# COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS. INTRODUCTION TO COMPUTER NETWORKS. What is a computer network? Briefly define..2 Briefly define the client-server model..3 What is scalability? Briefly define..4 Classify computer networks with respect to their transmission technologies..5 Classify computer networks with respect to their physical sizes..6 Write the names of LAN topology types and draw their figures..7 Draw the bus topology types and write their names..8 Briefly explain the access methods used in broadcast networks. (BA-İ-4/ /AS/2a).9 Write the type (broadcast or point-to-point) and topology (bus, ring or star) of computer networks that use terminating resistors. What does proper termination mean? What problem is encountered if proper termination is not provided? (CSE-5/3.0.05/FS/).0 Briefly explain why the transmission time of a frame in LANs using CSMA/CD protocol should be greater than the round-trip propagation time (2τ).. Consider building a CSMA/CD network running at 0 Mbps with a network cable of 2500 meter (consisting of five network segments each having a length of 500 meter and connected by using four repeaters). Considering the delays in the repeaters, the average signal speed in the network cable is m/μsec. Calculate the minimum frame length in bytes, so that when a collision occurs, computers can determine that the collision is related to the frame being sent ( byte=8 bits). Answer: 64 bytes. (BA-EE-/ /AS/4).2 Briefly answer the following questions about WANs: a) Specify the physical sizes of WANs. b) Write the name of the transmission method used in WANs. c) Write the name of the switching technique that is generally used in WANs. d) What are the components of a subnet? Write their names. e) What is the difference between a WAN and a subnet? f) Write the name of the first network that used the TCP/IP protocol. (e,f: BA-İ-4/ /BS/d).3 (Extra Qestion) Consider building a CSMA/CD network running at Gbps with a frame size of 625 bytes. The signal speed in the network cable is km/sec. No repeaters are used in the network. What is the maximum cable length? (Answer: 500 m). (CSE-2/ /MT/4).4 (Extra Question) Briefly answer the following questions about terminating resistor. a) Which type (transmission type) and which topology of computer networks use terminating resistors? b) How is the value of the terminating resistor chosen for proper termination? c) What problem is encountered if proper termination is not provided? /8

2 2. BASICS OF NETWORK ARCHITECTURE 2. What is network architecture? Briefly define. (BA-Ö-22/ /ASM/a) 2.2 Briefly define protocol and peer protocol. Write the names of the peer protocols in the OSI reference model. (BA-Ö-/ /AS/2b) 2.3 What is service data unit (SDU)? Briefly define. (BA-Ö-23/ /FS/e) 2.4 What is protocol data unit (PDU)? Briefly define. (BA-Ö-22/ /ASM/b) 2.5 Briefly define the connection-oriented service and the connectionless service ; write their advantages and disadvantages. (BA-Ö-/ /AS/b) 2.6 By using only three of the proper terms among Connection-oriented, connectionless, acknowledged, unacknowledged, communication channel, circuit switching service and packet switching service, define the following: a) Virtual circuit d) Datagram service (BA-İ-4/ /BS/c) 2.7 Write the names of the service primitives, and explain the transfer of these primitives by drawing a figure. (BA-Ö-/ /AS/2a) 2.8 Which service primitives are used in confirmed and unconfirmed services? Write their names. (BA-Ö-4/ /AS/b) 2.9 Which service type (confirmed service/unconfirmed service/confirmed or unconfirmed service/none of these services) can be used for each of the following phases of a connection-oriented communication service? a) Circuit establishment phase b) Data transfer phase c) Circuit release (termination) phase (BA-İ-5/ /AS/b) 2.0 Briefly explain why acknowledged datagram service is not used real-time digital voice or digital video communication. (BA-İ-5/ /AS/c) 2. Draw the OSI and TCP/IP models side by side, and write the layer numbers and names. 2.2 Write the name of the 2 nd layer of the OSI reference model and write six of its tasks. (BA-Ö-3/ /BS/a) 2.3 Write the name of the 3 rd layer of the OSI reference model and write its tasks. (BA-Ö-/ /AS/a) 2.4 Network devices generally functions at the lower three layer of the OSI reference model. Briefly explain the reason. 2.5 Write three advantages of network standardization and mention about two aspects that can be seen as disadvantages of network standardization. (BA-Ö-6/ /AS/2a) 2.6 Briefly answer the following questions about ITU-T: a) Write the full name of ITU-T and its field of interest. b) Write the classes of ITU-T s memberships. c) Is it a must for the manufacturers to comply with the ITU-T s recommendations? What can be the consequences if these recommendations are not fulfilled? (BA-Ö-2/ /AS/3) 2.7 Write the full name and memberships of ISO. (BA-İ-2/ /3a) 2/8

3 3. BASICS OF DATA TRANSMISSION 3. The binary signal at the output of a computer is shown in Figure 3.(a). A character consisting of eight bits is transmitted in 00 µsec. The frequency characteristics of the transmission medium and the amplitude spectrum of the transmitted binary signal are given in Figure 3. (b) and (c) respectively. Using the amplitude and frequency values given in Figure 3., a) Find the fundamental frequency ( st harmonic frequency) of the binary signal. b) Find the bandwidth (B t ) of the transmitted binary signal by considering the frequency components with amplitudes greater than or equal to /0 of the amplitude of the st harmonic. c) Find the transmission rate (R) of the binary signal. d) Find the 3-dB bandwidth of the transmission medium. e) Find the bandwidth (B r ) of the received signal. f) Which harmonic is the highest frequency component of the binary signal arrived at the receiver? f(t) H(f) 3 db T = 00 μs t (μs) f(khz) (a) Transmitted signal. (b) Characteristics of the transmission medium. C n f (khz) (c) Amplitude spectrum of the transmitted signal. Figure 3. (BA-Ö-2/ /FS/) Answer: (a) 0 khz; (b) 90 khz; (c) 80 kbps; (d) 60 khz; (e) 50 khz; (f) 5 th harmonic. 3.2 A digital communication is performed by using a four-symbol alphabet (a four-symbol signal). Each symbol is transmitted in symbol duration of 0 µsec. The probabilities the symbols to be sent are given as follows: P =/2 ; P 2 =/4 ; P 3 =P 4 =/8 a) Find the symbol rate of the signal. b) Find the average information content of the signal per symbol interval. c) Find the minimum bandwidth and minimum channel capacity required for the transmission medium in order to send this message with small probability of error. d) Consider that, by using a binary encoder, the four-symbol signal is converted into a binary signal and transmitted as a binary signal. Repeat part (c) for this case. M Auxiliary information: H = Pk log 2 ( ) bits/interval k = Pk (BA-Ö-2/ /AS/4) Answer: (a) symbols/sec; (b).75 bits/symbols; (c) 00 khz, 75 kbps; (d) 200 khz, 75 kbps. 3.3 In a facsimile transmission, 420,000 picture elements are needed for one page to provide proper picture resolution. 6 brightness levels are specified for each picture element for good reproduction. Consider that the modem circuit of the facsimile machine operates at the rate of 9600 bps. a) Find the maximum information content of one page of fax message. b) How long does it take to send one page of fax message? (BA-EE-/ /AS/4) Answer: (a) bits/page; (b) 2.92 minutes (or 2 minutes 55 seconds). 3/8

4 3.4 An analog voice signal band limited to 4 khz is sampled at Nyquist rate and then quantized at 256 levels. a) Find the sampling rate f s and the sampling interval T s. b) Assuming the equally likely case (each level appears with equal probability), find the information content (H) per interval (sample interval). c) The output of the 256-level quantizer is applied to a binary encoder to obtain a PCM signal. Find the information rate of the PCM signal. d) What must be the minimum value of the channel capacity in order to transmit the PCM signal with arbitrarily small frequency of errors? (BA-Ö-4/ /.AS/3) Answer: (a) 8 khz, 25 µsec; (b) 8 bits/interval; (c) 64 kbps; (d) 64 kbps. 3.5 In a digital communication system a 32 symbol signal is used in transmission. Each symbol is transmitted in a 5 μsec time slot with equal probability. a) Calculate the symbol rate of the 32 symbol signal. b) Calculate the information content of a symbol. c) Calculate the required bandwidth (in khz) and the capacity (in kbps) of the transmission medium to transmit the 32 symbol signal. d) Consider that the 32 symbol signal is applied to a binary encoder and a binary signal is obtained at the output of the encoder. Calculate the required bandwidth (in khz) and the capacity (in kbps) of the transmission medium to transmit the binary signal. (BA-Ö-3/ /BS/2) Answer: (a) symbols/sec; (b) 5 bits/symbol; (c) 200 khz, Mbps; (d) MHz, Mbps. 3.6 In a digital communication system a 64 symbol signal is used in transmission. Each symbol is transmitted in a 50 µsec time slot with equal probability. a) Calculate the symbol rate of the signal. b) Calculate the information content of a symbol. c) Calculate the required bandwidth (in khz) and the capacity (in kbps) of the transmission medium to transmit the signal. (BA-Ö-7/ /FS/2) Answer: (a) symbols/sec; (b) 6 bits/symbol; (c) 20 khz, 20 kbps. 3.7 Compare serial and parallel transmission with respect to the following attributes: ) Transmission speed (fast/slow) 2) Length of transmission cable (long/short) 3) Cost of transmission cable (high/low) 4) Cost of transmission hardware (high/low) (BA-İ-3/ /FS/e) 3.8 (Extra Question): Briefly compare the synchronous and asynchronous transfer modes in the following aspects: a) Which one is suitable for constant bandwidth channels and which one for variable (or dynamic) bandwidth channels? b) Which one is subjected to waste of bandwidth and which one uses the bandwidth efficiently? (CN/S-2/ /FS/d) 3.9 (Extra Question): A channel is given with a bandwidth of 30 khz and a Signal-to-Noise Ratio (SNR) of 40 db. For error free transmission the Shannon s channel capacity formula is known as C=Blog 2 (+SNR). Calculate the channel capacity. (CSE-2/ /MTE/3) Answer: 400 kbps 4/8

5 3.0 (Extra Question): A signal band-limited to 3.3 khz is sampled. a) Find the Nyquist sampling rate and the Nyquist sampling interval. b) Find the minimum sampling rate and sampling interval when a guard band of.4-khz is used in the sampling. (CSE-/22..04/MT/3) Answer: (a) 6.6 khz; 5.5 μsec; (b) 8 khz; 25 μsec. 4. DATA COMMUNICATION SERVICES 4. For each of below items, specify which feature belongs to SMDS (Switched Multimegabit Data Service). ) Connection-oriented / Connectionless. 2) Circuit-switched / Packet-switched. 3) Is SMDS is suitable for busty traffic? Yes or no. 4) Is the mean transmission rate is greater than the burst mode rate? Yes or no. 5) Is SMDS is cheaper than leased lines? Yes or no. 6) Can subscribers access SMDS over MANs? Yes or no. 7) Can subscribers access SMDS over leased lines? Yes or no. 8) Does SMDS have multicasting feature? Yes or no. 9) Does SMDS use permanent virtual circuits? Yes or no. 0) If an SMDS subscriber has 500 byte credit in his counter and he sends a 2000-byte packet, does SMDS discard the whole packet? Yes or no. (BA-Ö-2/ /AS/2) 4.2 In an SMDS network with a channel capacity of 45 Mbps, consider a subscriber with a counter increment rate of one byte in 0 μsec. a) For continuous data transmission, a) Calculate the average data transmission rate, a2) Calculate the transmission time of a 5625-byte packet. b) Consider that the subscriber doesn t send any data for a while, and thus 5625-byte credit is accumulated in its counter. At this moment the subscriber sends a 5625-byte packet. b) Calculate the transmission time of the packet that is sent in burst mode. b2) Compare the results obtained in (a) and (b). How many times transmission rate is increased when the packet is sent in burst mode. b3) How many bytes of credit are left on the counter just after the packet is sent? (BA-Ö-6/ /.AS/3) Answer: (a) 800 kbps; (a2) msec; (b) msec; (b2) times; (b3) Zero credit is left. 4.3 In an SMDS network with a channel capacity of 45 Mbps, consider a subscriber with a counterincrement rate of bytes/sec. a) In order to transmit a 5000-byte data block in burst mode, how long the subscriber should stay in idle mode? If the subscriber sends a 5000-byte packet before the end of this duration, what operation does the router make on this packet? b) If the subscriber does not send data for 45 msec, how many bytes of data is the subscriber allowed to send in burst mode? How long does it take to send this data in burst mode? (BA-Ö-22/ /ASM/3) Answer: (a) 00 msec; packet is discarded; (b) 2250 byte; 400 µsec. 4.4 Compare Narrowband-ISDN and Broadband-ISDN for the following features: a) Transmission capacity (give values in terms of kbps and Mbps), b) Switching type (circuit-switching, packet-switching), c) Transmission type (synchronous, asynchronous). (BA-Ö-23/ /FS/d) 5/8

6 4.5 For the basic access ISDN, a) Write the names and the capacities of the channels used for communication and for signaling. b) At the maximum, how many ISDN terminal equipments can be connected to the S interface? How many of them can make communication at the same time? Specify the channels for the type of communication service (telephone, telefax, PC, short message, etc). (BA-Ö-5/ /2.AS/2c) 4.6 Briefly define bearer services, teleservices and supplementary services in ISDN. (BA-Ö-/ AS/4) 4.7 Briefly answer the following questions about ISDN: a) For a basic access ISDN subscriber, draw a block diagram showing the access of ISDN terminal units and non-isdn terminal units to the ISDN exchange. Show the S and U interfaces on your block diagram. Write the number of wires used at these interfaces. b) For a basic access ISDN subscriber, what is the maximum access rate (in kbps) of a PC with an ISDN communication card (ISDN modem) to the Internet? Which ISDN channels are used for this access? c) Which layers of OSI reference model is included in an ISDN in the network? (BA-Ö-0-/ /BS/2) 4.8 In a basic access ISDN, a data frame in the data link layer contains 6 bits for B channel, 6 bits for B2 channel, 4 bits for D channel and 2 bits for framing and control. The time required to transmit one frame is 250 μs. By using these figures, a) Calculate the channel capacities of B, B2 and D channels in terms of kbps. Show how they are calculated. Don t write the results by heart. b) Calculate the transmission rate (in terms of kbps) and bandwidth (in term of khz) of this signal. c) This binary signal is applied to an M-ary encoder with M=8 (that is, three successive bits are encoded as one symbol). Find the symbol rate and the bandwidth of the signal at the output of the M-ary encoder. (BA-İ-3/ BS/2) Answer: (a) 64 kbps for B and B2; 6 kbps for D; (b) 92 kbps, 92 khz; (c) 64 ksymbols/sec, 64 khz. 4.9 A basic access ISDN subscriber has the following equipment: 3 ISDN telephone sets ISDN fax machine PCs (Personal Computers) with ISDN card installed 3 non-isdn Terminal Equipment (non-isdn telephone or non-isdn data terminal) 3 ISDN Terminal Adaptors (TA) Network Termination Unit of type (NT) Draw a block diagram showing the connection of this equipment to an ISDN exchange. Show the reference points R, T (or S) and U on the block diagram. (BA-Ö-6/ /.AS/4a) 4.0 Define briefly adaptation and internetworking in ISDN. (BB-İ-2/ /AS/2b) 4. Briefly answer the following questions about the Frame Relay (FR) technique. a) Define the FR technique by specifying its service type and in important feature. b) Compare an FR network with an X.25 network from the aspects of error detection, error correction and performance. c) Draw a block diagram showing the access of a PC to a FR network. (BA-Ö-9/ /FS/) 6/8

7 4.2 Which of the following properties belongs to a Frame Relay service? Specify for each item. ) Acknowledged / Unacknowledged. 2) Connected-oriented / Connectionless. 3) Circuit-switched / Packet-switched. 4) Slow / Fast. 5) Virtual circuits are used / Virtual circuits are not used. 6) Composed of OSI layers and 2 / Composed of OSI layers, 2 and 3. 7) Performs frame routing in the network / Performs packet routing in the network. 8) The network performs error detection (at NNI) / The network does not perform error detection (at NNI). 9) The terminal equipments perform only error detection (at UNI) / The terminal equipments perform both error detection and error correction (at UNI). 0) Cheaper than leased lines / More expensive than leased lines. (BA-EE-/ /AS/4) 4.3 Briefly answer the following questions about ATM (Asynchronous Transfer Mode) technique. a) Describe the ATM technique in one sentence by specifying the following properties: ) Service type: Connection-oriented / Connectionless. 2) Transmission type: Synchronous / Asynchronous. 3) Transmission speed: Low speed / High speed. 4) Switching type: Circuit switched / Packet switched. b) Draw an ATM cell showing the header and the data field and their lengths in terms of bytes. (BA-Ö-4/ /.AS/2) 4.4 (Extra question): Consider an SMDS (Switched Multimegabit Data Service) network operating at 00 Mbps. The counter of an SMDS subscriber, which resides in the router to which the subscriber is connected, increments one byte in 0 μsec. a) If the subscriber transmits data continuously, () Calculate the average data transmission rate. (2) Calculate the required time to transmit a 4000-byte packet. b) Suppose that the line is idle for a period of time, and the user sends a data of 4000 bytes at the end of this period. Calculate the transmission time for the 4000-byte data in burst mode. Compare the results obtained in (a) and (b). How many times the burst mode transmission is faster than the continuous mode transmission? (BA-Ö-4/ /.AS/4) Answer: (a) 800 kbps; (a2) 40 msec; (b) 320 μsec; 25 times faster. 4.5 (Extra Question): An SMDS (Switched Multimegabit Data Service) network operating at 45 Mbps is used for LAN-to- LAN traffic. A subscriber of this SMDS network having a contract for an average transmission rate of bytes/sec wants to send data. If the line is idle for a period, a credit (in terms of bytes) will be accumulated on the subscribers counter at the router and the subscriber will be allowed to send an amount of data equal to or less than the counter reading in burst mode. a) Calculate the transmission time required to transfer a 4500 byte data to the transmission medium for continuous transmission case. b) Suppose that the line is idle for a period of 500 msec, and the user sends a data of 4500 bytes at the end of this period. Calculate the transmission time for the 4500 byte data in burst mode. c) Compare the results obtained in (a) and (b). How many times the burst mode transmission is faster than the continuous mode transmission? d) Briefly explain what happens if the user sends a data of 5500 bytes at the end of a 500 msec idle period. (CN/S-3/ /MT/4) Answer: (a) 450 msec; 0.8 msec; (c) times faster; (d) Data is discarded by the router. 7/8

8 4.6 (Extra Question): Which of the following teleservices may be offered over the B, H and D channels in narrowband ISDN? Specify. () Packet data communication (64 kbps-2 Mbps) (8) Alarms (2) Teleconference (9) Facsimile (3) Packet data communication (at 9.6 kbps) (0) Packet data communication (at 64 kbps) (4) Telemetering () Signaling (5) Videophone (2) User info (short user messages) (6) Videoconference (3) Remote control (7) Telephone (CSE-3/ /2MT/2) 4.7 (Extra Question) Which of the following properties belongs to an ATM (Asynchronous Transfer Mode) service? Specify for each item. () Service type: Connection-oriented service / Connectionless service / Both. (2) Switching type: Circuit switching / Packet switching / Both. (3) Transmission rate is suitable for: Only wide-band data transmission / Only narrow-band data transmission / Both. (4) Cell length: Constant / Variable depending on transmission rate / Variable depending on the length of data field. (5) Error correction on the data field is performed by: The ATM layer / The TC (Transmission Convergence) sublayer / The upper layers. (6) Header error control is performed by: The ATM layer / The TC sublayer / The AAL (ATM Adaptation Layer). (7) Congestion control is performed by: The AAL / The ATM layer / The upper layers. (8) Flow control is performed by: The AAL / The ATM layer / The TC sublayer. (9) Virtual path and virtual channel management is performed by: The ATM layer / The AAL / The TC sublayer. (0) Cell rate adaptation is performed by: The CS (Convergence Sublayer) / The ATM layer / The TC sublayer. (CSE-3/ /2MT/3) 5. PHYSICAL LAYER 5. Briefly answer the following questions about the RS-232-C interface. a) Draw a block diagram showing the place of RS-232-C interface in the communication of two computers over the telephone network. Show the DTE and DCE units on your block diagram and briefly define these units. b) For a 25-pin RS-232-C interface, specify which unit (DTE or DCE) activates the following pins: Pin Nr. Pin Name Abbreviation 20 Data Terminal Ready DTR 6 Data Set Ready DSR 4 Request to Send RTS 5 Clear to Send CTS 22 Ring Indicator RI c) Compare the balanced and unbalanced transmission methods with regard to the type of signal grounds and performances of the interfaces. (BA-İ-9/ /AS/2) 5.2 What is null modem? Briefly define. Between which units the null modem is used? Which type of transmission (series or parallel; synchronous or asynchronous) does it use? Which type of connector does it use? 5.3 (Extra question) Put into order the following transmission mediums with regard to increasing probability of creating transmission errors: Coaxial cable, fiber optic cable, the atmosphere (for radio waves), twisted pair cable. 8/8

11 6. Go-back-N sliding window protocol is used between the data link layers of machines A and B with a window size of 7 frames at both sides. The figure below shows the a0 and b0 states of the sliding windows of machines A and B, respectively, just before Frame 2 is sent by A. The same figure also shows the sequence numbers of the frames sent by A and acknowledgements sent by B. a) Indicate the frame numbers that should be contained in the sliding windows and buffer memories at the sender and receiver for the states a, b, a2, b2, a3, b3, a4, b4,a5, b5, and b6. (a0) (a) (a2) (a3) (a4) Machine A Machine B Ç2 Ç3 Ç4 Ç ACK Ç6 Ç NAK b) Write a formula showing the relation between the window size (N, in terms of number of frames) and the size of the sequence number field (k, in terms of bits). Answer: (a) Content of the following table must be shown as a figure; (b) N=2 k -. (b0) (b) (b2) (b3) (b4) Machine A Machine B State Place of the Buffer Line Frames in the Sliding Window State Place of the Buffer Line Frames in the Sliding Window a Between -2 6, 7, 0 b Between -2 6, 7, 0 a2 Between 5-6 6, 7, 0,, 2, 3, 4 b2 Between 5-6 6, 7, 0,, 2, 3, 4 a3 Between 5-6 0,, 2, 3, 4 b3 Between 5-6 0,, 2, 3, 4 a4 Between 6-7 7, 0,, 2, 3, 4, 5 b4 Between 6-7 7, 0,, 2, 3, 4, 5 (BA-Ö-8/ /2.MS/4) 6.2 Sliding window protocol with window size of 7 frames are used between the data link layers of machines A and B. Assume that machine B sends an ACK (acknowledgement) for every frame it receives without error, and it sends a NAK (negative acknowledgement) for every frame it receives with error. This corresponds to a receiver window size of frame. Assume also that no frames are lost in the transmission medium. For the scenario shown in the figure on the right hand side, write the numbers of the data frames indicated by a, b, c, d, e, f, g, and write the numbers of the ACKs indicated by h, i, j, k, l, m, n, and also explain what kind of process does the receiver perform on the frames indicated by p for each of the following cases: a) For the Go-back-N Automatic Repeat Request method. b) For the Selective Reject Automatic Repeat Request method. (BA-İ-6/ /2.AS/4) A F0 F F2 F3 F4 F5 F6 a b c d e f g B ACK ACK 2 NAK 2 p h (ACK) i (ACK) j (ACK) k (ACK) l (ACK) m (ACK) n (ACK) Answer: (a) a: F2 h: ACK 3 (b) a: F2 h: ACK 7 p: Saved in the buffer memory and put into order. b: F3 i: ACK 4 b: F7 i: ACK 0 ACK 2, 3, 4, 5, 6 may not be sent. c: F4 j: ACK 5 c: F0 j: ACK d: F5 k: ACK 6 d: F k: ACK 2 e: F6 l: ACK 7 e: F2 l: ACK 3 f: F7 m: ACK 0 f: F3 m: ACK 4 g: F0 n: ACK g: F4 n: ACK 5 p: Discarded /8

14 A Makinesi B Makinesi (a0) (a) (a2) (a3) (a4) Ç0 Ç Ç2 Ç3 Ç ACK Ç5 Ç6 Ç NAK (b0) (b) (b2) (b3) (b4) b) Write a formula showing the relation between the window size (N, in terms of number of frames) and the size of the sequence number field (k, in terms of bits). (BA-Ö-7/ /FS/3) Answer: (a) Content of the following table must be shown as a figure; (b) N=2 k -. Machine A Machine B State Place of the Buffer Line Frames in the Sliding Window State Place of the Buffer Line Frames in the Sliding Window a At the left of 0 5, 6 b At the left of 0 5, 6 a2 Between 4-5 5, 6, 7, 0,, 2, 3 b2 Between 4-5 5, 6, 7, 0,, 2, 3 a3 Between 4-5 0,, 2, 3 b3 Between 4-5 0,, 2, 3 a4 Between 5-6 6, 7, 0,, 2, 3 b4 Between 5-6 6, 7, 0,, 2, 3 7. MEDIUM ACCESS CONTROL SUBLAYER 7. Compare the delay of pure ALOHA versus slotted ALOHA at low and high traffic loads. Which method causes less delay for low and high traffic loads? 7.2 A group of N stations share a 56-kbps pure ALOHA channels. Each station outputs a 000-bit frame on an average of every 00 sec. Considering that the maximum efficiency of the pure ALOHA is 8.4 %, calculate the maximum number of N. Answer: 030 stations. 7.3 A -km long, 0-Mbps CSMA/CD LAN has propagation speed of 200 m/μsec. Data frames are 66 bytes long, including 26 bytes header, checksum and other overhead. The first bit slot after a successful transmission is reserved for the receiver to capture the channel to send a 32-bit acknowledgement frame. What is the effective data rate (TRIB: Transmission Rate of Information Bits), assuming that there are no collisions. Hint: Take the time required to capture the channel as 2τ. This is the round trip propagation time for the electrical signal. Answer: 3.72 Mbps 7.4 Eight stations with station numbers 0 through 7 use the basic bit map protocol. The figure below shows the bits transmitted by these stations in the contention slots. Write the number of the stations that send the frames a, b, c, d and e shown in the figure. Contention slots Frames sent Contention slots Frames sent a b c d e bit d bits 4/8

16 8.9 In the computer network given below, delays between the routers are given in milliseconds. a) Apply Dijkstra s algorithm for Router A. In applying the algorithm, establish a table with the labels showing the minimum delay value and the corresponding path from Router A to all other routers for each iteration step. b) Briefly explain at which iteration and why the algorithm ends. c) Indicate which labels will be stored in the routing table of Router A. B 3 C A 3 E 6 2 F 2 2 D 2 3 G 4 H (AB-Ö-3/ /BS/3) Answer: (a) B(, A); C(4, A-B-C); D(5, A-E-D); E(3, A-E); F(3, A-G-F); G(2, A-G); H(5, A-B-C-H). 8.0 In the computer network given below, delays between the routers are given in milliseconds. a) Apply Dijkstra s algorithm for Router. In applying the algorithm, establish a table with the labels showing the minimum delay value and the corresponding path from Router to all other routers for each iteration step. b) Briefly explain at which iteration and why the algorithm ends. c) Indicate which labels will be stored in the routing table of Router (BA-Ö-7/ /FS/4) Answer: (a) D 2 (, -2); D 3 (3, ); D 4 (3, ); D 5 (2, -2-5); D 6 (5, ). 8. In the network given below, delays between the routers are given in milliseconds. a) Apply Bellman-Ford algorithm for the Router. In applying the algorithm, establish a table in which the maximum number of hops is started from zero and incremented by one for each iteration (h=0,, 2, 3, ). In the table you will establish, include the label values consisting of minimum delay and path definition from Router to other routers for each value of h. b) Briefly explain how the iteration ends. c) Indicate which labels will be stored in the routing table of Router at the end of the algorithm (BA-Ö-23/ /FS/3) Answer: (a) D 2 (2, -2); D 3 (3, ); D 4 (2, -5-4); D 5 (, -5); D 6 (2, -5-6). 6/8

17 8.2 Distance vector routing algorithm is used in the subnet shown below. The delay vectors that have just come in to router C from its neighbor routers and the measured delays to the neighbors of C are given below. Find the new routing table of C. Give both the outgoing line to use and the expected delay. Delay vectors received from C s neighbors: To B D F A 2 B C D E F G Delay measurements made by C: CB CD CF (BA-İ-3/ /BS/3) Answer: To New estimated Path delay from C A 4 Over B B 3 Directly to B C 0 - D 7 Directly to D E 6 Over D F 6 Over B G 2 Over B 8.3 Distance vector routing algorithm is used in the subnet shown below. The following delay vectors have just come in to router A: A, B, C, D, E, F From B: (6, 0, 5, 0, 6, 3) From C: (2, 7, 0, 3, 8, ) B C From D: (4, 3, 6, 0, 5, 7) The measured delays to B, C, and D are 3, 9, and 7 msec, A F respectively. Find the new routing table of A. Give both the outgoing line to use and the expected delay. D E (BA-Ö-8/ /BS/4) Answer: To Delay from A Path A 0 - B 0 Over D C 9 Over C D 7 Over D E 2 Over D F 4 Over D A B C D F G E 8.4 (Extra question) Distance vector routing algorithm is used in the subnet shown below. The following delay vectors have just come in to router C: From B: (5, 0, 8, 2, 6, 2) From D: (6, 2, 6, 0, 9, 0) From E: ( 7, 6, 3, 9, 0, 4) The measured delays to B, D, and E are 6, 3, and 5 msec, respectively. Find the new routing table of C. Give both the outgoing line to use and the expected delay. 7/8

18 B C A D (BA-Ö-2/ /FS/4) Answer: To Delay from C Path A Over B B 6 Over B C 0 - D 3 Over D E 5 Over E F 8 Over B 8.5 (Extra question) Distance vector routing algorithm is used in the subnet shown below. The delay vectors that have just come in to router A from its neighbor routers and the measured delays to the neighbors of A are given below. Find the new routing table of A. Give both the outgoing line to use and the expected delay. Delay vectors received by A: Delay measurements made by A: To Delay from B (ms) Delay from C (ms) Delay from D (ms) To Delay from A (ms) A B 5 B C A C D 4 D E (BA-FB-2/ /FS/3) Answer: To Delay from A Path A 0 Over A B 4 Over C C Over C D 4 Over D E 8 Over B E F B C D E 8/8

### Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

### Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is an unacknowledged connectionless service? What is an acknowledged

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

### WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

### Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

### DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

### EECC694 - Shaaban. Transmission Channel

The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,

### Telecommunications, Networks, and Wireless Computing

Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

### Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

### DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

### EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

### Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

### Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

### Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

### Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

### TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

### ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

### 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

### 11/22/2013 1. komwut@siit

11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

### WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

### :-------------------------------------------------------Instructor---------------------

Yarmouk University Hijjawi Faculty for Engineering Technology Computer Engineering Department CPE-462 Digital Data Communications Final Exam: A Date: 20/05/09 Student Name :-------------------------------------------------------Instructor---------------------

### Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

### Local-Area Network -LAN

Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

### This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

### EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

### Connection Services. Hakim S. ADICHE, MSc

Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity

Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

### CMPE 150 Winter 2009

CMPE 150 Winter 2009 Lecture 6 January 22, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.

### 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

### EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

### TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION

TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION (Please read appropriate parts of Section 2.5.2 in book) 1. VOICE DIGITIZATION IN THE PSTN The frequencies contained in telephone-quality

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

### Chapter 5. Data Communication And Internet Technology

Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

### Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

### Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

### Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet dominant LAN technology: cheap -- \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

### Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

### 2 Basic Concepts. Contents

2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a

### Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

### CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

### Ring Local Area Network. Ring LANs

Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

### Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

### (Refer Slide Time: 2:10)

Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer

### Public Switched Telephone System

Public Switched Telephone System Structure of the Telephone System The Local Loop: Modems, ADSL Structure of the Telephone System (a) Fully-interconnected network. (b) Centralized switch. (c) Two-level

### Written examination in Computer Networks

Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

### Analog vs. Digital Transmission

Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

### ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

### Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c

EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way

### Computer Networks Homework 1

Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

### Ethernet. Ethernet. Network Devices

Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

### Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

### CSE 3461 / 5461: Computer Networking & Internet Technologies

Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

### CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

### 10/13/2008 Vasile Dadarlat --Computer Networks 1

Lecture 4 Communications Channels Definition: the part that connects a data source to a data sink; based on the transmission media. Classification criteria: -type of the link (connection): point-to-point,

### Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

### COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall

### LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

### WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

### Communications and Computer Networks

SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

### Long Distance Connection and WAN

Lecture 6 Long Distance Connection and WAN Digital Telephone, PCM and Nyquist Sampling Theorem DSU/CSU, T Line Series and OC line Series Local Loop DSL Technologies - ADSL, HDSL, SDSL, VDSL Cable Modem

### R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

### Overview of Computer Networks

Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

### Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

### MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

### CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

### Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

### BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

### IT4504 - Data Communication and Networks (Optional)

- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

### Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

### CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

### Final for ECE374 05/06/13 Solution!!

1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

### Stop And Wait. ACK received; transmit frame 2 CS 455 3

Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

### Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

### Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

### Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

### Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8

Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

### Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

### Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

### First Semester Examinations 2011/12 INTERNET PRINCIPLES

PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

### WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham 1 Wide-area Networks (WANs) 2 Metropolitan-Area Network (MANs) 3 Path Determination 4 Internetworking Any internetwork must include

### Routing in packet-switching networks

Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

### Computer Networks CS321

Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

### College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:

### Controlled Random Access Methods

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

### Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

### Asynchronous Transfer Mode

CHAPTER 15 Asynchronous Transfer Mode Background Asynchronous Transfer Mode (ATM) technology is based on the efforts of the International Telecommunication Union Telecommunication Standardization Sector

### UPPER LAYER SWITCHING

52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

### Module 15: Network Structures

Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

### Transport and Network Layer

Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

### Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

### Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

### CS 5516 Computer Architecture Networks

Lecture 11: ISDN & ATM CS 5516 Computer Architecture Networks VA Tech Prof. Roy M. Wnek History of ISDN Traditionally, local loop connectivity has been with an analog signal on copper Inefficient, prone

### The Impact of QoS Changes towards Network Performance

International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact

### CORPORATE NETWORKING

CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based

### Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous

### GATE CS Topic wise Questions Computer Network

www.gatehelp.com GATE CS Topic wise Questions YEAR 23 Question. 1 Which of the following assertions is false about the internet Protocol (IP)? (A) It is possible for a computer to have multiple IP addresses