Preview

Cs 2204 Unit 3

Good Essays
Open Document
Open Document
804 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cs 2204 Unit 3
Running head: CS 2204: COMMUNICATIONS AND NETWORKING WRITTEN ASSIGNMENT UNIT 3

CS 2204: Communication and Networking 1

University of the People Term 2 (2016-2017) November 29/2016

Answer the following questions in your own words, in no more than 4 sentences each.
1. Discuss the case when the load is low or high in a Bit Map Protocol What will be the waiting slot for a low-numbered station and high numbered station? According to Nabavi, M. (2015), “in our first collision-free protocol, the basic bitmap method,
…show more content…
We have now considered two basic strategies for channel acquisition in a cable network: contention, as in CSMA, and collision –free methods. Each strategy can be rated as to how well it does with respect to the two important performance res, delay at low load measures, delay at low load and channel efficiency at high load .
What 3 properties/features are added to MACAW which was not there in MACA?
The authors base MACAW off of the MACA protocol”, which uses an RTS-CTS exchange before sending the actual data packet to avoid collisions. To this, MACAW adds numerous additional features (Yong,
…show more content…
2, each station has a queue for each stream, to which the backoff algorithm (MILD) is applied independently.
3, MACAW also extends the RTS-CTS-DATA exchange in MACAW to RTS-CTS-DS-DATA-ACK, which successfully increases throughout and fairness in various cell configurations (Yong, 2010).
3. What is Time Domain reflectometry?
Time – domain reflectometry or TDR is a measurement technique used to determine the characteristics of electrical lines by observing reflected waveforms Time-domain transmissometer (TDT) is an analogous technique that measures the transmitted (rather than reflected) impulse. Together, they provide a powerful means of analyzing electrical or optical transmission media such as coaxial cable and optical fiber ("Time-domain reflectometry", 2016).

Reference Nabavi, M. (2015). Computer Networks 4ed.. Docs.com. Retrieved 29 November 2016, from https://docs.com/nabavi/4230/computer-networks-4ed
Yong, J. (2010). Advanced Topics in Networking. Advanced Topics in Networking. Retrieved 29 November 2016, from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) is the process used by non-switched Ethernet to detect a clear channel between devices helping to decrease the chance of data “colliding” during transmission. Utilizing MAC protocol, a devise will “listen” for other traffic between connected devises. If no traffic is detected, the device will pause (an added security against devices sending at the same time) and then send the data in the form of MAC protocol frames.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    For each set of application performance requirements shown in Figure 3.33, classify the network as single-tier or multi-tier performance. Please explain your choice for each.…

    • 785 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    802.3: the name of the original IEEE Ethernet standard, as well as the overall base name of all IEEE Ethernet LAN working committees…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Media access management module main CSMA / CD (carrier sense multiple access with collision detection) protocol. CSMA / CD is a distributed MAC protocol that enables multiple network stations (nodes) can be shared transmission medium. Sending data when the frame, the first node listens for a carrier, when the medium is idle starts when the transmission frame, if in conflict with other nodes in the transmission process, each node must be given is a 32-bit transmission blocking signals to enhance the size of the conflict, in order to inform the bus conflict has occurred on each site, and then re-random delay period contention medium, and then resend the data frame.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    A cellular network or mobile network is a wireless network distributed over land areas called cells, each served by at least one fixed-location transceivers known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth with each cell.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    of nodes with channels assigned. In this paper, our goal is to design highly-efficient and localized protocols for CA. In addition, we want to maximize node connectivity after CA, which is important for packet…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    LYT2 Task 2

    • 2054 Words
    • 8 Pages

    T carriers, e.g., T1 and T3, are digital, leased twisted-pair lines, designed to carry voice…

    • 2054 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    IST 220

    • 369 Words
    • 2 Pages

    6: Describe the RTS/CTS protocol and when does it make sense to use? (7 pts)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    NT1210: Introduction to Networking_V1.0 > Week 1 > Submit Short Answer Assessment > Short Answer…

    • 544 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    8. If you want to design an Application-layer protocol that provides fast, efficient communication and doesn’t work with large amounts of data, what Transport-layer protocol would you design it to use?…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Research Paper On Asthma

    • 435 Words
    • 2 Pages

    Complete the following questions in your own words and in sentence form unless otherwise directed.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mobile And Wireless

    • 455 Words
    • 1 Page

    The foundation of any network is some sort of pathway for digital data (bits) to move back and forth between connected agents. Cables, ranging from coaxial to optical, have long dominated this realm. However, wireless is increasingly emerging as a viable alternative to direct physical connection (Stanford University, 2003). Wireless includes many various mediums such as AM, FM, HD and SiriusXM radio. Broadcast and satellite TV, and most, if not all, internet access and cellphones, are now wireless.…

    • 455 Words
    • 1 Page
    Satisfactory Essays

Related Topics