0% found this document useful (0 votes)
81 views3 pages

This Study Resource Was: Multiple Choice Questions ( × . )

This document contains the questions and answers for a class test on computer communications and networks. It includes 8 multiple choice questions testing knowledge of topics like MAC addresses, ARP, Ethernet, and random access protocols. It also includes 9 short answer questions testing understanding of concepts like vulnerable time, collision domains, CSMA, cyclic redundancy check, and network addressing.

Uploaded by

Đình Nghĩa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views3 pages

This Study Resource Was: Multiple Choice Questions ( × . )

This document contains the questions and answers for a class test on computer communications and networks. It includes 8 multiple choice questions testing knowledge of topics like MAC addresses, ARP, Ethernet, and random access protocols. It also includes 9 short answer questions testing understanding of concepts like vulnerable time, collision domains, CSMA, cyclic redundancy check, and network addressing.

Uploaded by

Đình Nghĩa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ITCS 6166/8166 – Computer Communications and Networks

Class Test 3

Name: _______________________________________

Student ID: _______________________________________

Score: _______________________________________
Multiple Choice Questions (𝟖 × 𝟎. 𝟕𝟓 = 𝟔)
1. Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC), called MAC address.
a) 16-bit
b) 32-bit
c) 64-bit
d) None of the choices are correct
2. ___________ is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses.
a) Dynamic Host Configuration Protocol (DHCP)
b) Bootstrap Protocol (BOOTP)

m
c) Address Resolution Protocol (ARP)

er as
d) Domain Name System (DNS)

co
3. In the p-persistent approach, when a station finds an idle line, it _______.

eH w
a) sends immediately
b) waits 1 sec before sending

o.
rs e
c) sends with probability p
d) sends with probability 1 − p
ou urc
4. In the _______ random-access method, stations do not sense the medium.
a) ALOHA
b) Ethernet
o

c) CSMA/CD
aC s

d) CSMA/CA
vi y re

5. Which of the following is an example of a controlled-access protocol?


a) CSMA
b) FDMA
c) Token passing
ed d

d) None of the choices are correct


ar stu

6. The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.
a) less than
b) greater than
c) equal to
sh is

d) None of the choices are correct


Th

7. The vulnerable time for CSMA is ___________.


a) 𝑇𝑓𝑟
b) 2 x 𝑇𝑝
c) 2 x 𝑇𝑓𝑟
d) None of the choices are correct
8. In the ________method, a station that has a frame to send senses the line. If the line is idle, it sends immediately. If the line is not idle, it waits
a random amount of time and then senses the line again.
a) 1-persistent
b) p-persistent
c) Non-persistent
d) None of the above

https://www.coursehero.com/file/30532027/Class-Test-3-answer-Spring-2017pdf/
ITCS 6166/8166 – Computer Communications and Networks
Class Test 3

Short Questions (9 points)


1. [1 point] Stations in a pure ALOHA network send frames of size 1000 bits at the rate of 1 Mbps. What is the vulnerable time for
this network?

The transmission rate of this network is 𝑇𝑓𝑟 = (1000 𝑏𝑖𝑡𝑠)/(1𝑀𝑏𝑝𝑠) = 1 𝑚𝑠.


The vulnerable time in pure Aloha is 2 × 𝑇𝑓𝑟 = 2 𝑚𝑠.

2. [1 point] Assume the propagation delay in a broadcast network is 5 µs and the frame transmission time is 10 µs. How long is the
network involved with this frame (vulnerable to collision)?

The network is involved with this frame for 5 + 10 = 15 μs.

3. [2 points] Assume that there are only two stations, A and B, in a bus CSMA/ CD net-work. The distance between the two
stations is 2000 m and the propagation speed is 2 × 108 𝑚/𝑠. If station A starts transmitting at time t1:
a) Does the protocol allow station B to start transmitting at time t1 + 8 µs? Justify your answer logically.
b) Does the protocol allow station B to start transmitting at time t1 + 11 µs? Justify your answer logically

m
er as
The propagation delay for this network is 𝑇𝑝 = (2000 𝑚) /(2 × 108 𝑚/𝑠) = 10 𝜇𝑠. The first bit of station A’s frame

co
eH w
reaches station B at (t1 + 10 μs).

o.
a) Station B has not received the first bit of A’s frame at (t1 + 10 μs). It senses the medium and finds it free. It starts sending
rs e
its frame, which results in a collision.
ou urc
b) At time (t1 + 11 μs), station B has already received the first bit of station A’s frame. It knows that the medium is busy and
refrains from sending.
o

4. [2 points] Consider the 5- bit generator, G= 10011, and suppose that D has the value 1010101010. What is the value of R and
aC s

what will be transmitted?


vi y re

If we divide 10011 into 1010101010 0000, we get 1011011100, with a remainder of R=0100.

Transmitted bits: 10101010100100


ed d

5. [3 points] Below is a picture of a network with 2 bridges and 1 router. Each interface is labeled with both an IP address and a
ar stu

MAC address. Imagine that host H1 is sending a packet to host H2. Please answer the following questions about this figure:
sh is
Th

https://www.coursehero.com/file/30532027/Class-Test-3-answer-Spring-2017pdf/
ITCS 6166/8166 – Computer Communications and Networks
Class Test 3

m
er as
a) How many networks are shown above?

co
eH w
3 -- The networks hanging off of R2

o.
rs e
b) Just before the packet reaches bridge B1, what is its layer 2 destination?
ou urc
R2a.mac
o

c) Just before the packet reaches bridge B2, what is its layer 2 source?
aC s
vi y re

R2c.mac

d) Just after the packet leaves router R2, what is its layer 3 source?
ed d

H1.ip
ar stu

e) When H1 sends out an ARP query, what is the reply to that query?

R2a.mac has R2a.ip (or just "R2a.mac")


sh is

f) Does the entry B2a.mac appear in B1’s forwarding table?


Th

No. B2a is on a different network than B1.

https://www.coursehero.com/file/30532027/Class-Test-3-answer-Spring-2017pdf/

Powered by TCPDF (www.tcpdf.org)

You might also like