A media access protocol for wireless lan

Assignment Help Basic Computer Science
Reference no: EM13852824

The required readings for this homework are lectures 3 and 4 and the following papers:

a) "MACAW: A Media Access Protocol for Wireless LAN's"

,b) 802.11 standard, which are available at the courseweb. You are encouraged to look formore sources online, which you need to cite.

Multiple-choice questions (choose one answer) 

1. The DCF mode in the IEEE 802.11 standard solves the following issues for thewireless channel access:

a. Hidden sender problems

b. Both hidden sender and exposed sender problems

c. Both hidden receiver and exposed receiver problems

d. All 4 problems: hidden/exposed, senders/receiverse. None of the above

 

2. The DS frame discussed in MACAW paper tries to address:

a. Exposed sender

b. Hidden sender

c. Exposed sender and hidden receiver

d. Hidden receiver

e. None of the above

3. Which of the following statements regarding fair channel access is true forMACAW and IEEE 802.11?

a. MILD is able to achieve absolute fairness

b. MACAW always provides best fairness

c. IEEE 802.11 DCF mode always provides best fairness

d. IEEE 802.11 PCF mode always provides best fairnesse. BEB favors stations that successfully contend for the channel mostrecently

Discussion questions (70pt)

1. MACAW always provides the best fairness? If not, what are the cases that it maybe unfair. Provide an example. (20pt)

2. Although RTS/CTS may prevent hidden terminal collisions, it is often disabled in802.11 commercial devices. What can be the reason for that? (10pt)

3. If you are asked to support time-critical applications in the IEEE 802.11 standard,which mode would you choose, the PCF or the DCF mode? Briefly justify youranswer. (10pt)

4. MACA introduces the idea of RTS/CTS to address hidden terminals. In whatscenario RTS/CTS cannot prevent collisions? (10pt)

5. 802.11 devices transmit an acknowledgment frame ACK after the reception of aDATA frame. What is the goal of the ACK frame? How does this design choiceconflict with the end-to-end argument discussed in the paper "End-To-EndArguments in System Design"? (20pt)

Reference no: EM13852824

Questions Cloud

Cash method of accounting : Dave has been practicing for four years, and he uses the cash method of accounting. During the current year, Dave recorded the following items of income:
Specific factors model : Consider a country that produces shirts and autos. Shirts are produced with sewing machines (specific factor) and labor while autos are produced using robots (specific factor) and labor. Show how going to international trade affects the budget constr..
What are the sunk costs : The incremental costs are purchase price ($3,000) and cash operating costs ($500). Here is a question for you based on the information in the table. What are the sunk costs, if any, in this situation?
Capitalist system relies on theoretical model : The U.S. capitalist system relies on a theoretical model, the circular flow model, with three basic elements interacting together to ensure that our needs and wants are provided. The three sectors are (a) consumer, (b) business, and (c) government.
A media access protocol for wireless lan : The required readings for this homework are lectures 3 and 4 and the following papers: a) "MACAW: A Media Access Protocol for Wireless LAN's" ,b) 802.11 standard, which are available at the courseweb. You are encouraged to look formore sources onli..
For the cobb-douglas production function : For the Cobb-Douglas production function in Problem 6.7, in can be shown (using calculus) that. If the Cobb-Douglas exhibits constant returns to scale (a+b=1), show that Both marginal productivities are diminishing.
Prove that s has infinite cardinality : 1. Suppose that S is the set of all strings of one or more a's and b's. For example, S contains the strings "a", "b", "aa",  "ab", "ba", "bb",  "aaa",  "aab"  ..., etc.
Draw an extensive form for this game : Consider the following sequential ZSG. First, nature chooses heads or tails, each with probability one-half. Player 1 then sees nature’s choice, and chooses heads or tails. If player 2’s choice matches nature’s choice, player 2 wins a dollar from pla..
Journalizing adjusting entries and analyzing : Problem 1: (Journalizing adjusting entries and analyzing their effects on net income, comparing accrual and cash basis) An accountant made the following adjustment at December 31, the end of the accounting period:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare the benefits of the virtualization computing tech

Compare the benefits of the virtualization computing technology with past successful or unsuccessful telecommunications technologies you have in place. With four references.

  Takes a btree as it''s argument

Write a function that takes a btree as it's argument and returns a pair consisting of the left and right subtrees. Define an exception for the erroneous case where the tree is empty.

  Create a program that will calculate the daily pay

Using a loop, create a program that will calculate the daily pay and total pay assuming you get paid 1 penny the first day and then double every day after the first day. Display these numbers in a listbox. Use a inputbox to ask the user how many d..

  What is a predefined control event

What is a predefined control event? Discuss its usage in programming.

  Write guide for the organization

Write a 2-3 page report recommending style manual and/or technical/legal writing guide for the organization to use and describe the reasons for your recommendations.

  Principles and theory of security management

think of some intrusions - the disgruntled mailman flying onto the Capitol lawn on his gyrocopter and remember the couple who crashed a White House function a few years ago

  Degree of security in time-shared machine dedicated machine

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

  Explaining components of computing environment

According to Raggad's taxonomy of information security, a computing environment is made up of ?ve continuously interacting components namely; activities, people, data, technology and networks.

  What visual effects were you able to achieve

What visual effects were you able to achieve with the tools that you used in the activity?  Do you think these effects enabled you to improve the quality of the image?  Why or Why not?

  Determining minimum size of control bus

Determine the minimum size of the control bus?

  Distinguish between simple object access

Distinguish between Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL), and Universal Description, Discovery, and Integration (UDDI).

  Recognize interface metaphor to use for conceptual design

For conceptual design (architectural or high-level), recognize the interface metaphor to use, interaction type(s) to employ, and interface type(s) to follow. For each of these, make sure to describe why you select what you did.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd