You are on page 1of 3

DALAL SAEED JOBAN ID: 120009310

5-1: Week 5 Exercises


 Q9-1. Distinguish between communication at the network layer and communication at the
data-link layer?
- Communication at the network layer is host-to-host; communication at the data-link layer is
node-to-node.
(Forouzan, 2013, p. 239&511)
=========================================================================================
 Q9-3. Can two hosts in two different networks have the same link-layer address? Explain?
- Two hosts in two different networks can theoretically have the same link-layer address
because a link-layer address has only local jurisdiction. However, the tendency is to avoid this
for the future development of the Internet. Even today, manufacturers of network interface cards

m
er as
(NIC) use different set of link-layer addresses to make them distinguished.

co
eH w
(Forouzan, 2013, pp. 243-244)
=========================================================================================

o.
 Q9-9. In Figure 9.9, how does system A know what the link-layer address of system B is
rs e
ou urc
when it receives the ARP reply?
- The source hardware address defines the link-layer address of station B.
(Forouzan, 2013, p. 246)
o

=========================================================================================
aC s

 Q9-12. Why does a router normally have more than one interface?
vi y re

- A router, by nature, is connected to two or more network. It needs an interface (port) for each
network it is connected to.
ed d

(Forouzan, 2013, p. 244)


ar stu

=========================================================================================
 Q9-14. How many IP addresses and how many link-layer addresses should a router have
when it is connected to five links?
sh is

- A router should have five different IP addresses and five different link-layer addresses. Each
Th

IP address belongs to the set of addresses assigned to a network. Each link-layer address also
define the router at the connection at the data-link layer.
(Forouzan, 2013, p. 244)
=========================================================================================
 Q12-9. To understand the uses of K in Figure 12.13, find the probability that a station can
send immediately in each of the following cases:
a) After one failure
- K=1 , R= 0 to 21-1 , means R= 0 to 1

https://www.coursehero.com/file/12180996/5-1/
DALAL SAEED JOBAN ID: 120009310

The probability that a station can send immediately is

b) After four failures


- k=4 , R= 0 to 24-1 , means R= 0 to 15

The probability that a station can send immediately is

- So, the use of K decreases the probability that a station can immediately send when the
number of failures increases. This means decreasing the probability of collision.
(Forouzan, 2013, p. 336)
=========================================================================================
 Q12-14. Assume the propagation delay in a broadcast network is 5 μs and the frame
transmission time is 10 μs.

m
er as
a) How long does it take for the first bit to reach the destination?

co
- It takes 5 μs for the first bit to reach the destination.

eH w
b) How long does it take for the last bit to reach the destination after the first bit has

o.
arrived?
rs e
ou urc
- The last bit arrives at the destination 10 μs after the first bit.
c) How long is the network involved with this frame (vulnerable to collision)?
o

- The network is involved with this frame for 5 + 10 = 15 μs.


aC s

=========================================================================================
vi y re

 Q12-17. Explain why collision is an issue in random access protocols but not in controlled
access protocols?
- In random-access methods, there is no control over the medium access. Each station can
ed d
ar stu

transmit when it desires. This liberty may create collisions. In controlled- access methods, the
access to the medium is controlled, either by an authority or by the priority of the station. There
is no collision.
sh is

(Forouzan, 2013, p. 353)


Th

=========================================================================================
 Q12-21. List some strategies in CSMA/CA that are used to avoid collision?
a) It uses the combination of RTS and CTS frames to warn other stations that a new station
will be using the channel.
b) It uses NAV to prevent other stations to transmit.
c) It uses acknowledgments to be sure the data has arrived and there is no need for
resending the data.
(Forouzan, 2013, pp. 338-339)
=========================================================================================

https://www.coursehero.com/file/12180996/5-1/
DALAL SAEED JOBAN ID: 120009310

 Q12-23. There is no acknowledgment mechanism in CSMA/CD, but we need this


mechanism in CSMA/CA. Explain the reason?
- In CSMA/CD, the lack of detecting collision before the last bit of the frame is sent out is
interpreted as an acknowledgment. In CSMA/CA, the sender cannot sense collision; there is a
need for explicit acknowledgments.
(Forouzan, 2013, p. 334&339)
=========================================================================================

m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
sh is
Th

https://www.coursehero.com/file/12180996/5-1/

Powered by TCPDF (www.tcpdf.org)

You might also like