IEEE802, Computer Engineering

Assignment Help:

1. (a) Given a baseband bus with station 1 located at 10m, station 2 located at 1000m, and station 3 located at 1010 meters (see diagram above). If the data rate of the bus is 10 Mbps, and the propagation speed of the medium is 200 m/microsecond, how long would it take to send a packet of 100 bits:

(1) between stations 3 and 2?

(2) between stations 3 and 1?

(b) Given a broaband bus with station 1 located at 10m, station 2 located at 1000m, and station 3 located at 1010 meters, and the headend is located at A (see diagram above). If the data rate of the bus is 10 Mbps, and the propagation speed of the medium is 200 m/microsecond, how long would it take to send a packet of 100 bits:

(1) between stations 3 and 2?

(2) between stations 3 and 1?



2. Given a five station token bus LAN with station addresses of 3000, 500, 100, 70, and 50. Stations with addresses of 5000, 4000, 400, 90, and 60 are waiting to enter the ring. Assume a 16 bit address size for the token bus LAN.

(a) Show, in the correct order, each of the MAC control frames that would be sent over the token bus when station 100 attempts to add new station(s) to the ring.

(b) Show, in the correct order, each of the MAC control frames that would be sent over the token bus when station 50 attempts to add new station(s) to the ring.

Use the frame format show below to identify the MAC control frames being sent:



3. Consider a five station token bus network. Calculate the number of frames sent, and the token rotation time (TRTC) for each station, for 5 complete rotations of the token. The priorities of the stations are as follows:

Station Address

Priority

1

6

2

4

3

4

4

4

5

6



Assume the following conditions for the network:

• Time is measured in octet times

• The time to pass the token is 20

• All stations have an unlimited number of frames to send

• The token holding time (THT) for sending priority 6 frames is 400

• The target token rotation time for the priority 4 frames (TRT4) is fixed at a value of 1400

• The frame length is the same fixed value for each station and equal to 100 octets

• The stations are ordered by decreasing station address number

Related Discussions:- IEEE802

What is branch target, What is branch target? As a result of branch ins...

What is branch target? As a result of branch instruction, the processor fetches and implements the instruction at a new address called as branch target, instead of the instruct

C LANGUAGE PROGRAMME, find a c program to find the area under the curve y=f...

find a c program to find the area under the curve y=f(x) between x=a and x=b,intregrate y=f(x)between the limits of a and b.the area under a curve between two points can be found b

Program for encoding ASCII alpha numeric, Q. Program for encoding ASCII Alp...

Q. Program for encoding ASCII Alpha numeric? ; A program for encoding ASCII Alpha numeric. ; ALGORITHM:             ; create the code table             ; read an input

Set up the site structure, Structuring the Web site is first step towards b...

Structuring the Web site is first step towards building the corporate Web site. Structuring includes creating a folder that includes all our picture files, text files and database

What do you meant by hosts, Q. What do you meant by Hosts? Hosts are in...

Q. What do you meant by Hosts? Hosts are in general, individual machines at a specific location. Resources of a host machine is generally shared and can be utilized by any user

Describe the various characteristics of udp protocol, Describe the various ...

Describe the various characteristics of UDP protocol. The characteristics of the UDP are as follows: End to end: UDP is transport protocols that can distinguish between

Principles of contract law, Andrew, a 17 zear old university student decide...

Andrew, a 17 zear old university student decided to hold a post exams party for his friends. Andrew asked Kath, a family friend and the owner of 'Kath's Katerers' to supply food

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

State about the logic micro-operations, State about the Logic Micro-operati...

State about the Logic Micro-operations These operations are performed on binary data stored in register. For a logic micro-operation each bit of a register is treated as a diff

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd