Tutorial for Chapter 1
|
|
- Geoffrey Armstrong
- 7 years ago
- Views:
Transcription
1 Tutorial for Chapter 1 CEN 444 Computer Networks Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
2 Tutorial for Chapter 1 Problem 1 Problem 1 If a camel can carry a box of three 8-mm tapes. These tapes each contain 7 gigabytes. The camel can travel at 18 km/hour. 1. For what range of distances does the camel have a higher data rate than a transmission line whose data rate (excluding overhead) is 150 Mbps? 2. How does your answer change if: a. camel s speed is doubled. b. each tape capacity is doubled. c. the data rate of the transmission line is doubled. M. Dahshan CEN444 Computer Networks Page 2 of 15
3 Tutorial for Chapter 1 Problem 1 Solution The camel can carry 7 3 = 21 gigabytes, or 21 8 = 168 gigabits. A speed of 18 km/hour = The time to travel distance x km is = km/sec. x = 200x sec, Data rate = data size / travel time = 168/200x Gbps = 0.84/x Gbps = 840/x Mbps. Data rate higher than 150 Mbps means 840/x > 150, i.e. x < = 5.6 km. Thus, at x < 5.6 km, the camel has a higher rate than the communication line. (a) New speed 18 2 km/hour = 36/(60 60) = 0.01 km/sec. The time to travel distance x a km is x a 0.01 = 100x a sec, Data rate = data size / travel time = x a Gbps = 1.68 x a Gbps = 1680 x a Data rate higher than 150 Mbps means 1680 > 150, i.e. x x a < 1680 a 150 Mbps. = 11.2 km. M. Dahshan CEN444 Computer Networks Page 3 of 15
4 Tutorial for Chapter 1 Problem 1 That is, x a = 2x. Therefore, if camel s speed is doubled, maximum value of x is also doubled. (b) The camel can carry = 42 gigabytes, or 42 8 = 336 gigabits. Data rate = data size / travel time = x b Gbps 1.68/xb Gbps = 1680/xi Mbps. The rest is the same as (a). Therefore, if tape capacity is doubled, value of x is also doubled. (c) x < 840/150 x c < , x c = x 2. Therefore, if data rate of the transmission line is doubled, value of x is halved. M. Dahshan CEN444 Computer Networks Page 4 of 15
5 Tutorial for Chapter 1 Problem 2 Problem 2 A factor in the delay of a store-and-forward packet-switching system is how long it takes to store and forward a packet through a switch. If switching time is 10 μ sec, is this likely to be a major factor in the response of a client-server system where the client is in New York and the server is in California? Assume the propagation speed in copper and fiber to be 2/3 the speed of light in vacuum. Note: the distance between New York and California is 5,000 km. Assume there can be a maximum of 50 switches along the path. M. Dahshan CEN444 Computer Networks Page 5 of 15
6 Tutorial for Chapter 1 Problem 2 Solution The speed of propagation is 200,000 km/sec = 200 meters/μsec. In 10 μsec the signal travels 200m 10 = 2000m = 2 km. Thus, each switch adds the equivalent of 2 km of extra cable. Traversing 50 switches adds 2 50 = 100 km to the total path. If the client and server are separated by 5000 km, the percentage of the equivalent added distance is which is = 2% Thus, switching delay is not a major factor under these circumstances. M. Dahshan CEN444 Computer Networks Page 6 of 15
7 Tutorial for Chapter 1 Problem 3 Problem 3 1. Calculate the total time required to transfer a 1,000-KB file in the following cases, assuming an RTT of 100 ms, a packet size of 1-KB data, and an initial 2xRTT of handshaking before data is sent. a. The bandwidth is 1.5 Mbps, and data packets can be sent continuously. b. The bandwidth is 1.5 Mbps, but after we finish sending each data packet we must wait one RTT before sending the next. M. Dahshan CEN444 Computer Networks Page 7 of 15
8 Tutorial for Chapter 1 Problem 3 Solution a. We have a 2xRTT initial handshake, followed by the time to transmit 1000 KB, and finally the propagation delay (half RTT) for the last bit to reach the other side. Therefore, we have: Initial handshake is = 0.2 sec Time to transmit 1000 KB = data size in bits = = sec data rate in bits per second Propagation delay for the last bit to reach the other side = = 0.5 sec Total delay = = sec M. Dahshan CEN444 Computer Networks Page 8 of 15
9 Tutorial for Chapter 1 Problem 3 b. Initial handshake is = 0.2 sec Time to transmit each packet = packet transmission time + RTT = = sec This apply to the first 999 packets. For the last packet, the delay is = = sec Propagation delay for the last bit to reach the other side = = 0.5 sec Total delay is = sec M. Dahshan CEN444 Computer Networks Page 9 of 15
10 Tutorial for Chapter 1 Problem 4 Problem 4 Consider a point-to-point link 2km in length. At what bandwidth would propagation delay (at a speed of m/sec) equal transmit delay for 100-byte packets? What about 512-byte packets? M. Dahshan CEN444 Computer Networks Page 10 of 15
11 Tutorial for Chapter 1 Problem 4 Solution First, we calculate the propagation delay. Then we equate the result to the transmission delay with bandwidth being the unknown parameter. Propagation delay = distance / signal speed = m m/sec = 10 5 sec Transmission delay = = data size in bits data rate in bits per second For 100-byte packet, transmission delay = data rate (bandwidth) Thus, data rate = = 800 = 8 transmission delay bits/sec For 512-byte packet, transmission delay = data rate (bandwidth) Thus, data rate = = = bits/sec M. Dahshan CEN444 Computer Networks Page 11 of 15
12 Tutorial for Chapter 1 Problem 5 Problem 5 A disadvantage of a broadcast subnet is the capacity wasted when multiple hosts attempt to access the channel at the same time. As a simplistic example, suppose that time is divided into discrete slots, with each of the n hosts attempting to use the channel with probability p during each slot. What fraction of the slots will be wasted due to collisions? M. Dahshan CEN444 Computer Networks Page 12 of 15
13 Tutorial for Chapter 1 Problem 5 Solution We have the following possible events: Events 1 through n consist of the corresponding host successfully attempting to use the channel, i.e., without a collision. The probability of each of these events is p(1 p) n 1. Event n + 1 is an idle channel, with probability (1 p) n. Event n + 2 is a collision. We want to calculate the probability of this event. The total is n + 2 events. Since these n + 2 events are exhaustive, their probabilities must sum to unity. The probability of a collision, which is equal to the fraction of slots wasted, is then just 1 np(1 p) n 1 (1 p) n. M. Dahshan CEN444 Computer Networks Page 13 of 15
14 Tutorial for Chapter 1 Problem 6 Problem 6 Five routers are to be connected in a point-to-point subnet. Between each pair of routers, the designers may put a high-speed line, a medium-speed line, a low-speed line, or no line. If it takes 100 ms of computer time to generate and inspect each topology, how long will it take to inspect all of them? M. Dahshan CEN444 Computer Networks Page 14 of 15
15 Tutorial for Chapter 1 Problem 6 Solution We need to count how many topologies are possible. The number of possible bidirectional links in a fully connected point-to-point topology is n (n 1), where n is the number of nodes. 2 In this case, we have 5 nodes, so we may have = 10 links. Each of the 10 links have 4 possible types (three speeds or no line). The number of possible topologies = 4 10 = Time required to generate and inspect all topologies = = ms, which equals = hours. M. Dahshan CEN444 Computer Networks Page 15 of 15
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationIntroduction, Rate and Latency
Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text
More informationOperating Systems and Networks Sample Solution 1
Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation
More informationEXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationCH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page
More informationEECC694 - Shaaban. Transmission Channel
The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationComputer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationReferring to the above question, the end-to-end delay (transmission delay plus propagation delay) is
CS326e Quiz 3 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID In the following 7 problems, we are sending
More informationHomework Assignment #1 Solutions
Homework Assignment #1 Solutions EE122: Introduction to Communication Networks (Fall 2007) Department of Electrical Engineering and Computer Sciences College of Engineering University of California, Berkeley
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationCSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems
CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link
More informationCSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
More informationDirect Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)
reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationThe Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
More informationLocal Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1
Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationChapter1: Exercises. Silvia Giordano ICA, EPFL. Project e-1
Chapter1: Exercises Silvia Giordano ICA, EPFL Project e-1 EX1: Protocol design Design and describe an application-level protocol to be used between an automatic teller machine (ATM) and a bank s centralized
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationIntroduction To Computer Networks
Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationGATE CS Topic wise Questions Computer Network
www.gatehelp.com GATE CS Topic wise Questions YEAR 23 Question. 1 Which of the following assertions is false about the internet Protocol (IP)? (A) It is possible for a computer to have multiple IP addresses
More informationProfessor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter. www.classes.cs.uchicago.edu/classes/archive/2003/winter/54001-1
Professor: Ian oster Ts: Xuehai Zhang, Yong Zhao Winter Quarter www.classes.cs.uchicago.edu/classes/archive//winter/541-1 alculate the total time required to transfer a 1 KB file (RTT=1 ms, packet size
More informationNetwork Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency
Network Performance: Networks must be fast What are the essential network performance metrics: bandwidth and latency Transmission media AS systems Input'signal'f(t) Has'bandwidth'B System'with'H(-) Output'signal'g(t)
More informationDATA COMMUNICATIONS AND NETWORKING. Solved Examples
Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following
More informationAnswer: that dprop equals dtrans. seconds. a) d prop. b) d trans
Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationChapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationChapter 1 Computer Networks and the Internet
CSF531 Advanced Computer Networks 高 等 電 腦 網 路 Chapter 1 Computer Networks and the Internet 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Access networks
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationExam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
More informationGigabit Ethernet: Architectural Design and Issues
Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps
More informationBasic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
More informationWide Area Network Latencies for a DIS/HLA Exercise
Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506
More informationWide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
More informationIntroduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationChapter 1: roadmap. Access networks and physical media
Chapter 1: roadmap 1.1 What is the nternet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 nternet structure and SPs 1.6 elay & loss in packet-switched networks 1.7 Protocol
More informationNetwork Edge and Network Core
Computer Networks Network Edge and Network Core Based on Computer Networking, 4 th Edition by Kurose and Ross What s s the Internet: Nuts and Bolts View PC server wireless laptop cellular handheld access
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationWhat is this Course All About
Fundamentals of Computer Networks ECE 478/578 Lecture #1 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona What is this Course All About Fundamental principles
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationMultiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.
Multiplexing Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium. The following two factors in data communications lead to
More informationComputer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
More informationa. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationOptimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
More informationCourse Duration: Course Content Course Description Course Objectives Course Requirements
Course: TCS 201 Telecommunication and Networks I (3 credits compulsory) Course Duration: The course shall comprise of 45hours of theory and practical classes. The theory will be taught for 30hours of 2hours
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationFuture Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
More informationSolutions to the Sample Questions on Introduction
Solutions to the Sample Questions on Introduction NOTE: Pay close attention to units. A byte of storage is 8-bits, and 1 kilobits of storage is1024 bits. By convention, the rules are different between
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationStorage Area Network
Storage Area Network 2007 Infortrend Technology, Inc. All rights Reserved. Table of Contents Introduction...3 SAN Fabric...4 Advantages of SAN Solution...4 Fibre Channel SAN vs. IP SAN...4 Fibre Channel
More informationCMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
More informationIP Networking Primer. Presented by: Michael Leary
IP Networking Primer Presented by: Michael Leary Purpose and Objective OSI Model IP Addressing Bandwidth Networks Network Devices Power over Ethernet Cabling Internet Protocol IP is a key network layer
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationChapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri
Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is an unacknowledged connectionless service? What is an acknowledged
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationComputer Networks. By Hardeep Singh
Computer Networks Contents Introduction Basic Elements of communication systemnetwork Topologies Network types Introduction A Computer network is a network of computers that are geographically distributed,
More informationThe Conversion Technology Experts. Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network
The Conversion Technology Experts Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network Media Conversion: Cost Effectively Integrating T1 into Your Fiber Network Revealing some simple
More informationWhat s the Internet. routers: forward packets (chunks of data) millions of connected computing devices: hosts = end systems
What s the Internet PC server wireless laptop cellular handheld router access points wired links millions of connected computing devices: hosts = end systems running network apps communication links fiber,
More informationInternet of Things. Exam June 24
Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationFrame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet
Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationComputer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More information2 Basic Concepts. Contents
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
More informationiseries Ethernet cabling and configuration requirements
iseries Ethernet cabling and configuration requirements iseries Ethernet cabling and configuration requirements Copyright International Business Machines Corporation 1999, 2000. All rights reserved. US
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationIntroduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media
Introduction cont. Some Structure in the Chaos Lecture goal: get context, overview, feel of ing more depth, detail later in course approach: o descriptive o use Internet as example Overview: access net,
More information2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
More informationSONET and DWDM: Competing Yet Complementary Technologies for The Metro Network
and : Competing Yet Complementary Technologies for The Metro Network Introduction The next generation of equipment has been well accepted by service providers and is being usefully deployed into networks
More informationNetwork Technologies
Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More informationTroubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products
Troubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products Table of Contents Introduction...................................................................... 1 About Link
More informationFIBER OPTIC COMMUNICATIONS. Optical Fibers
FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and
More informationSERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4
SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1
More information