New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
computer networking
Data Communications and Networking 5th edition Behrouz A. Forouzan - Solutions
The minimum number of columns in a datagram network is two; the minimum number of columns in a virtual-circuit network is four. Can you explain the reason? Is the difference related to the type of addresses carried in the packets of each network?
Compare space-division and time-division switches.
Figure 8.27shows a switch (router) in a datagram network.Find the output port for packets with the following destination addresses:a. Packet 1: 7176b. Packet 2: 1233 Output Destination address port 1233 1456 3 1 3255 4470 7176 3 8766 3 9144 4)
What is TSI and what is its role in time-division switching?
Figure 8.28shows a switch in a virtual-circuit network.Find the output port and the output VCI for packets with the following input port and input VCI addresses:a. Packet 1: 3, 78b. Packet 2: 2, 92c. Packet 3: 4, 56d. Packet 4: 2, 71 Outgoing Incoming VCI VCI Port Port 3 4 14 71 92 58 78 56 22 2 41
Compare and contrast the two major categories of circuit switches.
List four major components of a packet switch and their functions.
It is obvious that a router or a switch needs to search to find information in the corresponding table. The searching in a routing table for a datagram network is based on the destination address; the searching in a switching table in a virtual-circuit network is based on the combination of
We need to have a space-division switch with 1000 inputs and outputs. What is the total number of crosspoints in each of the following cases?a. Using a single crossbar.b. Using a multi-stage switch based on the Clos criteria.
Compare the telephone network and the Internet. What are the similarities? What are the differences?
What is an internet? What is the Internet?
Categorize the four basic topologies in terms of line configuration.
For each of the following four networks, discuss the consequences if a connection fails.a. Five devices arranged in a mesh topologyb. Five devices arranged in a star topology (not counting the hub)c. Five devices arranged in a bus topologyd. Five devices arranged in a ring topology
What are the two types of line configuration?
What are the advantages of a multipoint connection over a point-to-point one?
A color image uses 16 bits to represent a pixel. What is the maximum number of different colors that can be represented?
What are the three criteria necessary for an effective and efficient network?
What is the maximum number of characters or symbols that can be represented by Unicode?
Identify the five components of a data communications system.
We have two computers connected by an Ethernet hub at home. Is this a LAN or a WAN? Explain the reason.
What is the difference between half-duplex and full-duplex transmission modes?
In the ring topology in Figure 1.7, what happens if one of the stations is unplugged?Figure 1.7 Repeater Repeater Repeater |Repeater Repeater Repeater
Name the four basic network topologies, and cite an advantage of each type.
In the bus topology in Figure 1.6, what happens if one of the stations is unplugged?Figure 1.6 Drop line Drop line Drop line Cable end Cable end Tap Tap Tap
For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology?
Performance is inversely related to delay. When we use the Internet, which of the following applications are more sensitive to delay?a. Sending an e-mailb. Copying a filec. Surfing the Internet
What are some of the factors that determine whether a communication system is a LAN or WAN?
When a party makes a local telephone call to another party, is this a point-topoint or multipoint connection? Explain the answer.
How many point-to-point WANs are needed to connect n LANs if each LAN should be able to directly communicate with any other LAN?
When we use local telephones to talk to a friend, are we using a circuit switched network or a packet-switched network?
Explain the difference between a required RFC and a recommended RFC.
Explain the difference between the duties of the IETF and IRTF.
What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?
Answer the following questions about Figure 2.2 when the communication is from Maria to Ann:a. What is the service provided by layer 1 to layer 2 at Marias site?b. What is the service provided by layer 1 to layer 2 at Anns site?Figure 2.2 Maria Ann Layer 3 Layer 3
Which layers of the TCP/IP protocol suite are involved in a link-layer switch?
Answer the following questions about Figure 2.2 when the communication is from Maria to Ann:a. What is the service provided by layer 2 to layer 3 at Marias site?b. What is the service provided by layer 2 to layer 3 at Anns site?Figure 2.2 Maria Ann Layer 3 Layer 3
A router connects three links (networks). How many of each of the following layers can the router be involved with?a. Physical layerb. Data-link layerc. Network layer
Assume that the number of hosts connected to the Internet at year 2010 is five hundred million. If the number of hosts increases only 20 percent per year, what is the number of hosts in year 2020?
In the TCP/IP protocol suite, what are the identical objects at the sender and the receiver sites when we think about the logical connection at the application layer?
Assume a system uses five protocol layers. If the application program creates a message of 100 bytes and each layer (including the fifth and the first) adds a header of 10 bytes to the data unit, what is the efficiency (the ratio of applicationlayer bytes to the number of bytes transmitted) of the
A host communicates with another host using the TCP/IP protocol suite. What is the unit of data sent or received at each of the following layers?a. Application layerb. Network layerc. Data-link layer
Assume we have created a packet-switched internet. Using the TCP/IP protocol suite, we need to transfer a huge file. What are the advantage and disadvantage of sending large packets?
Match the following to one or more layers of the TCP/IP protocol suite:a. Route determinationb. Connection to transmission mediac. Providing services for the end user
Match the following to one or more layers of the TCP/IP protocol suite:a. Creating user datagramsb. Responsibility for handling frames between adjacent nodesc. Transforming bits to electromagnetic signals
In Figure 2.10, when the IP protocol decapsulates the transport-layer packet, how does it know to which upper layer protocol (UDP or TCP) the packet should be delivered?Figure 2.10 HTTP DNS SNMP •• ISNMP HTTP FTP FTP DNS TCP UDP TCP UDP IP IP b. Demultiplexing at destination a. Multiplexing at
List some application-layer protocols mentioned in this chapter
Assume a private internet uses three different protocols at the data-link layer (L1, L2, and L3). Redraw Figure 2.10 with this assumption. Can we say that, in the data-link layer, we have demultiplexing at the source node and multiplexing at the destination node?Figure 2.10 HTTP DNS SNMP ••
If a port number is 16 bits (2 bytes), what is the minimum header size at the transport layer of the TCP/IP protocol suite?
Assume that a private internet requires that the messages at the application layer be encrypted and decrypted for security purposes. If we need to add some information about the encryption/decryption process (such as the algorithms used in the process), does it mean that we are adding one layer to
What are the types of addresses (identifiers) used in each of the following layers?a. Application layerb. Network layerc. Data-link layer
Showing 2000 - 2100
of 2050
First
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Step by Step Answers