# CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide

Save this PDF as:

Size: px
Start display at page:

Download "CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide"

## Transcription

1 CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide 1. Channel Rates and Shared Media You are entrusted with the design of a network to interconnect a set of geographically distributed hosts within your corporation. After some research, you narrow the options to two choices, a fiber-based token ring or a copper-based switched network. The pertinent statistics appear in the table below. type fiber-based token ring copper-based switched network signal bandwidth 10 MHz 1 MHz signal-to-noise ratio at transmitter 20 db 20 db attenuation rate 1 db/km 2 db/km The longest link in the network in either case is 10 km. (a) What link bandwidth is possible according to Shannon's Law i. for the fiber network? SNR = 20dB (10km*1dB/km) = 10dB 10dB = 10log 10 (S/N) S/N = 10 So, S/N at receiver is 10. C = B*log 2 (1+S/N) = 10MHz * log 2 (1+10) = Mbps (in fiber) ii. for the copper network? SNR = 20dB (10km*2dB/km) = 0dB 0dB = 10log 10 (S/N) S/N = 1 So, S/N at receiver is 1. C = B*log 2 (1+S/N) = 1MHz * log 2 (1+1) = 1Mbps (in copper) (b) Assuming that hosts in the copper network can all transmit at their link rate (the values found in part (a)) simultaneously, roughly how many hosts are necessary for the networks to provide equal aggregate bandwidth (the sum of bandwidth for all hosts)? we would need ~35 hosts on the copper network to equal the aggregate bandwidth of the fiber network. (c) Using the copper-based network with a 32-point QAM encoding, what modulation rate (baud) is necessary to obtain the bandwidth found in part (a)? 32 points = 5 bits/symbol 1Mbps / (5 bits/symbol) = 0.2 M symbols/sec = 200K baud

2 2. Medium Access Control This question concerns medium access control on a microwave network using carrier sense multiple access with collision detection (CSMA/CD, the algorithm used with Ethernet). The network consists of four hosts distributed as shown in the figure below. The microwaves are broadcast, and the signal travels directly along a line of sight from sender to all receivers. Assume that the signals propagate at the speed of light in a vacuum, m/sec. A 54 km 40 km 51 km B C 90 km 57 km 57 km D (a) If a transmitter sends at 1 Mbps, how long must packets be to guarantee collision detection by the transmitter? Longest link = 90 km, so maximum one-way delay is: (90km) / (3 x 108 m/s) = 30 x 10-5 sec = 300 µsec Therefore, maximum RTT is 600 µsec. So at a rate of 1 Mbps, we get: (1 Mbps) * 600 µsec = 600 bits = 75 bytes (b) Divide time into slots the length of the maximum round-trip propagation delay in the network. One packet may be transmitted each time slot. Assume that each of the four hosts attempts to transmit with probability p in each time slot. What is the probability of a successful transmission in any given slot if i. p = ¼? (4 C 1) * (¼) * (¾) 3 = 27 / 64 ii. p = ½? (4 C 1) * (½) * (½) 3 =1 / 4 iii. p = ¾? (4 C 1) * (¾) * (¼) 3 = 3 / 64 (c) Using the minimum transmission length from part (a) and the probability of successful transmission from part (b)(ii) (for p = ½), calculate the average throughput of the network if each packet requires 20 bytes of header/trailer and i. 10 bytes of data, and Given 30 bytes of information (data and headers), we need another 45 bytes to reach the minimum packet size (from part a). Therefore, we are transmitting only 10 bytes of actual data per 75 bytes transmitted. (10 bytes) / (75 bytes) = = 13.3% goodput (assuming no errors)

4 (d) Given a go-back-n algorithm (with RWS=1), assume that data frames are received with probability p = 0.9 and that acknowledgements (ACK's) are always received (probability of 1). Further assume that the retransmission timeout used by the sender is a negligible amount of time longer than the round-trip time, implying that a packet is retransmitted as soon as the sender could possibly detect its loss on the previous transmission. Calculate the average transmission rate (in bits per second) achieved for long streams of data. transmission time = 8,192 b / bps = sec = 25 msec penalty for loss = 200 msec + 25msec(RTT) average number of transmissions = 1/p = 10/9 average time per frame = 25 msec + (225 * 1/9 msec) = 50 msec average throughput = 8, 192 b / (25 msec + (225 * 1/9 msec)) = Kbps 4. Token Ring Consider a token ring with latency of 500 µsec. Answer for both a single active host and for many active hosts. For the latter, assume that there are sufficiently many hosts transmitting that the time spent advancing the token can be ignored. Assume a packet size of 1500 B (a) Assuming that the delayed token release strategy is used, what is the effective throughput rate that can be achieved if the ring has a bandwidth of 3 Mbps? Single host: At 3 Mbps, it takes 4 ms to send a packet. A single active host would transmit for 4 ms and be idle for 0.5 ms until the frame was received back and idle for yet another 0.5 ms as the token went around the ring. So, efficiency = 4 / ( ) = 80 %. So, effective throughput = 2.4 Mbps Many hosts: Time spent advancing the token is ignored. So, the time between successive packet transfers is 4.5 ms. So, efficiency = 4 / 4.5 = %. So, effective throughput = 2.67 Mbps. (b) Assuming that the immediate token release strategy is used, what is the effective throughput rate that can be achieved if the ring has a bandwidth of 3 Mbps? Single host: A host sends a packet for 4 ms, and then remains idle for 0.5 ms as the token circulates. So, efficiency = 4 / ( ) = %. So, effective throughput = 2.67 Mbps. Many hosts: Hosts transmit one after the other. The time interval between successive packet transfers is the same as the transmission time. So, efficiency is close to 100% and effective throughput is close to 3 Mbps. (c) With delayed release, what is the effective throughout rate that can be achieved if the ring has a bandwidth of 100 Mbps? Single host: At 100 Mbps, transmission time = 120 µs. A single host would send for 120 µs and then wait for 500 µs for the packet to come around and then wait another 500 µs for the token to go around. So, efficiency = 120/( ) = 10.71%. So, effective throughput = Mbps.

5 Many hosts: Time between successive packet transfers = µs. So, efficiency = 120 / ( ) = %. So, effective throughput = Mbps. (d) With immediate release, what is the effective throughout rate that can be achieved if the ring has a bandwidth of 100 Mbps? Single host: A host would send for 120 µs and then wait 500 µs for the token to come back. So, efficiency = 120 / ( ) = %. So, effective throughput = Mbps. Many hosts: Hosts transmit one after the other. The time interval between successive packet transfers is the same as the transmission time. So, efficiency is close to 100% and effective throughput is close to 100 Mbps. 5. Name the OSI layer or layers in which medium access control (MAC) is addressed and state whether MAC is typically handled in hardware, in software, or in both in the Internet architecture. Data link layer Hardware 6. Explain one advantage of abstracting networked communication into multiple layers. Modularity Abstraction 7. Describe the problem solved by reliable transmission. Supports the illusion that a network neither loses nor reorders frames. Implemented in the transport layer in software. 8. Explain how a receiver detects the end of a frame with length-based framing. The length is indicated in the header of the frame. 9. Explain the main drawback of the stop-and-wait ARQ algorithm. By only allowing one outstanding packet, bandwidth is not used efficiently (i.e. stop-and-wait does not keep the pipe full) 10. Name the OSI layer or layers in which framing is addressed and state whether framing is typically handled in hardware, in software, or in both in the Internet architecture. Framing is addressed at the datalink layer in hardware 11. Define the Hamming distance of an encoding. The minimum number of bit flips to move from one to the other 12. Explain the effect of layering on end-to-end bandwidth.

7 20. Name the OSI layer or layers in which error detection is addressed in the Internet architecture and state whether error detection is typically handled in hardware, in software, or in both. Data link, Hardware

### 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

### CSE 123: Computer Networks

CSE 123: Computer Networks Homework 2 Out: 4/20, Due: 4/27 Instructions 1. Turn in a physical copy at the beginning of the class on 4/27 2. Ensure the HW cover page has the following information clearly

### CSE 123: Computer Networks

Total Points = 28 CSE 123: Computer Networks Homework 2 Solutions Out: 4/20, Due: 4/27 Problems 1. High Frequency Trading [5 pts] Companies like Goldman Sachs put a high value on using very low latency

### RTT 60.5 msec receiver window size: 32 KB

Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

### Ethernet, ARQ. Unit 10

Unit 10 Ethernet, ARQ Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh, and

### Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point:

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: Computers connected by communication channels that each connect exactly two computers with access to full channel bandwidth. Forms

### ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

### EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

### Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer

Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger

### Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet dominant LAN technology: cheap -- \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

### Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff Our Focus is Ethernet History Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s Roots

### Introduction to Local Area Networks

For Summer Training on Computer Networking visit Introduction to Local Area Networks Prepared by : Swapan Purkait Director Nettech Private Limited swapan@nettech.in + 91 93315 90003 Introduction A local

### Local & Metropolitan Area Networks

Local & Metropolitan Area Networks CS455 Yonshik Choi, Ph.D. Department of Computer Science Illinois Institute of Technology Rice Campus Local Area Networks Characteristic Smaller geographical area a

### CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

### ALOHA Class of Multiple Access Protocols

ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and

### Stop And Wait. ACK received; transmit frame 2 CS 455 3

Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

### Local Area Networks (LANs)

Local Area Networks (LANs) Broadcast Networks Multiple Access Protocols Ethernet (IEEE 802.3) Token Ring (IEEE 802.5, FDDI) Introduction So far, we have dealt with switched communication networks. Recall

### ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 Lecture 17: Medium Access Control V Perfectly scheduled approaches Token ring networks 1 We have categorized channel allocation techniques as either

### 06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize

### LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

### Tutorial for Chapter 1

Tutorial for Chapter 1 CEN 444 Computer Networks Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa Tutorial for

### Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

USN 06EC71 Seventh Semester D.E. Degree Examination, December 2010 Computer Communication Networks Time: 3 hrs. Note: Answer any FIVE full questions, selecting at least TWO questions/rom each part. Max.

### Introduction to LAN Protocols

CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

### Tutorial 1 Solutions (Week 5)

COMP 333/933 Computer Networks and Applications Tutorial Solutions (Week 5) Introduction Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose the propagation

### 4. MAC protocols and LANs

4. MAC protocols and LANs 1 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing

### Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

### High-Speed LANs Part III: LLC and Bridging

High-Speed LANs Part III: LLC and ridging Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 1-1 Overview

### IEEE 802 LANs. LAN: Local Area Network What is a local area network?

IEEE 802 LANs LAN: Local Area Network What is a local area network? A LAN is a network that resides in a geographically restricted area LANs usually span a building or a campus 1 Characteristics of LANs

### ISO-OSI 7-Layer Network Architecture

ISO-OSI 7-Layer Network Architecture This lecture introduces the ISO-OSI layered architecture of Networks. According to the ISO standards, networks have been divided into 7 layers depending on the complexity

### DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

### OSI MODEL. TCP/IP Protocol Suite 2

OSI Model UNIT I OSI MODEL TCP/IP Protocol Suite 2 OSI Model Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication

### Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

### Not all Ethernet standards utilize CSMA/CD MAC, the most commonly used 3 Ethernet Standards that support shared transmission medium are:

Ethernet is a family of computer networking technologies for LANs. Typical Ethernet standards (e.g. IEEE 802.3) model the Physical and Data Link Layers of OSI/RM. Not all Ethernet standards utilize CSMA/CD

### Star topology. Ethernet. Ethernet Frame Structure (more) Ethernet Frame Structure. Ethernet uses CSMA/CD. Unreliable, connectionless service

thernet dominant wired LN technology: cheap \$0 for 00Mbs! first widely used LN technology Simpler, cheaper than token LNs and TM Kept up with speed race: 0 Mbps 0 bps Star topology us topology popular

Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

### Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1 Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common

### CS 421: Computer Networks FALL MIDTERM I November 22, minutes

CS 421: Computer Networks FALL 2004 MIDTERM I November 22, 2004 120 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with

### 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

### 6.263/16.37: Lectures 3 & 4. The Data Link Layer: ARQ Protocols

6.263/16.37: Lectures 3 & 4 The Data Link Layer: ARQ Protocols MIT 1 Automatic Repeat ReQuest (ARQ) When the receiver detects errors in a packet, how does it let the transmitter know to re-send the corresponding

### Final for ECE374 05/06/13 Solution!!

1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

### Tutorial 1 (Week 6) Introduction

COMP 333/933 Computer Networks and Applications Tutorial (Week 6) Introduction Problem Set, Question 7 Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose

### LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

### Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model

OSI MODEL 1 Introduction Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

### CSE331: Introduction to Networks and Security Homework 1 Fall 2006 Due: 29 Sept. 2006

CSE331: Introduction to Networks and Security Homework 1 Fall 006 Due: 9 Sept. 006 What to turn in: Submit hardcopy answers to the questions below. Please include your name, e-mail address, and the number

### Two types of CDMA systems deployed in practice: direct sequence spread spectrum (DSSS) frequency hopping spread spectrum (FHSS)

Two types of CDMA systems deployed in practice: direct sequence spread spectrum (DSSS) frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS): what we studied using linear algebra

### MEDIA ACCESS CONTROL

MEDIA ACCESS CONTROL Random Access & Token Rings 18 The Data Link Layer Simplest way to create a network of nodes Ø Connect the nodes directly with a physical medium Point-to-point links: Ø Choice of Media

### Medium Access Sublayer

Medium Access Sublayer Topology of the Network Bus, Ring, Tree Protocols IEEE 802.3 for bus topology IEEE 802.4 for token bus IEEE 802.5 for token ring FDDI for fibre ring IEEE 802.11 for wireless networks

### Transport Layer Protocols

Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

### Journal of Environmental Science, Computer Science and Engineering & Technology

JECET; December2014-February 2015; Sec. B; Vol.4.No.1, 13-18. E-ISSN: 2278 179X Research Article Journal of Environmental Science, Computer Science and Engineering & Technology An International Peer Review

M ddresses and RP Mac ddressing, thernet, and Interconnections 32-bit IP address: network-layer address used to get datagram to destination IP subnet M (or LN or physical or thernet) address: used to get

### Local and Metropolitan Area Networks

Local and Metropolitan Area Networks Local Area Networks (LAN)- Networks that optimized for a moderate-size geographic area, such as a single office building, a warehouse, or a campus. - low bit error

### Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

### EECC694 - Shaaban. Transmission Channel

The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,

### Introduction, Rate and Latency

Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text

### TCP III - Error Control

TCP III - Error Control TCP Error Control 1 ARQ Error Control Two types of errors: Lost packets Damaged packets Most Error Control techniques are based on: 1. Error Detection Scheme (Parity checks, CRC).

### 802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

### Electromagnetic Signal. Transmission Fundamentals. Time-Domain Concepts. Time-Domain Concepts. Time-Domain Concepts. Sine Wave Parameters

Electromagnetic Signal Transmission Fundamentals Chapter 2 Function of time Can also be expressed as a function of frequency Signal consists of components of different frequencies Time-Domain Concepts

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

### 16.36 Communication Systems Engineering

MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

### Medium Access Control (MAC) protocol

Medium Access ontrol (MA) protocol omputers DNS Shared medium Point-to-Point. R R. WLAN AP R LAN. Shared medium AP DNS DNS: Domain Name System Figure 1: Different components of a network The Internet consists

### LAN. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. LAN Topologies-1. Disadvantage. Advantages LECT-4A4

CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 In the last class we saw how two computers can connect to each other. In this class we will see how a group

### Module 15: Network Structures

Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

### COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS

COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS. INTRODUCTION TO COMPUTER NETWORKS. What is a computer network? Briefly define..2 Briefly define the client-server model..3 What is scalability? Briefly

### Telecommunication Systems

PUF-HCM Master Informatics Telecommunication Systems RTEL 1 Team teaching Responsible Team: Email Rami Langar Rami Langar (Courses) Su Tam Nguyen (TD) Rami.Langar@lip6.fr guitar1911@yahoo.com RTEL 2 Organisation

### Myriad of different LAN technologies co-existing in a WAN. For example:

Myriad of different LAN technologies co-existing in a WAN. For example: Fast Ethernet (100 Mbps) Gigabit Ethernet (1000 Mbps); 10 and 100 GigE Purdue CS backbone: 10 Gbps AT&T (tier-1 provider)? WLAN (11,

### Chapter 16: Distributed Operating Systems

Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

### Protocols and Architecture. Protocol Architecture.

Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

### Token Passing: IEEE802.5 standard. IEEE802.5 standard

Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control

### Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

### Computer Networks CS321

Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

### Notes Odom, Chapter 3 Flashcards Set:

EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 3 Flashcards Set: http://www.flashcardmachine.com/1101574/4vb4 LAN Ethernet UTP IEEE NIC 10BASE5 10BASE2 CSMA/CD Local Area Network Layer 1 and 2 standards

### Inst: Chris Davison

ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks MAC Sublayer Contents Fixed Assignment Protocols Demand Assignment Protocols Contention

### Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed

### Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

### Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

### COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS

### Chapter 2 Network Devices

Chapter 2 Network Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated with wireless

### DIN 2012 Tutorial. physical links between primary and secondary stations: Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL).

DIN 2012 Tutorial (Q1a) In the IEEE 802.15 standard (Bluetooth), describe the following two types of : physical links between primary and secondary stations: (i) (ii) Synchronous Connection Oriented (SCO);

### CSMA/CA. Information Networks p. 1

Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

### Ethernet. Ethernet. Network Devices

Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

### COMPUTER NETWORKS - LAN standardization

IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

### EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

### 10/13/2008 Vasile Dadarlat --Computer Networks 1

Lecture 4 Communications Channels Definition: the part that connects a data source to a data sink; based on the transmission media. Classification criteria: -type of the link (connection): point-to-point,

### Local Area Networks (LAN)

Lecture 4 Local Area Networks (LAN) - Sharing Transmission Media by Computers - Classifications of Computer Networks: LAN, MAN, WAN Point-To-Point Connection and Shared Medium LAN Topology: Star, Ring,

### CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

### Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

### QVidium Technologies Whitepaper: September 2012

QVidium Technologies Whitepaper: September 2012 Real-time Streaming Video Error Correction: A Comparison of QVidium ARQ vs. Conventional ARQ and ProMPEG FEC Overview This paper begins with a basic primer

### Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

### Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

### 1. LAN ARCHITECTURE. LAN Protocol Architecture

Chap. 12 LAN Technology 1 1. LAN ARCHITECTURE LAN Protocol Architecture LAN protocol architectures are specified by IEEE 802 reference model In IEEE 802 reference model, there are two separate layers corresponding

### Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

### TCP - Introduction. Features of TCP

TCP - Introduction The Internet Protocol (IP) provides unreliable datagram service between hosts The Transmission Control Protocol (TCP) provides reliable data delivery It uses IP for datagram delivery

### TCP PERFORMANCE IN MOBILE-IP

TCP PERFORMANCE IN MOBILE-IP Foo Chun Choong Department of Electrical Engineering, National University of Singapore ABSTRACT The throughput performance of TCP in Mobile-IP [1] was investigated. Compared

### Communication Systems I

Communication Systems I Course Map Contents Recap of the networks we ve seen so far Basics of protocols HTTP example The OSI model Packet and Circuit switching Physical media What to expect next Recap

### The Internet. The Internet. The Internet. What is the internet, and how does it work?

ECS 15; Lectures 17 and 18 Final paper: The Abstract 1-2 sentences defining the research problem. What is the internet, and how does it work? 1-2 sentences explaining your approach. 1-2 sentences describing

### Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

### Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview:

Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course approach: use Internet as example Overview: what s the Internet what s a protocol? network edge network core