Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.Answer the following questions: 1.1 Which multiple access methods are controll

ID: 3593479 • Letter: 1

Question

1.Answer the following questions:

                1.1 Which multiple access methods are controlled access protocols?

a. CSMA/CD and CSMA/CA

b. FDM and TDM

c. Reservation, polling and token-passing

d. FDMA, TDMA and CDMA

1.2 Which type of protocol is the best choice for a real-time system?

        a. controlled access                b. random access                    

1.3 WiFi uses only one frame format, but Ethernet uses both data and control frames.

a.True                        b. false

    1.4 Full-duplex switched Ethernet does not have collisions

a. true               b. false

     1.5 Why can’t CSMA/CD be used in wireless networks?

              a. Wireless networks don’t share the medium, so it is not required

              b. Collisions cannot always be detected in wireless networks

              c. The question is incorrect – CSMA/CD is sometimes used in wireless networks

              d. Electomagnetic interference

         1.6 An access point

                 a. is exactly the same as a switch in a wired network

                 b. uses IP addresses in the frames it sends to wireless devices

                 c. bridges between a wired network and a wireless network

                 d. must use CDMA

                  1.7 What is the difference between a hub and a switch?

a.nothing - they are two names for the same device

b.a hub has many ports, but a switch can only have two ports

c.a hub sends all frames to all connected devices; a switch can filter frames and send them only to the destination device

d.a hub operates at layer 2 of the network model and a switch operates at layer 1

1.8 A junior IT employee links three switches together such that each switch connects to the two others. What will happen?

            a. The switches will work as expected          b. A broadcast storm             

c. A VLAN is created                                                d. The switches will act as routers

     1.9 A 24 port Ethernet switch has been configured with three separate VLANs as

          follows:

VLAN1: Server FS1, Workstations WS1, WS2 and WS3

VLAN2: Server FS2, Workstations WS4, WS5, and WS6

VLAN3: Server FS3, Workstations WS7, WS8, and WS9

                 If WS4 sends a network broadcast, which hosts will receive it?

a.All hosts

b.No hosts. VLANs do not support broadcasting

c.FS1, WS1, WS2, WS3

d.FS2, WS5, WS6

e.FS3, WS7, WS8, WS9

Match the Cisco command line interface prompt with the mode.

_____   Switch>

A. Configuration mode

_____   Switch#

B.   Interface level within configuration mode

_____   Switch(config)#

C. User EXEC mode

_____   Switch(config-if)#

D. Privileged EXEC mode

How can a receiver tell whether an Ethernet frame uses the original Ethernet standard or the IEEE 802.3 standard? [Hint: Just looking for the LLC/SNAP header is not sufficient, because the receiver has no way to know whether the data is a LLC/SNAP header or the beginning of the payload. ]

4.Why does a bridge or switch network run the Distributed Spanning Tree Algorithm? You do not need to explain the algorithm itself.

5.A local area network contains the following devices:

-A switch with 4 ports, numbered 1 – 4.

-Host A (MAC address AA-AA-AA-AA-AA-AA)

-Host B (MAC address BB-BB-BB-BB-BB-BB)

-Host C (MAC address CC-CC-CC-CC-CC-CC)

-A gateway router (MAC address DD-DD-DD-DD-DD-DD)

a. Sketch the LAN.

b. Show the forwarding table inside the switch

6.Answer the following questions concerning IP addressing:

    6.1 The mask in binary for 128.235.176.0/21 is

a.10000000 11101011 10110000 00000000

b.11111111 11111111 11111000 00000000

c.00000000 00000000 00000111 11111111

d.11111111 11111111 11111111 00000000

6.2 Your computer has an IP address of 172.17.8.3 assigned to it with a subnet mask of 255.255.255.0. What is the IP address of your network?

a. 172.17.8.0        b. 172.17.0.0              c. 172.17.8.3            d. 172.0.0.0

6.3   Your computer has an IP address of 172.17.8.3 assigned to it with a subnet mask of 255.255.0.0. What is the broadcast address for your network?

a. 172.17.8.255    b. 172.17.255.255      c. 172.17.8.3            d. 172.255.255.255

6.4 Your network already uses IP addresses 192.168.1.1 through 192.168.1.254 and has a subnet mask of 255.255.255.0. What IP address to could you assign to a new workstation?

a. 192.168.1.0   b. 192.168.1.25   c. 192.168.2.1 d. No addresses are available

7.Consider the class-less IP network 130.45.130.0/22

a.How many bits are in the net id?                    _________________

                                   

b.How many bits are in the host id?                  __________________

c.How many possible hosts are there?              __________________

                       

d.What is the mask in binary and dotted decimal?

__________________________ and _______________________________

8.Is each address below for a network, a host, or broadcast?

a.123.45.67.8 /20                                      ____________________

b.123.45.64.0/20                                       ____________________

c.123.45.67.255/20                                   ____________________

d.123.45.79.255/20                                   ____________________

9.Is the host 128.235.203.16 on the network 128.235.204.0/22?

_____   Switch>

A. Configuration mode

_____   Switch#

B.   Interface level within configuration mode

_____   Switch(config)#

C. User EXEC mode

_____   Switch(config-if)#

D. Privileged EXEC mode

Explanation / Answer

Q. 1.1 Which multiple access methods are controlled access protocols?

Answer: d. FDMA, TDMA and CDMA

Explanation :
- Contention based random multiple access methods. Aloha. Slotted Aloha. ...
- Token passing: Token ring. Token bus.
- Polling.
- Resource reservation (scheduled) packet-mode protocols. Dynamic Time Division Multiple Access (Dynamic TDMA)

Q.1.2 Which type of protocol is the best choice for a real-time system?

Answer : a. controlled access

Explanation : frequency sharing.1 The idea in time sharing is to have the nodes ... schemes define how multiple nodes should control their access to a shared ... These ideas are sometimes used in practice, but all real-world systems

Q.1.3 WiFi uses only one frame format, but Ethernet uses both data and control frames.

Answer : A.TRUE

Explanation :  WLANs are used in combination with or as a substitute to wired computer ... IEEE 802.11 b/g wireless Ethernet operates on 2.4 GHz band. ... Each of the five permitted transmission techniques makes it possible to send a MAC frame from one ... Control frames are shorter having at the most two addresses with no data.

Q. 1.4 Full-duplex switched Ethernet does not have collisions

Answer : B. FALSE

Explanation : full-duplex ethernet, is jusr about using both uplink and donwlink for traffix. So, in full-duplex you tx and rx at the same time. If you use full-duplex in a shared media like a hub, you will FOR SURE have collisions....

Note : Chegg policy allows only first four(4) question to the answer on board....

Thanks...

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Chat Now And Get Quote