2IC10 Computer Networks Assignments week 4
|
|
- Tyler Baker
- 5 years ago
- Views:
Transcription
1 2IC10 Computer Networks Assignments week 4 Mark van Eijk, s Bas Kloet, s Physical Layer 1 Question What is the most used physical medium nowadays? Why? Does that specific medium have the best performance? Can it be used everywhere? If not, give an example. The most used medium is twisted pair, because it s cheap and easy to use. In performance however, it s easily surpassed by other options, like optical fiber. Of course, there are places, like in a boat on the open sea, where communication via twisted pair, or any other wire for that matter, is simply impossible. For those places communication via satellite would be a much more viable option. Other places that are unsuitable for twisted pair, are those with very high magnetic radiation. In those places optical fiber would be a much better option. 2.8 Question It is desired to send a sequence of computer screen images over an optical fiber. The screen is pixels, each pixel being 24 bits. There are 60 screen images per second. How much bandwidth is needed, and how many microns of wavelength are needed for this band at 1.30 microns. The amount of bandwidth needed is bits per second. I don t understand the second question Question At the low end, the telephone system is star shaped, with all the local loops in a neighbourhood converging on an end office. In contrast, cable television consists of a single long cable snaking its way past all the houses in the same neighbourhood. Suppose that a future TV cable were 10 Gbps fiber instead of copper. Could it be used to simulate the telephone model of everybody having their own private line to the end office? If so, how many one-telephone houses could be hooked up to a single fiber? 1
2 Since the latency of a fiber channel is extremely lower then that of twisted pair, the fact the fiber goes past multiple houses is no problem in simulation the star shaped network. Neither is the bandwidth a problem, since speech needs 64kbps 1 of bandwidth. This means that one fiber can transport / calls by using multiplexing Question A cable company decides to provide Internet access over cable in a neighbourhood consisting of 5000 houses. The company uses a coaxial cable and spectrum allocation allowing 100 Mbps downstream bandwidth to each house at any time. To attract customers, the company decides to guarantee at least 2 Mbps downstream bandwidth to each house at any time. Describe what the cable company needs to do to provide this guarantee. Guaranteeing 2Mbps downstream, means that at most 100/2 50 houses can be connected to any coaxial cable at any time. This means that there will need to be 5000/ head ends, all upgraded to be able to guarantee the desired Quality of Service. Question Calculate the utilization of the channel when communicating parties are using stop-and-wait protocol if the following parameters are known: packet size: 8000 bits transmission rate: 1 Gbps distance between the two parties: 3000 km the signal speed: km/s ACK packets: 16 bits What is the effective throughput? How to improve the utilization? The propagation delay of the channel: 3000 km km/s 8000 bits s. The transmission delay of the packet: bits/s s. 16 bits The transmission delay of the ACK-packets: bits/s. The ACK-packet corresponding to a sent packet is received after: 2 propagation delay + transmission delay packet + transmission delay ACK-packet 8000 bits s bits/s + 16 bits bits/s 8016 bits bits/s s 1 american telephone system 2
3 This results in a utilization of: And an effective throughput of: transmission delay total delay s packet size 8000 bits delay s s % bits/s. Hence the effective throughput is almost totally depending on the propagation delay, instead of the transmission rate. Improving utilization can be reached by sending more packets instead of first waiting for the corresponding ACK-packet. This can be done by using one of the versions of the Sliding Window protocol with a sender of at least 2. Data Link Layer 3.1 Question An upper-layer packet is split into 10 frames, each of which has an 80 percent chance of arriving undamaged. If no error control is done by the data link protocol, how many times must the message be sent on average to get the entire thing through? On average, 8 out of 10 frames arrives undamaged. This means that to get 10 frames through, you need to send the message 10/ times. 3.9 Question Sixteen-bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that the receiver can detect and correct single bit errors? Show the bit pattern transmitted for the message Assume that even parity is used in the Hamming code. The formula needed is m + r r with m message length in number of bits and r the number of parity bits. So in this case this means that r 5, because , but With parity bits at positions 1, 2, 4, 8 and 16, even parity and counting the positions from left to right 2 you get Question Consider an error-free 64-kbps satellite channel used to send 512-byte data frames in one direction, with very short acknowledgements coming back the other way. What is the maximum throughput for s of 1, 7, 15 and 127? The earth-satellite propagation time is 270 ms. throughput utilization bitrate 2 like in Tanenbaum, but unlike in the sheets. 3
4 If: transmission delay + 2 propagation delay < transmission delay Then we have the following formula for the utilization: Otherwise utilization is 100 %. bitrate propagation delay framelength When we fill in these formula, we get the following results: utilization throughput % 6798 bits/s % bits/s % bits/s % bits/s Question Which checksum is obtained for the message when the following CRC polynomial is used? C(x) x 7 + x 5 + x Using the polynomial C(x) x 7 +x 5 +x 3 +1, we get the divisor This divisor is 8 bits long, so the CRC will be 7 bits long. We now add 7 0 s to the message: Then we divide this by , which results in CRC The message on which the checksum will now be calculated is: To make division into k sections, each of the same amount of bits, possible, we add a 0 to the end of the message , which we now divide in 3 sections, each 8 bits: , and We add these numbers using one s complement: , where the left-most 1 is the carry-bit. Because the carry-bit is set, it has to be added to the result without the carry-bit: This result has to be complemented, which results in the following checksum: Question Name at least 3 services implemented by the sliding window protocol. The sliding window protocol implements: preservation of data unit sequence: data units are delivered to the receiver s higher layer in the same sequence that they were given from the sender s higher layer 4
5 no duplication: no data unit should be delivered to the receiver s higher layer more than once error-free delivery: data units are delivered to the receiver s higher layer without errors Question Assume that there are never transmission errors over a particular physical channel with a large propagation delay. Which of the two Sliding Window protocols would you expect to have better performance across the channel? Explain Assume that each protocol uses a 3-bit sequence number. The two Sliding Window protocol variants: Go-back-N: sender has K and receiver has 1 Selective Repeat: sender and receiver both have the same Go-Back-N has a smaller than and Selective Repeat has a of at most If the channel would also deliver packets in the order they were sent, the Go-back-N protocol would be more efficient, since it can have a larger windows size and the larger the the better performance. If the channel on the other hand would not exhibit such behaviour, the Selective Repeat will be more efficient if large numbers of packets arrive out of order, since it has a larger at the receiving side. This ensures that less packets have to be resent. 5
Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.
Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced
More informationEE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002
EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise
More informationChapter 1: introduction
Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,
More informationLecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1
Lecture 4 Data Transmission Modes and Switching Data Transmission & Switching 1-1 Agenda Introduction to Data Transmission Modes Parallel and Serial Transmission Transmission Media Guided and unguided
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationSolution of Exercise Sheet 1
Solution of Exercise Sheet 1 Exercise 1 (Data Rate and Latency) The Prussian semaphore system (dt. Preußischer optischer Telegraf ) was a telegraphic communications system used between Berlin and Koblenz
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationCompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4
CompSci 356: Computer Network Architectures Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 Xiaowei Yang xwy@cs.duke.edu Overview Review: link/network performance metrics
More informationHigh Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection
High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution
More informationChapter 8: Multiplexing
NET 456 High Speed Networks Chapter 8: Multiplexing Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education - Prentice
More informationPART III. Data Link Layer MGH T MGH C I 204
PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationCSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.
Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.1 Chapter 1 Introduction Text Book for this course Computer Networking:
More informationCS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online
1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.
More informationCSCI-1680 Link Layer Reliability John Jannotti
CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More informationOverview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.
Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationComputer Networks. Homework #4: No Grading
Computer Networks Homework #4: No Grading Problem #1. Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would
More informationSince enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time
Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More information2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.
2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:
More informationComputer Networks and Internet
Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationDCN Questions CHAPTER 1:- NETWORKING FUNDAMENTALS
DCN Questions CHAPTER 1:- NETWORKING FUNDAMENTALS Q1. What are the four fundamental Characteristics of Data Communication? On which effectiveness of data communication is depended? Q2. Define data communication?
More informationLecture 2 Physical Layer - Multiplexing
DATA AND COMPUTER COMMUNICATIONS Lecture 2 Physical Layer - Multiplexing Mei Yang Based on Lecture slides by William Stallings 1 MULTIPLEXING multiple links on 1 physical line common on long-haul, high
More informationECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3
ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should
More informationTransmission Media. Criteria for selection of media. Criteria for selection of media 2/17/2016. Chapter 3: Transmission Media.
Chapter 3: Transmission Media Marks- 20 Transmission Media Transmission media carries the information from sender to receiver. Different types of cables or waves to transmit data. Data is transmitted through
More informationAnnouncements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:
Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationCommunication Networks
Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture
More information2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not
CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationNetworks. Computer Technology
Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda
More informationend systems, access networks, links circuit switching, packet switching, network structure
Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More information06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction
Local & Metropolitan Area Networks ACOE322 Lecture 1 Introduction 1 1. INTRODUCTION In this section we will cover : 1. Overview of data communications and networking 2. Definition and overview of LANs,
More informationChapter 6 Questions. Problems
Chapter 6 Questions Q6-1. Q6-2. Q6-3. Q6-4. Q6-5. Q6-6. Q6-7. Describe the goals of multiplexing. List three main multiplexing techniques mentioned in this chapter. Distinguish between a link and a channel
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationComputer Networks and the internet. Daniel Graham Ph.D
Computer Networks and the internet Daniel Graham Ph.D 1.1 What Is the Internet? The Internet is a computer network that interconnects hundreds of millions of computing devices throughout the world. As
More informationCPE 548 Exam #1 (50 pts) February 17, 2016
Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic
More informationDATA LINK LAYER UNIT 7.
DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationCPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448
Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted
More informationAssignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points.
Assignment #1 Csci4211 Spring 2017 Due on Feb. 13th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Describe the special properties of the following transmission
More informationA Whirlwind Introduction to the Internet Overview
CS 455/555 / Spring 2013 Intro to Networks and Communications Whirlwind Introduction to the Inter (part 1) Dr. Michele C. Weigle http://www.cs.odu.edu/~mweigle/cs455-s13/ A Whirlwind Introduction to the
More informationPSD2A Computer Networks. Unit : I-V
PSD2A Computer Networks Unit : I-V 1 UNIT 1 Introduction Network Hardware Software Reference Models OSI and TCP/IP models Example networks: Internet, ATM, Ethernet and Wireless LANs Physical layer Theoretical
More informationCOPYRIGHTED MATERIAL INTRODUCTION AND OVERVIEW
1 INTRODUCTION AND OVERVIEW The past few decades have seen the merging of computer and communication technologies Wide-area and local-area computer networks have been deployed to interconnect computers
More informationData Transmission Definition Data Transmission Analog Transmission Digital Transmission
Data Transmission Definition Data Transmission Data transmission occurs between transmitter (sender) and receiver over some transmission medium. This transfer of data takes place via some form of transmission
More informationCS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos
CS254 Network Technologies Lecture 2: Network Models & Error Detection and Correction Dr Nikos Antonopoulos Department of Computing University of Surrey Autumn 2006 2.1 Layered Tasks Sender, Receiver,
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationData Communication & Computer Networks INFO
Data Communication & Computer Networks INFO Instructor: Dr. A. SARI Department: Management Information Systems Course Code: MIS 305 Academic Term: 2013/2014 Fall Title: Data Communication & Computer Networks
More informationL2: Bandwidth and Latency. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L2: Bandwidth and Latency Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained
More informationCS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006
CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject
More informationEECS 228a Lecture 1 Overview: Networks. Jean Walrand
EECS 228a Lecture 1 Overview: Networks Jean Walrand www.eecs.berkeley.edu/~wlr Fall 2002 Course Information Instructor: Jean Walrand n Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 in 285 Cory
More informationIntegrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)
Digital Local Loop Technologies Integrated t Services Digital it Network (ISDN) Handles voice and data Relatively l high h cost for low bandwidth (Skip) Digital Subscriber Line (DSL) Cable modems Hybrid
More informationInformal Quiz #01: SOLUTIONS
ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS : GOOGLE: Shiv RPI shivkuma@ecse.rpi.edu 1 Review of Networking Concepts (I): Informal Quiz SOLUTIONS For each T/F question: Replace the appropriate
More informationComputer Networks and the Internet. CMPS 4750/6750: Computer Networks
Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationComputer Networks Summer 2013
Computer Networks Summer 2013 Problem 1 Homework 2 Due Date: 6/17/2013 Two hosts A and B are each connected to a switch S via 10-Mbps links as shown in Figure 1. The propagation delay on each link is 20
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationCS348: Computer Networks Introduction to Computer Networks and Internet
CS348: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E mail: manaskhatua@iitg.ac.in Course Plan Syllabus: http://www.iitg.ac.in/cse/csecourses/?coursecode=cs348
More informationCPSC 441 Tutorial-1. Department of Computer Science University of Calgary
CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationMultiplexing (Recap)
Multiplexing (Recap) Multiplexing How to transfer data between two sites once there is a digital link between them? Analog to Digital (A2D) conversion Human voice is a continuous signal in the range 0-4
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More informationNETWORK PROBLEM SET Solution
NETWORK PROBLEM SET Solution Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: 1. For a packet-switched network of N nodes, the number of hops is one less than
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationINTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com
INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed
More informationFaculty of Science Final Examination. Computer Science B Basics of Computer Networks
Student Name: Student Number: Faculty of Science Final Examination Computer Science 308-435B Basics of Computer Networks Examiner: Prof. Hans Vangheluwe Friday, April 27 th, 2001 Associate Examiner: Prof.
More informationQ23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network?
CS368: Exercise 5 Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network? a) Stop_and_Wait b) Go-Back-N c) Selective-Repeat Q23-6.
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationData and Computer Communications. Protocols and Architecture
Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or
More informationReliable transmission
Reliable transmission CSCI 466: Networks Keith Vertanen Fall 2011 Ge/ng connected thus far Physical connec8vity Aggrega8ng bits into frames Detec8ng errors in frames Message 1001 1010 M(x) = x 7 + x 4
More informationECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback
ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times
More informationThe data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex.
Data transmission Data transmission on a network involves serial transmission. It transfers data by sending one bit at a time through a single line. All data on a network is transferred using a data transmission
More informationNETWORK PROBLEM SET Due Date 6/28/2014
NETWORK PROBLEM SET Due Date 6/28/2014 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached to the
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationET4254 Communications and Networking 1
Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission
More informationWAN Technology & Design. Dr. Nawaporn Wisitpongphan
WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow
More information