Escolar Documentos
Profissional Documentos
Cultura Documentos
Networks
1) Consider the single-sender CDMA example in Figure 6.5 of the textbook. What would
be the senders output (for the 2 data bits shown) if the senders CDMA code were (1, -1,
1, -1, 1, -1, 1, -1)?
Answer:
Output corresponding to bit d1 = [-1,1,-1,1,-1,1,-1,1]
Output corresponding to bit d0 = [1,-1,1,-1,1,-1,1,-1]
2) Consider sender 2 in Figure 6.6 of the textbook. What is the senders output to the
channel before it is added to the signal from sender 1, Z2i,m?
Answer:
Sender 2 output = [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]
3) Suppose that the receiver in Figure 6.6 of the textbook wanted to receive the data
being sent by sender 2. Show that the receiver is indeed able to recover sender 2s data
from the aggregate channel signal by using sender 2s code.
Answer:
d21 = (-2) x (-1) + 2x1 + 2x1 + 2x1 / 8 = 1
d22 = 2x1 + 2x1 + 2x1 + (-2)x(-1) / 8 = 1
4) Why are acknowledgements used in 802.11 but not used in wired Ethernet?
Answer: In wireless channels bit error rates are high and collision detection cannot be
effectively done.
5) Describe the role of the beacon frames in 802.11.
Answer: Beacon frame is one of the management frames in IEEE 802.11 based WLANs.
It contains all the information about the network. Beacon frames are transmitted
periodically to announce the presence of a Wireless LAN network. Beacon frames are
transmitted by the Access Point (AP) in an infrastructure BSS. The beacon frame
contains a number of important fields:
Timestamp: this allows all devices connected to the AP to synchronize with the
AP.
6) Suppose the correspondent in Figure 6.22 of the textbook were mobile. Sketch the
additional network-layer infrastructure that would be needed to route the datagram from
the original mobile user to the (now mobile) correspondent. Show the structure of the
datagram(s) between the original mobile user and the (now mobile) correspondent, as in
Figure 6.23.
Answer:
If the correspondent is mobile, then any datagrams destined to the correspondent would
have to pass through the correspondents home agent. The foreign agent in the
network being visited would also need to be involved, since it is this foreign agent that
notifies the correspondents home agent of the location of the correspondent. Datagrams
received by the correspondents home agent would need to be encapsulated/tunneled
between the correspondents home agent and foreign agent, (as in the case of the
encapsulated diagram at the top of Figure 6.23.
See figure on next page