CN Mod2
CN Mod2
effectively:
---
---
---
---
Here’s an **elaborated version** of each topic from your PDF. I've expanded on the explanations while
keeping them structured and easy to follow.
---
#### **Techniques:**
1. **Stop-and-Wait**:
- The sender transmits one frame and waits for an acknowledgment (ACK) before sending the next
frame.
- If the ACK is not received within a specific time, the sender retransmits the frame.
- **Advantages**:
- Simple and ensures error detection for every frame.
- **Disadvantages**:
- Inefficient for high-speed networks because the channel remains idle during the wait time.
2. **Sliding Window**:
- Both sender and receiver maintain a "window" that limits the number of frames in transit.
- Multiple frames can be sent before waiting for an ACK.
- Windows slide forward as frames are acknowledged, making this method more efficient.
- **Key Features**:
- Uses sequential frame numbering (e.g., if \( n = 8 \), numbers are \( 0, 1, ..., 7, 0, 1, ...\)).
- Receiver acknowledges frames using a single ACK for several frames.
---
#### **Mechanism**:
1. **Automatic Repeat Request (ARQ)**:
- Used for retransmission when errors are detected.
- **Retransmission Scenarios**:
- **Damaged frame**: Frame is corrupted during transmission.
- **Lost frame**: Frame does not reach the receiver.
- **Lost acknowledgment**: Receiver’s ACK does not reach the sender.
2. **Types of ARQ**:
1. **Stop-and-Wait ARQ**:
- A simple method where the sender waits for an ACK before sending the next frame.
- Retransmits the last frame if no ACK is received within a timeout.
2. **Sliding Window ARQ**:
- Maintains copies of frames until ACKs are received.
- **Go-Back-n ARQ**: Retransmits the damaged frame and all subsequent ones.
- **Selective-Repeat ARQ**: Only retransmits the erroneous frame.
---
#### **Types**:
1. **Random Access**:
- Devices transmit data without a fixed schedule.
- **Protocols**:
1. **Pure ALOHA**:
- Transmits data whenever a frame is ready.
- Collisions can occur if multiple devices send simultaneously.
- Vulnerable time = \( 2T_f \) (twice the frame time).
2. **Slotted ALOHA**:
- Time is divided into slots.
- Devices transmit only at the start of a slot, reducing collisions.
- Vulnerable time = \( T_f \).
3. **CSMA (Carrier Sense Multiple Access)**:
- Reduces collisions by sensing the medium before transmitting.
- **Variants**:
- **1-Persistent CSMA**: Sends immediately if idle; high collision chances.
- **Non-Persistent CSMA**: Waits randomly if busy; reduces collisions.
- **P-Persistent CSMA**: Combines 1-persistent and non-persistent approaches.
2. **Controlled Access**:
- Devices consult each other to determine who transmits.
- **Methods**:
- **Reservation**: Devices reserve time slots.
- **Polling**: Central controller polls devices for permission to send.
- **Token Passing**: Devices pass a token; only the token-holder transmits.
---
---
---
---
Here’s an **elaborated explanation** starting from **Multiple Access Protocols** to the final topics,
covering all aspects in detail.
---
---
1. **ALOHA**:
- Originated with pure ALOHA, where stations send data whenever it’s ready.
- **Types**:
- **Pure ALOHA**:
- Vulnerable time = \( 2T_f \) (twice the frame time).
- Collisions occur if frames overlap during this time.
- Relies on acknowledgment (ACK) for successful transmissions.
- **Efficiency**: \( \text{Maximum efficiency} = 18.4\% \).
- **Slotted ALOHA**:
- Time is divided into discrete slots.
- Frames are sent only at the beginning of time slots, reducing collisions.
- Vulnerable time = \( T_f \).
- **Efficiency**: \( \text{Maximum efficiency} = 36.8\% \).
---
2. **Polling**:
- A central controller (primary station) polls secondary stations one by one.
- Only the polled station can transmit.
- Efficient for low traffic but introduces delays under high traffic.
3. **Token Passing**:
- A special token circulates in the network.
- Only the station holding the token can transmit.
- Reduces collisions but requires efficient token management.
---
2. **Slotted ALOHA**:
- Reduces collision chances by dividing time into discrete slots.
- Stations transmit only at the beginning of slots.
---
---
### **CSMA/CD (Collision Detection)**
1. **Steps**:
- Sense the medium before transmitting.
- If idle, transmit; monitor the medium for collisions.
- If a collision is detected:
- Stop transmission.
- Send a JAM signal to notify others.
- Backoff and retry after a random time.
2. **Energy Levels**:
- **Zero**: Channel idle.
- **Normal**: Successful transmission.
- **Abnormal**: Collision detected (energy level doubles).
---
---
Here's a **detailed, elaborate, and fully comprehensive short note** covering all topics and subtopics from
the uploaded materials. This format ensures that every critical detail is included, making it easy to study
and understand.
---
---
---
---
**Frame Format**:
| **Field** | **Description** |
|---------------------|--------------------------------------------------------------------------------------------------|
| Start Delimiter | Marks the start of the frame. |
| Access Control | Includes priority, token bit, and reservation fields. |
| Frame Control | Indicates whether the frame contains data or control information.
|
| Destination/Source Address | 6-byte MAC addresses of the recipient and sender.
|
| Data | Encapsulated data from higher layers. |
| CRC | Error-checking field. |
| End Delimiter | Marks the end of the frame. |
| Frame Status | Indicates whether the frame has been successfully read by the recipient.
|
---
---
**Frame Format**:
| **Field** | **Purpose** |
|---------------------|-------------------------------------------------------------------------------------------------|
| Start Delimiter | Indicates frame arrival. |
| Frame Control | Specifies data or control type. |
| Destination/Source Address | MAC addresses for communication. |
| Data | Information from higher layers. |
| CRC | Ensures data integrity. |
| End Delimiter | Marks the end of the frame. |
---
---
---
Here’s a detailed and well-structured short note focusing on **Wired LANs** and **Wireless LANs**,
covering all topics and subtopics from your document. It is designed to make learning efficient and
comprehensive.
---
## **Wired LANs**
### **Overview**
- **Wired LANs** use physical cables (like twisted pair, coaxial, or fiber optics) to connect devices.
- Standards for wired LANs are developed under **IEEE Project 802**.
---
---
| **Field** | **Purpose** |
|---------------------|-------------------------------------------------------------------------------------------------|
| Preamble | Alerts the receiver about the incoming frame. |
| SFD | Marks the start of the frame. |
| Destination Address | Physical address of the recipient. |
| Source Address | Physical address of the sender. |
| Length/Type | Indicates the size or type of the payload. |
| Data | Contains user data from higher layers. |
| CRC | Ensures error detection. |
---
---
---
---
## **Wireless LANs**
### **Overview**
- **Wireless LANs (WLANs)** use radio waves for communication, eliminating the need for physical
cables.
- Defined by **IEEE 802.11** standards.
---
---
### **2. MAC Sublayer in WLANs**
1. **Distributed Coordination Function (DCF)**:
- Implements **CSMA/CA**:
- Stations sense the channel before transmitting.
- Avoids collisions using acknowledgments and backoff mechanisms.
2. **Point Coordination Function (PCF)**:
- Poll-based access method.
- Used for time-sensitive transmissions.
---
---
---
---
This short note captures all key aspects of **Wired and Wireless LANs**, making it easy to understand
while retaining all critical points. Let me know if you need further elaboration!