Mac protocol
Across
- 2. In this method, the stations in a network are organized in a logical ring.
- 5. The vulnerable time for__is the propagation time Tp.
- 7. cdma uses __ bandwidth
- 9. when station needs to make a reservation before sending data then it is called __ method.
- 12. stations abort their transmissions as soon as they detect a__ in CSMA
- 14. In __ each station is allocated a time slot during which it can send data.
- 15. In __ methods,the stations consult one another to find which station has the right to send
- 17. is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations.
Down
- 1. In __ each station is forced to send only at the beginning of the time slot
- 3. In __ method all data exchanges must be made through the primary device even when the ultimate destination is a secondary device
- 4. in slottedaloha the vulnerable time is the __ as the frame transmission time
- 6. categoriesof multiple – access protocol are divided .
- 8. In pure Aloha the vulnerable time is,__the frame transmission time.
- 9. the protocol that is used to transmit data without any schedule time
- 10. In code division multiple access, the orthogonal sequence is unique for each
- 11. The original ALOHA Protocol is called
- 13. the available bandwidth is divided into frequency bands.
- 16. In polling method, the secondary stations follow its instructions and the primary stations controls the