What is the main role of media access control

Assignment Help Computer Networking
Reference no: EM133084256

Problem Sheet
Question 1. Which of the following best describes the role of data link layer?
(i) It deletes entries in the ARP cache.
(ii) It uses sockets to identify running applications.
(iii) It provides communication between locally networked devices.
(iv) It uses sequence numbers to maintain the reliability.
(v) It is layer 3 in the TCP/IP model of networking.

Question 2. Which of the following statement(s) about data link layer is/are incorrect?
(i) Data link layer is the interface between network layer and physical media.
(ii) Data link interface to the network is the Network Interface Card.
(iii) Data link layer provides multiplexing of multiple upper layer conversations to the physical media.
(iv) Data link layer uses the IP address for communication.

Question 3. Define the following acronyms
(i) LLC
(ii) MAC

Question 4. Describe the main role of data link LLC.

Question 5. The LLC is sometimes described as providing a multiplexed service to upper layer protocols. Describe what this statement means with an example.

Question 6. What is the main role of Media Access Control component of data link layer?

Question 7. How many bits constitute a MAC address?

Question 8. Describe two constituent parts of a MAC address.

Question 9. What Windows command will display the MAC address of your computer's network interface card?

Question 10. What Linux command will display the MAC address of your computer's network interface card?

Question 11. Network cards are said to be smart devices. Justify this statement.

Question 12. Describe the process that leads to the detection of corrupted frames at data link layer.

Question 13. An Ethernet frame contains CRC, source MAC address, FTP header, IP header, TCP header, destination MAC address, and protocol type. Describe their order in sequence.

Question 14. How many bytes constitute the source MAC address in an Ethernet frame?

Question 15. How many hexadecimal digits are required to specify an Ethernet broadcast address? What is a broadcast address?

Question 16. Describe how each of the following works?
(i) CSMA/CD
(ii) CSMA/CA

Question 17. Describe when entries are added to and removed from ARP cache.

Question 18. As a data link frame moves through an internetwork, the Ethernet frame header is modified at each step. Why does this happen?

Question 19. The number of entries in ARP cache changes with time. Describe the events that lead to the addition of entries to the cache and events that lead to the removal of entries from ARP cache.

Question 20. Describe how to generate an ARP request and reply from your Linux Lite machine.

Question 21. Generate and capture an ARP request and the corresponding reply.

Question 22. Determine the following.
(i) Contents of target's MAC address field in the ARP request.
(ii) Contents of target's MAC address field in the ARP reply.
(iii) Contents of sender's MAC address field in the ARP reply.

Reference no: EM133084256

Questions Cloud

Discuss the determinants of demand and supply : 1. Determine which of the two (2) investment projects your supervisor should choose, given a discount rate of 10% from J P Morgan Chase bank. The first project
What is leadership paradox : What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system
Determine the optimal investment project : Determine which of the two (2) investment projects your supervisor should choose, given a discount rate of 10% from J P Morgan Chase bank.
Deadweight loss compared to the solution : 1. There are 4 ?rms in the industry that have the total costs of eliminating pollution given by 132/4, 132/3, 132/2 and P2 respectively.
What is the main role of media access control : Describe the main role of data link LLC - What is the main role of Media Access Control component of data link layer
Large number of independent loan prospects : A large number of independent loan prospects are available, each paying a net return (on $100) of $24 with probability 1/4 and $4 with probability 3/4.
Build full risk management plan : Build a full risk management plan, including a complete risk matrix for a project for a wedding including the wedding itself, the reception and the dinner.
Explain substitution and income effects : 1. Suppose that an individual in Japan has preferences represented by the following utility function: U C C 0 ( C 0 , 1 ) = l n ( ) + (1/1+rho) ln(C1)
Calculate the effective sustainable interest rate : A. Evatuate the two divergent challenges faced by Microfinance institutions(MFIs). Identify and explain the measurements used to assess the performance of MFIs

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd