NETWORK PROBLEM SET Solution

Size: px
Start display at page:

Download "NETWORK PROBLEM SET Solution"

Transcription

1 NETWORK PROBLEM SET Solution Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: 1. For a packet-switched network of N nodes, the number of hops is one less than the number of nodes visited. Star: for a star topology, the fixed number of hops is 2. Loop: for a loop topology, the furthest distance from a source node is situated at N/2 hops if the number of nodes in the loop is even and at (N 1) /2 hops if the number of nodes in the loop is odd. Fully Connected: for a fully connected topology, each node is directly connected to all other nodes. Therefore, the number of hops is simply 1. The average Length for different topologies: Star: For a star topology, the fixed number of hops is 2. Loop: The average number depends on whether the total number of nodes is odd or even. Even Case: Notice that there are 2 nodes located at i hops from the source, for 1 <= i <= N/2 1, and only one node, the furthest from the source, located at N/2 hops from the source. Therefore, the average number of hops, H, is: (!!!!) H = 2/(N 1)( i) +!!!!! H = N! /(4 N 1 ) Odd Case: In this case, there are exactly 2 nodes located at i hops from the source, for 1 <= i <= (N 1)/2. Therefore, the average number of hops, H, is: (! H = 2/(N 1)(!!!) i)!!! H = (N + 1)/4 Fully connected: For such a topology, the average number of hops is Since a tree is defined to be any geometry which interconnects all nodes so that there is a single path between any two nodes but not loops or circuits, a tree can be formed from any ring configuration by deleting one link. Thus, for any ring configuration, a tree configuration with shorter total length can be found and the minimum possible total length of any tree must be shorter than the minimum possible total length of any ring.

2 Problem 2 A parent on travel wishes to establish a conversation with his young son over a communication network. The parent was concerned that the communication will not be of good quality, if they are too far of each other. Assume that the speed of sound is approximately 330 meters/second. Also, assume that the network transmits the sound at the speed of light in cable, 2.3 x 10 8 meters/second. 1. The delay for the sound when the parent and his child are 10 meters apart is t 10 = 10/330 = milliseconds. The maximum distance is the time required for a real-time experience times the cable speed. Therefore, d = (2.3 x 10 8 ) x (30.30 x 10-3 ) = 6,969,000 meters = 6969 kilometers. 2. The delay variation, jitter, and consecutive packet loss, when the network is congested, also impact the quality of the sound.

3 Problem 3 (Hw2 Sol) 1. Suppose the size of an uncompressed text file is 1 megabyte. a. How long does it take to download the file over a 32 kilobit/second modem? a. T32k = 8 (1024) (1024) / = seconds b. How long does it take to take to download the file over a 1 megabit/second modem? b. T1M = 8 (1024) (1024) bits / 10 6 bits/sec = 8.38 seconds 2. Suppose data compression is applied to the 1 megabyte text file. Assuming a compression ratio of 1:6: a. How long does it take to download the compressed file over a 32 kilobits/second modem? a. T32k = 8 (1024) (1024) / (32000 x 6) = sec b. How long does it take to take to download the compressed file over a 1 megabits/second modem? b. T1M = 8 (1024) (1024) / (10 6 6) = 1.4 sec 3. A scanner has a resolution of 600 x 600 pixels/square inch. Assume that an 8- inch x 10-inch image is scanned and transmitted over the network: The number of pixels is 600x600x8x10 = pixels per picture. a. If scanning uses 8 bits/pixel, how long does it take to send the scanned image over a 32 kilobits/second modem? a. With 8 bits/pixel representation, we have: = Mbits per picture. It takes ( )/( ) = sec. b. If scanning uses 24 bits/pixel, how long does it take to send the scanned image over a 1 megabits/second modem? b. With 24 bits/pixel representation, we have: 28.8x = Mbits per picture. It takes ( )/(10 6 ) = sec.

4 Problem 4 Define the following parameters for a communication network: N = number of hops between two given end systems, L = message length in bits, B = data rate, in bits per second (bps), on all links, P = packet size H = overhead (header) bits per packet, and S = call setup time (circuit switching or virtual, and D = propagation delay. Assume that N = 4, L = 3200, B = 9600, P = 1024, H = 16, S = 0.2, and D = and that the queuing delay and processing overhead are ignored. (a) The end-to-end delay for circuit switching is: T = C1 + C2, where C1 = Call setup time, C2 = Message delivery time. C1 = S = 0.2 sec. C2 = Propagation Delay + Transmission Time. Therefore, C2 = N D+ L/B = (3200/9600) = sec. T = = sec. (b) The end-to-end delay for packet switching is: T = D1 + D2 + D3 + D4, where D1 = Time to transmit and deliver all packets through the first hop, D2 = Time to deliver the last packet acros the second hop, D3 = Time to deliver the last packet across the third hop, and D4 = Time to deliver the last packet across the forth hop. There are P H = = 1088 data bits per packet. A message of 3200 bits requires four packets. Therefore: D1 = 4 t + p, where t = transmission time for one packet, p = propagation delay for one hop. D1 = 4 P/B + D = / = sec.

5 D2 = D3 = D4 = t + p = P/B + D = sec. T = sec. Notice that the above solution assumes that the last packet is padded to a full size packet. If padding of the last packet is not allowed, the transmission of the unpadded packet takes only , and the total transmission T =

6 Problem 5 Consider a city with a population of 1 million. Assume that at any given time of the day, only 1% of the people in the city are using the phone. 1. If a voice call requires 64 Kbps, the number of people on the phone at a given time is = 10 4, so the total bit rate is = 640 megabits per second. 2. If high-quality videoconferencing is used and the bit rate is increased to 1.4 Mbps, then the total bit rate increases to 14 Gbps.

7 Problem 6 Suppose two friends want to communicate secretly using the following code: If the bit in the original message has value 1, then the bit is replaced with the secret code word 111; If the bit in the original message has value 0, then the bit is replaced with the secret code word 000; 1. The receiver makes a decoding error if two or more out of the three bits are in error. Therefore, Perror = 3p 2 (1 p) + p 3 = 3(10-3 ) 2 ( ) + (10-3 )3 3(10-6 ) 2. Assume now that instead of using the majority vote rule, the sender adds two check bits to a group of 2n information bits. The first check bit is the parity check of the first n bits, and the second check bit is the parity check of the second n bits. What error patterns can the receiver detect using the above code? 2. If we rearrange the 2n information bits and the 2 parity bits into two code words, each consisting of n information bits and a parity bit, we see that in effect we have divided the overall code word into two sub-code words of length n + 1. An error pattern is detectable if the error pattern in the first code word and in the second code word are both detectable. An error pattern in each sub-code word is detectable if the number of errors in the sub-code word is odd. Therefore an error pattern is detectable if the number of errors in both sub-code words is odd. 3. Assuming that the channel has a bit error rate p = 10-3, and that bit errors occur at random and independently of each other, find the probability that a failure remains undetected? 3. An error detection failure occurs is either the first sub-code word or the second sub-code word or both failed. Let Pdetect (n + 1) be the probability of successful error detection in the single parity code of length n + 1, then P [detection failure in code of length 2n + 2] = 1 P [successful detection in both codes of length n + 1] 1 Pdetect (n + 1) Pdetect (n + 1) Pdetect (n + 1) = P [exactly (2i+1) bits out of (n+1) bits are in error; < (n + 1)/2 ] Pdetect (n + 1) =!!(!!!)/!!!!!!!!!!! p(!!!!) (1 p)!!!!

8 Problem 7 (13-Hw2) 1. Using the CRC-CCITT polynomial (x 16 + x 12 + x 5 + 1), generate the 16-bit CRC code for a message consisting of a 1 followed by 15 0s. 1. Answer The 16-bit CRC code is: Let G(x) = x 5 + x 4 + x + 1 be the polynomial generator and M = Find the CRC for this message. 2. Answer The CRC of the message is: Let G(x) = x 5 + x 4 + x be the polynomial generator, T = be the message received by the destination node. Would the receiver accept the message? Why? 3. Answer Dividing the received frame by G(x) results in a remainder of 0. It can be concluded that the frame is not in error. The receiver should, therefore, accept the frame. 4. In a CRC error-detecting scheme, choose G(x) = x 4 + x + 1. a. Encode the bits a. Answer Divide X 10 + X 7 + X 4 + X 3 + X + 1 by X 4 + X + 1. The remainder is X 3 + X 2. The CRC bits are The string is sent. b. Suppose the channel introduces an error pattern (i.e., the channel flips a bit from 0 to 1 or 1 to 0 in position 1 and 5). Show the message that is received. Can the error be detected? b. Answer The string is received, corresponding to X 11 + X 10 + X 8 + X 7 + X 5 + X 4 + X 3 + X 2. The remainder after division by X 4 + X + 1 is X 3 + X 2 + X is nonzero. The errors are detected. c. Repeat (b) with error pattern Show the message received. Can the error bit detected? c. Answer The string is received, corresponding to X 10 + X 8 + X 7 + X 5 + X 4 + X 3 + X 2. The remainder after division by X 4 + X + 1 is nonzero. The errors are detected.

9 Problem 8 (13-Hw2) Consider the use of 1000-bit frames on a 1-Mbps satellite channel with 270-ms delay. We define the throughput, T, of a channel as follows as the number of bits transmitted per second. We assume that the channel is error free and the processing time of frames and acknowledgments is negligible. What is the maximum throughput (bits per second) for the following flow control schemes? 1. Stop-and-wait flow control? 2. Sliding window flow control with a window size of 7? 3. Sliding window flow control with a window size of 127? 4. Sliding window flow control with a window size of 255? Consider the use of 1000-bit frames on a 1-Mbps satellite channel with 270-ms delay. We define the throughput, T, of a channel as follows as the number of bits transmitted per second. We assume that the channel is error free and the processing time of frames and acknowledgments is negligible. What is the maximum throughput (bits per second) for the following flow control schemes? Let TF represent the time to transmit a frame, UL represent the link utilization and W denote the window size. UL can be defined as: UL = (W TF)/2D, where D is the one way satellite delay TF = 1000/1o 6 = 10-3 sec; D= 540 msec. 1. Stop-and-wait flow control? 1. W=1: UL = 10-3 /( )= Sliding window flow control with a window size of 7? 2. W=7; UL = 7(10-3 /( ))= Sliding window flow control with a window size of 127? 3. W=127; UL = 127(10-3 /( ))= Sliding window flow control with a window size of 255? 4. W=255; UL = 255(10-3 /( ))= 0.47

10 Problem 9 1. Given the two main reasons for why Ethernet must specify a minimum frame size a. First, it makes it easier to distinguish between valid frame and garbage. b. Second, if the frame is too short, the transmission will be finished before the collision signal returns. The worst case takes 2τ, where τ is the propagation delay. Therefore, the frame has to be longer than 2 τ. 2. Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable with no repeaters. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size? Suppose the frame size is f, transmission rate is r, and propagation delay is t. Then f/r 2*t; ==> f r * 2 * t = 1 Gbps * 2 * (1km / km/s); ==> f 10,000 bits ==> f 1,250 bytes.

11 Problem The IP header checksum only verifies the integrity of IP header. Discuss the pros and cons of doing the checksum on the header part versus on the entire packet. Error checking in the header is more important because the packet is routed according to the header information. In addition, the delivery of the data at the destination to the higher layers also requires the header information. Thus error checking of the header protects against incorrect delivery of the information. Restricting the error checking to the header also simplifies the implementation in the nodes, requires less checksum bits, and prevents unnecessary packet discard. Some higher layers can tolerate some data errors, and higher layers also have the option of performing retransmission. 2. Identify the range of IPv4 addresses spanned by Class A, Class B, and Class C. The range of IPv4 addresses spanned by each class is: Class A: to Class B: to Class C: to What are all the possible subnet masks for the Class C address space? List all the subnet masks in dotted- decimal notation, and determine the number of hosts per subnet supported for each subnet mask supports 126 hosts (not including the broadcast address) supports 62 hosts supports 30 hosts supports 14 hosts supports 7 hosts supports 3 hosts and are not practically usable. 4. Assuming a Classless address space, perform CIDR aggregation on the following /24 IP addresses: /24, /24 and / / 22 = / 22 = / 22 = / 22 = Mask = The resulting prefix is / Perform CIDR aggregation on the following /24 IP addresses: /24; /24; /24; / / 20 = / 20 = / 20 =

12 / 20 = Mask = The resulting prefix is / 20.

13 Problem A small organization has a Class C address for seven networks each with 24 hosts. What is an appropriate subnet mask? Solution: A Class C address requires 21 bits for its network ID, leaving 8 bits for the host ID and subnet ID to share. One possible scheme would assign 4 bits to the host and 4 to the subnet ID, as shown below. The number of bits assigned to the host can also be increased to 5. Network ID Subnet ID Host ID Subnet mask: A university has one Class B address and 150 LANs with 100 hosts in each LAN. a. Design an appropriate subnet addressing scheme. A Class B address has 14 bits for the network ID and 16 bits for the host ID. To design an appropriate subnet addressing scheme we need to decide how many bits to allocate to the host ID versus the subnet ID. Note that either 8 or 7 bits can be used to identify the hosts. Selecting 8 bits to identify the host, leaves enough bits in the subnet ID field for up to 2 8 = 256 LANs. The number of bits in the host ID field is 8. Excluding all 0s and all 1s addresses, the maximum number of hosts in each LAN is (2 8-2) = 254. The subnet mask is Network ID Subnet ID Host ID Selecting 7 bits to identify the host, leaves enough bits in the subnet ID field for up to 2 9 = 512 LANs. Excluding all 0s and all 1s addresses, the maximum number of hosts in each LAN is (2 7-2) = 124. The subnet mask in this case is Network ID Subnet ID Host ID The choice between 7 or 8 bits to represent the hosts depends on the projected growth of the organization. If the number of LANs is expected to increase, then the host ID should be set to 7bits. Otherwise, the choice should be 8 bits. An alternate solution would be to use a variable-length prefix scheme using 7-bit host addresses to allow for aggregation and provide for greater flexibility in accommodating future changes.

14 b. Design an appropriate CIDR addressing scheme. CIDR addressing scheme involves devising a prefix length that indicates the length of the network mask. In this case, 8 bits are required to identify each LAN (since 127 < 150 < 255) and 7 bits are required to identify each host in each LAN (since 63 < 100 < 127). Therefore a CIDR address would use a 17-bit prefix, and thus have an address of the form address/17.

15

16 Problem Suppose an application layer entity wants to send an L-byte message to its peer process, using an existing TCP connection. The TCP segment consists of the message plus 20 bytes of header. The segment is encapsulated into an IP packet that has an additional 20 bytes of header. The IP packet in turn encapsulated inside an Ethernet frame that has 18 bytes of header and trailer. What percentage of the transmitted bits in the physical layer correspond to message information, if L = 1000 bytes? TCP/IP over Ethernet allows data frames with a payload size up to 1460 bytes. Therefore, L = 1000 bytes are within this limit. The message overhead includes: TCP: 20 bytes of header IP: 20 bytes of header Ethernet: total 18 bytes of header and trailer. Therefore, for L = 1000 bytes, 1000/1058 = 95% efficiency. 2. Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the amount of overhead incurred from segmenting the file into packet-sized units = 1460 bytes 1.5 Mbyte / 1460 byte = ; Therefore 1028 blocks are needed to transfer the file. Overhead = ((1028 x M)/1.5M) x 100 = 2.8% 3. Consider a TCP that implements an extension to allow for window sizes much larger than 64 KB. Suppose that the extended TCP is used over a 1-Gpbs link with a latency of 99 ms to transfer a 10-MB file. Assuming that (i) TCP receiver s window is 1 MB, (ii) TCP sends 1-KB packets, (iii) no congestion and (iv) no lost packets, how many RTTs does it take until slow start opens the send window to 1 MB? In slow start, the size of the window doubles every RTT. At the end of the i th RTT, the window size is 2 i KB. It will take 10 RTTs before the send window has reached 210 KB = 1MB.

NETWORK PROBLEM SET Due Date 6/28/2014

NETWORK PROBLEM SET Due Date 6/28/2014 NETWORK PROBLEM SET Due Date 6/28/2014 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached to the

More information

Computer Networks Summer 2013

Computer Networks Summer 2013 Computer Networks Summer 2013 Problem 1 Homework 2 Due Date: 6/17/2013 Two hosts A and B are each connected to a switch S via 10-Mbps links as shown in Figure 1. The propagation delay on each link is 20

More information

Computer Networks. Homework 1 Due Date June 11, 2013

Computer Networks. Homework 1 Due Date June 11, 2013 Computer Networks Homework 1 Due Date June 11, 2013 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,

More information

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448 Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted

More information

UNIVERSITI TUN HUSSEIN ONN MALAYSIA FINAL EXAMINATION SEMESTER I SESSION 2009/10

UNIVERSITI TUN HUSSEIN ONN MALAYSIA FINAL EXAMINATION SEMESTER I SESSION 2009/10 UNIVERSITI TUN HUSSEIN ONN MALAYSIA FINAL EXAMINATION SEMESTER I SESSION 2009/10 SUBJECT NAME SUBJECT CODE COURSE DATA COMMUNICATION BEP4223 4BEE EXAMINATION DATE NOVEMBER 2009 DURATION INSTRUCTION 3 HOURS

More information

Delhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: Ph:

Delhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web:     Ph: Serial : BS_CS_A_Computer Network_040 Delhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: E-mail: info@madeeasy.in Ph: 0-45242 CLASS TEST 20-9 COMPUTER SCIENCE & IT Subject

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 QUESTION 5 QUESTION 6

QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 QUESTION 5 QUESTION 6 QUESTION 1 Three packet-switching networks each contain 8 nodes, A - H. The first network has a star topology with a central switch; the second is a (bidirectional) ring; and the third is a fully interconnected

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

CPE 548 Exam #1 (50 pts) February 17, 2016

CPE 548 Exam #1 (50 pts) February 17, 2016 Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Midterm Exam CSCE 232: Computer Networks Fall Instructions: Midterm Exam CSCE 232: Computer Networks Fall 2007 Last Name: First Name: Student ID: Instructions: 1. This is a close-book and close-notes exam. 2. There are seven questions in total. The number of points

More information

Chapter 18. Introduction to Network Layer

Chapter 18. Introduction to Network Layer Chapter 18. Introduction to Network Layer 18.1 Network Layer Services 18.2 Packet Switching 18.3 Network Layer Performance 18.4 IPv4 Addresses 18.5 Forwarding of IP Packets Computer Networks 18-1 Communication

More information

Chapter 3 Packet Switching

Chapter 3 Packet Switching Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

L2: Bandwidth and Latency. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L2: Bandwidth and Latency. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L2: Bandwidth and Latency Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

a. (4pts) What general information is contained in a LSR-PDU update that A might send? B1: Networks (25 points) Link State Routing (LSR). (Hint: flooding and Dijkstra s Algorithm). Assume Router A has physical links to Routers W, X, Y, Z. a. (4pts) What general information is contained in

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT S 421: OMPUTR NTWORKS ALL 2006 INAL January 5, 2007 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window. Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

PRACTICE QUESTIONS ON RESOURCE ALLOCATION

PRACTICE QUESTIONS ON RESOURCE ALLOCATION PRACTICE QUESTIONS ON RESOURCE ALLOCATION QUESTION : Internet Versus Station Wagon A famous maxim, sometimes attributed to Dennis Ritchie, says Never underestimate the bandwidth of a station wagon full

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Why not spawn processes

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

A closer look at network structure:

A closer look at network structure: T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

FINAL May 21, minutes

FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want

More information

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36 Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes CS 421: COMPUTER NETWORKS FALL 2011 FINAL January 12, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

EE 122 Fall st Midterm. Professor: Lai Stoica

EE 122 Fall st Midterm. Professor: Lai Stoica EE 122 Fall 2001 1 st Midterm Professor: Lai Stoica Question 1 (15 pt) Layering is a key design principle in computer networks. Name two advantages, and one disadvantage to layering. Explain. Use no more

More information

end systems, access networks, links 1.3 network core

end systems, access networks, links 1.3 network core Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Lecture 6 Datalink Framing, Switching. From Signals to Packets Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to

More information

Basics of datacommunication

Basics of datacommunication Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Advanced Computer Networks Spring Set #1

Advanced Computer Networks Spring Set #1 Advanced Computer Networks Spring 2019- Set #1 Prof. Zygmunt J. Haas Computer Science Department The University of Texas at Dallas ECSS 4.405 Richardson, TX 75080 http://www.utdallas.edu/~haas/courses/acn

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

CSE3213 Computer Network I

CSE3213 Computer Network I CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic

More information

CSCI-1680 Link Layer Reliability John Jannotti

CSCI-1680 Link Layer Reliability John Jannotti CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS

More information

Chapter 6 Addressing the Network- IPv4

Chapter 6 Addressing the Network- IPv4 Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments 19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Computer Networks Principles

Computer Networks Principles Computer Networks Principles Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Contents Introduction protocols and layered architecture encapsulation interconnection structures performance

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

COM-208: Computer Networks - Homework 1

COM-208: Computer Networks - Homework 1 COM-208: Computer Networks - Homework 1 1. Design an application-level protocol to be used between an TM (automatic teller machine) and a bank s centralized server. The protocol should allow: verifying

More information

CPSC 441 Tutorial-1. Department of Computer Science University of Calgary

CPSC 441 Tutorial-1. Department of Computer Science University of Calgary CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

Indian Institute of Technology, Kharagpur

Indian Institute of Technology, Kharagpur Indian Institute of Technology, Kharagpur End-Autumn Semester 2018-19 Date of Examination: 27-11-2018 Session: FN (9-12 pm) Duration: 3 hrs Subject No.: IT30037 Subject: INTRODUCTION TO INTERNET Department/Center/School:

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Sungkyunkwan University Chapter 4 Network Layer Prepared by H. Choo 2018-Fall Computer Networks Copyright 2000-2014 2000-2018 Networking Laboratory 1/52 Presentation Outline 4.1 Introduction 4.2 Network-Layer

More information

VTU-NPTEL-NMEICT Project

VTU-NPTEL-NMEICT Project PROBLEMS Module 05: Performance Metrics RTT (Round Trip Time) 1. Calculate the total time required transfer a 1.5 MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1-KB data and

More information

UNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012

UNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012 Student Number: UNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012 ECE 361 Computer Networks This test is Closed Book 75 Minutes Examiner: A. Leon-Garcia Question Mark

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

CS 640: Introduction to Computer Networks

CS 640: Introduction to Computer Networks CS 640: Introduction to Computer Networks Midterm I 10/19/2006 Allotted time: 11:00AM to 12:30 PM (90 minutes) Name: Answers in bold italic font UW -ID Number: 1. There are 6 questions in this mid-term.

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

There are 10 questions in total. Please write your SID on each page.

There are 10 questions in total. Please write your SID on each page. Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write

More information

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please

More information

Computer Networks and reference models. 1. List of Problems (so far)

Computer Networks and reference models. 1. List of Problems (so far) Computer s and reference models Chapter 2 1. List of Problems (so far) How to ensure connectivity between users? How to share a wire? How to pass a message through the network? How to build Scalable s?

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

CMSC 611: Advanced. Interconnection Networks

CMSC 611: Advanced. Interconnection Networks CMSC 611: Advanced Computer Architecture Interconnection Networks Interconnection Networks Massively parallel processor networks (MPP) Thousands of nodes Short distance (

More information

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Internet Architecture & Performance. What s the Internet: nuts and bolts view Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,

More information