1-In a network based on the bus topology, the bus is a non-shareable resource for which the machines must compete in order to transmit messages. How is deadlock controlled in this context? 2-Using 32-bit Internet addresses was originally thought to provide ample room for expansion, but that conjecture is not proving to be accurate. IPV6 uses 128-bit addressing. Will that prove to be adequate? Justify your answer’ (for example, you might compare the number of possible addresses to the population of the world).

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter9: Computer Networks
Section: Chapter Questions
Problem 3VE
icon
Related questions
Question

1-In a network based on the bus topology, the bus is a non-shareable resource for which the machines must compete in order to transmit messages. How is deadlock controlled in this context?

2-Using 32-bit Internet addresses was originally thought to provide ample room for expansion, but that conjecture is not proving to be accurate. IPV6 uses 128-bit addressing. Will that prove to be adequate? Justify your answer’ (for example, you might compare the number of possible addresses to the population of the world).

Expert Solution
Step 1

1- Deadlock in a bus topology network occurs when two or more devices simultaneously try to transmit messages and block each other, waiting for the other to finish. This can result in a situation where no device can send or receive messages, causing the network to become unavailable. Deadlock control in this context can be achieved through various techniques, including:

  • Media Access Control (MAC) Protocols: In bus topology networks, the MAC protocol is responsible for determining which device has control of the bus and when it can transmit messages. By implementing a specific MAC protocol, such as Carrier Sense Multiple Access with Collision Detection (CSMA/CD), the risk of deadlock can be reduced.

  • Token Passing: In this technique, a "token" is passed between devices, and only the device in possession of the token is allowed to transmit messages. When a device finishes transmitting its message, it passes the token to the next device, allowing it to transmit. This technique eliminates the possibility of deadlock as each device takes turns accessing the bus.

 

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Hyperlinks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning