A media access protocol for wireless lan

Assignment Help Basic Computer Science
Reference no: EM13852824

The required readings for this homework are lectures 3 and 4 and the following papers:

a) "MACAW: A Media Access Protocol for Wireless LAN's"

,b) 802.11 standard, which are available at the courseweb. You are encouraged to look formore sources online, which you need to cite.

Multiple-choice questions (choose one answer) 

1. The DCF mode in the IEEE 802.11 standard solves the following issues for thewireless channel access:

a. Hidden sender problems

b. Both hidden sender and exposed sender problems

c. Both hidden receiver and exposed receiver problems

d. All 4 problems: hidden/exposed, senders/receiverse. None of the above

 

2. The DS frame discussed in MACAW paper tries to address:

a. Exposed sender

b. Hidden sender

c. Exposed sender and hidden receiver

d. Hidden receiver

e. None of the above

3. Which of the following statements regarding fair channel access is true forMACAW and IEEE 802.11?

a. MILD is able to achieve absolute fairness

b. MACAW always provides best fairness

c. IEEE 802.11 DCF mode always provides best fairness

d. IEEE 802.11 PCF mode always provides best fairnesse. BEB favors stations that successfully contend for the channel mostrecently

Discussion questions (70pt)

1. MACAW always provides the best fairness? If not, what are the cases that it maybe unfair. Provide an example. (20pt)

2. Although RTS/CTS may prevent hidden terminal collisions, it is often disabled in802.11 commercial devices. What can be the reason for that? (10pt)

3. If you are asked to support time-critical applications in the IEEE 802.11 standard,which mode would you choose, the PCF or the DCF mode? Briefly justify youranswer. (10pt)

4. MACA introduces the idea of RTS/CTS to address hidden terminals. In whatscenario RTS/CTS cannot prevent collisions? (10pt)

5. 802.11 devices transmit an acknowledgment frame ACK after the reception of aDATA frame. What is the goal of the ACK frame? How does this design choiceconflict with the end-to-end argument discussed in the paper "End-To-EndArguments in System Design"? (20pt)

Reference no: EM13852824

Questions Cloud

Cash method of accounting : Dave has been practicing for four years, and he uses the cash method of accounting. During the current year, Dave recorded the following items of income:
Specific factors model : Consider a country that produces shirts and autos. Shirts are produced with sewing machines (specific factor) and labor while autos are produced using robots (specific factor) and labor. Show how going to international trade affects the budget constr..
What are the sunk costs : The incremental costs are purchase price ($3,000) and cash operating costs ($500). Here is a question for you based on the information in the table. What are the sunk costs, if any, in this situation?
Capitalist system relies on theoretical model : The U.S. capitalist system relies on a theoretical model, the circular flow model, with three basic elements interacting together to ensure that our needs and wants are provided. The three sectors are (a) consumer, (b) business, and (c) government.
A media access protocol for wireless lan : The required readings for this homework are lectures 3 and 4 and the following papers: a) "MACAW: A Media Access Protocol for Wireless LAN's" ,b) 802.11 standard, which are available at the courseweb. You are encouraged to look formore sources onli..
For the cobb-douglas production function : For the Cobb-Douglas production function in Problem 6.7, in can be shown (using calculus) that. If the Cobb-Douglas exhibits constant returns to scale (a+b=1), show that Both marginal productivities are diminishing.
Prove that s has infinite cardinality : 1. Suppose that S is the set of all strings of one or more a's and b's. For example, S contains the strings "a", "b", "aa",  "ab", "ba", "bb",  "aaa",  "aab"  ..., etc.
Draw an extensive form for this game : Consider the following sequential ZSG. First, nature chooses heads or tails, each with probability one-half. Player 1 then sees nature’s choice, and chooses heads or tails. If player 2’s choice matches nature’s choice, player 2 wins a dollar from pla..
Journalizing adjusting entries and analyzing : Problem 1: (Journalizing adjusting entries and analyzing their effects on net income, comparing accrual and cash basis) An accountant made the following adjustment at December 31, the end of the accounting period:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify tactical

Conduct research to find examples of the differences between I.T. security controls and countermeasure gap analysis, and identify tactical, strategic, risk mitigation, threats, and vulnerability dimensions and gaps associated with compliance recom..

  Explain how data and information can be categorised

What is meant by data? What is meant by information? How can data information be categorised? Where from? Used for?

  How do block-level tags and inline tags relate

How do block-level tags and inline tags relate to each other- Give an example of each type of tag and given that the following style was contained in an external style sheet

  Write a python function celcius fahrenheit

Write a python function celcius_fahrenheit wich takes temperature values from a list and changes them into fahrenheit values.

  Internal e-mail getting hacked from the outside

Great Widgets is having a problem with the e-mail server it uses for internal e-mail getting hacked from the outside. One of its network folks has suggested an intranet, but the CEO, T. J. Alexander, is not up to speed about how an intranet wor..

  System development methodologies in information systems

There are literally thousands of system development methodologies in the Information Systems field. Suggest some reasons why there might be so many.

  An ideal embedded operating system

In an ideal embedded operating system, would all non-kernel threads always execute at lower priority than interrupts? Why?

  Discussing own experiences or those of folks

Read below info then write a short paper discussing your own experiences or those of folks you know in this environment, and how you/they have coped with the potentially conflicting ethical dimensions of these and related issues

  Explain main resources in management information systems

The three main resources in management information systems (MIS) are information, information technology, and people. Which of these three resources is the most significant?

  How and why would ejecta affect short term climate

Many things can happen when a large NEO strikes earth. Consider only ejecta for a moment. How and why would ejecta affect short term climate?

  Discuss the role of the project manager or team

Summarize how the project manager or team exhibited exceptional and ethical project management practices. 2.Discuss the role of the project manager or team

  Explain description design analyses

Description Design Analyses (perhaps include sub-categories for each process) Description of Units being Designed What do they remove? Explain how do they operate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd