Networks Homework # 2

Similar documents
Ethernet. Introduction. CSE 3213 Fall 2011

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Data Link Layer, Part 3 Medium Access Control. Preface

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Contention Protocols and Networks

Data and Computer Communications

Data and Computer Communications. Chapter 11 Local Area Network

b. Suppose the two packets are to be forwarded to two different output ports. Is it

Lecture 05 Chapter 16 High Speed LANs

Chapter 5 OSI Network Layer

COS 140: Foundations of Computer Science

Data Link Layer, Part 5. Medium Access Control

Position of IP and other network-layer protocols in TCP/IP protocol suite

Protocols for Multiaccess Networks

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Networking Technologies and Applications

Internetwork Protocols

The Medium Access Control Sublayer

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

CSMA/CD (Collision Detection)

ET4254 Communications and Networking 1

EE 122: Ethernet and

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Network Layer/IP Protocols

Multiple Access Protocols

The Internet. The Internet is an interconnected collection of netw orks.

LAN PROTOCOLS. Beulah A AP/CSE

EE-379 Embedded Systems and Applications Introduction to Ethernet

COS 140: Foundations of Computer Science

===================================================================== Exercises =====================================================================

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

Computer network questions for final exam preparation 21/08/2017

Computer Networks (Unit wise Questions)

COMP 361 Computer Communications Networks. Spring Semester Final Examination Solution Key

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College


Chapter 12 Multiple Access 12.1

Link Layer and Ethernet

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

Data Link Layer -2- Network Access

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Principles behind data link layer services

Unit 7 Media Access Control (MAC)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

ELC 537 Communication Networks

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Data Link Layer -2- Network Access

UNIVERSITY QUESTIONS

Random Assignment Protocols

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Link Layer and Ethernet

The Link Layer and LANs

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CCNA Exploration1 Chapter 7: OSI Data Link Layer

1: Review Of Semester Provide an overview of encapsulation.

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Introduction to Internetworking

Outline: Connecting Many Computers

CSCI 466 Midterm Networks Fall 2011

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

The Link Layer II: Ethernet

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

EE 610 Part 2: Encapsulation and network utilities

Chapter 4: The Medium Access Layer

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

Introduction to Protocols

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

ECE 461 Internetworking Fall Quiz 1

FINAL May 21, minutes

Indian Institute of Technology, Kharagpur

Code No: RR Set No. 1

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 4450:427/527 - Computer Networks Spring 2017

SEN366 (SEN374) (Introduction to) Computer Networks

ECE/CSC 570 Section 001. Final test. December 11, 2006

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

CSCI 466 Midterm Networks Fall 2011

ECE 158A: Lecture 7. Fall 2015

Lecture 6: Example LAN: Ethernet

Transcription:

ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Homework # 2 INSTRUCTIONS: 1. Show your work (i.e., how you derived your answer or the reason behind your thinking) in addition to your answer. 2. Copied Solutions = ZERO 3 homework must be printed and solved on the same paper. 4. Deadline : Wednesday, 11/4/2012 STUDENT NAME : ID # : MARK / 30

1. Write TRUE/FALSE for the following statements : 1- ( ) A variety of signal encoding techniques are used in the various LAN standards to achieve efficiency and to make the high data rates practical. 2- ( ) An algorithm is needed with CSMA to specify what a station should do if the medium is found busy. 3- ( ) The p-persistent algorithm with binary exponential backoff is efficient over a wide range of loads. 4- ( ) Ethernet has both a medium access control layer and a physical layer. 5- ( ) With full-duplex operation a station can transmit and receive simultaneously. 6- ( ) Flow control is a key function that is typically performed by a protocol. 7- ( ) Data are transmitted over an internet in packets from a source system to a destination across a path involving a single network and routers. 8- ( ) IP does not guarantee that all data will be delivered or that the data that are delivered will arrive in the proper order. 9- ( ) In IPv6 fragmentation may only be performed by routers along a packet's delivery path. 10- ( ) A static table is more flexible than a dynamic table in responding to both error and congestion conditions. 2. Choose the correct answer: 1- A technique known as slotted organizes time on the channel into uniform slots whose size equals the frame transmission time. Transmission is permitted to begin only at a slot boundary. a) Ethernet b) ALOHA c) boundary relay d) CSMA 2- Ethernet now encompasses data rates of. a) 100 Mpbs, 1 Gbps, 10 Gbps, and 100 Gbps b) 10 Mbps, 100 Mpbs, 1 Gbps, and 10 Gbps c) 1 Gpbs, 10 Gbps, 100 Gbps, and 1000 Gbp d) 10 Mbps, 100 Mbps, 1000 Mbps, and 10 Gbps 3- A problem with is that capacity is wasted because the medium will generally remain idle following the end of a transmission, even if there are one or more stations waiting to transmit. a) 1-persistent CSMA b) slotted ALOHA c) p-persistent CSMA d) nonpersistent CSMA 2

4- One of the rules for CSMA/CD states, "after transmitting the jamming signal, wait a random amount of time, then attempt to transmit again". This random amount of time is referred to as the. a) Precursor b) Backoff c) Backlog d) carrier time 5- Which of the following makes use of two optical fiber cables, one for transmission and one for reception, and utilizes a techniques known as intensity modulation. a) 100BASE-T4 b) 10BASE-F c) 100BASE-FX d) 10BASE-T 6- IP attaches a header to upper layer data to form an IP. a) Datagram b) Layer c) Packet d) subnet 7- A next generation IP, known as, provides longer address fields and more functionality than the current IP. a) IPv3 b) IPv4 c) IPv5 d) IPv6 8- For virtually all protocols data are transferred in blocks called. a) Datagrams b) PDUs c) Segments d) NSAPs 9- Which of the following is NOT an enhancement of IPv6 over IPv4? a) improved error recovery b) expanded address space c) address autoconfiguration d) support for resource allocation 10- The principal feature of is that it can encrypt and/or authenticate all traffic at the IP level. a) IAB b) VPN c) IPSec d) TCP,UDP 3

3. Answer the following Questions: a) Suppose that host A is connected to a router R1, R1 is connected to another router, R2, and R 2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and 20 bytes of TCP header is passed to the IP code at host A for delivery to B. Show the Total length, Identification, Don't Fragment Flag, More Flag, and Fragment offset fields of the IP header in each packet transmitted over the three links. Assume that: link A-R1 can support a maximum frame size of 1024 bytes including a 14-byte frame header, link R1-R2 can support a maximum frame size of 512 bytes, including an 8-byte frame header link R2-B can support a maximum frame size of 512 bytes including a 12-byte frame header. 4

b) When given an IP Address, Base Network Mask, and a Subnet Mask, how can you determine other information, Complete the following table: 5

6