FX #2 life insurance basics

View Set

CH. 12 - Arts of Ritual Daily Life

View Set

Med Surg II - Chapter 37 Disorders of the Urinary System

View Set

Педиатры - Фармакология 1

View Set