# Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Save this PDF as:

Size: px
Start display at page:

Download "Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is"

## Transcription

1 CS326e Quiz 3 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID In the following 7 problems, we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 10 8 meters/sec, and the distance between source and destination is 10,000 km. Initially suppose there is only one link between source and destination. Also suppose that the entire MP3 file is sent as one packet. The transmission delay is: 3 seconds 50 milliseconds. Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is 6 seconds 3 seconds Referring to the above question, how many bits will the source have transmitted when the first bit arrives at the destination. 1 bit 30,000,000 bits 500,000 bits

2 Now suppose there are two links between source and destination, with one router connecting the two links. Each link is 5,000 km long. Again suppose the MP3 file is sent as one packet. Suppose there is no congestion, so that the packet is transmitted onto the second link as soon as the router receives the entire packet. The end-to-end delay is 6.1 seconds 6.05 seconds Now suppose that the MP3 file is broken into 3 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ignore router processing delays. Assuming store and forward packet switching at the router, the total delay is 6.05 seconds 4.05 seconds Now suppose there is only one link between source and destination, and there are 10 TDM channels in the link. The MP3 file is sent over one of the channels. The end-to-end delay is seconds 30 seconds 300 microseconds

3 Now suppose there is only one link between source and destination, and there are 10 FDM channels in the link. The MP3 file is sent over one of the channels. The end-to-end delay is seconds 300 microseconds 3 seconds Review the car-caravan example in Section 1.6. Again assume a propagation speed of 100 km/hour. Suppose the caravan travels 200 km, beginning in front of one tollbooth, passing through a second tollbooth, and finishing just before a third tollbooth. What is the end-to-end delay? 64 minutes 122 minutes 62 minutes 124 minutes Referring to the above problem, suppose now that when a car arrives at the second tollbooth, it proceeds through the tollbooth without waiting for the cars behind it. What is the end-to-end delay? 122 minutes and 24 seconds 124 minutes 122 minutes and 12 seconds 62 minutes

4 Suppose there are two links between a source and a destination. The first link has transmission rate 100 Mbps and the second link has transmission rate 10 Mbps. Assuming that the only traffic in the network comes from the source, what is the throughput for a large file transfer? 100 Mbps 1 Gbps 110 Mbps 10 Mbps

5 Before sending a packet into a datagram network, the source must determine all of the links that packet will traverse between source and destination. Layers four and five of the Internet protocol stack are implemented in the end systems but not in the routers in the network core. The Internet provides its applications two types of services, a TDM service and a FDM service. ADSL bandwidth is shared. With ADSL, each subscriber gets more downstream bandwidth than upstream bandwidth.

6 Twisted-pair cooper wire is no longer present in computer networks. Suppose 10 connections traverse the same link of rate 1 Gbps. Suppose that the client access links all have rate 5 Mbps. Then the maximum throughput for each connection is 100 Mbps. The acronym API in this textbook stands for Advanced Performance Internet. Consider a queue preceding a transmission link of rate R. Suppose a packet arrives to the queue periodically every 1/a seconds. Also suppose all packets are of length L. Then the queuing delay is small and bounded as long as al < R. In the connection flooding attack, the attacker sends a deluge of packets to the targeted host, clogging the target s access link with packets.

### R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

### CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

### CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link

### Solutions to the Sample Questions on Introduction

Solutions to the Sample Questions on Introduction NOTE: Pay close attention to units. A byte of storage is 8-bits, and 1 kilobits of storage is1024 bits. By convention, the rules are different between

### Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,

### First Midterm for ECE374 02/25/15 Solution!!

1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

### Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

### :-------------------------------------------------------Instructor---------------------

Yarmouk University Hijjawi Faculty for Engineering Technology Computer Engineering Department CPE-462 Digital Data Communications Final Exam: A Date: 20/05/09 Student Name :-------------------------------------------------------Instructor---------------------

### Network Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency

Network Performance: Networks must be fast What are the essential network performance metrics: bandwidth and latency Transmission media AS systems Input'signal'f(t) Has'bandwidth'B System'with'H(-) Output'signal'g(t)

### ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

ECE/CS 372 introduction to computer networks Lecture 2 Announcements: Please make sure to check the course s website on a regular basis http://web.engr.oregonstate.edu/~sinkyha/cs372 Midterm scheduled

### Computer Networks Homework 1

Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

### Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

Computer Networks Delay, loss and throughput Layered architectures How do loss and delay occur? packets queue in router buffers packet arrival rate to exceeds output capacity packets queue, wait for turn

### CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

### The Impact of QoS Changes towards Network Performance

International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact

### Communication Networks Chapter 5. Switching Technology

Communication Networks Chapter 5. Switching Technology o Circuit Switching o Message Switching o Virtual Circuit / Virtual Connection o Datagram Recapitulation: Telecommunications Network LAN 1 Backbone

### Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

### IT-5302-3 Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

IT-5302-3 Internet Architecture and Protocols Punjab University College of Information Technology, University of the Punjab, Pakistan. Lecture 02 Overview of Internet Architecture Lecture 02 - Roadmap

### What is Network Latency and Why Does It Matter?

What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known

### Exam 1 Review Questions

CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

### Operating Systems and Networks Sample Solution 1

Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation

### Chapter 3 ATM and Multimedia Traffic

In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

### What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

### EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

### Strategies. Addressing and Routing

Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that

### Multiplexing, Circuit Switching and Packet Switching. Circuit Switching

Multiplexing, Circuit Switching and Packet Switching Circuit Switching Old telephone technology For each connection, physical switches are set in the telephone network to create a physical circuit That

### 1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

### Analog vs. Digital Transmission

Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

### DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

### Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,

### Architecture and Performance of the Internet

SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

### Internet structure: network of networks

Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure and s 1.6 Delay & loss in packet-switched networks 1.7 Protocol

### CSE331: Introduction to Networks and Security Homework 1 Fall 2006 Due: 29 Sept. 2006

CSE331: Introduction to Networks and Security Homework 1 Fall 006 Due: 9 Sept. 006 What to turn in: Submit hardcopy answers to the questions below. Please include your name, e-mail address, and the number

### Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

### Final for ECE374 05/06/13 Solution!!

1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

### The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

CS326e Spring 2014 Midterm Exam Name SOLUTIONS UTEID The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. 1. [4 Points]

### Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Introduction cont. Some Structure in the Chaos Lecture goal: get context, overview, feel of ing more depth, detail later in course approach: o descriptive o use Internet as example Overview: access net,

### Homework Assignment #1 Solutions

Homework Assignment #1 Solutions EE122: Introduction to Communication Networks (Fall 2007) Department of Electrical Engineering and Computer Sciences College of Engineering University of California, Berkeley

### 15-441: Computer Networks Homework 1

15-441: Computer Networks Homework 1 Assigned: January 29, 2008 Due: February 7, 2008 1. Suppose a 100-Mbps point-to-point link is being set up between Earth and a new lunar colony. The distance from the

### ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

### A SENSIBLE GUIDE TO LATENCY MANAGEMENT

A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former

### Application Performance Analysis and Troubleshooting

Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency

### CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

### Lecture 21 ISDN Integrated Digital Network.

Lecture 21 ISDN is an acronym for Integrated Services Digital Network. ISDN was developed to cater the needs of users who want high data rate, since conventional telephone line is not capable of providing

### Tutorial for Chapter 1

Tutorial for Chapter 1 CEN 444 Computer Networks Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa Tutorial for

### Solving the Big Dilemma of Big Data

shaping tomorrow with you Our thirst for information and communication is, it seems, insatiable. This is particularly apparent in the online world, where data sets are getting steadily larger. These massive

### Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

### The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

### AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

### EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

### CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

### Chapter1: Exercises. Silvia Giordano ICA, EPFL. Project e-1

Chapter1: Exercises Silvia Giordano ICA, EPFL Project e-1 EX1: Protocol design Design and describe an application-level protocol to be used between an automatic teller machine (ATM) and a bank s centralized

### First Midterm for ECE374 03/24/11 Solution!!

1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

### Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren Lecture 1 Overview" Class overview Expected outcomes Structure of the course Policies and procedures A brief review

### CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

### Tutorial 1 (Week 6) Introduction

COMP 333/933 Computer Networks and Applications Tutorial (Week 6) Introduction Problem Set, Question 7 Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose

### Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

### This topic lists the key mechanisms use to implement QoS in an IP network.

IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

### Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

### CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

### Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

### Corvil Insight. Low-Latency Market Data

Corvil Insight Low-Latency Market Data of 12 Contents How much bandwidth do you really need? 4 How to ask the bandwidth question for low-latency? 4 What about loss? 5 Exchange feed example 5 Working with

### Technote. SmartNode Quality of Service for VoIP on the Internet Access Link

Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed

### EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

### Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than \$100,000 % ISP intranet % % % backbone satellite link desktop computer: server: network

### File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

White Paper File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss Introduction In today s complex networks it is often difficult to correlate different measurements that are reported by network

### H3C SR8800 RPR Technology White Paper

H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable

### Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

### (Refer Slide Time: 2:10)

Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer

### Three Network Technologies

Three Network Technologies Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching Internet The global public information infrastructure for data ing technique:

### Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

### Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Layer Introduction Datagrams and Virtual ircuits Routing Traffic ontrol Main Objective Data delivery from source to destination Node (Router) Application Presentation Session Transport Data Link Data Link

### Chapter 9. IP Secure

Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

### Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.

### 1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

### Data Networks Summer 2007 Homework #3

Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

### Transport Layer Protocols

Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

### EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

### STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

### Chapter 1 Computer Networks and the Internet

CSF531 Advanced Computer Networks 高 等 電 腦 網 路 Chapter 1 Computer Networks and the Internet 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Access networks

### Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is Store-and-Forward packet switching? What is a connectionless

### Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

### Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link

### Per-Flow Queuing Allot's Approach to Bandwidth Management

White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

### Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

### EKSAMEN / EXAM TTM

1.1 1.1.1...... 1.1.6...... 1.1.2...... 1.1.3..... 1.1.4...... 1.1.5..... 1.1.7...... 1.1.8..... 1.1.9...... 1.1.10... 1.2 1.2.1...... 1.2.2...... 1.2.3..... 1.2.4...... 1.2.5..... 1.2.6...... 1.2.7......

### The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

The Internet CCST9015 Feb 6, 2013 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How fast the

### By: Mohsen Aminifar Fall 2014

By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: m.aminifar@modares.ac.ir admin@parsenet.ir Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175

### Distributed Denial of Service Attacks & Defenses

Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011 Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources:

### Data Communications & Computer Networks. Circuit and Packet Switching

Data Communications & Computer Networks Chapter 9 Circuit and Packet Switching Fall 2008 Agenda Preface Circuit Switching Softswitching Packet Switching Home Exercises ACOE312 Circuit and packet switching

### Smart Queue Scheduling for QoS Spring 2001 Final Report

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

### Internet Packets. Forwarding Datagrams

Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

### SPEAKEASY QUALITY OF SERVICE: VQ TECHNOLOGY

SPEAKEASY QUALITY OF SERVICE: VQ TECHNOLOGY August 2005 Formoreinformation,contactSpeakeasyPartnerITS at630.420.2550orvisitwww.teamits.com. www.speakeasy.net 800-556-5829 1201 Western Ave Seattle, WA 98101

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

### Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

### Routing in packet-switching networks

Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

### Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

### Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

### 06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize