Preview

Lan Technology

Powerful Essays
Open Document
Open Document
2876 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lan Technology
Contents
Question-1 2
Question-2 3
Question-3 6
Question-4 7
Question-5 8
Question-6 9
Question-7 10
Question-8 11

Question-1
Discuss the two basic “media access control” methods for shared media used in the TCP/IP suite.
ANSWER:
In the Open Systems Interconnection (OSI) model of communication, the Media Access Control layer is one of two sub layers of the Data Link Control layer and is concerned with sharing the physical connection to the network among several computers. Each computer has its own unique MAC address. Ethernet is an example of a protocol that works at the Media Access Control layer level.
There are two basic media access control methods for shared media:
1. Controlled access method.
2. Contention based access method.
Controlled accessed method:
When using the controlled access method, network devices take turns, in sequence, to access the medium. This method is also known as scheduled access or deterministic. If a device does not need to access the medium, the opportunity to use the medium passes to the next device in line. When one device places a frame on the media, no other device can do so until the frame has arrived at the destination and has been processed by the destination.
Although controlled access is well-ordered and provides predictable throughput, deterministic methods can be inefficient because a device has to wait for its turn before it can use the medium.
Connection based access method:
Also referred to as non-deterministic, contention-based methods allow any device to try to access the medium whenever it has data to send. To prevent complete chaos on the media, these methods use a Carrier Sense Multiple Access (CSMA) process to first detect if the media is carrying a signal. If a carrier signal on the media from another node is detected, it means that another device is transmitting. When the device attempting to transmit sees that the media is busy, it will wait and try again after a short time period. If no carrier

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    Is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    6) For the network that you have chosen to characterize for this class, identify the primary types of media employed. Be sure to include both how the computers individually connect into the network devices as well as how network devices interconnect and how the connection to the Internet is achieved. Briefly explain the purpose in the network of each type of media employed and identify at least one alternative media which could also fulfill this purpose.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    3.2: OSI reference model: The OSI model includes two more layers that the TCP/IP layer already had but is constructed in only layer 5.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    This network access control determines which IP packets are allowed entry to a network and which are dropped.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 6 assignment

    • 378 Words
    • 2 Pages

    Management and control frames – Takes a new wireless client from the time is arrives at a new site until it can use the WLAN. Perform functions important to the wireless LAN. The 802.11 standard defines many different frames to do different kinds of work…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at LAN-to-WAN Domain level.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 1 2 NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 3 Oral Assessments Skills Assessment Interview • 15% of the course total The questionnaire consists of • 15 sets of questions • 3 questions in each set…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Satisfactory Essays

    In the event that a packet becomes lost due to network congestion, traffic load balancing, or other unpredictable network behavior, TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Medium Access Sub Layer

    • 6934 Words
    • 28 Pages

    (a). SLOTTED ALOHA: Roberts published a method for doubling the capacity of an ALOHA system by dividing the time up into discrete intervals, with each interval corresponding to a single frame. Time synchronization was achieved by having a special station that emits a pip at the start of each interval, like a clock. In this system, a computer is not permitted to send whenever a carriage return is typed. Instead, it is required to wait for the beginning of next slot. Since the vulnerability period is now halved, the probability of no other traffic during the some slot is e-g leads to…………….…

    • 6934 Words
    • 28 Pages
    Powerful Essays