Code Division Multiple Access (CDMA) differs from Time Division Multiple Access (TDMA) because there is no _______________-
Code Division Multiple Access (CDMA) differs from Time Division Multiple Access (TDMA) because there is no _______________-
The corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of the______________
The corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of the______________
A collision of the frames could be the result when a station sends a frame and at the same time any other station tries to send a __________
A collision of the frames could be the result when a station sends a frame and at the same time any other station tries to send a __________
In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process we use a___________
In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process we use a___________
When we multiply two different sequences of the chips sequences and add the results, we get _____________
When we multiply two different sequences of the chips sequences and add the results, we get _____________
The time-out period is equal to the maximum possible propagation delay of__________
The time-out period is equal to the maximum possible propagation delay of__________
The frame transmission time in Pure ALOHA is _____________
The frame transmission time in Pure ALOHA is _____________
A station of Carrier Sense Multiple Access/Collision Detection (CSMA/CD) that has a frame to send needs to monitor the____________
A station of Carrier Sense Multiple Access/Collision Detection (CSMA/CD) that has a frame to send needs to monitor the____________
In token passing method, the station can send data when it receives the ____________
In token passing method, the station can send data when it receives the ____________
The original ALOHA protocol is called____________
The original ALOHA protocol is called____________
In Chip sequence, if we multiply a sequence by a number, every element in the sequence is multiplied by that element is called _______________
In Chip sequence, if we multiply a sequence by a number, every element in the sequence is multiplied by that element is called _______________
In Frequency Division Multiple Access, the bandwidth of each channel is shifted by the ______________
In Frequency Division Multiple Access, the bandwidth of each channel is shifted by the ______________
In star ring topology, the wiring inside the hub makes a ______________
In star ring topology, the wiring inside the hub makes a ______________
The number of sequences in a Walsh table i.e. N=_____________
The number of sequences in a Walsh table i.e. N=_____________
The p-persistent method uses its back off procedure if the line is_____________
The p-persistent method uses its back off procedure if the line is_____________
The protocol that was developed at the University of Hawaii is___________
The protocol that was developed at the University of Hawaii is___________
In the logical ring, the successor is the station which is ______________
In the logical ring, the successor is the station which is ______________
In CSMA/CA, An amount of time divided into slots is known as ____________
In CSMA/CA, An amount of time divided into slots is known as ____________
In Frequency Division Multiple Access, the data link layer in each station tells its physical layer to make_____________
In Frequency Division Multiple Access, the data link layer in each station tells its physical layer to make_____________
Fiber Distributed Data Interface (FDDI) and Copper Distributed Data Interface (CDDI) uses ____________
Fiber Distributed Data Interface (FDDI) and Copper Distributed Data Interface (CDDI) uses ____________