Which of the following statements are true about MAC protocols? A. Medium Access Control protocols determine the sequence in which end hosts get to send packets over a shared medium, such as a radio channel or shared cable. B. ALOHA is a simple, deterministic access protocol in which each end host with data to send transmits in strict round robin order. C. In an ALOHA network, the end hosts can spend a large fraction of their time sending packets that will collide with others.
Which of the following statements are true about MAC protocols? A. Medium Access Control protocols determine the sequence in which end hosts get to send packets over a shared medium, such as a radio channel or shared cable. B. ALOHA is a simple, deterministic access protocol in which each end host with data to send transmits in strict round robin order. C. In an ALOHA network, the end hosts can spend a large fraction of their time sending packets that will collide with others.
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
![Which of the following statements are true about
MAC protocols?
A. Medium Access Control protocols determine the
sequence in which end hosts get to send packets over a
shared medium, such as a radio channel or shared cable.
B. ALOHA is a simple, deterministic access protocol in
which each end host with data to send transmits in strict
round robin order.
C. In an ALOHA network, the end hosts can spend a large
fraction of their time sending packets that will collide
with others.
D. Random access protocols are generally more
complicated and less reliable than deterministic access
protocols.
You are considering two retransmission strategies for
all hosts in a network using the ALOHA protocol. The first is
a deterministic strategy where the first time a collision is
detected, the sender waits one second and retransmits. The
second time a collision is detected, the sender waits two
seconds and retransmits, and so on. The second strategy is a
random strategy where when a collision is detected, the sender
waits a random amount of time and retransmits. After the first
collision it randomly chooses between waiting 0 or 1 seconds;
after the second collision it randomly waits between 0 and 2
seconds, and so on.
A. The deterministic strategy will perform better under
low-load
B. The random strategy will perform better under high-
load
C. The deterministic strategy will not recover from
collisions
D. The average expected delay for these strategies is the
same](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fdcbbd1a9-d252-4439-a5e5-8136ff41f888%2F36eedf10-8dfa-4930-81c8-582a2441b64d%2F5jkk7f5_processed.jpeg&w=3840&q=75)
Transcribed Image Text:Which of the following statements are true about
MAC protocols?
A. Medium Access Control protocols determine the
sequence in which end hosts get to send packets over a
shared medium, such as a radio channel or shared cable.
B. ALOHA is a simple, deterministic access protocol in
which each end host with data to send transmits in strict
round robin order.
C. In an ALOHA network, the end hosts can spend a large
fraction of their time sending packets that will collide
with others.
D. Random access protocols are generally more
complicated and less reliable than deterministic access
protocols.
You are considering two retransmission strategies for
all hosts in a network using the ALOHA protocol. The first is
a deterministic strategy where the first time a collision is
detected, the sender waits one second and retransmits. The
second time a collision is detected, the sender waits two
seconds and retransmits, and so on. The second strategy is a
random strategy where when a collision is detected, the sender
waits a random amount of time and retransmits. After the first
collision it randomly chooses between waiting 0 or 1 seconds;
after the second collision it randomly waits between 0 and 2
seconds, and so on.
A. The deterministic strategy will perform better under
low-load
B. The random strategy will perform better under high-
load
C. The deterministic strategy will not recover from
collisions
D. The average expected delay for these strategies is the
same
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Recommended textbooks for you
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
![Concepts of Database Management](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
![Prelude to Programming](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
![Sc Business Data Communications and Networking, T…](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY