Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In the case of two answers, circle the correct answer 1H 15min 1] How many conne

ID: 3348939 • Letter: I

Question

In the case of two answers, circle the correct answer                                                                      1H 15min

1] How many connections are required to fully connect directly N users?

2] Given the communication theorem, what is the minimum bandwidth representative of the T1 carrier? (1.544 Mbps)

3] In a MAC address, MAC stands for:

4] Which layer from the host deals with flow control?

5] Definition of network architecture:

6] Which layer deals with the message segmentation and reassembly?

7] How many bytes make up the MAC address?

8] What is the total number of IP addresses available in IPV4

9] Transmission Control Protocol (TCP) enables best-effort transfer of information?      Yes              No

10] What is the nominal length of a T-1 cable?

11] DNS uses service provided by:            TCP       UDP

12] Which servers may be used by the DNS protocol?

13] At which layer may the CRC be appended?

14] What is the exact purpose in placing servers closer to each other or to hosts?

15] What does the TTL (Time-to-Live) field represent?

16] Based on the Delay expression given in slide 7 (Chapter 3), the propagation delay is less prominent at higher speed of digital transmission? Yes           No

17] The SNR has a less prevalent effect on the channel capacity than the channel bandwidth. Yes     No

18] Find the CRC for the for the HEX data D2A using the generator polynomial x3 + x + 1

CRC =                   

19] Based on slide 27 (chapter 3)

NRZ has one unwanted feature:

Bipolar is better than Manchester because:

give all your answers in decimal,

21] Given a host address 192.168.19.17/21,

a. the host belongs to a    subnet       supernet

b. What is the subnet mask?

c. What is the network IP address?

                d. What is the broadcast address?

                e. What is the address of the first host?

                f. What is the address of the last host?

                g. How many hosts belong to this network?

22]          a. The (7,4) Hamming code is called a perfect code because:

               

                b. What is the Hamming distance?

                c. How many errors can it detect?

23] What is the purpose of the two-dimensional parity code?

24] Based on the trellis given in slide 17 of the error control power point, which 2-bit inputs were transmitted given the initial state 01, and the received sequence 101101?

25] given a header made of the following 2 16-bit numbers 5FD3   B2C1

Find its checksum (in HEX)

Explanation / Answer

Hello,
          Please find the answer to the first four questions attached as under. Please give a thumbs up rating if you find the answer useful! Have a rocking day ahead!

1. For direct connection for N users, remember that each user is connected to N-1 user by a direct line. Also, if user A is connected to B, then vice-versa is also true.i.e. each line has two communication routes. Therefore, no of lines required = N x (N-1)/2

2. The minimum bandwidth representative of the T1 carrier (1.544 Mbps) will be twice of 1.544 Mbps i.e. 3.08Mbps.

3. In a MAC address, MAC stands for: Media Access Control : These numbers are used as network addresses for most IEEE 802 network technologies.

4. Flow control is implemented on two layers, which are Datalink Layer (Layer 2) and Transport Layer (Layer 4).

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote