SolStd12 - CHAPTER 12 Multiple Access Solutions to...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1 CHAPTER 12 Multiple Access Solutions to Odd-Numbered Review Questions and Exercises Review Questions 1. The three categories of multiple access protocols discussed in this chapter are ran- dom access , controlled access , and channelization . 3. In controlled access methods , the stations consult one another to find which sta- tion has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three popular controlled-access methods: reservation , polling , and token passing . 5. In random access methods, there is no access control (as there is in controlled access methods) and there is no predefined channels (as in channelization). Each station can transmit when it desires. This liberty may create collision . 7. In a random access method, the whole available bandwidth belongs to the station that wins the contention; the other stations needs to wait. In a channelization method, the available bandwidth is divided between the stations. If a station does not have data to send, the allocated channel remains idle. 9. We do not need a multiple access method in this case. The local loop provides a dedicated point-to-point connection to the telephone office. Exercises
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/16/2010 for the course SETAS ETEC301 taught by Professor Multiple during the Winter '09 term at Centennial College.

Page1 / 4

SolStd12 - CHAPTER 12 Multiple Access Solutions to...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online