Data communications and Networking 4th Edition by behrouz forouzan
Chapter 1-32 stress during math exams, particularly when they are faced with complex, multi-step problems. The pressure to perform well on timed exams can further
exacerbate this challenge.7. Future Trends in
, interactive case studies, or project-based assessments. These methods can better replicate the conditions of the modern business environment, where decision-making often requires
collaboration, creativity, and adaptability. Digital tools and platforms that offer real-time feedback
CHAPTER 1
Introduction
Solutions to Review Questions and Exercises
Review Questions
1. The five components of a data communication system are the sender, receiver,
transmission medium, message, and protocol.
2. The advantages of distributed processing are security, access to distributed data-
bases, collaborative processing, and faster problem solving.
3. The three criteria are performance, reliability, and security.
4. Advantages of a multipoint over a point-to-point configuration (type of connec-
tion) include ease of installation and low cost.
5. Line configurations (or types of connections) are point-to-point and multipoint.
6. We can divide line configuration in two broad categories:
a. Point-to-point: mesh, star, and ring.
b. Multipoint: bus
7. In half-duplex transmission, only one entity can send at a time; in a full-duplex
transmission, both entities can send at the same time.
8. We give an advantage for each of four network topologies:
a. Mesh: secure
b. Bus: easy installation
c. Star: robust
d. Ring: easy fault isolation
9. The number of cables for each type of network is:
a. Mesh: n (n – 1) / 2
b. Star: n
c. Ring: n – 1
d. Bus: one backbone and n drop lines
10. The general factors are size, distances (covered by the network), structure, and
ownership.
, 2
11. An internet is an interconnection of networks. The Internet is the name of a spe-
cific worldwide network
12. A protocol defines what is communicated, in what way and when. This provides
accurate and timely transfer of information between different devices on a net-
work.
13. Standards are needed to create and maintain an open and competitive market for
manufacturers, to coordinate protocol rules, and thus guarantee compatibility of
data communication technologies.
stress during math exams, particularly when they are faced with complex, multi-step problems. The pressure to perform well on timed exams can further exacerbate this challenge.7.
Future Trends in
Exercises
14. Unicode uses 32 bits to represent a symbol or a character. We can define 232 differ-
ent symbols or characters.
15. With 16 bits, we can represent up to 216 different colors.
16.
a. Cable links: n (n – 1) / 2 = (6 5) / 2 = 15
b. Number of ports: (n – 1) = 5 ports needed per device
17.
a. Mesh topology: If one connection fails, the other connections will still be work-
ing.
b. Star topology: The other devices will still be able to send data through the hub;
there will be no access to the device which has the failed connection to the hub.
c. Bus Topology: All transmission stops if the failure is in the bus. If the drop-line
fails, only the corresponding device cannot operate.
d. Ring Topology: The failed connection may disable the whole network unless it
is a dual ring or there is a by-pass mechanism.
18. This is a LAN. The Ethernet hub creates a LAN as we will see in Chapter 13.
19. Theoretically, in a ring topology, unplugging one station, interrupts the ring. How-
ever, most ring networks use a mechanism that bypasses the station; the ring can
continue its operation.
20. In a bus topology, no station is in the path of the signal. Unplugging a station has
no effect on the operation of the rest of the network.
21. See Figure 1.1
22. See Figure 1.2.
, interactive case studies, or project-based assessments. These methods can better replicate the conditions of the modern business environment,
where decision-making often requires collaboration, creativity, and adaptability. Digital tools and platforms that offer real-time feedback
a. E-mail is not an interactive application. Even if it is delivered immediately, it
may stay in the mail-box of the receiver for a while. It is not sensitive to delay.
b. We normally do not expect a file to be copied immediately. It is not very sensi-
tive to delay.
c. Surfing the Internet is the an application very sensitive to delay. We except to
get access to the site we are searching.
23. In this case, the communication is only between a caller and the callee. A dedi-
cated line is established between them. The connection is point-to-point.
, 3
Figure 1.1 Solution to Exercise 21
Hub
Station Station Station Station
Repeater Repeat er
Station Station Station Station
Repeat er
Station
stress during math exams, particularly when they are faced with complex, multi-step problems. The pressure to perform well on timed exams can further exacerbate this challenge.7.
Future Trends in
Figure 1.2 Solution to Exercise 22
Station Station
Repeater
Repeater
Station Station
24. The telephone network was originally designed for voice communication; the
Internet was originally designed for data communication. The two networks are
similar in the fact that both are made of interconnections of small networks. The
telephone network, as we will see in future chapters, is mostly a circuit-switched
network; the Internet is mostly a packet-switched network.
, interactive case studies, or project-based assessments. These methods can better replicate the conditions of the modern business environment,
where decision-making often requires collaboration, creativity, and adaptability. Digital tools and platforms that offer real-time feedback
, CHAPTER 2
Network Models
Solutions to Review Questions and Exercises
, interactive case studies, or project-based assessments. These me stress during math exams, particularly when they are faced with complex, multi-step problems. The pressure to
perform well on timed exams can further exacerbate this challenge.7. Future Trends in thods can better replicate the conditions of the modern business environment, where decision-
making often requires collaboration, creativity, and adaptability. Digital tools and platforms that offer real-time feedback
Review Questions
1. The Internet model, as discussed in this chapter, include physical, data link, net-
work, transport, and application layers.
2. The network support layers are the physical, data link, and network layers.
3. The application layer supports the user.
4. The transport layer is responsible for process-to-process delivery of the entire
message, whereas the network layer oversees host-to-host delivery of individual
packets.
5. Peer-to-peer processes are processes on two or more devices communicating at a
same layer
6. Each layer calls upon the services of the layer just below it using interfaces
between each pair of adjacent layers.
7. Headers and trailers are control data added at the beginning and the end of each
data unit at each layer of the sender and removed at the corresponding layers of the
receiver. They provide source and destination addresses, synchronization points,
information for error detection, etc.
8. The physical layer is responsible for transmitting a bit stream over a physical
medium. It is concerned with
a. physical characteristics of the media
b. representation of bits
c. type of encoding
d. synchronization of bits
e. transmission rate and mode
f. the way devices are connected with each other and to the links
9. The data link layer is responsible for
a. framing data bits
b. providing the physical addresses of the sender/receiver
c. data rate control
1