MULTIPLE CHOICE QUESTIONS

Similar documents
DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE

Data and Computer Communications. Tenth Edition by William Stallings

Multiplexing. Chapter 8. Frequency Division Multiplexing Diagram. Frequency Division Multiplexing. Multiplexing

Question Paper Profile

EE 304 TELECOMMUNICATIONs ESSENTIALS HOMEWORK QUESTIONS AND ANSWERS

CS420/520 Axel Krings Page 1 Sequence 8

a. Find the minimum number of samples per second needed to recover the signal without loosing information.

CSCI-1680 Physical Layer Rodrigo Fonseca

(Refer Slide Time: 2:23)

and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT

Transmission Principles

Representation of Information. Transmission Principles. Agenda. Transmission of Information

Data and Computer Communications. Tenth Edition by William Stallings

*Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook

ECE 271 INTRODUCTION TO TELECOMMUNICATION NETWORKS HOMEWORK QUESTIONS ECE 271 HOMEWORK-1

Bandwidth Utilization:

P. 241 Figure 8.1 Multiplexing

Lecture 5 Transmission

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures

Physical-Layer Services and Systems

SOME PHYSICAL LAYER ISSUES. Lecture Notes 2A

MODULE IV. End Sem. Exam Marks. Syllabus

PRINCIPLES OF COMMUNICATION SYSTEMS. Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum

BSc (Hons) Computer Science with Network Security. Examinations for Semester 1

Chapter 2. Physical Layer

ROM/UDF CPU I/O I/O I/O RAM

ET4254 Communications and Networking 1

IEEE P Broadband Wireless Access Working Group

The Physical Layer Outline

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

William Stallings Data and Computer Communications 7 th Edition. Chapter 4 Transmission Media

Physical Layer. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Announcements : Wireless Networks Lecture 3: Physical Layer. Bird s Eye View. Outline. Page 1

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

DigiPoints Volume 1 SINE WAVES VA 3.1 SCTE

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

Data Communications. Unguided Media Multiplexing

Making Connections Efficient: Multiplexing and Compression

CPSC Network Programming. How do computers really communicate?

Bandwidth utilization is the wise use of available bandwidth to achieve specific goals.

Bandwidth Utilization:

Operating Systems and Networks. Networks Part 2: Physical Layer. Adrian Perrig Network Security Group ETH Zürich

6. has units of bits/second. a. Throughput b. Propagation speed c. Propagation time d. (b)or(c)

William Stallings Data and Computer Communications. Chapter 8 Multiplexing. Multiplexing

TELECOMMUNICATION SYSTEMS

Outline / Wireless Networks and Applications Lecture 3: Physical Layer Signals, Modulation, Multiplexing. Cartoon View 1 A Wave of Energy

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Data and Computer Communications Chapter 8 Multiplexing

Encoding and Framing

Data and Computer Communications

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal

College of information Technology Department of Information Networks Telecommunication & Networking I Chapter DATA AND SIGNALS 1 من 42

UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT

Data Communications and Networks

Introduction to LAN/WAN. Physical Layer

Figure 4-1. Figure 4-2 Classes of Transmission Media

Introduction to Communications Part Two: Physical Layer Ch3: Data & Signals

CS307 Data Communication

Data and Computer Communications Chapter 4 Transmission Media

Data Transmission. ITS323: Introduction to Data Communications. Sirindhorn International Institute of Technology Thammasat University ITS323

Digital to Digital Encoding

Module 3: Physical Layer

Announcement : Wireless Networks Lecture 3: Physical Layer. A Reminder about Prerequisites. Outline. Page 1

Chapter 1: Telecommunication Fundamentals

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015

Review of Lecture 2. Data and Signals - Theoretical Concepts. Review of Lecture 2. Review of Lecture 2. Review of Lecture 2. Review of Lecture 2

Unguided Media and Matched Filter After this lecture, you will be able to Example?

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

Data and Computer Communications. Tenth Edition by William Stallings

Lecture Progression. Followed by more detail on: Quality of service, Security (VPN, SSL) Computer Networks 2

Point-to-Point Communications

1. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? a MHz (4M -40K) b. 36 MHz c. 360 KHz d. 396 KHz

Chapter 1 Introduction

Chapter 3 Digital Transmission Fundamentals

Unguided Transmission Media

UNIT- 7. Frequencies above 30Mhz tend to travel in straight lines they are limited in their propagation by the curvature of the earth.

CS601 Data Communication Lecture Wise Question and Answers. For final Term Exam Preparation By. Virtualians Social Network

Physical Layer. Transfers bits through signals overs links Wires etc. carry analog signals We want to send digital bits. Signal

Wireless Communications

Introduc)on to Computer Networks

DATA TRANSMISSION. ermtiong. ermtiong

EITF25 Internet Techniques and Applications L2: Physical layer. Stefan Höst

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions

CS441 Mobile & Wireless Computing Communication Basics

Data and Computer Communications

Lecture Progression. Followed by more detail on: Quality of service, Security (VPN, SSL) Computer Networks 2

Last Time. Transferring Information. Today (& Tomorrow (& Tmrw)) Application Layer Example Protocols ftp http Performance.

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering

Computer Networks

Lecture Fundamentals of Data and signals

Chapter 4: Transmission Media

CS601 Data Communication Solved Objective For Midterm Exam Preparation

Unbounded Transmission Media

Fiber Distributed Data Interface

CSE 461: Bits and Bandwidth. Next Topic

The Physical Layer Chapter 2. The Physical Layer

Sirindhorn International Institute of Technology Thammasat University

Cordless Systems and Wireless Local Loop. Cordless System Operating Environments. Design Considerations for Cordless Standards

Transcription:

CHAPTER 7 2. Guided and unguided media 4. Twisted pair, coaxial, and fiber-optic cable 6. Coaxial cable can carry higher frequencies than twisted pair cable and is less sus-ceptible to noise. 8. a. The beam bends toward the horizontal axis, and passes into the less dense medium (R > I). b. The refracted beam travels along the horizontal axis (R = 90 degrees). c. The light beam will be reflected back into the original medium (I = R). 10. In multimode, multiple beams of light from one source travel through the core in different paths. In graded-index multimode, the core s density is not constant but is higher in the center and decreases gradually to a lower density at the edge. In single mode, a step-index fiber is used with a highly focused source of light. 12. Noise resistance, less signal attenuation, and higher bandwidth 14. 3 KHz to 300 GHz 16. Terrestrial microwaves require line of sight propagation, using repeaters (usually installed with each antenna) to increase the distance. 18. During a conversation a mobile phone may move from one cell to another and the signal may become weak. In this case, the MTSO seeks a new cell to accommo-date the communication. The MTSO changes the channel carrying the call. The process of handing the signal from the old channel to the new channel is called handoff. 20. Decibel measures the relative strength of two signals or a signal at two different points. 22. Propagation time = distance / propagation speed 24. The Shannon capacity determines the theoretical highest data rate for a channel. 26. See Figure 7.20 in the text. 28. The troposphere is the portion of the atmosphere extending outward approximately 30 miles from the earth surface and includes the stratosphere. It contains air and is used for the propagation of VLF, LF, MF, VHF and UHF signals. The ionosphere is the layer of the atmosphere above the troposphere. It contains free electrically charged particles (ions). The ionosphere is used to propagate HF signals. 30. The distance terrestrial microwaves can travel is limited by the curvature of the earth and surface obstacles because terrestrial microwaves require line of sight transmission. 32. b 33. b 34. a 35. b 36. a 37. b 38. b 39. d 40. c 41. c 42. b 43. a 44. a 45. d 46. c 47. b 48. a 49. b 50. a 51. b 52. a 53. a 54. a 55. c 56. b 57. a 58. d 59. a 60. b 61. c 62. c 63. a 64. b 65. d 66. c 67. b 68. a 69. b 70. c 71. d 72. b 73. a 74. c 75. d 76. b 77. d 78. d 79. b 80. c 86. 100 Kb / 5 s = 20 Kbps 87. 100,000 bits / 5 Kbps = 20 s 88. 400,000 km / 300,000 km/s = 1.33 s 89. 480 s 300,000 km/s = 144,000,000 km 90. 2.9 10 8 / 10 12 = 0.0003 m = 0.3 mm The wavelength of infrared is longer than the wavelength of red because the frequency of the former is less than the frequency of the latter. 91. 1 mm 5 = 5 mm 92. 2,000 km / 195,000 km/s = 0.01 s = 10 ms 93. 4,000 log 2 (1 + 1,000) = 40 Kbps (approximately) 94. 4,000 log 2 (1 + 10 / 0.005) = 43,866 bps CHAPTER 8 2. In FDM each signal modulates a different carrier frequency. The modulated carriers are combined to form a new signal that is then sent across the link. 4. A demultiplexer uses a series of filters to decompose the multiplexed signal into its constituent component signals. 6. Synchronous and asynchronous 8. Synchronous and asynchronous. In synchronous TDM each frame contains at least one time slot dedicated to each device. The order in which each device sends its data is fixed. In asynchronous TDM the number of time slots is less than the number of devices and the slot order depends on which devices have data to send. Addressing of each time slot is necessary. 10. Inverse multiplexing splits a data stream from one high speed line onto multiple lower speed lines. 1

12. Voice channels (12 x 44 KHz) are multiplexed onto a higher bandwidth line to create a group (48 KHz). Up to five groups (5 x 48 KHz) can be multiplexed to create a super group (240 KHz). Ten super groups (10 x 240 KHz) are multiplexed to create a master group (2.52 MHz). Six master groups are multiplexed to create a jumbo group with 16.984 MHz. 14. The DSU changes the rate of the digital data created by the subscriber s device to 56 Kbps and encodes it in the format used by the service provider. 16. DS is the name of the service, which is implemented by T-lines. The capacity of the lines precisely matches the data rate of DS-services. 18. ADSL divides the bandwidth of a twisted pair cable into three bands. The first band, 0-25 KHz is used for regular telephone service. The second band (925-200 KHz) is for upstream communication and the third band (250 KHz 1 MHz) for downstream communication. 20. FTTC means fiber to the curb. Optical fiber is the medium from the central office of the telephone/cable company to the curb of the users premises. 22. A DSU is used in digital services and because the service is already digital a modem is not needed to transform analog data into digital. The DSU changes the rate of the digital data created by the subscriber s device to 56 Kbps and encodes it in the format used by the service provider. A modem takes a digital signal and changes it to an analog signal and vice versa. 24. For DS-0 the sampling rate is 8000 samples/second; with 8 bits per sample, this means 8000 8 bps or 64 Kbps. 25. d 26. a 27. d 28. a 29. a 30. b 31. a 32. a 33. b 34. d 35. a 36. a 37. b 38. c 39. b 40. d 41. b 42. d 43. d 44. a 45. c 46. b 47. a 48. d 49. d 50. c 51. b 52. a 53. c 54. c 55. a 56. c 57. c 58. d 60. (7900 Hz (200 x 2)) / 3 = 2.5 KHz 62. 41 bits per frame x 100 = 4.1 Kbps 64. See Figure 8.1. 66. 125 us 68. n (n 1) / 2 = 500 (499)/2 = 124,750 lines; multiplexing can reduce the number of lines. 70. Nyquist theorem dictates that the sampling rate must be twice the highest fre-quency; 2 x 4000 Hz or 8000 Hz. 72. T1 line Þ (1,544,000 24 x 64000) / 24 = 333 bits /channel Þ 0.5% T2 line Þ (6,312,00 96 x 64000) / 96 = 1750 bits /channel Þ 2.7% T3 line Þ (44,736,000 672 x 64000) / 672 = 2571 bits /channel Þ 4.0% T4 line Þ (274,176,000 4032 x 64000) / 4032 = 4000 bits /channel Þ 6.2% 74. 19 + 4 x 20 = 99 KHz 76. See Figure 8.5. 78. Thirty percent of the bandwidth is wasted. 80. See Figure 8.6 Output bit rate: 45 bits/second; duration; 22 ms; 45 slots per second 82. 2 Mbps; T1 is not appropriate in this case (1.544 Mbps) 84. See Figure 8.8. 2

CHAPTER 9 2. Redundancy is a technique of adding extra bits into each data unit for the purpose of determining the accuracy of transmission. 4. A parity bit is added to every data unit so that the total number of 1s in the unit becomes even (in even-parity checking). If after transmission the number of 1s is odd, then there must be an error. 6. VRC is the least expensive and most common type of error detection. It can detect single bit errors as well as burst errors if the total number of bits changed is odd. 8. An LRC of n bits can detect single bit errors as well as most burst errors of n bits except for damage to corresponding bits of different data units. 10. The length of the divisor should be one bit more than the length of the CRC. 3

12. A polynomial should not be divisible by x and should be divisible by (x+1). 14. Checksum. 16. a. The checksum generator divides the data into equal segments. b. The segments are added together using one's complement arithmetic. c. The sum is complemented and sent to the receiver along with the data. 18. If a bit inversion in one data segment is balanced by an opposite bit inversion on the corresponding bit of another segment, the error can't be detected by checksum. 20. The purpose of the Hamming code is to correct one or more corrupted bits. 21. b 22. b 23. d 24. a 25. c 26. b 27. c 28. a 29. d 30. c 31. b 32. a 33. b 34. a 35. d 36. b 37. c 38. d 39. d 40. d 41. b 42. a 43. d 44. d 46. a. 0 b. 0 c. 1 d. 0 48. 11110110 50. No error 52. 0001101110001100 54. a. 5 b. 5 c. 5 d. 7 56. 00111010 11001111 11111111 00000000 00001010 58. Bits 1, 5, 7, and 8 (from the right) are in error. 60. 5 bits long 62. x 11 + x 6 + x 5 + x 4 + 1 64. Two redundancy bits, one data bit. 66. No errors in the received code; the original code is the same as the received code. CHAPTER 10 REVIEW QUESTIONS 2. Line discipline, error control, and flow control. 4. The two methods for line discipline are ENQ/ACK and poll/select. The first method is used in peer-to-peer communication. The second method is used in pri-mary- secondary communication. 6. If the primary device wants to receive data it asks the secondary devices if they have anything to send. This is called polling. If the primary wants to send data, it tells the target secondary to get ready to receive the data. This is called selecting. 8. Polling is used by the primary device to receive transmissions from secondary devices. Selecting is used by the primary device if it wants to send something to secondary devices. 10. Each receiving device has a block of memory (buffer) that is used for storing the incoming data until they are processed. If the buffer starts to fill up, the receiver must be able to notify the sender. 12. In stop-and-wait flow control the sender waits for an ACK from the receiver after each frame sent. A new frame is only sent out if the previous frame has been acknowledged. 14. Error control refers to methods of error detection and retransmission and is based on automatic repeat request (ARQ), which means retransmission of the data in the case of damaged frames, lost frames, or lost acknowledgments. 16. The sender retransmits a packet if the packet was damaged or lost or if the acknowledgment of that packet was lost. 18. The two types of sliding window ARQ are go-back-n and selective-reject. In the first method, if one frame is lost or damaged, all frames since the last acknowledg-ment are retransmitted. In selective-reject only the specific damaged or lost frames will be retransmitted. 20. a. If a frame is damaged, the receiver sends a negative acknowledgment (NAK) indicating the last frame sent was damaged and needs to be retransmitted. b. If a frame is lost, the timer goes off and the frame is resent. 21. If a NAK gets lost, the sender timer expires. The sender automatically retransmits the last frame sent. The NAK frames are not numbered because the sender waits for an acknowledgment after each frame is sent. If the sender receives a NAK frame it automatically knows that the last frame sent was damaged and retransmits that frame. 22. In practice, go-back-n ARQ is more popular due to its simplicity of implementa-tion. 24. c 25. a 26. a 27. b 28. c 29. a 30. c 31. b 32. d 33. c 34. c 35. b 36. c 37. d 38. b 39. c 40. b 41. d 42. d 43. a 44. c 45. a 4

EXERCISES 46. See Figure 10.1. 48. a. Data frame or NAK b. ACK or NAK 50. a. The number refers to the receipt of an acceptable frame. b. The number refers to the next expected frame. c. The number refers to the next expected frame. 52. Four bits. 54. 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2 56. See Figure 10.3. 58. See Figure 10.5. 62. 26 ms 64. 26 ms 66. See Figure 10.9. 68. See Figure 10.11. 5

Chapter 11 2. A DLE DLE pattern can be seen when the transparent region contains DLE as a part of the text. 4. In data communications protocol means a set of rules or specifications used to implement one or more layers of the OSI model. 6. Asynchronous protocols are mainly used in modems. 8. Synchronous protocols can be character-oriented or bit-oriented. In a character-oriented protocol, the frame is interpreted as a series of characters while in a bit-oriented protocol the frame is interpreted as a series of bits. 10. BSC is used in both point-to-point and multipoint configurations. It supports half-duplex transmission and uses stopand-wait ARQ for flow control and error control. 12. In a long BSC frame error detection is more difficult since changes in several bits can cancel each other. Therefore to decrease the probability of an error the message should be divided between several blocks. 14. Control frames are used to establish connections, maintain flow and error control during transmission, and terminate connections. 16. In an unbalanced configuration the primary device sends commands; the secondary devices send responses. In a symmetrical configuration, the primary part of one station sends commands to the secondary part of the other one and vice versa. In a balanced configuration both stations can send commands and responses. 18. Bit stuffing is the process of adding one extra 0 when there are five consecutive 1s in the data stream to distinguish data from a flag. 20. Piggybacking is combining data to be sent and acknowledgment of the received frame in one single frame. 22. Mode-setting, unnumbered-exchange, disconnection, initialization, and miscella-neous. 24. b 25. b 26. a 27. b 28. b 29. b 30. c 31. c 32. d 33. b 34. b 35. b 36. a 37. a 38. a 39. b 40. b 41. b 42. a figure 11-1 EXERCISES 43. SYN-SYN-EOT-SYN-H-E-L-L-O (The hyphens separate bytes). 44. SYN-SYN-EOT-SYN-DLE-B-Y-E (The hyphens separate bytes). 6

45. Only the control field is shown in Figure 11.1 46. Ü 0001111101011111000111100111110001 47. Ü 000111110111110111110111110111110111100111110001 48. a. 0000111 (7) b. S-frame c. N/A d. 3 e. no f. no g. It is a poll frame. 49. a. 0000111 (7) b. S-frame c. N/A d. 3 e. no f. no g. It is a negative response to poll or positive response to select (depends on the previous packet). 50. a. 0000011 (3) b. S-frame c. N/A d. 3 e. no f. no g. Select 51. a. 0000011 (3) b. S-frame c. N/A d. 3 e. no f. no g. Negative response to select 52. a. 0000011 b. I-frame c. 2 d. 3 e. 00101110010100001011 f. no 53. a. 0000011 (3) b. I-frame c. 2 d. 3 e. 001111101011110010100001011 f. no 54. a. 1000011 (67) b. U-frame c. N/A d. N/A e. no f. 00101...00001011 55. a. SYN-SYN-ENQ b. SYN SYN ACK0 c. SYN SYN STX 100bytes ITB BCC STX 100bytes ITB BCC STX 100bytes ITB BCC STX 100bytes ETB BCC SYN SYN STX 100bytes ITB BCC STX 100bytes ITB BCC STX 100bytes ITB BCC STX 100bytes ETB BCC SYN SYN STX 100bytes ITB BCC STX 100bytes ITB BCC STX 100bytes ITB BCC STX 100bytes ETX BCC d. SYN SYN ACK1 56. a. SYN SYN ENQ figure 11-2 b. SYN SYN STX 50 bytes ETX BCC c. SYN SYN ACK1 57. See Figure 11.2 58. See Figure 11.3 59. See Figure 11.4 60. See Figure 11.5 figure 11-4 figure 11-3 figure 11-5 Chapter 12 CHAPTER 12 2. CSMA/CD is the access mechanism used in Ethernet (802.3). If a station wants to send data over the network, it must first listen for existing traffic on the line. If no traffic is detected, the line is considered idle and transmission is initiated. Then the station continues to listen after sending the data. If a collision is detected, the station stops the current transmission and waits a certain amount of time for the line to clear and then starts all over again. 4. These fields are added by the MAC layer. 6. They are almost the same. The control field is moved to the LLC layer. The addresses are divided into two source and destination addresses. The type field is added to define the upper layer protocol using the frame. 7

8. Baseband refers to digital signal transmission (without modulation) and broadband refers to analog signal transmission (with modulation). 9. In 10Base5, the transceiver is placed onto the cable and connects the station NIC to the link via an AUI cable. In 10Base2, the transceiver circuit is in the NIC. In 10Base-T, instead of an individual transceiver, all of the networking operations are placed into an intelligent hub that has a port for every station. 10. Collision occurs in an Ethernet when two stations on the same link transmit data at the same time. A collision can be detected by an extremely high voltage on the line. 12. The AC field is a field in the Token Ring frame and is used to control the access on a Token Ring network. Since 802.3 uses CSMA/CD as its access method, an AC field is not needed. 14. 4B/5B encoding transforms each four-bit data segment into a five-bit unit that contains no more than two consecutive 0s. Each of the 16 possible four-bit patterns is assigned a five-bit pattern to represent it. These patterns have been selected so that even sequential data units cannot result in a sequence of more than three 0s. None of the five-bit patterns start with more than one 0 or ends with more than two 0s. 16. A token circulates around the Token Ring network. This token travels from NIC to NIC in sequence, until it encounters a station that wants to send data. This station then keeps the token (if free) and sends its data. The data frame proceeds around the ring. When the frame reaches its destination, the receiving station copies the message, checks for errors and changes four bits in the last byte of the frame. The frame then continues around the ring. The original sender examines the frame and discards the used data frame and releases the token back on the ring. 18. The switch is a device that can recognize the destination address of a frame and can therefore route the frame to the port of the destination station. This way the rest of the media is not involved in the transmission. 20. 100Base-FX uses fiber optic cable which has less signal degradation. 22. b 23. b 24. a 25. c 26. c 27. c 28. d 29. c 30. b 31. b 32. d 33. b 34. d 35. c 36. d 37. c 38. d 39. a 40. a 41. b 42. a 43. b 44. d 45. a 46. d 47. d 48. d 49. b 50. a 51. b 52. c 53. b 54. d 55. b 56. c 57. b 58. Smallest Ethernet frame: 72 bytes (26 byte header + 46 bytes of data) Largest Ethernet frame: 1,526 bytes (26 byte header + 1,500 bytes of data) 60. Ratio for smallest Ethernet frame: 46 / 72 or 0.639. Ratio for largest Ethernet frame: 1500 / 1526 or 0.983. Average ratio: (46 / 72 + 1500 / 1526) / 2 or 0.811. 62. The Ethernet frame must have a minimum data size because a sending station must be able to sense a collision before the entire frame is sent. The minimum size of an Ethernet network is therefore determined by the minimum frame size. If there is no minimum data size, the minimum frame size would be only 27 bytes (26 byte header + 1 byte of data) which would make the minimum network size much shorter. 64. In the worst case, the collision would be sensed in 2 13.89 = 27.8 microseconds. 66. If we call the minimum number of bits X: X bits / 10,000,000 bits/second = 0.0000278 seconds X = 10,000,000 0.0000278 = 277.78 bits 277.78 bits / 8 = 34.72 bytes The minimum frame size would have to be larger than 35 bytes for an Ethernet net-work of length 2500 meters to work properly. 68. The token size is 3 bytes. 3 bytes 8 bits / byte = 24 bits. If the data rate is 16 Mbps, 24 bits can be generated in: 24 bits / 16,000,000 bits/second = 1.5 microseconds 70. 11011011101110011101 72. See Table 12.1 Table 12.1 Exercise 72 Feature Ethernet Token Ring Preamble 56 bits None SFD 10101011 None SD None One byte AC None One byte FC None One byte Destination address Six bytes Two to six bytes Source address Six bytes Two to six bytes Data size 46 to 1500 bytes Up to 4500 bytes CRC CRC-32 CRC-32 ED None One byte FS None One byte 8