Ingeniería informatica Redes Tema 12
1 In the _______ random-access method collision is avoided.
2 In the 1-persistent approach, when a station finds an idle line, it _______.
3 _______ requires one primary station and one or more secondary stations.
4 In the p-persistent approach, when a station finds an idle line, it _______.
5 The 1-persistent approach can be considered a special case of the p-persistent approach with p equal to _______.
6 In the reservation access method, if there are 10 stations on a network, then there are _______ reservation minislots in the reservation frame.
7 _______ is a controlled-access protocol.
8 _______ is (are) a channelization protocol.
9 In the _______ random-access method, stations do not sense the medium.
10 Which of the following is an example of a random-access protocol?
11 Which of the following is an example of a controlled-access protocol?
12 The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.
13 The vulnerable time for CSMA is ___________.
14 We need RTS and CTS packets in ____________ protocol.
15 In FDMA, we use different ___________ to achieve channelization.
16 In CDMA, we use different ___________ to achieve channelization.
17 In TDMA, we use different ___________ to achieve channelization.
18 Walsh tables are used in _________________.
Tómese unos minutos en revisar sus respuestas antes de hacerlas definitivas.