Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 Shivkumar Kalyanaraman:

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Computer Networks Ethernet I Professor Hui Zhang
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Multiple access What if multiple machines are sharing the same link?
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Midterm Review 1 Introduction –Basic terminology and concepts. Physical Layer –Time and frequency domains. –Bandwidth and data rate. –Analog and digital.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Network Layer Performance.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 ECSE-4670: CCN Quiz 1: Solutions Time: 45 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Informal Quiz 3 True or False? T F  Forwarding works in the control plane whereas routing.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 2 Shivkumar Kalyanaraman:
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Connecting LANs, Backbone Networks, and Virtual LANs
Thin Ethernet (10B2 / IEEE 802.3a) Segment length 0.5 m Up to 30 attached nodes Cable flexible and cheap Integrated or external transceiver connected via.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #01 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
2. Data Link Layer: Medium Access Control. Scheduling.
The Medium Access Control Sublayer
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
7- chapter Seven Local Area Networks (LAN)
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 Shivkumar Kalyanaraman: Biplab Sikdar: Informal Quiz 3 Shivkumar Kalyanaraman: Biplab Sikdar:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 T F  Slotted ALOHA has improved utilization since the window of vulnerability is halved compared to pure ALOHA.  CSMA/CD is likely to be much better than CSMA when t_prop/t_trans >1  The logical bus model used in Ethernet implies that the channel is used in a half-duplex mode.  Hubs connect two collision domains, whereas bridges connect two broadcast domains.  Bridges and switches in Ethernet allow separation of collision domains, and reduce the degree of sharing of the physical media.  100Base-T was made possible because the maximum segment length necessary in UTP tree architectures was 100m.  The smallest valid Type field in the Ethernet header is 0x0800 because of interoperability concerns with IEEE which has a MTU of 1518 bytes  The reason Ethernet has a minimum frame size is to guarantee detection of collision (or the lack of it) before the end of frame transmission  The reason a collection of bridged collision domains do not scale is because the probability of broadcasts (by nodes or bridges) increases.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3  Randomness (in service and arrival) is what causes queuing at buffers.  The inter-arrival times of a poisson arrival process are exponentially distributed.  The P-K formula for M/G/1 queuing systems reduces to the E(n) formulas for M/M/1 and M/D/1 if we substitute the value for  2 (I.e.  2 = 1/  2 and  2 = 0 for exponential deterministic service processes respectively)  The throughput of a M/M/1/N system is the same as that of an M/M/1 system  The blocking probability of a M/M/1/N system can be approximated by that of an M/M/1 system for small buffer sizes  The number of packets in an M/M/1 system is  n(1-  )  n which can be written as (1-  )  * d/d  {   n-1 } =  /(1-  )

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4  Little’s law which relates expected queuing delay E(T) and expected number in the system E(n) is applicable only to M/M/1 queues (I.e. it cannot be applied to M/G/1 and D/D/1 systems)  Little’s law also applies to instantaneous (as opposed to average) queuing delay and instantaneous number in the system.  The “number of packets in the system” refers to the number of packets waiting in the queue plus the number of packets in service.  In an M/M/1 system with = 1000 bits/s and  = 900 bits/s, the expected delay E(T) is 5 seconds.  Once a telephone circuit is established, voice samples which are switched see no (waiting) delay because it is a D/D/1 system  The P-K formulas (for E(n)) for M/G/1 systems tells us that queues and queuing delay increases dramatically as utilization  > 0.9 and as the variance of the service times  2 increases.  An M/G/1 system with service rate of 10 Mbps is likely to have smaller queues than a similar system with a service rate of 1Mbps, assuming other parameters are equal.  Larger queues (I.e. larger E(n), as may happen in higher speed bottlenecks) does not necessarily imply larger queuing delay (I.e. larger E(T))

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5  The M/M/k/k system and the Erlang formula models the probability of your phone call being connected (I.e. not blocked).  At light loads, an M/D/1 system has half the queues as an M/M/1 system, and at heavy loads, both of them have nearly equal queues.  Consider a point-to-point link with no multiple-access, bit-errors or flow-control issues. Framing is not required for such a link.  Parity (odd or even) works because it transforms the transmitted bits into codewords with a Hamming distance of 2.  CRC is based upon the idea that it is highly unlikely for an uncorrupted packet (including CRC bits) to be perfectly divisible (I.e. zero remainder) by the CRC polynomial.  The set of bits in the CRC field is the remainder of the following division operation: D. 2r/G, where D is the set of data bits, and G is a r+1 bit generator pattern.  Channel partitioning MAC protocols can lead of waste of bandwidth if some users do not use their allocations.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6  Random access MAC protocols tend to perform very well at low loads in terms of channel multiplexing; but suffers from high delay at high loads.  “Taking turns” or token-based protocols like token-ring offer a best of both partitioning and random access worlds.  In Local area networks, t_prop/t_trans < 1, and number of users accessing the channel is not too large.  TDMA is simply a distributed form of TDM scheduling (which does not allow statistical multiplexing); token-passing is simply a distributed form of round-robin scheduling (which allows statistical multiplexing); random access is similar to a distributed version of FCFS, with adjustments for collisions.  The primary reasons a bus-protocol for LANs is different from that of a computer bus is because of distance and the number of nodes attached.  The suitability of MAC protocols to a particular scenario depends upon the expected utilization levels, number of users, distances (I.e. propagation delay), transmission speeds (I.e. transmission delays), and the complexity of protocol mechanisms. This is why we have a slew of MAC protocols for a variety of applications from Ethernet to Wireless LANs to satellite networks to cable networks.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7  CDMA divides frequency into multiple bands and has users transmitting in an assigned band only.  Orthogonal CDMA codes lead to interference in transmission.  Fixed-channel assignment protocols for packet switched data (with markovian arrival/service distribution) leads to a reduction in average delay by a factor of N.  Slotted ALOHA has a maximum utilization of 18%.  Slotted ALOHA increases utilization over unslotted ALOHA because it does not allow collisions to occur between users who arrive in adjacent time slots.  The CSMA part of Ethernet uses p-persistent transmission with a p of 0.5.  The collision detection part of Ethernet really pays off in practice because average transmission time >> propagation time.  In Ethernet, all nodes detect collision at precisely the same time instant.  In Ethernet, a node which sees collision and backs off tends to remain in backoff phases if other nodes which have not seen a collision are constantly accessing the channel (a.k.a. the “capture” effect).  Ethernet uses a linear backoff system when it detects collision.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8  Token ring is essentially a distributed polling implementation where the revolving token polls a node to see if it has something to transmit.  Token-based protocols cannot be implemented on a bus-architecture.  Reservation protocols cannot be implemented on a ring architecture.  Ethernet succeeded in the real-world because the protocol was flexible enough to be applied to a variety of media and topology architectures, especially the tree architectures which could leverage the existing PBX twisted pair wiring & conduits in buildings.  Ethernet has a minimum packet size because the transmission of packet at the source node without hearing a collision is assumed to be an acknowledgement of the transmission (I.e. no collisions are allowed to happen if the source has not heard it till end of packet transmission).  Token ring has a minimum packet size of 64 bytes.  CRC bits are placed at the end of the packet (I.e. as a “trailer” instead of at the “header”), because the CRC can be calculated as the packet bits are processed, and be appended to the end.  Hubs isolate collision domains.  Routers are placed at the border of broadcast domains.  The 10BaseT notation represents 100 Mbps Ethernet operating over coaxial cable.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9  Hubs are essentially repeaters with multiple ports, I.e., they operate at layer 1, regenerate and broadcast signals to all the connected ports.  ”Full-duplex” “Point-to-point” Gigabit Ethernet implies that only the Ethernet framing format is used, but the CSMA/CD protocol is not used (coz CSMA/CD assumes a “half-duplex” and “multiple-access” channel)  Layer 2 switches are just bridges with a high speed switching fabric (I.e. high speed parallel forwarding).  The primarily difference between interconnection devices at Layer 1 (hubs, repeaters), Layer 2 (bridges) and Layer 3 (routers) is the degree and intelligence of filtering packets. Their efficiency of filtering also fundamentally limits their scalability.  Bridges’ filtering capability is through a “learning” algorithm where the bridge snoops on passing packets and determines which side a node lies. In the absence of any packets seen, a bridge resorts to flooding – something a router (I.e. layer 3 device) will never do.  The purpose of a dynamically constructed spanning tree between bridges is to limit the scope of flooded packets so that they don’t appear on the same LAN twice.  The wireless LAN MAC protocol uses CSMA/CA instead of CSMA/CD because collisions can be heard only at the receiver (and not at the source node) because of the hidden terminal problem.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10 T F   Slotted ALOHA has improved utilization since the window of vulnerability is halved compared to pure ALOHA.    CSMA/CD is likely to be much better than CSMA when t_prop/t_trans >1   The logical bus model used in Ethernet implies that the channel is used in a half-duplex mode.    Hubs connect two collision domains, whereas bridges connect two broadcast domains.   Bridges and switches in Ethernet allow separation of collision domains, and reduce the degree of sharing of the physical media.   100Base-T was made possible because the maximum segment length necessary in UTP (twisted pair) tree architectures was 100m.   The smallest valid Type field in the Ethernet header is 0x0800 because of interoperability concerns with IEEE which has a MTU of 1518 bytes   The reason Ethernet has a minimum frame size is to guarantee detection of collision (or the lack of it) before the end of frame transmission   The reason a collection of bridged collision domains do not scale is because the probability of broadcasts (by nodes or bridges) increases. Solutions

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 11   Randomness (in service and arrival) is what causes queuing at buffers.   The inter-arrival times of a poisson arrival process are exponentially distributed.   The P-K formula for M/G/1 queuing systems reduces to the E(n) formulas for M/M/1 and M/D/1 if we substitute the value for  2 (I.e.  2 = 1/  2 and  2 = 0 for exponential deterministic service processes respectively)    The throughput of a M/M/1/N system is the same as that of an M/M/1 system   The blocking probability of a M/M/1/N system can be approximated by that of an M/M/1 system for small buffer sizes   The number of packets in an M/M/1 system is  n(1-  )  n which can be written as (1-  )  * d/d  {   n-1 } =  /(1-  )

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 12    Little’s law which relates expected queuing delay E(T) and expected number in the system E(n) is applicable only to M/M/1 queues (I.e. it cannot be applied to M/G/1 and D/D/1 systems)    Little’s law also applies to instantaneous (as opposed to average) queuing delay and instantaneous number in the system.   The “number of packets in the system” refers to the number of packets waiting in the queue plus the number of packets in service.    In an M/M/1 system with = 1000 bits/s and  = 900 bits/s, the expected delay E(T) is 5 seconds.   Once a telephone circuit is established, voice samples which are switched see no (waiting) delay because it is a D/D/1 system   The P-K formulas (for E(n)) for M/G/1 systems tells us that queues and queuing delay increases dramatically as utilization  > 0.9 and as the variance of the service times  2 increases.    An M/G/1 system with service rate of 10 Mbps is likely to have smaller queues than a similar system with a service rate of 1Mbps, assuming other parameters are equal.   Larger queues (I.e. larger E(n), as may happen in higher speed bottlenecks) does not necessarily imply larger queuing delay (I.e. larger E(T))

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 13   The M/M/k/k system and the Erlang formula models the probability of your phone call being connected (I.e. not blocked).   At light loads, an M/D/1 system has half the queues as an M/M/1 system, and at heavy loads, both of them have nearly equal queues.   Consider a point-to-point link with no multiple-access, bit-errors or flow-control issues. Framing is not required for such a link.   Parity (odd or even) works because it transforms the transmitted bits into codewords with a Hamming distance of 2.   CRC is based upon the idea that it is highly unlikely for an uncorrupted packet (including CRC bits) to be perfectly divisible (I.e. zero remainder) by the CRC polynomial.   The set of bits in the CRC field is the remainder of the following division operation: D. 2r/G, where D is the set of data bits, and G is a r+1 bit generator pattern.   Channel partitioning MAC protocols can lead of waste of bandwidth if some users do not use their allocations.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 14   Random access MAC protocols tend to perform very well at low loads in terms of channel multiplexing; but suffers from high delay at high loads.   “Taking turns” or token-based protocols like token-ring offer a best of both partitioning and random access worlds.   In Local area networks, t_prop/t_trans < 1, and number of users accessing the channel is not too large.   TDMA is simply a distributed form of TDM scheduling (which does not allow statistical multiplexing); token-passing is simply a distributed form of round-robin scheduling (which allows statistical multiplexing); random access is similar to a distributed version of FCFS, with adjustments for collisions.   The primary reasons a bus-protocol for LANs is different from that of a computer bus is because of distance and the number of nodes attached.   The suitability of MAC protocols to a particular scenario depends upon the expected utilization levels, number of users, distances (I.e. propagation delay), transmission speeds (I.e. transmission delays), and the complexity of protocol mechanisms. This is why we have a slew of MAC protocols for a variety of applications from Ethernet to Wireless LANs to satellite networks to cable networks.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 15   CDMA divides frequency into multiple bands and has users transmitting in an assigned band only.   Orthogonal CDMA codes lead to interference in transmission.   Fixed-channel assignment protocols for packet switched data (with markovian arrival/service distribution) leads to a reduction in average delay by a factor of N.   Slotted ALOHA has a maximum utilization of 18%.   Slotted ALOHA increases utilization over unslotted ALOHA because it does not allow collisions to occur between users who arrive in adjacent time slots.   The CSMA part of Ethernet uses p-persistent transmission with a p of 0.5.   The collision detection part of Ethernet really pays off in practice because average transmission time >> propagation time.   In Ethernet, all nodes detect collision at precisely the same time instant.   In Ethernet, a node which sees collision and backs off tends to remain in backoff phases if other nodes which have not seen a collision are constantly accessing the channel (a.k.a. the “capture” effect).   Ethernet uses a linear backoff system when it detects collision.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 16   Token ring is essentially a distributed polling implementation where the revolving token polls a node to see if it has something to transmit.   Token-based protocols cannot be implemented on a bus-architecture.   Reservation protocols cannot be implemented on a ring architecture.   Ethernet succeeded in the real-world because the protocol was flexible enough to be applied to a variety of media and topology architectures, especially the tree architectures which could leverage the existing PBX twisted pair wiring & conduits in buildings.   Ethernet has a minimum packet size because the transmission of packet at the source node without hearing a collision is assumed to be an acknowledgement of the transmission (I.e. no collisions are allowed to happen if the source has not heard it till end of packet transmission).   Token ring has a minimum packet size of 64 bytes.   CRC bits are placed at the end of the packet (I.e. as a “trailer” instead of at the “header”), because the CRC can be calculated as the packet bits are processed, and be appended to the end.   Hubs isolate collision domains.   Routers are placed at the border of broadcast domains.   The 10BaseT notation represents 100 Mbps Ethernet operating over coaxial cable.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 17   Hubs are essentially repeaters with multiple ports, I.e., they operate at layer 1, regenerate and broadcast signals to all the connected ports.   ”Full-duplex” “Point-to-point” Gigabit Ethernet implies that only the Ethernet framing format is used, but the CSMA/CD protocol is not used (coz CSMA/CD assumes a “half-duplex” and “multiple-access” channel)   Layer 2 switches are just bridges with a high speed switching fabric (I.e. high speed parallel forwarding).   The primarily difference between interconnection devices at Layer 1 (hubs, repeaters), Layer 2 (bridges) and Layer 3 (routers) is the degree and intelligence of filtering packets. Their efficiency of filtering also fundamentally limits their scalability.   Bridges’ filtering capability is through a “learning” algorithm where the bridge snoops on passing packets and determines which side a node lies. In the absence of any packets seen, a bridge resorts to flooding – something a router (I.e. layer 3 device) will never do.   The purpose of a dynamically constructed spanning tree between bridges is to limit the scope of flooded packets so that they don’t appear on the same LAN twice.   The wireless LAN MAC protocol uses CSMA/CA instead of CSMA/CD because collisions can be heard only at the receiver (and not at the source node) because of the hidden terminal problem.