What is the main role of media access control

Assignment Help Computer Networking
Reference no: EM133084256

Problem Sheet
Question 1. Which of the following best describes the role of data link layer?
(i) It deletes entries in the ARP cache.
(ii) It uses sockets to identify running applications.
(iii) It provides communication between locally networked devices.
(iv) It uses sequence numbers to maintain the reliability.
(v) It is layer 3 in the TCP/IP model of networking.

Question 2. Which of the following statement(s) about data link layer is/are incorrect?
(i) Data link layer is the interface between network layer and physical media.
(ii) Data link interface to the network is the Network Interface Card.
(iii) Data link layer provides multiplexing of multiple upper layer conversations to the physical media.
(iv) Data link layer uses the IP address for communication.

Question 3. Define the following acronyms
(i) LLC
(ii) MAC

Question 4. Describe the main role of data link LLC.

Question 5. The LLC is sometimes described as providing a multiplexed service to upper layer protocols. Describe what this statement means with an example.

Question 6. What is the main role of Media Access Control component of data link layer?

Question 7. How many bits constitute a MAC address?

Question 8. Describe two constituent parts of a MAC address.

Question 9. What Windows command will display the MAC address of your computer's network interface card?

Question 10. What Linux command will display the MAC address of your computer's network interface card?

Question 11. Network cards are said to be smart devices. Justify this statement.

Question 12. Describe the process that leads to the detection of corrupted frames at data link layer.

Question 13. An Ethernet frame contains CRC, source MAC address, FTP header, IP header, TCP header, destination MAC address, and protocol type. Describe their order in sequence.

Question 14. How many bytes constitute the source MAC address in an Ethernet frame?

Question 15. How many hexadecimal digits are required to specify an Ethernet broadcast address? What is a broadcast address?

Question 16. Describe how each of the following works?
(i) CSMA/CD
(ii) CSMA/CA

Question 17. Describe when entries are added to and removed from ARP cache.

Question 18. As a data link frame moves through an internetwork, the Ethernet frame header is modified at each step. Why does this happen?

Question 19. The number of entries in ARP cache changes with time. Describe the events that lead to the addition of entries to the cache and events that lead to the removal of entries from ARP cache.

Question 20. Describe how to generate an ARP request and reply from your Linux Lite machine.

Question 21. Generate and capture an ARP request and the corresponding reply.

Question 22. Determine the following.
(i) Contents of target's MAC address field in the ARP request.
(ii) Contents of target's MAC address field in the ARP reply.
(iii) Contents of sender's MAC address field in the ARP reply.

Reference no: EM133084256

Questions Cloud

Discuss the determinants of demand and supply : 1. Determine which of the two (2) investment projects your supervisor should choose, given a discount rate of 10% from J P Morgan Chase bank. The first project
What is leadership paradox : What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system
Determine the optimal investment project : Determine which of the two (2) investment projects your supervisor should choose, given a discount rate of 10% from J P Morgan Chase bank.
Deadweight loss compared to the solution : 1. There are 4 ?rms in the industry that have the total costs of eliminating pollution given by 132/4, 132/3, 132/2 and P2 respectively.
What is the main role of media access control : Describe the main role of data link LLC - What is the main role of Media Access Control component of data link layer
Large number of independent loan prospects : A large number of independent loan prospects are available, each paying a net return (on $100) of $24 with probability 1/4 and $4 with probability 3/4.
Build full risk management plan : Build a full risk management plan, including a complete risk matrix for a project for a wedding including the wedding itself, the reception and the dinner.
Explain substitution and income effects : 1. Suppose that an individual in Japan has preferences represented by the following utility function: U C C 0 ( C 0 , 1 ) = l n ( ) + (1/1+rho) ln(C1)
Calculate the effective sustainable interest rate : A. Evatuate the two divergent challenges faced by Microfinance institutions(MFIs). Identify and explain the measurements used to assess the performance of MFIs

Reviews

Write a Review

Computer Networking Questions & Answers

  How the organization will address dynamic cyber risk

How the organization will address dynamic Cyber risk and threat environments. Strategies and tactics the organization will employ.

  Formulate ip that determine a set of disks for storage

Formulate an IP that determine a set of disks requiring the minimum amount of storage such that each file is on at least one of the disks.

  Analysis of the current network configuration

Analyse current network configurations and suggest two application scenarios -Design a detailed Network in Netsim-current network configurations

  Identify the ethical issue that you want to analyze

Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site.

  1what are your objectives with the penetration of the

1.what are your objectives with the penetration of the market?2.assess the strengthsweaknesses and opportunitiesthreats

  Define the type of packet filters that you might build

You suspect there may be a problem with the HTTP servers. Define the type of packet filters that you might build to capture traffic destined to you six critical Web servers?

  How a firewall can distinguish between two incoming requests

Explain how a firewall can distinguish between two incoming requests allowing one while denying the other - Can someone provide the answer with reference to computer networking?

  Ideal communication mechanism because of its openness

The Internet is an ideal communication mechanism because of its openness and anonymity but people must make ethical decisions about how to use this power.

  Research a metro ethernet service

Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn't have Metro Ethernet).

  In march of 2010 while working for a british aircraft parts

in march of 2010 while working for a british aircraft parts manufacturer in the finance department you were directed by

  How to determine the malware in a computer

How to determine the malware in a computer

  Design a network for gemtech

Design a network for GemTech, Draw a complete architecture of the network and What routing protocol would you recommend for the internal network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd