EEE521 Computer and Data Communication Networks

advertisement
EEE521 Computer and Data Communication Networks
Semester 2 2011/2012
Preparatory questions for CSMA/CA and WLANs
These questions facilitate the study of random access methods in wireless computer networks.
Students should read the text book, Chapter 12.1 CSMA/CA part and Chapter14 Wireless LAN (14.1
only). It is recommended for students to complement their study with other supplementary reading
resources. Students are advised to attempt as many questions as they can before the lecture and
complete the answers during and after the lecture. It is not compulsory to hand in the answers to these
questions but the option is always available.
1. Why is the design of random contention access for the wireless network different from that for the
wired network?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
2. Figure 1 below shows 3 labtops A, B and C in a wireless local area network. The transmission
ranges for A and B are given by the lined ovals.
Figure 1
Laptop A is sending data to Laptop B. During the transmission, laptop C also has a data to be sent
to laptop B. Anticipate the problem that can arise in this situation and identify the reason.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
1
3. According to CSMA/CA, what actions must be taken by station A, B and C to avoid this
problem?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
4. Figure 2 below shows 4 laptops in a wireless local area network. The transmission ranges of A, B,
C and D are given by the lined ovals.
Figure 2
B is transmitting to A. Meanwhile, C also has to send data to D. Anticipate the problem that can
occur in this situation.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
2
5. What must C do to avoid the potential problem?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
6. What are the three strategies used by CSMA/CA to regulate medium access in wireless network?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
7. What actions must be taken by the wireless stations prior to sending their request to send (RTS) to
its intended destination in an adhoc wireless LAN? Explain the importance of every action taken.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
8. What actions must be taken by the wireless station when they are alerted by a RTS from a source?
Explain the importance of every action taken.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
3
______________________________________________________________________________
______________________________________________________________________________
9. What action must be taken by the sending wireless station after it has successfully received the
CTS from the destination? Explain the importance of the action.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
10. How do wireless stations know that they have gained the right to use the channel for sending
data? What action must be taken by the wireless station if they are told that another station has
gained the right to access the medium?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
11. Based on the operation of the CSMA/CA, completes the timing diagram in Figure 3 below with
the appropriate frames and waiting times.
Figure 3
4
12. What layers are covered by the IEEE specifications for 802.11?
______________________________________________________________________________
13. Describe the two kinds of network architectures defined in IEEE 802.11.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
14. What is the difference between an ad hoc architecture and infrastructure architecture in the Basic
Service Set?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
15. What are the two MAC sublayers defined by IEEE 802.11?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
16. Briefly explain how the medium access is coordinated using the PCF in the IEEE 802.11 based
network?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
5
17. Briefly explain how the PCF access method ensures that polled station which has time-critical
information gained higher priority than stations without critical data.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
18. Briefly explain how the Access Point, Polled Stations and Contention Stations coordinated their
access to ensure that both contention and contention-free traffic are delivered in the wireless
LAN?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
19. What is the importance of the MAC layer data fragmentation in wireless network?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
6
Download