CS 132 Fall 2010 Homework 2 1 CS 132 - Computer Networks – Fall 2010 Homework 2 1)The MAC sublayer is only used in broadcast or shared channel networks. (True or False) 2)IEEE 802.3 defines Token Ring protocols. (True or False) 3)LLC stands for __________________4)Discuss the differences between the 3 access protocols (Fixed Assignment, Demand Assignment, and Contention Access) under the MAC sublayer. 5)Discuss the functionalities of the 3 demand assignment protocols: Polling, Reservation Scheme, and Token passing scheme. 6)Discuss how the TDMA protocol works. Create an example transmission sequence and explain how TDMA would allocate the channel for each transmission. 7)Discuss how Bit-map protocol and binary countdown protocol work. Create an example transmission sequence and explain how the two protocols work. How does the permuting addresses scheme modify the bit map protocol? Perform the bit-map protocol example again with permuting addresses. 8)Which of the following are correct for contention access protocols? a)long delay for bursty traffic b)cannot support priority traffic c)not good for continuous traffic (e.g., voice) d)low channel efficiency with a large number of hosts 9)Given the time for packet transmission, mark the vulnerable period for ALOHA and slotted ALOHA, give your reasons.
has intentionally blurred sections.
Sign up to view the full version.