This test has six questions. The test runs the entire class period, starting at 4:30 and ending at 6:20. When you finish the test, you may leave.
• Frames• ARP table• Hub• Virtual local area network (VLAN)• Random access protocol
• Frames:The PDUs sent by the data-link layer.• ARP table:The table used by ARP to map an IP address to a MAC address.• Hub:A layer-2 device that passively connects LAN segments into a larger lan.• Virtual local area network (VLAN):A technique for segmenting a switch-connected LAN into operationally separate LANs (the virtual LANs).• Random access protocol:A shared-channel media-access protocol providing relatively unconstrained access to the channel and a method from recovering from channel-access conflicts (collisions).
If a host’s ARP table fails to map an IP address to a MAC address, the ARP protocol queries every host on the network segment by sending an ARP resolution request addressed to the MAC broadcast address.
Define the addition-based checksum as the sum of the bytes in the message where
each byte is interpreted as an 8-bit unsigned integer and the sum is
interpreted as addition modulo 256 (This definition involves division; if that
upsets you, you can define the sum as the running sum of arbitrary length).
For example, the two-byte message 1 2
has checksum 1 + 2 = 3. This
checksum doesn’t distinguish between the messages 1 2
and 2 1
(or the messages 10000001 10000010
and 00000001 00000010
).
Define the division-based checksum as 1) a zero-byte message has checksum 1 and
2) an n-byte message bn, bn-1, ..., b1 has the
checksum equal to the quotient of dividing bn by the checksum of
n-1-byte message bn-1, ..., b1. For example, the two-byte
message 2 1
has checksum 2 (1/1 = 1, 2/1 = 2) and the message 1 2
has
checksum 0 (2/1 = 2, 1/2 = 0).
No. The smallest number of hosts possible is zero, in which case you don’t have a network. A similar argument holds for 1 (although you can imagine a single host on an Ethernet segment connecting to a gateway to another network). With two hosts, there’s always the possibility of both hosts wanting to transmit simultaneously, leading to collisions (assuming the hosts are otherwise independent).
There are many:
The token-ring protocol is a half-duplex protocol: a host holding the token gets to send a message, and then sends the token to the next host. If the host holding the token has no message to send, it just sends the token.