Professional Documents
Culture Documents
m
er as
(NIC) use different set of link-layer addresses to make them distinguished.
co
eH w
(Forouzan, 2013, pp. 243-244)
=========================================================================================
o.
Q9-9. In Figure 9.9, how does system A know what the link-layer address of system B is
rs e
ou urc
when it receives the ARP reply?
- The source hardware address defines the link-layer address of station B.
(Forouzan, 2013, p. 246)
o
=========================================================================================
aC s
Q9-12. Why does a router normally have more than one interface?
vi y re
- A router, by nature, is connected to two or more network. It needs an interface (port) for each
network it is connected to.
ed d
=========================================================================================
Q9-14. How many IP addresses and how many link-layer addresses should a router have
when it is connected to five links?
sh is
- A router should have five different IP addresses and five different link-layer addresses. Each
Th
IP address belongs to the set of addresses assigned to a network. Each link-layer address also
define the router at the connection at the data-link layer.
(Forouzan, 2013, p. 244)
=========================================================================================
Q12-9. To understand the uses of K in Figure 12.13, find the probability that a station can
send immediately in each of the following cases:
a) After one failure
- K=1 , R= 0 to 21-1 , means R= 0 to 1
https://www.coursehero.com/file/12180996/5-1/
DALAL SAEED JOBAN ID: 120009310
- So, the use of K decreases the probability that a station can immediately send when the
number of failures increases. This means decreasing the probability of collision.
(Forouzan, 2013, p. 336)
=========================================================================================
Q12-14. Assume the propagation delay in a broadcast network is 5 μs and the frame
transmission time is 10 μs.
m
er as
a) How long does it take for the first bit to reach the destination?
co
- It takes 5 μs for the first bit to reach the destination.
eH w
b) How long does it take for the last bit to reach the destination after the first bit has
o.
arrived?
rs e
ou urc
- The last bit arrives at the destination 10 μs after the first bit.
c) How long is the network involved with this frame (vulnerable to collision)?
o
=========================================================================================
vi y re
Q12-17. Explain why collision is an issue in random access protocols but not in controlled
access protocols?
- In random-access methods, there is no control over the medium access. Each station can
ed d
ar stu
transmit when it desires. This liberty may create collisions. In controlled- access methods, the
access to the medium is controlled, either by an authority or by the priority of the station. There
is no collision.
sh is
=========================================================================================
Q12-21. List some strategies in CSMA/CA that are used to avoid collision?
a) It uses the combination of RTS and CTS frames to warn other stations that a new station
will be using the channel.
b) It uses NAV to prevent other stations to transmit.
c) It uses acknowledgments to be sure the data has arrived and there is no need for
resending the data.
(Forouzan, 2013, pp. 338-339)
=========================================================================================
https://www.coursehero.com/file/12180996/5-1/
DALAL SAEED JOBAN ID: 120009310
m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
sh is
Th
https://www.coursehero.com/file/12180996/5-1/