Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A . Assume ten devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device? B
A Assume ten devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device?
B What is the use of port address?
f Suppose a computer sends a packet at the network layer to another computer somewhere in the Internet. The logical destination address of the packet is corrupted. What happens to the packet?
D What is bitstuffing?
E What are the advantages and disadvantages of reservation based multiple access?
A Two neighbouring nodes A and B use a slidingwindow protocol with a bit sequence number. As the ARQ mechanism, GobackN is used with a window size of Assuming is transmitting and is receiving, show the window positions for the following succession of events:
i Before A sends any frames.
ii After A sends frames and B acknowledges and the ACKs are received by
iii. After A sends frames and and B acknowledges and the ACK is received by
B A channel has a data rate of and a propagation delay of For what range of frame sizes does stopandwait give an efficiency of at least
A Suppose that a Selectiverepeat ARQ is used where window size Show, by example, that what should be the maximum length of sequence number in bits.
B There are only three active stations in a slotted Aloha network: A B and C Each station generates a frame in a time slot with the corresponding probabilities and respectively.
a What is the throughput of each station?
b What is the throughput of the network?
c What would be the throughput of the network if pure Aloha is used?
Consider a CSMACD network with a data rate of the minimum frame size is found to be bits for the correct operation of the collision detection process. What should the minimum frame size be if we keep the size of the network constant, but we increase the data rate to each of the following?
a
b
B Using a topology of four nodes, explain hidden and exposed terminal problems. Show that using RTSCTS packet exchange, exposed terminal problem can not be resolved.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started