Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri



Similar documents
Computer Networks. Data Link Layer

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer Overview

CMPE 150 Winter 2009

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Sheet 7 (Chapter 10)

COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS

15-441: Computer Networks Homework 1

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Computer Networks Homework 1

WAN Data Link Protocols

High-Level Data Link Control

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

PART-A Questions. 9. What are the two parts of message inside the envelope?

Review of Error Detection of Data Link Layer in Computer Network

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

COMPUTER NETWORKS FOURTH EDITION PROBLEM SOLUTIONS ANDREW S. TANENBAUM. Vrije Universiteit Amsterdam, The Netherlands PRENTICE HALL PTR

Process Control and Automation using Modbus Protocol

Applied Data Communication Lecture 14

Appendix D T1 Overview

Data Link Layer. Flow Control. Flow Control

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

DATA COMMUNICATION AND NETWORKS

Based on Computer Networking, 4 th Edition by Kurose and Ross

10/13/2008 Vasile Dadarlat --Computer Networks 1

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Written examination in Computer Networks

GATE CS Topic wise Questions Computer Network

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

: Instructor

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

VoIP Bandwidth Calculation

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Raj Jain. The Ohio State University Columbus, OH These slides are available on-line at:

The OSI and TCP/IP Models. Lesson 2

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Clearing the Way for VoIP

Module 7 Internet And Internet Protocol Suite

Operating Systems and Computer Networks / Datenverarbeitung 2 / Data Processing 2

EKSAMEN / EXAM TTM

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Ring Local Area Network. Ring LANs

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Exam 1 Review Questions

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

Homework Assignment #1 Solutions

Chapter 9. IP Secure

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

1. Overview. 2. F-bit Utilization

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

0,2 D(0) A(1) D(1) 1,3 D(2) 0,2 D(0) A(1) D(1) 1,3 D(2) D(3) D(3) D(1) D(1) A(4) D(2) 4,6 D(3) A(4) 4,6 GO BACK 3 SELECTIVE REJECT WINDOW SLIDES

Error detection using CRC

What is Network Latency and Why Does It Matter?

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

First Midterm for ECE374 03/24/11 Solution!!

Solutions to the Sample Questions on Introduction

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

CS335 Sample Questions for Exam #2

Architecture and Performance of the Internet

Physical Layer, Part 2 Digital Transmissions and Multiplexing

Networking Test 4 Study Guide

CHAPTER 8 MULTIPLEXING

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Chapter 2 - The TCP/IP and OSI Networking Models

Combining Voice over IP with Policy-Based Quality of Service

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Candidates should attempt FOUR questions. All questions carry 25 marks.

SRX 210 Services Gateway T1 Interface Configuration

Computer Networks - CS132/EECS148 - Spring

Protocols. Packets. What's in an IP packet

Error Control Coding and Ethernet

LIN (Local Interconnect Network):

- T-Carrier Technologies -

Operating Systems and Networks Sample Solution 1

10 Gigabit Ethernet WAN PHY

1 Introduction to mobile telecommunications

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Application Note AN-00160

CYCLIC REDUNDANCY CHECKS IN USB. Introduction. Two-minute mathematical background

BROADBAND AND HIGH SPEED NETWORKS

Data Link Protocols. 5.4 Framing

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

PART OF THE PICTURE: The TCP/IP Communications Architecture

Internet Packets. Forwarding Datagrams

Transport Layer Protocols

Chapter 1 Computer Networks and the Internet

RECOMMENDATION ITU-R F (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter.

Transcription:

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is an unacknowledged connectionless service? What is an acknowledged connectionless service? What is an acknowledged connection-oriented service? Draw a placement of the data link protocol? What is a framing? What is a character count framing method? What are flag bytes with byte stuffing framing method? What is starting and ending flags, with bit stuffing framing method? What is Physical layer coding violations framing method? What is an error control? What is error detection? What is an error correction? What is an error control? What is a feedback-based flow control? What is a rate-based flow control? What is a codeword? What is a Hamming distance? What is a (even or odd) parity bit? What is CRC (Cyclic Redundancy Check)? What is a packet? What is a frame? What is an unrestricted simplex protocol? What is a simplex stop-and-wait protocol? What is a simplex protocol for a noisy channel? What is a piggybacking? What is a sliding window? What is a one-bit sliding window protocol? What is a protocol using go back N? What is a protocol using selective repeat? What is a HDLC High Level Data Link Control? What is a PPP The Point-to-Point Protocol?

Örnek Problemler ve Çözümleri (Sample Problems and Solutions): (Chapter 3, Problem 2-1) The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing methods are used: (a) Character count (b) Flag bytes with byte stuffing. (c) Starting and ending flag bytes, with bit stuffing. a) 00000100 01000111 11100011 11100000 01111110 b) 01111110 01000111 11100011 11100000 11100000 11100000 01111110 01111110 c) 01111110 01000111 00011 11100000 01110 0111110 (Chapter 3, Problem 2-2) The following character encoding is used in a data link protocol: A: 0101; B: 10101001; FLAG: 01111110; ESC: 10100011 Show the bit sequence transmitted (in binary) for the five-character frame: A ESC B ESC FLAG when each of the following framing methods are used: (a) Flag bytes with byte stuffing. (b) Starting and ending flag bytes, with bit stuffing. d) 01111110 0101 10100011 10100011 10101001 10100011 10100011 10100011 01111110 01111110 e) 01111110 0101 10100011 10101001 10100011 01110 0111110 (Chapter 3, Problem 3) Given the output after byte-stuffing: FLAG A B ESC ESC C ESC ESC ESC FLAG ESC FLAG D F FLAG. What is the original data? A B ESC C ESC FLAG FLAG D F (Chapter 3) Given the output after byte-stuffing: FLAG A B ESC ESC C ESC ESC ESC FLAG ESC FLAG D FLAG. What is the original data? A B ESC C ESC FLAG FLAG D

(Chapter 3) A B ESC C ESC FLAG FLAG D is given. This data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the text is used. What is the output after stuffing? After stuffing, we get A B ESC ESC C ESC ESC ESC FLAG ESC FLAG D (Chapter 3) A bit string, 01111111110, needs to be transmitted at the data link layer. What is the string actually transmitted after bit stuffing? The output is 0111111001110 (Chapter 3, Problem 9) Eight bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that receiver can detect and correct single bit errors? Show the bit pattern transmitted for the message 11001010. Assume that odd parity is used in the Hamming code. m+r+1 2 r, m=8 8+r+1 2 r, r=4 n=m+r=8+4=12 1 2 3 4 5 6 7 8 9 10 11 12 2 0 2 1 2 2 2 3?? 1? 1 0 0? 1 0 1 0 3=2 0 +2 1 =1+2 5=2 0 +2 2 =1+4 6=2 1 +2 2 =2+4 7=2 0 +2 1 +2 2 =1+2+4 9=2 0 +2 3 =1+8 10=2 1 +2 3 =2+8 11=2 0 +2 1 +2 3 =1+2+8 12=2 2 +2 3 =4+8 Check bit 2 0 is used for data in positions 3, 5, 7, 9, 11 so its value is 1 because of 11 Check bit 2 1 is used for data in positions 3, 6, 7, 10, 11 so its value is 1 because of 100011 Check bit 2 2 is used for data in positions 5, 6, 7, 12 so its value is 0 because of 10000 Check bit 2 3 is used for data in positions 9, 10, 11, 12 so its value is 1 because of 10101 So the bit pattern transmitted for the message 11001010 is 1 1 1 0 1 0 0 1 1 0 1 0

(Chapter 3, Problem 10) An 8-bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is the binary value after encoding? The encoded value is 101001001111 (Chapter 3, Problem 14) 7 5 What is the remainder obtained by dividing X +X + 1 by the generator polynomial X 3 +1? 7 5 X +X + 1 X 3 + 1 ------------- 7 4 4 2 X + X X + X + X --------------- 5 4 X +X + 1 5 2 X +X + 0 ---------------- 4 2 X +X + 1 4 X + X --------------- 2 X +X + 1 is remainder (Chapter 3, Problem 15) A bit stream 10101010 is transmitted using the standard CRC method. The generator polynomial is x 3 +x 2 +1. Show the actual bit string transmitted. Suppose the second bit from the left is inverted during transmission. Show that this error is detected at the receiver s end. The frame is 10101010 The generator is = x 3 +x 2 +1 So we must append 3 zeros to the message: 10101010000 10101010000 1110 01111 1001 01000 01010

01110 110 is remainder So actual bit string transmitted is 10101010110 The received bit stream with an error in the second bit from the left is 1010110 1010110 10101010 001110 001110 001111 00100 is a remainder As we see the remainder is different from zero. Thus, the receiver detects the error and can ask for a retransmission. (Chapter 3, Problem 17) A channel has a bit rate of 4 Kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent? Efficiency will be 50% when the time to transmit the frame equals the round-trip propagation delay. At a transmission rate of 4 bits/ms, 160 bits takes 40 ms. For frame sizes above 160 bits, stop-and-wait is reasonably efficient. (Chapter 3, Problem 29-1) Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose propagation time from the earth is 270 msec. Acknowledgements are always piggybacked onto data frames. The headers are very short. Three-bit sequence numbers are used. What is the maximum achievable channel utilization for a) Stop-and-wait. b) Protocol 5. c) Protocol 6. Let t=0 denote the start of transmission. At t=1 msec, the first frame has been fully transmitted. At t=271 msec, the first frame has fully arrived. At t=272 msec, the frame acknowledging the first one has been fully sent. At t=542 msec, the acknowledementbearing frame has fully arrived. Thus, the cycle is 542 msec. A total of k frames are sent in 542 msec, for an efficiency of k/542. Hence a) k=1, efficiency=1/542=0,18% b) k=7, efficiency=7/542=1,29% c) k=4, efficiency=4/542=0,74%

(Chapter 3, Problem 29-2) Frames of 10000 bits are sent over a 1-Mbps channel using a geostationary satellite whose propagation time from the earth is 270 msec. Acknowledgements are always piggybacked onto data frames. The headers are very short. Three-bit sequence numbers are used. What is the maximum achievable channel utilization for a) Stop-and-wait. b) Protocol 5. c) Protocol 6. Let t=0 denote the start of transmission. At t=10 msec, the first frame has been fully transmitted. At t=280 msec, the first frame has fully arrived. At t=290 msec, the frame acknowledging the first one has been fully sent. At t=580 msec, the acknowledementbearing frame has fully arrived. Thus, the cycle is 580 msec. A total of k frames are sent in 542 msec, for an efficiency of k/542. Hence d) k=1, efficiency=1/580=0,17% e) k=7, efficiency=7/580=1,21% f) k=4, efficiency=4/580=0,69% (Chapter 3, Problem 32-1) A 100-km-long cable runs at the T1 data rate. The propagation speed in the cable is 2/3 the speed of light in vacuum. How many bits fit in the cable? The propagation speed in the cable is 200,000 km/sec, or 200 km/msec, so a 100-km cable will be filled in 500 microsec. Each T1 frame is 193 bits sent in 125 microsec. This corresponds to four frames, or 772 bits on the cable. (Chapter 3, Problem 32-2) A 50-km long cable run at the T1 data rate. The propagation speed in the cable is 2/3 the speed of light in vacuum. How many bits fit in the cable? The propagation speed in the cable is 200,000 km/sec, or 200 km/msec. So a 50 km cable will be filled in 250 µsec. Each T1 frame is 193 bits sent in 125 µsec. This corresponds to two frames, or 386 bits on the cable.