Chapter1: Exercises. Silvia Giordano ICA, EPFL. Project e-1



Similar documents
Computer Networks Homework 1

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

Solutions to the Sample Questions on Introduction

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Final for ECE374 05/06/13 Solution!!

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

WAN Data Link Protocols

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Introduction to Metropolitan Area Networks and Wide Area Networks

Question: 3 When using Application Intelligence, Server Time may be defined as.

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

Architecture and Performance of the Internet

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

First Midterm for ECE374 02/25/15 Solution!!

Introduction, Rate and Latency

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Internet structure: network of networks

Computer Networks and the Internet

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

First Midterm for ECE374 03/09/12 Solution!!

Communications and Computer Networks

Protocols and Architecture. Protocol Architecture.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Computer Networks - CS132/EECS148 - Spring

Clearing the Way for VoIP

Chapter 1 Computer Networks and the Internet

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Transport Layer Protocols

Computer Networks CS321

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

What s the Internet. routers: forward packets (chunks of data) millions of connected computing devices: hosts = end systems

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

How To Understand The Internet From A Telephone To A Computer (For A Computer)

CS268 Exam Solutions. 1) End-to-End (20 pts)

Introduction to WAN Technologies

Introduction to LAN/WAN. Network Layer

Quality of Service (QoS)) in IP networks

CSCI Topics: Internet Programming Fall 2008

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

PART OF THE PICTURE: The TCP/IP Communications Architecture

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Operating Systems and Networks Sample Solution 1

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

TCP for Wireless Networks

: Instructor

1. Public Switched Telephone Networks vs. Internet Protocol Networks

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Module 2 Overview of Computer Networks

Lecture 28: Internet Protocols

The Telephone Network. An Engineering Approach to Computer Networking

technology standards and protocol for ip telephony solutions

Quality of Service Testing in the VoIP Environment

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Computer Networks & Security 2014/2015

WAN Technology. Heng Sovannarith

Introduction to WAN Technologies

Overview of Computer Networks

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

Chapter 3 ATM and Multimedia Traffic

VoIP telephony over internet

Exam 1 Review Questions

Network Overview. The network edge: The network edge: Internet Services Models. The network edge: A closer look at network structure:

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

Analog vs. Digital Transmission

Circuit-Switched Router Connections Nathan J. Muller

The IP Transmission Process. V1.4: Geoff Bennett

Performance Measurement of Wireless LAN Using Open Source

(Refer Slide Time: 02:17)

Top-Down Network Design

Lesson 1 - Computer Networks and Internet - Overview

The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

The Network Layer Functions: Congestion Control

10CS64: COMPUTER NETWORKS - II

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

Data Networks Summer 2007 Homework #3

Nokia E90 Communicator Using WLAN

LAN Performance Measurements Lab

Protocol Architecture. ATM architecture

PART III. OPS-based wide area networks

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

VoIP network planning guide

QoS issues in Voice over IP

CSE 3461 / 5461: Computer Networking & Internet Technologies

Transcription:

Chapter1: Exercises Silvia Giordano ICA, EPFL Project e-1

EX1: Protocol design Design and describe an application-level protocol to be used between an automatic teller machine (ATM) and a bank s centralized computer (BCC): user s card and password to be verified the account balance (at BCC) to be queried money disbursed to the user handle all-too-common case in which there is not enough money in the account to cover the withdrawal Project e-2

Step1: Specification Specify the protocol by listing the msgs exchanged and the action taken by the ATM or the BCC on transmission and receipt of the msgs Msgs from ATM (client) to BCC (server) and ATM actions Msgs from BCC to ATM machine and BCC actions The user puts the card in the ATM machine. The card s <userid> is transmitted to BCC The user types PIN that is sent to BCC The user requests balance User asks to withdrawl money User gets the money or error msg and leaves BCC checks the card. Asks user for PIN (password) PIN in BCC checks ERROR the PIN PIN OK BCC checks the operation BCC sends the balance operation in ERROR operation OK User done, display welcome screen at ATM Project e-3

Msgs from ATM machine to Server Messages from ATM machine to BCC Msg name purpose HELO <userid> Let BCC know there is the card user ID in the ATM PASSWD <passwd> User enters PIN, which is sent to server BALANCE User requests balance WITHDRAWL <amt> User asks to withdrawl money BYE User all done Project e-4

Msgs from Server to ATM machine Messages from Server to ATM machine (display) Msg name purpose PASSWD Ask user for PIN (password) OK last requested operation OK ERR last requested operation in ERROR AMOUNT <amt> sent in response to BALANCE request BYE user done, display welcome screen at ATM Project e-5

Step2: Operation example Sketch the operation of the protocol for the case of a simple withdrawal with no errors, using a diagram with arrows Project e-6

Correct operation client HELO <userid> PASSWD PASSWD <passwd> OK BALANCE AMOUNT <amt> server check if valid userid check password password is OK ATM dispenses $ WITHDRAWL <amt> OK BYE BYE check if enough $ to cover withdrawl Project e-7

No enough money client error msg displayed no $ given out HELO <userid> PASSWD PASSWD <passwd> OK BALANCE AMOUNT <amt> WITHDRAWL <amt> ERR BYE BYE server check if valid userid check password password is OK check if enough $ to cover withdrawl Project e-8

Step3: underlying end-to-end transport service Explicitly state the assumptions made by the protocol about the underlying end-to-end transport service connection-oriented: reliable transport: flow control: congestion control: timing: secure connection required between client(atm), server(bcc) data cannot be loss or received in wrong order the total amount of data transferred is small this application cannot congest the network it is not really time sensitive minimum bandwidth guarantees: the msgs sent are few and small Project e-9

Ex2:packet vs circuit switching Consider an application that transmits data at a steady rate (for example, the sender generates a N-bit unit of data every k time units, where k is small and fixed). Also, when such an application starts, it will stay on for a relatively long period of time. Answer the following questions, briefly justifying your answer: a) Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why? b) Suppose that a packet-switching network is used and the only traffic in this network comes from such applications as described above. Furthermore, assume that the sum of the application data rates is less than the capacities of each and every link. Is some form of congestion control needed? Why? Project e-10

Circuit switched network circuit-switched network: the application involves long sessions with predictable smooth bandwidth requirements. transmission rate is known and not bursty, bandwidth can be reserved for each application session circuit with no signicant waste. no overhead costs of setting up and tearing down a circuit connection (amortized over the length sessions). if packet-switched network: no predictable delay protocol overhead (information in the packet). congestion and flow control needed Project e-11

Packet switched network Large link capacities: the network needs no congestion control mechanism. Even if all the applications simultaneously transmit over the same link with bandwidth L, L is sufficient to (greater than) handle the sum of all of the applications' data rates (very little queuing). Project e-12

Ex3: Delay Consider two hosts, Host A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to B. A L bits R bps m meters B s m/sec Project e-13

Propagation and transmission delay Express the propagation delay, d prop, in terms of m and s. d prop = distance/speed = m/s seconds. Determine the transmission time of the packets, d trans, in terms of L and R. d trans = packet-lenght/rate = L/R seconds. Ignoring processing and queuing delays, obtain an expression for the end-to-end delay. d end-to-end =d prop + d trans = m/s + L/R seconds Project e-14

Bits Suppose Host A begins to transmit the packet at time t 0 = 0. At time t = d trans, where is the last bit of the packet? Suppose The bit d prop is just is greater leaving than Host da. trans. At time t = d trans, where is the first bit of the packet? Suppose The first d bit is in the link and has not prop is less than d trans. At time t = d reached Host B. trans, where is the first bit of the packet? The first bit has reached Host B. A L time t 0 d trans B d prop Project e-15

Numerical example Suppose s = 2.5 * 10 8, L = 100 bits, and R = 28 kbps. Find the distance m so that d prop equals d trans m = L/R x s = (100/(28 x 10 8 ))(2.5*10 8 ) = 8.93 Km Project e-16

Explain in few lines the following concepts (1): 1. functions of the physical layer 2. functions of the link layer 3. functions of the network layer 4. functions of the transport layer 5. circuit switching 6. packet switching 7. connection oriented communication 8. intermediate systems 9. switch Project e-17

Explain in few lines the following concepts (1): 10. reliable transport 11. congestion avoidance 12. client-server computing 13. router 14. protocol 15. error recovery 16. flow control 17. PDU Project e-18