Question: Question 1 [ 2 8 ] a . In this course we had two layered models that we worked with. One of them is the
Question
a In this course we had two layered models that we worked with. One of them is the TCPIP model. Give examples of protocols that are associated with each layer of the TCPIP model.
b What is a network "protocol"?
c Differentiate between guided media and unguided media.
d Differentiate between an analog and a digital electromagnetic signal.
e What is attenuation?
f Define channel capacity.
g What are three important characteristics of a periodic signal?
h What function does a modem perform?
i An alternative to a LAN is simply a big timesharing system with terminals for all users. Give two advantages of a clientserver system using a LAN.
If the unit exchanged at the data link level is called a frame and the unit exchanged at the network level is called a packet, do frames encapsulate packets or do packets encapsulate frames? Explain your answer.
k Wireless networks are easy to install, which makes them inexpensive since installation costs usually far overshadow equipment costs. Nevertheless, they also have some disadvantages. Name two of them.
Question
Consider the wireless topology above, comprised of nodes. Circles around each node illustrate their transmission range, eg As range is shown by the dotted, shaded circle. Assume that the transmissions of two nodes will interfere at a location if and only if they transmit at the same time and their transmission areas overlap. In these problems, assume that losses only occur due to collisions.
Page of
Degree and Diploma Examinations: June
Introduction to Data Communication and Networking: CSI M
List both the hidden and exposed terminals in each of the following:
a When node A transmits to node B
b When node B transmits to node C
You are considering using a "Request to Send RTS Clear to Send CTS protocol to reduce these potential problems from hidden and exposed terminals.
c When using RTSCTS explain what would prevent a hidden terminal from clobbering a sender
d When using RTSCTS explain how an exposed terminal decides it is safe to send to another destination?
e Is RTSCTS more like statistical timedivision multiplexing, normal time division multiplexing, or frequencydivision multiplexing? No explanation needed.
f Why csmacd is not suitable for wireless LAN? Explain your answer.
Consider the Ethernet like network of selflearning switches $$$$ and shown below. Assume the following frames delivered since the switches have started working: FA frame sent from F to A DC and C B List the switches through which the frame sent from A to AE will be sent
g Why do we need the spanning tree protocol in Ethernet LANs? Use an example.
Question
a What is the typical size of the header for an IPv datagram?
b How is the bit IP checksum field calculated?
c How is the TTL field used on the Internet? What purpose does it serve?
d Which field is used for IP congestion control? How does it work?
e Why is datagram fragmentation not an issue in IPv How is this achieved?
f A message of bytes is to be transmitted over IP networks. The first has an MTU of bytes and the second network has an MTU of bytes. How many fragments are expected at the destination? Show the values of the following IP header fields and flags for each fragment on the two networks: Packet length, MF Fragment Offset and Identification.
Page of
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
