Mac protocol

1234567891011121314151617
Across
  1. 2. In this method, the stations in a network are organized in a logical ring.
  2. 5. The vulnerable time for__is the propagation time Tp.
  3. 7. cdma uses __ bandwidth
  4. 9. when station needs to make a reservation before sending data then it is called __ method.
  5. 12. stations abort their transmissions as soon as they detect a__ in CSMA
  6. 14. In __ each station is allocated a time slot during which it can send data.
  7. 15. In __ methods,the stations consult one another to find which station has the right to send
  8. 17. is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations.
Down
  1. 1. In __ each station is forced to send only at the beginning of the time slot
  2. 3. In __ method all data exchanges must be made through the primary device even when the ultimate destination is a secondary device
  3. 4. in slottedaloha the vulnerable time is the __ as the frame transmission time
  4. 6. categoriesof multiple – access protocol are divided .
  5. 8. In pure Aloha the vulnerable time is,__the frame transmission time.
  6. 9. the protocol that is used to transmit data without any schedule time
  7. 10. In code division multiple access, the orthogonal sequence is unique for each
  8. 11. The original ALOHA Protocol is called
  9. 13. the available bandwidth is divided into frequency bands.
  10. 16. In polling method, the secondary stations follow its instructions and the primary stations controls the