You are on page 1of 2

DCCN

Name: Time Allocated: 10 Minutes

Quiz # 4 (BEE5DE); Quiz #5 (BEE5C)


Reg. number: Total marks: 10 (1 mark each)

Answer briefly (in the space provided)


1.

How does a 802.3 transmitter react to the sensing of a busy link when it wants to transmit? (1 mark) It simply waits for the link to get idle again.

2.

When does a 802.11 transmitter perform a backoff? (1 mark) It performs a backoff on sensing the link busy when it wants to transmit, on not receiving the acknowledgement and after successful transmission of a packet.

3.

Why is the SIFS value chosen to be smaller than DIFS? (1 marks) RTS/CTS/DATA/ACK exchange is considered an atomic operation and we do not want it to be interrupted; therefore, this exchange is separated by SIFS, other nodes have to wait longer

4.

Why is link-layer fragmentation used in the 802.11 standard? (1 mark)


To reduce the chances of collision or receiving a corrupted packet as the wireless medium is errorprone

5.

Why have we chosen the minimum frame size in 10BaseT Ethernet to be 64 bytes? (1 mark)
Since the transmitter can detect a collision if it transmits for at least this amount of time.

6.

What is promiscuous mode? (1 mark) In this mode, the node will receive and process all packets it receives even if it is not the destination node itself.

7.

Give two reasons collision detection is not a good choice for 802.11 MAC? (1 mark) Hidden node/ exposed node problem; Engineering reasons (expensive to build a full-duplex wireless transceiver).

8.

How does the RTS/CTS exchange solve the exposed node problem? (1 mark)

DCCN

Quiz # 4 (BEE5DE); Quiz #5 (BEE5C)

If an exposed node receives an RTS but not the corresponding CTS, then it can transmit since it is not in the range of the receiver specified in the RTS
9. Why arent there hidden nodes in wired 802.3 networks? (1 mark)

Since a transmission in 802.3 network can be heard by all nodes and the signal is not attenuated as much as it is in wireless networks.
10. How is the 802.11 MAC method different from the MACAW protocol? (1 mark)

It also involved physical carrier sensing which was not used in MACAW protocol

You might also like