EKSAMEN / EXAM TTM

Similar documents
Lecture 7 Multiple Access Protocols and Wireless

Ethernet, VLAN, Ethernet Carrier Grade

Random Access Protocols

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Based on Computer Networking, 4 th Edition by Kurose and Ross

EPL 657 Wireless Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CS263: Wireless Communications and Sensor Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

How To Make A Multi-User Communication Efficient

CSMA/CA. Information Networks p. 1

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Transport Layer Protocols

First Semester Examinations 2011/12 INTERNET PRINCIPLES

ECE/CS 372 introduction to computer networks. Lecture 13

CSE 123A Computer Networks

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

EKSAMEN / EXAM TTM

Final for ECE374 05/06/13 Solution!!

COMP 3331/9331: Computer Networks and Applications

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Transport and Network Layer

10. Wireless Networks

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture 17: Wireless Networking"

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Controlled Random Access Methods

RTT 60.5 msec receiver window size: 32 KB

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Internet Control Protocols Reading: Chapter 3

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Computer Networks. Chapter 5 Transport Protocols

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

- Hubs vs. Switches vs. Routers -

... neither PCF nor CA used in practice

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

How To Understand The Layered Architecture Of A Network

Real-Time (Paradigms) (51)

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Networking Test 4 Study Guide

Mobile Computing/ Mobile Networks

TCP in Wireless Networks

Ethernet. Ethernet. Network Devices

CS268 Exam Solutions. 1) End-to-End (20 pts)

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

ECE 333: Introduction to Communication Networks Fall 2002

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Wiereless LAN

Module 15: Network Structures

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

LESSON Networking Fundamentals. Understand TCP/IP

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Data Center Networks, Link Layer Wireless (802.11)

Level 2 Routing: LAN Bridges and Switches

Per-Flow Queuing Allot's Approach to Bandwidth Management

This sequence diagram was generated with EventStudio System Designer (

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

NETWORK LAYER/INTERNET PROTOCOLS

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Question: 3 When using Application Intelligence, Server Time may be defined as.

UPPER LAYER SWITCHING

Chapter 7 Low-Speed Wireless Local Area Networks

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

MAC Algorithms in Wireless Networks

Chapter 6: Wireless and Mobile Networks

Technical Support Information Belkin internal use only

Low-rate TCP-targeted Denial of Service Attack Defense

Chapter 14: Distributed Operating Systems

DATA COMMUNICATION AND NETWORKS

TCP in Wireless Mobile Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

First Midterm for ECE374 03/09/12 Solution!!

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Protocol Data Units and Encapsulation

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Route Discovery Protocols

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

Transcription:

1.1 1.1.1.... 1.1.6.... 1.1.2.... 1.1.7.... 1.1.3.... 1.1.8.... 1.1.4..... 1.1.9..... 1.1.5... 1.1.10... 1.2 1.2.1.... 1.2.6.... 1.2.2... 1.2.7.... 1.2.3.... 1.2.8.... 1.2.4..... 1.2.9..... 1.2.5.... 1.2.10... 1.3 1.3.1.... 1.3.6.... 1.3.2... 1.3.7.... 1.3.3.... 1.3.8.... 1.3.4..... 1.3.9..... 1.3.5.... 1.3.10... 1.4 1.4.1.... 1.4.6.... 1.4.2... 1.4.7... 1.4.3.... 1.4.8.... 1.4.4..... 1.4.9..... 1.4.5.... 1.4.10... 1.5 1.5.1.... 1.5.6.... 1.5.2.... 1.5.7... 1.5.3.... 1.5.8.... 1.5.4..... 1.5.9..... 1.5.5... 1.5.10... Kontroller: Eksamensvaktens signature / Invigilator's signature Kandidatnr. på alle sider Samme kandidatnr. over alt 1/7

2. 2.1 A protocol defines the format and order of messages sent and received among communicating entities, and actions taken on message transmission and receipt. 2.2 Packet is picked off network if destination MAC address of ethernet frame is equal to the MAC address of the end system. Ethernet frame type field indicates IP. Ethernet headers decapsulated and packet delivered IP protocol. Protocol field in IP indicates TCP. TCP protocol uses the source and destination port fields of the TCP header to decide which connection and application process the data belongs to. 2.3.1 2.3.2 Uses UDP to stop traceroute as ICMP port unreachable indicates packet has reached the destination. Thus, transport protocol port number is utilized, and IP does not have this. UDP is chosen as only a port number is needed, the services offered by TCP are not needed. 2/7

3. 3.1 Switches are plug and play, flat address structure, no configuration. They learn where all other nodes within the subnet are by looking av MAC addresses when they switch frames. (Flood when frame destination unknown.) Routers learn least cost paths through routing protocols which need to be configured 3.2 Switched ethernet has one sender and one receiver per segment. There are no collissions, and the switches can simultaneously transfer data between several segments. 3.3 Three MAC protocol classes + one protocol within each class should be shortly described. 1.Channel partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use TDMA o Access to channel in "rounds" o Each station gets fixed length slot (length = packet transmission time) in each round o Unused slots go idle FDMA (Frequency Division Multiple Access) o Channel spectrum divided into frequency bands o Each station assigned fixed frequency band o Unused transmission time in frequency bands go idle CDMA (Code Division Multiple Access) o Each group of users given a unique shared code o All users share same frequency band o Each user use its own chipping sequence (i.e. code) to encode data o Many codes occupy the same channel, but only users associated with a particular code can understand each other o (Allows multiple users to coexist and transmit simultaneously with minimal interference if codes are orthogonal ) 3/7

2. Random access channel not divided, allow collisions when node has packet to send transmit at full channel data rate R must specifiy how to detect and recover from collisions Slotted ALOHA o All frames same size o Time divided into equal size slots (time to transmit 1 frame) o Nodes start to transmit only at slot beginning o Nodes are synchronized o When node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot If 2 or more nodes transmit in slot, all nodes detect collision, node retransmits frame in each subsequent slot with probability p until success AOHA (pure) o When frame first arrives, transmit immediately o Simpler than ALOHA, no synchronization o Collision probability increases (frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] ) o CSMA (Carrier Sense Multiple Access) o Listen before transmit If channel sensed idle, transmit entire frame If channel sensed busy, defer transmission o Collisions can still occur: two nodes may not hear each other s transmission CSMA/CD (CSMA/Collision Detect) o carrier sensing, deferral as in CSMA o Collision detection: colliding transmissions aborted, reducing channel wastage CSMA/CA (CSMA/Collision Avoidance) o Idea: allow sender to reserve channel rather than random access of data frames to avoid collisions of long data frames (request-to-send, clear-to-send) o if sender senses channel idle for a period, transmit entire frame o If sense channel busy then o start random backoff time o timer counts down while channel idle o transmit when timer expires o if no ACK from receiver, increase random backoff interval 4/7

3. Taking turns nodes take turns, but nodes with more to send can take longer turns Polling o master node invites slave nodes to transmit in turn o typically used with dumb slave devices Token passing o control token passed from one node to next sequentially o token message o no master node Channel partitioning (and taking turns) best at high load, random best at low traffic load. (Taking turn do have some overhead to do polling/token passing, but are better than channel partitioning at low loads) 5/7

4. 6/7

5. 5.1 Flow control and congestion control are two distinct control mechanisms with distinct objectives. Flow control makes sure that the sender of a connection does not overwhelm the buffers at the receiver by sending too many packets too fast. Congestion control regulates the amount of data that an application can send into the network, helping to prevent congestion in the network (i.e. in the network router buffers). 5.2 TCP strategy for adjusting sending rate: Increases transmission rate by probing for usable bandwidth until loss occurs (slow-start, additive increase) Reduces rate after loss event (receive duplicate acks, timeout) Implemented by changing the congestion window that limits number of bytes to be transmitted. 5.3 5.3.1 Slow start: 1-6, 23-26 5.3.2 Congestion avoidance 6-16, 17-22 5.3.3 16: duplicate acks, 22: time-out 5.3.4 Threshold initial value 32, 18: 21 6. 6.1 ServerSocket(), accept(), read(), write() and then close(). 6.2 255.255.255.240 = /28 6.3 TCP is byte oriented. Need to seperate the http messages. HTTP has a Content-Length field indicating number of bytes after the space indicating end of header lines and start of message body. The server MUST return the responses in the same order as they were received. 7/7