Hidden Station Case Study Essay

Decent Essays
Answer the following questions in your own words , in no more than 4 sentences each.

QUES- Discuss the case when the load is low or high in a Bit Map Protocol. What will be the wait slot for a low numbered station and high numbered station?

ANS - Under conditions of low load, the bit map will simply be repeated over and over, for lack of data frames.

Low Numbered Stations - when it becomes ready to send, the 'current' slot will be somewhere in the middle of the bit map.
On Average, the station will have to wait N/2 slots for the current scan to finish and another full N slot for the following scan run to completion before it may begin transmitting. Therefore, on an average they have to wait for 1.5N slots.

High Numbered Stations - They
…show more content…
ANS - As the load increases, overhead increases. Where as in Collision free protocols, as the load increases their overhead decreases.
Under conditions of light load, contention protocols are preferable due to its less delay. As the load increases, overhead increases.

QUES - What do you understand by The Hidden Station Problem and The Exposed Station Problem?

ANS - Hidden Station Problem: The problem of a station not being able to detect a potential competitor for the medium because the competitor is too far away is called the hidden station problem. Quote an example

The Exposed Station Problem: The exposed node problem occurs when a node is prevented from sending packets to other nodes due to a neighbouring transmitter. Quote an example.

QUES - What 3 properties/features are added to MACAW which were not there in MACA?
ANS -
1. Since without DLL acknowledgements, the lost frames were not retransmitted until the transport layer noticed their absence later. Therefore, Acknowledgement (ACK) frame introduced.

2. CSMA was added to keep a station transmitting an RTS at the same time another station is also doing so to the

Related Documents

  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 1339 Words
    • 6 Pages

    The time base was varied, to provide a convenient balance between range and resolution in the frequency…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However, it was soon realized that the 60 GHz standard is not likely to be an evolutionary move and, therefore, a parallel standardization effort in the 5 GHz band was started to address this intention. As a result, two 802.11 standards , known as 802.11ac and 802.11ad, that address physical layer upgrades exist. However, 802.11ac & 802.11ad is now accepted as the evolutionary upgrade from 802.11n. 3.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Therefore, at the completion of the disk transfer DMA generates an interrupt signal it is interrupting the CPU and informing it that the operation has been completed and returning the status of the operation. The interrupt signal interrupts the CPU from what it is doing and forces the CPU to take the required action. Then, set up the next request once the disk transfer is completed. b.…

    • 568 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 5 Essay

    • 596 Words
    • 3 Pages

    5.10 A user level program can disable the timer interrupt and prevent context switching from taking place if it is given the ability to disable interrupts. This also allows it to use the processor without letting other processes execute. 5.11 It depends on how interrupts are implemented, but regardless, it is not a good choice of techniques.…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In Case Study Part 1 it was explained that in the case study, Jack and the Mountain People, Jack has come to a crossroad in his life and has a major problem in which he now needs to come up with possible solutions. In Case Study Part 1, a mission statement was identified and the problem definition technique and problem identification were explored in order to determine what the main problem is, as well as what other subsidiary problems are present. The mission of this case study is as follows: Jack needs to create a long, prosperous, and happy life with Jill by providing a stable income for his family. Problem Identification and Statement…

    • 1216 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Finally, the potential issues or risks while using the mobile wireless will be discussed. 1. the technical details of FDMA, TDMA and CDMA (1) FDMA Frequency Division Multiple Access (FDMA) bandwidth is divided into narrow frequency slots and is use to allocate a unique frequency band or channel that a user is free to transmit or receive all the time over the shared…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The application layer contains programs or processers that use transport layer protocols so that it delivers the data to the destination of the computers. The application layer has many protocols that programs use to communicate with the second layer which is called Transport layer. Some of the application layer protocols are: Simple mail transfer protocol (SMTP), File transfer protocol (FTP), Hypertext transfer protocol (HTTP) and Simple network management protocol (SNMP). Transport layer The second layer of TCP/IP protocol suite is the transport layer.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 3 Network Analysis

    • 1515 Words
    • 7 Pages

    Networking P1: DESCRIBE THE TYPES OF NETWORKS AVAILABLE AND HOW THEY RELATE TO PARTICULAR NETWORK STANDARDS AND PROTOCOLS There are many types of wireless networks available. This includes: WAN, LAN, MAN, PAN, WLAN. Below, I will go into detail about each type that will help you understand exactly what each type of network is and what it consists of.…

    • 1515 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Part I - Finding five more sources that relate to your teaching unit. A-Describe each in a few sentences to a paragraph--what is the main information in the source? How is this useful to your unit? 1.…

    • 1509 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Timely updation improves the quality of network services, without incurring extra…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Porter’s Five Forces Model of Competition The five forces analysis addresses industry factors affecting competition within the areas of rivalry, barriers to entry, bargaining powers of suppliers and buyers, and the threat of substitutes. For SiriusXM to remain competitive within the radio broadcast industry, they must carefully monitor and address each of these forces. Rivalry Intensity – (Strong). Rivalry within the radio broadcast industry is a strong force, as many options are available to consumers.…

    • 981 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The second type is small group communication which occurs between small group of people who can see and talk to each other. The third form is mass media communication which occurs between the speaker and a large number of unknown audiences in which there can be a little or no interaction. Finally, public speaking is the process of delivering a speech with a specific purpose to an audience (Ibid, 2010:5). In this process, the speaker creates, organizes, and produces the message, encoding, to the audience. The latter receives the message and translates it through the decoding process based on their experiences and attitudes.…

    • 956 Words
    • 4 Pages
    Improved Essays