Which access method is used by ethernet

Assignment Help Computer Networking
Reference no: EM13336335

For the Web research questions, since Web sites often change, if the steps outlined in the assignment don't lead you to the requested info try to find where that info is in the current version of the Web site.

 

PART ONE - Ch. 4 - Ethernet Basics

Refer to Ch. 4 in the text.  You may also want to refer to the Power Point slide show for Chapter 4 (available in Moodle) for these questions.

Read the Chapter Summary on pg. 85-86.  Nothing to turn in for this one.

As a review, do the self-assessment quiz from the publisher's website: : https://highered.mcgraw-hill.com/sites/0071789111/student_view0/chapter4/self-assessment_quiz.html

If the above link does not work go to: https://highered.mcgraw-hill.com/sites/0071789111/student_view0/index.html

then choose Chapter 4 in the upper left, then select Self-Assessment Quiz.

Nothing to turn in.  The correct answers are provided after you submit your answers

Do the even questions in the Key Term Quiz, pg. 86-87.  Notice that the key terms are listed immediately above on pg. 86.  Enter your answers here:

2. ___________________________

4. ______________________________

6. ___________________________

8. ___________________________

10. __________________________

 

Do question #3 in Essay Quiz on pg. 88.  Enter your essay below:

When a switch is in normal operation, in order to deliver an incoming frame it (select the best answer)

a. sends the frame out all ports.

b. sends the frame out all ports except the one from which it came.

c. sends the frame only to the port from which it came.

d. does a table lookup to find the port outside of which the destination MAC address in the frame is located.

 

________________________ is the function of the CRC in Ethernet.

Which access method is used by Ethernet?  _________________________ (Recall that an access method determines when a computer may send its frame).

List the seven fields in the Ethernet frame format.

_____________________

_____________________

_____________________

_____________________

_____________________

_____________________

_____________________

 

Go to the www.webopedia.com site and search for CSMA then click on the CSMA/CD link.  Complete the following sentences using info from this site: 

Standard Ethernet networks use CSMA/CD to _____________________ the traffic on the line at participating stations.

 

If another collision occurs, the time intervals from which the random waiting time is selected are increased step by step. This is known as _______________________________________.

 

For the TIA/EIA 568B wiring standard, associate the eight pins in the RJ-45 connector with the wire colors listed below, that is, enter then numbers 1 through 8 for the colors listed below.

 

____ Brown

            ____ Brown/White

            ____ Green

            ____ Green/White

            ____ Blue

            ____ Blue/White

            ____ Orange

            ____ Orange/White

 

In 10BaseT, which pins in an RJ-45 connector carry the send signal? ________  Which pins carry the receive signal? _______ (This is also true for 100BaseT.)

 

PART TWO - Ch. 5 - Modern Ethernet

Refer to Ch. 5 in the text.  You may also want to refer to the Power Point slide show for Chapter 5 (available in Moodle) for these questions.

1.      Read the Chapter Summary on pp. 101-102.  Nothing to turn in for this one.

 

2.      As a review, do the self-assessment quiz from the publisher's website: https://highered.mcgraw-hill.com/sites/0071789111/student_view0/chapter5/self-assessment_quiz.html

If the above link does not work go to: https://highered.mcgraw-hill.com/sites/0071789111/student_view0/index.html

then choose Chapter 5 in the upper left, then select Self-Assessment Quiz.

Nothing to turn in.  The correct answers are provided after you submit your answers

 

3.      Do the odd questions in the Key Term Quiz, pg. 102.  Notice that the key terms are listed immediately above on pg. 102.  Enter your answers here:

1. ___________________________

3. ______________________________

5. ___________________________

7. ___________________________

9. ___________________________

 

4.      As we have learned, there are many Ethernet standards.  Compare the different standards by referring to Ch. 4 & 5 to fill in the table below.

 

E/N Standard

Speed

Max Distance

Cable Type

Connector

10BaseT

 

 

 

 

10BaseFL

 

 

 

 

100BaseTX

 

 

 

 

100BaseFX

 

 

 

 

1000BaseSX

 

 

 

 

1000BaseLX

 

 

 

 

10GBaseSR

 

 

 

 

10GBaseER

 

 

 

 

 

PART THREE - Ch. 6 - Installing a Physical Network

Refer to Ch. 6 in the text.  You may also want to refer to the Power Point slide show for Chapter 6 (available in Moodle) for these questions.

1.     Read the Chapter Summary on pp. 139-140.  Nothing to turn in for this one.

2.      As a review, do the self-assessment quiz from the publisher's website https://highered.mcgraw-hill.com/sites/0071789111/student_view0/chapter6/self-assessment_quiz.html

If the above link does not work go to: https://highered.mcgraw-hill.com/sites/0071789111/student_view0/index.html

then choose Chapter 6 in the upper left, then select Self-Assessment Quiz.

Nothing to turn in.  The correct answers are provided after you submit your answers.

3.      Do the even questions in the Key Term Quiz, pg. 141.  Notice that the key terms are listed immediately above on pg. 140.   Enter your answers here:

2. ___________________________

4. ______________________________

6. ___________________________

8. ___________________________

10. __________________________

 

4.      UTP Cable Installation Research

a.       Use a Web browser to visti the site https://www.lanshack.com/cat5e-tutorial.aspx

b.      Find the "UTP Installation Do's and Don'ts" section.

c.       Read through the lists of Do's and Don'ts.

d.      For the following items, indicate whether the website info indicates this is a Do or Don't by bolding or underlining the appropriate word.

                                                  i.      Do, Do Not: Install cable that is supported by the ceiling tiles.

                                                ii.      Do, Do Not: Maintain the twists of the pairs all the way to the point of termination, or no more than 0.5" untwisted.

                                              iii.      Do, Do Not: Allow the cable to be sharply bent, or kinked, at any time.

                                              iv.      Do, Do Not: Tie cables to electrical conduits.

                                                v.      Do, Do Not: Install cables "taught" in the ceiling, or elsewhere.

                                              vi.      Do, Do Not: Always test every installed segment with a cable tester.

                                            vii.      Do, Do Not: Install proper cable supports.

 

PART FOUR - Bandwidth Calculations

Refer to the Power Point slide show Bandwidth and the accompanying video lecture, and the handout Bandwidth Examples and accompanying video lecture for these questions.  All are available in Moodle.

Calculate the minimum length of time it would take to download a 20MByte document from a workstation to a server across each of the following networks.  This means you will have to convert bytes to bits.  Assume that each byte is 10 bits (rather than 8) to account for packet overhead.  Divide the document size in bits by the bandwidth.  Enter your answers below.

1.      10-Gigabit Ethernet (for example10GBaseSR)

2.      Gigabit Ethernet (for example 1000BaseSX)

3.     Fast Ethernet (for example 100BaseTX)

4.      Ethernet (for example 10BaseT)

5.      56Kbps modem connection

Upload this document with your answers in Bold via Moodle.

Reference no: EM13336335

Questions Cloud

The 4ps of marketing : The 4Ps of Marketing
What are the work done by the ropes force : A rope is used to pull a 2.72 kg block at constant speed 6.90 m along a horizontal floor. What are the work done by the ropes force
Display the top ten ip addresses in your file : You will given a web server log file to process. Using a command-line pipeline display the top ten IP addresses in your file along with the count of how many times the IP address appeared.
What is the greatest angle with the vertical : A pendulum consists of a 3.7 kg stone swinging on a 4.4 m string of negligible mass. The stone has a speed of 8.2 m/s when it passes its lowest point. What is the greatest angle with the vertical that the string will reach during the stone's motion
Which access method is used by ethernet : Calculate the minimum length of time it would take to download a 20MByte document from a workstation to a server across each of the following networks.  This means you will have to convert bytes to bits.
Compute the emf induced in the inner solenoid : One solenoid is centered inside another. The outer one has a length of 50.0cm and contains 6800 coils, Find the emf induced in the inner solenoid
Define the electronic configurations of the benzen anion : Predict the electronic configurations of (a) the benzen anion, (b) the benzene cation. Estimate the pi-electron binding energy in each case within the Huckel Approximation.
What is the speed of the heavier mass : The Atwood machine in the figure consists of masses m1 = 1.20 kg and m2 = 1.10 kg and a solid pulley with a diameter of 5.9 cm,  what is the speed of the heavier mass after it has fallen a distance of 1.65 m
Explain the pressure of the gas in the mercury manometer : What is the pressure of the gas in this mercury manometer if h = 69 mm and atmospheric pressure is 749 mmHg

Reviews

Write a Review

Computer Networking Questions & Answers

  How would you ensure that critical update affecting security

How would you ensure that a critical update affecting security is delivered to all the clients using the application? Discuss what you would use for this delivery. Make sure to give advantages and disadvantages to this software.

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Determine time to transmit text over a t-1 line

Be sure to allow for spaces and punctuation between words. How long would it take to transmit the text over a T-1 line at 1.544Mbps and a fibre optic link at 2.488Gbps?

  Calculating higher data rate in atm line

Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

  Calculate the transmission delay for a link rate

Review the results of your calculations and consider the impact these two delays have on the quality of service. As a result of your work, comment on the use of the small cell size used in ATM. Refer to your results to support your position - What..

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  Kinds of business applications in networked business office

Write down types kinds of business applications would you deem significant in networked business office? What kinds of network servers and resources would be essential to run these business applications?

  Explain packet-by-packet fair queueing system-logical buffer

Consider a packet-by-packet fair queueing system with three logical buffers and with service rate of one unit/second. Show the sequence of transmissions for this system.

  Explain multiprogramming and time-sharing environment

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd