Homework_2_Fall_2010

Homework_2_Fall_2010 - CS 132 Fall 2010 Homework 2 1 CS 132...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 132 Fall 2010 Homework 2 1 CS 132 - Computer Networks – Fall 2010 Homework 2 1) The MAC sublayer is only used in broadcast or shared channel networks. (True or False) 2) IEEE 802.3 defines Token Ring protocols. (True or False) 3) LLC stands for __________________ 4) Discuss the differences between the 3 access protocols ( Fixed Assignment, Demand Assignment, and Contention Access) under the MAC sublayer. 5) Discuss the functionalities of the 3 demand assignment protocols: Polling, Reservation Scheme, and Token passing scheme. 6) Discuss how the TDMA protocol works. Create an example transmission sequence and explain how TDMA would allocate the channel for each transmission. 7) Discuss how Bit-map protocol and binary countdown protocol work. Create an example transmission sequence and explain how the two protocols work. How does the permuting addresses scheme modify the bit map protocol? Perform the bit-map protocol example again with permuting addresses. 8) Which of the following are correct for contention access protocols? a) long delay for bursty traffic b) cannot support priority traffic c) not good for continuous traffic (e.g., voice) d) low channel efficiency with a large number of hosts 9) Given the time for packet transmission, mark the vulnerable period for ALOHA and slotted ALOHA, give your reasons.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CS 132 Fall 2010 Homework 2 2 10) Explain how the pure ALOHA and slotted ALOHA protocols work. Explain how the slotted ALOHA protocol improves the pure ALOHA protocol. What is the relation between vulnerable period, propagation delay, channel speed, and packet length? 11) Assume that several stations share a channel and use fixed-size packets to communicate. The 2 farthest stations are A and B. The transmission time for 1 packet is 1 t . The propagation delay is 2 t . a) For Pure ALOHA protocol, the vulnerable period is __________ b) For slotted ALOHA, the vulnerable period is ___________ c) For 1-Persistent CSMA, the vulnerable period is ____________ 12) What are the differences between 1-Persistent, Non-Persistent, and P-Persistent CSMA? 13)
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/24/2011 for the course CS 132 taught by Professor Suda,t during the Fall '08 term at UC Irvine.

Page1 / 6

Homework_2_Fall_2010 - CS 132 Fall 2010 Homework 2 1 CS 132...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online