MULTIPLE-CHOICE QUESTIONS (MCQ) EXAMINATION DURATION: 105 MINUTES. Annotations to the assignments and the solution sheet. Note the following points

Size: px
Start display at page:

Download "MULTIPLE-CHOICE QUESTIONS (MCQ) EXAMINATION DURATION: 105 MINUTES. Annotations to the assignments and the solution sheet. Note the following points"

Transcription

1 Special Exercise for Operating Systems and Computer Networks Page: 1 MULTIPLE-CHOICE QUESTIONS (MCQ) EXAMINATION DURATION: 105 MINUTES Annotations to the assignments and the solution sheet This is a multiple choice examination, that means: Solution approaches are not assessed. For each subtask there is only one correct solution. For each subtask you are allowed to mark one box only. If two or more boxes for a subtask are marked, no points will be given for this subtask. Note the following points In addition to the assignment sheets there is a solution sheet. Mark the appropriate box(es) on the solution sheet! Any answer on the ASSIGNMENT SHEETS will NOT be considered. It is not possible to correct markings in the solution sheet. In case of errors request a new solution sheet. Any earlier solution sheet is substituted only as immediate exchange old against new. The previous erroneous or invalid sheet will be destroyed by the invigilating staff. In case of submission of multiple sheets neither will be evaluated. Any substitution of solution sheets is only possible up to 5 minutes before the official end of the examination time. Only use the sheets enclosed in the envelope or otherwise provided by the supervisors. Don't use any other paper. If you need more paper ask the supervisors. Return everything, i.e. assignment sheets, solution sheet and any additional sheets - used and unused. Only exams that are returned completely will be assessed. FILL-IN YOUR NAME AND MATRICULATION NUMBER ON THE ASSIGNMENT SHEET AND THE SOLUTION SHEET!

2 Special Exercise for Operating Systems and Computer Networks Page: 2 Assignment 1 (6 Points) 1.1 Concerning operating systems, which of the following statements is true? A computer system can only have one operating system. The largest advantage of an open layered model is that when application developers change an aspect in a layer, all layers of the model s specification changes with it. An operating system controls the hardware and gives a predefined set of functions to the applications. In lower level programming the software must be compatible to the top level operating system to function correctly 1.2 Concerning computer networks, which of the following statements is true? In non-persistent CSMA, when a collision occurred, the transmitting device waits for a random period of time before listening to the channel again to determine if the media is free. In p-persistent CSMA, when a collision occurred, the transmitting device waits for p time slots before listening to the channel again to determine if the media is free. The Data Link Layer in ISO/OSI Model provides a logical addressing for paths within the network. In Selective Repeat Sliding Window protocol, the sender re-transmits the unacknowledged frames only, if an erroneous frame arrived at the receiver.

3 Special Exercise for Operating Systems and Computer Networks Page: 3 Assignment 2 (16 Points) Given is a magnetic Hard disk with 6 heads, 3 platters, cylinders, 250 sectors/track on the innermost cylinders, 450 on the outermost cylinders and a sector size of 1 KiB. 2.1 Which of the following equals the total hard disk capacity of the before mentioned disk (Rounded to the second decimal place) GiB GiB GiB GiB GiB If you couldn t calculate the disk capacity in 2.1, use SC = 205 GiB for the following question. 2.2 What is the minimal cluster size that is chosen, if you want to format the hard disk from assignment 1.1 with the standard formatting using FAT32? 1 KiB 2 KiB 4 KiB 8 KiB 16 KiB 2.3 The Disk from Question 2.2 is now organized in Blocks with a length of 1KiB. What is the length of the address necessary to index all blocks of the hard drive 20 Bits 28 Bits 33 Bits 37 Bits 47 Bits

4 Special Exercise for Operating Systems and Computer Networks Page: 4 Consider the magnetic platter of a HDD shown in figure 2-1. Technical details: Fig. 2-1 Magnetic plattern It takes the head 2 ms to change its position by one track The average reposition time of the disk to the correct sector on one track is 2ms. This operation can be done parallel to the change of the track. One sector has the same size as one cluster and can be read and interpreted in 9.7ms In case of sequential files, no time delay through repositioning occurs. All other time consuming operations can be ignored. 2.4 A read-request for the data fragmented to the parts P1-P7 arrives at the hard disk at t=0s. The header is positioned on the sector with the index 2. How long after the request arrived will the data be read? 83,9 ms 85,9 ms 87,9 ms 89,9 ms 91,9 ms

5 Special Exercise for Operating Systems and Computer Networks Page: 5 Assignment 3 (13 Points) A computer with 15 bit address has virtual address space of 32 KiB and physical memory of 16 KiB. The size of a page is 2 KiB. Table 3-1 depicts the page table belonging to the virtual memory of the computer. Table 3-1 Page table 3.1 Which of the following instructions is the resulting instruction for the physical memory block if the virtual memory instruction MOVE REG is executed by a program in the computer under consideration of the page table given in Table 3-1? MOVE REG 6 MOVE REG 2054 MOVE REG 4102 MOVE REG 8198 MOVE REG MOVE REG Which of the following instructions is the original instruction for the virtual memory block if the physical memory instruction MOVE REG is executed by a program in the computer under consideration of the page table given in Table 3-1? MOVE REG 9 MOVE REG 2057 MOVE REG MOVE REG MOVE REG MOVE REG 38921

6 Special Exercise for Operating Systems and Computer Networks Page: 6 Assignment 4 (24 Points) Consider the following set of processes, with the length of CPU-burst time given in milliseconds. The processing begins at tstart = 0ms. The arrival time describes the time after tstart when a process arrives at the CPU (in milliseconds). All time delays due to context change and memory access can be ignored. The waiting time and turnaround times are determined from the point on when a process arrives at the CPU! Process Burst Time (ms) Arrival time (ms) Priority Priority Description P Highest P Medium P Highest P High P Low P Highest Table 4-1 CPU Burst-time and Process Priority Note: Assume that P1 is at the head of the ready queue and P6 is at the tail. P1 to P3 arrive at the same time. 4.1 Using non-preemptive shortest job first scheduling algorithm, determine the average turnaround time for processes described in Table 4-1! (Rounded to the second decimal place) tav,wait = 8.33ms tav,wait = 11.66ms tav,wait = 12.0ms tav,wait = 12.5ms tav,wait = 14.17ms 4.2 Using non-preemptive priority scheduling algorithm, determine the average waiting time for processes described in 4-1! In case of equal priorities, Round Robin scheduling algorithm with a quantum time of 1ms is to be applied. (Rounded to the second decimal place) tav,wait = 7.00ms tav,wait = 7.83ms tav,wait = 8.17ms tav,wait = 12.00ms tav,wait = 12.33ms

7 Special Exercise for Operating Systems and Computer Networks Page: 7 Multiprogramming is used to improve CPU utilization. Looking at it from a probabilistic point of view, it is assumed that a process spends a fraction p of its time waiting for I/O to complete. With n processes in the memory at the same time, the CPU utilization for all processes can be calculated by the probability of a busy CPU in dependence of the number of active processes, shown in Table 4-2. CPU idle p n CPU busy 1 - p n Table 4-2 Probabilities of Idle and Busy CPU Four processes are received by one CPU in a computer center as shown in table 4-3. The computer center was idle prior to the arrival of process 1 and transition times can be ignored. Process CPU mins Arrival Time (min) (hh:mm:ss) :00:00 2 0,5 06:01: :03: :04:00 Table 4-3 Job arrival and execution time Each process from table 4-3 needs 50% of its time for memory access (p=0.5) Using the information given in Table 4-2 and Table 4-3, calculate the following: 4.3 Which job from Table 4-3 is first to finish? Process 1 Process 2 Process 3 Process 4 None of them 4.4 In which time frame is the last (unfinished) Process from Table 4-3 finished? 06:07:00 06:09:00 06:09:00 06:11:00 06:11:00 06:13:00 06:13:00 06:15:00 None of them

8 Special Exercise for Operating Systems and Computer Networks Page: 8 Assignment 5 (20 Points) Two stations: A (sender) and B (receiver) are connected via a point-to-point link to exchange messages. There are 10 frames ready for buffering at Station A and the starting time for every algorithm is at 0 ms. Fig. 5-1 Network transmission depiction Consider the following statements for this assignment: The transmission and process times between the two stations and two processes are: tsend = tanswer = tprocess = 10ms The timeout-time for an unacknowledged frame is: ttimeout = 25ms The window sizes for the Selective Repeat and Go-back-n algorithms are defined with n = 4. A retransmission of a frame has a higher priority than the transmission of the next frame in the window (for Selective Repeat algorithm). Station B knows as soon as a frame arrives if an error occurred or not, without a delay in time. An ACK or NAK is processed instantaneously at Station A and B meaning that as soon as the information arrives it can be used. If the ACK- or NAK-frame cannot be interpreted, the frame connected to the response will be timed out.

9 Special Exercise for Operating Systems and Computer Networks Page: Considering an error free transmission, which of the following statements is true? The ACK for Frame 4 using Go-back-n algorithm arrives 40ms after starting time. The ACK for Frame 4 using Go-back-n algorithm arrives 50ms after starting time. The ACK for Frame 4 using Go-back-n algorithm arrives 60ms after starting time. The ACK for Frame 4 using Go-back-n algorithm arrives 70ms after starting time. The ACK for Frame 4 using Go-back-n algorithm arrives 80ms after starting time. Now consider the following error scenario for the assignments 5.2 to 5.4: 25ms after the beginning of the transmission an error occurs, that is repeated every 40ms thereafter (At 25ms, 65ms, 105ms, etc.). This error affects the frames that are currently transmitted, making the message, that they carry unreadable. 5.2 How many ms after the start of the algorithm will the ACK for frame 4 arrive at Station A using the Stop-and-wait algorithm? 80 ms 100 ms 120 ms 140 ms 160 ms 5.3 How many ms after the start of the algorithm will the ACK for frame 4 arrive at Station A using the Go-back-n algorithm? 50 ms 80 ms 110 ms 140 ms 170 ms 5.4 How many ms after the start of the algorithm will the ACK for frame 5 arrive at Station A using the Selective Repeat algorithm? 50 ms 80 ms 110 ms 140 ms 170 ms

10 Special Exercise for Operating Systems and Computer Networks Page: 10 Assignment 6 (16 Points) For network transmission, the following network frame structure depicted in Fig. 7-1 is used. The payload has a variable length of n bytes. The length (BL) of the whole network frame (block) cannot be larger than BL, max = 8 KiB. SOT SOH 6 Charachters EOH DLE STX n Byte DLE ETX BCC BCC EOT Header Payload Trailer Fig. 7-1 Network Frame Structure The header and trailer control bytes are: SOT Start of Transmission, indicates the start of the frame SOH Start of Header 6 Bytes Header with the total length of 6 Bytes EOH End of Header STX Start of Text, indicates the beginning of the payload transmission ETX End of Text, indicates the end of the payload transmission BCC Block Check, used for error detection mechanism EOT End of Transmission, indicates the end of the frame The transmission rate (bandwith) TR is Mbit/s. For this assignment the average number of additional ESC-Bytes appearing in the payload is 0 Byte/s. 6.1 Calculate the code efficiency for the case of an error-free transmission for a fixed size of 128 Byte payload (Rounded to the second decimal place). ηcode= % ηcode= % ηcode= % ηcode= % ηcode= % 6.2 Calculate the transmission rate of pure payload with an average number of additional ESC sequences within the payload is 10 3 Byte/s. Each additional ESC sequence in the payload has a total size of 2 Bytes, the payload has a fixed size of 128 Bytes and the transmission rate (bandwith) TR is Mbit/s. TR,eff = Mbit s TR,eff = Mbit s TR,eff = Mbit s TR,eff = Mbit s TR,eff = Mbit s

11 Special Exercise for Operating Systems and Computer Networks Page: 11 Now consider an erroneous transmission. The error bit rates are given as follows: Single Errors: q1 = 10-4 per Byte. Double Errors: q2 = 10-5 per Byte. Triple Errors: q3 = 10-6 per Byte. Higher error rates are not considered. 6.3 Calculate the optimal block length that does not violate the rule for BL,Max, given in this assignment, if the error correction mechanism is able to recognize all errors and correct single and double errors (Results are to be rounded to the next full Byte [ < 0]). 16 Byte B L,Opt = Byte Byte B L,Opt = Byte B L,Opt = Byte 2 B L,Opt = Byte 2 B L,Opt = 16 Byte Byte 126 Byte2 B L,Opt = B L,Opt = Byte 2 B L,Opt = Byte 2 B L,Opt = Byte 2 Hint: Optimal Block length is the block length that results in a maximum payload transfer rate (given below) under the errorneous transmission. net tare preamble payload trailer gross Payload transfer rate

12 Special Exercise for Operating Systems and Computer Networks Page: 12 Assignment 7 10 Points Given is a set of payload with a total length of 1 MiB. This data needs to be transmitted via asynchronous communication to its destination. The transmission rate of the connection is 30 Mbps. The following attributes need to be implemented in the preamble: 3 Synchronization Bytes to inform the receiver of the transmission clock The indicators, when the header begins and ends Header information of a total length of 7 Bytes 1 Byte that indicates when the payload (Text) begins The following attributes need to be implemented in the trailer: 1 Byte that indicates when the payload (Text) ends 1 Cyclic Redundancy Check -Byte for each 1KiB of payload The indicator when the transmission ends 7.1 Which of the following examples represent the demanded preamble? SYN SYN DLE SOH 7 Bytes EOH DLE STX Preamble SOH SYN SYN SYN 7 Bytes EOH STX Preamble SOH SYN SYN SYN 7 Bytes STX EOH Preamble SYN SYN SYN SOH 7 Bytes EOH STX Preamble SYN SYN SYN STX SOH 7 Bytes EOH Preamble

13 Special Exercise for Operating Systems and Computer Networks Page: Which of the following examples represent the demanded trailer? EOT CRC #1 CRC #2 CRC #1024 ETX Trailer CRC #1 CRC #2 CRC #3 CRC #1024 ETX EOT Trailer ETX CRC #1 CRC #2 CRC #1024 EOT Trailer ETX CRC #1 CRC #2 CRC #1000 EOT Trailer ETX CRC #1 CRC #2 CRC #1000 DLE EOT Trailer If you couldn t solve the task 7.1 and/or 7.2 assume the tare to be 1100 Bytes for Task How many complete frames can be transmitted with the presented asynchronous transmission during 1 second of pure data transmission? (Consider the line to be error free) 1 Frames 2 Frames 3 Frames 4 Frames 5 Frames

MULTIPLE-CHOICE QUESTIONS (MCQ) EXAMINATION DURATION: 90 MINUTES. Annotations to the assignments and the solution sheet. Note the following points

MULTIPLE-CHOICE QUESTIONS (MCQ) EXAMINATION DURATION: 90 MINUTES. Annotations to the assignments and the solution sheet. Note the following points Special Exercise for Operating Systems and Computer Networks Page: 1 MULTIPLE-CHOICE QUESTIONS (MCQ) EXAMINATION DURATION: 90 MINUTES Annotations to the assignments and the solution sheet This is a multiple

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Chapter 2: Getting Connected

Chapter 2: Getting Connected Islamic University of Gaza Faculty of Engineering Eng. Jehad Aldahdooh Computer Networks Computer Engineering Dept. Chapter 2 Chapter 2: Getting Connected 1. Explain Manchester Encoding. Manchester Encoding

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

5th Slide Set Computer Networks

5th Slide Set Computer Networks Prof. Dr. Christian Baun 5th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/38 5th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

1.1 CPU I/O Burst Cycle

1.1 CPU I/O Burst Cycle PROCESS SCHEDULING ALGORITHMS As discussed earlier, in multiprogramming systems, there are many processes in the memory simultaneously. In these systems there may be one or more processors (CPUs) but the

More information

Operating Systems Comprehensive Exam. Fall Student ID # 10/31/2013

Operating Systems Comprehensive Exam. Fall Student ID # 10/31/2013 Operating Systems Comprehensive Exam Fall 2013 Student ID # 10/31/2013 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Scheduling of processes

Scheduling of processes Scheduling of processes Processor scheduling Schedule processes on the processor to meet system objectives System objectives: Assigned processes to be executed by the processor Response time Throughput

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

ECE/CSC 570 Section 001. Final test. December 11, 2006

ECE/CSC 570 Section 001. Final test. December 11, 2006 ECE/CSC 570 Section 001 Final test December 11, 2006 Questions 1 10 each carry 2 marks. Answer only by placing a check mark to indicate whether the statement is true of false in the appropriate box, and

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Framing and Stuffing. Advanced Computer Networks

Framing and Stuffing. Advanced Computer Networks Framing and Stuffing Advanced Computer Networks Framing & Stuffing Outline Synchronous vs Asynchronous Transmissions Asynchronous Character Transmissions Framing Identifying Synchronous Block Boundaries

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

Operating Systems Comprehensive Exam. Spring Student ID # 3/16/2006

Operating Systems Comprehensive Exam. Spring Student ID # 3/16/2006 Operating Systems Comprehensive Exam Spring 2006 Student ID # 3/16/2006 You must complete all of part I (60%) You must complete two of the three sections in part II (20% each) In Part I, circle or select

More information

Input-Output Organization

Input-Output Organization Ted Borys - CSI 404 5/1/2004 Page 11-1 Section 11 Input-Output Organization ASCII Character Set 94 printable characters Upper & lowercase letters 10 numerals Special characters such as $, @, #, % 34 control

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

EECE.4810/EECE.5730: Operating Systems Spring 2017 Homework 3 Solution

EECE.4810/EECE.5730: Operating Systems Spring 2017 Homework 3 Solution 1. (16 points) Consider the following set of processes, with the length of the CPU-burst time given in milliseconds: Process Burst Priority P1 20 4 P2 5 3 P3 30 2 P4 2 3 P5 5 1 a. (12 points) Assume the

More information

Chapter 5 Data-Link Layer: Wired Networks

Chapter 5 Data-Link Layer: Wired Networks Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction

More information

Preview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System

Preview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System Preview Process Scheduler Short Term Scheduler Long Term Scheduler Process Scheduling Algorithms for Batch System First Come First Serve Shortest Job First Shortest Remaining Job First Process Scheduling

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

STUDENT NAME: STUDENT ID: Problem 1 Problem 2 Problem 3 Problem 4 Problem 5 Total

STUDENT NAME: STUDENT ID: Problem 1 Problem 2 Problem 3 Problem 4 Problem 5 Total University of Minnesota Department of Computer Science & Engineering CSci 5103 - Fall 2018 (Instructor: Tripathi) Midterm Exam 1 Date: October 18, 2018 (1:00 2:15 pm) (Time: 75 minutes) Total Points 100

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Operating System Concepts Ch. 5: Scheduling

Operating System Concepts Ch. 5: Scheduling Operating System Concepts Ch. 5: Scheduling Silberschatz, Galvin & Gagne Scheduling In a multi-programmed system, multiple processes may be loaded into memory at the same time. We need a procedure, or

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

I/O Organization John D. Carpinelli, All Rights Reserved 1

I/O Organization John D. Carpinelli, All Rights Reserved 1 I/O Organization 1997 John D. Carpinelli, All Rights Reserved 1 Outline I/O interfacing Asynchronous data transfer Interrupt driven I/O DMA transfers I/O processors Serial communications 1997 John D. Carpinelli,

More information

CSCI Spring Final Exam Solution

CSCI Spring Final Exam Solution CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and

More information

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring

More information

Operating Systems Comprehensive Exam. Spring Student ID # 3/20/2013

Operating Systems Comprehensive Exam. Spring Student ID # 3/20/2013 Operating Systems Comprehensive Exam Spring 2013 Student ID # 3/20/2013 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,

More information

Protocol Principles. Framing, FCS and ARQ 2005/03/11. (C) Herbert Haas

Protocol Principles. Framing, FCS and ARQ 2005/03/11. (C) Herbert Haas Protocol Principles Framing, FCS and ARQ (C) Herbert Haas 2005/03/11 Link Layer Tasks Framing Frame Protection Optional Addressing Optional Error Recovery Connection-oriented or connectionless mode Optional

More information

Exercises for the Lectures on Communication Networks

Exercises for the Lectures on Communication Networks Exercises for the Lectures on Prof. Jochen Seitz & Dipl.-Ing. Karsten Renhak Department of University of Technology Ilmenau October 5, 010 [Jochen.Seitz Karsten.Renhak]@tu-ilmenau.de Contents 1 Communication

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4 Christian Schindelhauer Freiburg, 26 Nov 2006 Due until 28 Nov 2006 Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4 SECTION 1: Wireless Sensor Transceiver, Energy 1. Energy is limited

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

COMP 3361: Operating Systems 1 Final Exam Winter 2009

COMP 3361: Operating Systems 1 Final Exam Winter 2009 COMP 3361: Operating Systems 1 Final Exam Winter 2009 Name: Instructions This is an open book exam. The exam is worth 100 points, and each question indicates how many points it is worth. Read the exam

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CS4411 Intro. to Operating Systems Exam 2 Fall 2009

CS4411 Intro. to Operating Systems Exam 2 Fall 2009 CS4411 Intro. to Operating Systems Exam 2 { Fall 2009 1 CS4411 Intro. to Operating Systems Exam 2 Fall 2009 150 points { 8 pages Name: Most of the following questions only require short answers. Usually

More information

Unit 3 : Process Management

Unit 3 : Process Management Unit : Process Management Processes are the most widely used units of computation in programming and systems, although object and threads are becoming more prominent in contemporary systems. Process management

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Problem Max. Points Act. Points Grader

Problem Max. Points Act. Points Grader Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2007-12-12 Dr. Jürgen Schönwälder Duration: 90 minutes Final Examination The Jacobs University s Code of Academic Integrity applies

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Data Link layer (CN chap 3.1, 3.4, 3.6)

Data Link layer (CN chap 3.1, 3.4, 3.6) Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion

More information

8th Slide Set Operating Systems

8th Slide Set Operating Systems Prof. Dr. Christian Baun 8th Slide Set Operating Systems Frankfurt University of Applied Sciences SS2016 1/56 8th Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

DirectNET Host. Communications Programs. In This Chapter...

DirectNET Host. Communications Programs. In This Chapter... Communications Programs In This Chapter.... Why do you need a communications program? Modes of Operation Protocol Components Controlling the Communications Initiating the Request Acknowledging the Request

More information

8: Scheduling. Scheduling. Mark Handley

8: Scheduling. Scheduling. Mark Handley 8: Scheduling Mark Handley Scheduling On a multiprocessing system, more than one process may be available to run. The task of deciding which process to run next is called scheduling, and is performed by

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

STUDENT NAME: STUDENT ID: Problem 1 Problem 2 Problem 3 Problem 4 Problem 5 Total

STUDENT NAME: STUDENT ID: Problem 1 Problem 2 Problem 3 Problem 4 Problem 5 Total University of Minnesota Department of Computer Science CSci 5103 - Fall 2016 (Instructor: Tripathi) Midterm Exam 1 Date: October 17, 2016 (4:00 5:15 pm) (Time: 75 minutes) Total Points 100 This exam contains

More information

Process behavior. Categories of scheduling algorithms.

Process behavior. Categories of scheduling algorithms. Week 5 When a computer is multiprogrammed, it frequently has multiple processes competing for CPU at the same time. This situation occurs whenever two or more processes are simultaneously in the ready

More information

Data Link Layer (part 2)

Data Link Layer (part 2) Data Link Layer (part 2)! Question - What is a major disadvantage of asynchronous transmission? Reference: Chapters 6 and 7 Stallings Study Guide 6! Question - What is a major disadvantage of asynchronous

More information

Data Communication Networks Final

Data Communication Networks Final Data Communication Networks Final Saad Mneimneh Visiting Professor Hunter College of CUNY NAME: This final test is take home... There are 8 Problems (but each problem has multiple parts, possibly on separate

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0088 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 3 rd Ed Problems

More information

Computer Networks - Midterm

Computer Networks - Midterm Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if

More information

King Saud University. College of Computer & Information Sciences. Information Technology Department. IT425: Operating Systems.

King Saud University. College of Computer & Information Sciences. Information Technology Department. IT425: Operating Systems. King Saud University College of Computer & Information Sciences Information Technology Department IT425: Operating Systems Assignment 6 Second Semester 1433/1434H 2012/2013 Homework policy: 1) Copying

More information

Chapter 3 Review Questions

Chapter 3 Review Questions Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications

More information

Lecture 2 Process Management

Lecture 2 Process Management Lecture 2 Process Management Process Concept An operating system executes a variety of programs: Batch system jobs Time-shared systems user programs or tasks The terms job and process may be interchangeable

More information

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Project 1 (document version 1.3) Process Simulation Framework

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Project 1 (document version 1.3) Process Simulation Framework CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Project 1 (document version 1.3) Process Simulation Framework Overview This project is due by 11:59:59 PM on Thursday, October 20, 2016.

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments 19540 - Telematics 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Matthias Wa hlisch Department of Mathematics and Computer Science Institute of Computer Science 19. November, 2009 Institute

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 9 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 CPU Scheduling: Objectives CPU scheduling,

More information

Chapter 5: CPU Scheduling

Chapter 5: CPU Scheduling Chapter 5: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Thread Scheduling Multiple-Processor Scheduling Operating Systems Examples Algorithm Evaluation Chapter 5: CPU Scheduling

More information

OPERATING SYSTEMS. UNIT II Sections A, B & D. An operating system executes a variety of programs:

OPERATING SYSTEMS. UNIT II Sections A, B & D. An operating system executes a variety of programs: OPERATING SYSTEMS UNIT II Sections A, B & D PREPARED BY ANIL KUMAR PRATHIPATI, ASST. PROF., DEPARTMENT OF CSE. PROCESS CONCEPT An operating system executes a variety of programs: Batch system jobs Time-shared

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the

More information

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011 Operating Systems Comprehensive Exam Spring 2011 Student ID # 2/17/2011 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,

More information

CS630 Operating System Design, First Exam, Spring 2017,

CS630 Operating System Design, First Exam, Spring 2017, First Exam, Spring 2017, Problem 1. (35 Points) Assume that P A, P B and P C are three distinctive programs. When P A is executed, it forks new processes executing P B at tick-marks 2, 5 and 7 and its

More information

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1. Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT

More information

Chapter 9: Data Transmission

Chapter 9: Data Transmission Chapter 9: Data Transmission MULTIPLE CHOICE 1. In practical terms, parallel data transmission is sent: a. over short distances only c. over any distance b. usually over long distances d. usually over

More information

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet Anonymous number: 3 Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1 AResComNet 20172018 Rou destination Final exam : Version A in English Rou

More information

Lecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23.

Lecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23. Last Lecture Lecture 11 Overview Medium Access Control This Lecture Flow and error control Source: Sections 11.1-11.2, 23.2 Next Lecture Local Area Networks 1 Source: Sections 13 Data link layer Logical

More information

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Informal Quiz #01: SOLUTIONS

Informal Quiz #01: SOLUTIONS ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS : GOOGLE: Shiv RPI shivkuma@ecse.rpi.edu 1 Review of Networking Concepts (I): Informal Quiz SOLUTIONS For each T/F question: Replace the appropriate

More information

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions Network+ Guide to Networks, 6 th Edition Solutions 2 1 Network+ Guide to Networks, 6 th Edition Chapter 2 Solutions Review Questions 1. Your supervisor has asked you to correct several cable management

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information