COM-208: Computer Networks - Homework 1
|
|
- Laura Mathews
- 5 years ago
- Views:
Transcription
1 COM-208: Computer Networks - Homework 1 1. Design an application-level protocol to be used between an TM (automatic teller machine) and a bank s centralized server. The protocol should allow: verifying a user s card and password querying the account balance (which is maintained at the server) making a money withdrawal The protocol must be able to handle the case in which there is not enough money in the account to cover the withdrawal. Specify the protocol by listing the messages exchanged and the actions taken by the TM or the bank s server on transmission and receipt of messages. Sketch the operation of your protocol for the case of a simple withdrawal with no errors, using a timing diagram as seen in the lecture. Then sketch the operation in case there are not sufficient funds to complete the withdrawal. Host Host R,l,c Figure 1: Two hosts connected by a single link 2. Consider two hosts, and, connected by a single link of rate R bps as shown in Figure 1. The link s cable length is l and the signal propagation speed along the cable is c. Host sends to two s back-to-back, the first having size L 1 and the second L 2. Suppose c = m/s, R = 100 Mbps, l = 200 km, L 1 = 1 kb and L 2 = 10 kb. a. Express the propagation delay on the link, d prop, in terms of l and c. b. Determine the transmission delay of each, d trans,1 and d trans,2, in terms of L 1, L 2 and R. c. What is the queuing delay of each, d queue,1 and d queue,2? d. Draw a timing diagram showing the transmission of each and the delays (d prop, d trans, d queue ). e. Compute the transfer time, i.e. the time elapsed between the moment host starts transmission to the moment host receives the last bit of the data. Note: in computer networks, we use the following measurement units related to data transfer: bps = b/s = bits per second ps = /s = bytes per second, with 1 byte = 8 bits 1 kbps = 1000 bps (not 1024!), 1 Mbps = 1000 kbps = 10 6 bps, 1 Gbps = 1000 Mbps = 10 9 bps etc. Delays are often specified in the unit that yields the most compact representation, for example 50 ms instead of 0.05 s. 3. Consider again the scenario in the previous problem, except the s are now sent over a path consisting of multiple links, connected by relays, as shown in Figure 2. The transmission method of the relays is store-and-forward, and their processing delay is d proc = 1 us for each. Consider that each link has the same properties as in the previous problem, i.e. transmission rate R, length l and signal propagation speed c. What is the transfer time if the number of links is: 1
2 Host Relay R 1 Relay R 2 Relay R N-1 Host R,l,c R,l,c R,l,c Figure 2: Two hosts connected by a path with multiple links with identical properties a. 2 b. 3 c. N Draw a timing diagram to help justify your answer. 4. Consider the scenario in the previous problem, except the relays now use circuit ing, i.e. they do not store-and-forward s but instead immediately transmit each bit they receive before waiting for the entire to arrive. What is the transfer time if the number of links is: a. 2 b. 3 c. N Draw a timing diagram to help justify your answer. 5. (P4) Consider the circuit-ed network in Figure 3. There are 4 internal links, each supporting up to 4 connections. ny connection must pass through an internal link (it cannot enter and exit the network at the same ). a. What is the maximum number of simultaneous connections that can be in progress? b. Suppose that all connections enter or exit the network through es and C. What is the maximum number of simultaneous connections that can be in progress? c. Suppose we want to make four connections that enter or exit the network through es and C, and another four connections that enter or exit the network through es and D. Can we simultaneously route all eight connections through the network? Switch Switch Switch D Switch C Figure 3: circuit-ed network 2
3 6. (P8) Packet ing vs circuit ing Multiple users share a 3 Mbps link. Suppose each user requires 150 kbps when transmitting, but each user transmits only 10% of the time. Note: Subquestions (c) and (d) of this problem are optional, as they require special knowledge about probability theory, that you may have not yet acquired. Yet, they are given here because they show how the probabilities around statistical multiplexing in ing (slide 50 of Lecture 1) are computed. a. For the beginning of the problem, assume that circuit ing is used. In particular, a circuit in the link is implemented with Frequency Division Multiplexing (FDM) or Time Division Multiplexing (TDM). How many users can be supported? Does this number differ when FDM is used vs TDM? b. For the remainder of this problem, suppose that ing is used. Find the probability p that a given user is transmitting at any time. c. (Optional) Suppose that there are 120 users. Find the probability that at any given time, exactly n users are transmitting simultaneously. (Hint: use the binomial distribution.) d. (Optional) Find the probability that there are 21 or more users transmitting simultaneously. e. Which method provides better performance guarantees? Which method uses more efficiently the available resourses (link bandwidth)? Explain. 7. (P31) In modern -ed networks, including the Internet, the source host segments long, application-layer messages (for example, an image or a music file) into smaller s and sends each separately into the network. The receiver then reassembles the s back into the original message. We refer to this process as message segmentation. Figures 4 and 5 illustrate the end-to-end transport of a message with and without message segmentation. message source destination Figure 4: Sending a message without segmentation source destination Figure 5: Sending a message with segmentation Consider a message that is bits long. Each of the 3 links in the network has the rate 2 Mbps. Ignore propagation, queuing, and processing delays. a. Consider sending the message without message segmentation. How long does it take to transfer the message from to the first? Keeping in mind that each uses store-and-forward ing, what is the total time to transfer the message from to? b. Now suppose that the message is segmented into 800 s, with each being 10,000 bits long. How long does it take to move the file from to? Discuss. c. In addition to reducing delay, what are other reasons to use message segmentation? d. Discuss the drawbacks of message segmentation. 8. In Problem 3, you computed the total transfer time of two s over N links. In this problem, you will generalize your results for multiple s. Consider Figure 2, and assume that: host sends to, P s back-to-back, each of which has length L; the number of link is N and each link has transmission rate R; 3
4 any processing and propagation delays may be ignored, as in the previous exercise (message segmentation). there is no other traffic in the network (i.e. there is no queuing delay due to other s) nswer to the following questions: a. What will be the end-to-end delay for sending P s from to? b. What will be the end-to-end delay if the s do not have the same length, i.e. the s lengths are L 1, L 2,..., L P? 9. (P21) Consider Figure 6. R 1 2 R 1 1 R 1 N R 2 1 R 2 2 R 2 N R M 1 R M N R M 2 Figure 6: network topology with multiple paths This network consists of M paths between the server and the client. No two paths share any link. Each path k (k = 1,..., M) consists of N links, with transmission rate R k 1, R k 2,..., R k N. a. If the server can only use path 1 to send data to the client, what is the maximum throughput that the server can achieve? b. If the server can use all M paths simultaneously to send data, what is the maximum throughput that the server can achieve? Rs Rc server client Figure 7: Two links with different transmission rates. 10. (P23) Consider Figure 7. ssume that we know the bottleneck link along the path from the server to the client is the first link with R S bits/sec. Suppose we send a pair of s back to back from the server to the client, and there is no other traffic on this path. ssume each of size L bits, and both links have the same propagation delay d prop. a. What is the inter-arrival time at the destination? That is, how much time elapses from when the last bit of the first arrives until the last bit of the second arrives? b. Now assume that the second link is the bottleneck link (i.e., R C < R S ). Is it possible that the second queues at the input queue of the second link? Explain. Furthermore, suppose that the server sends the second T seconds after sending the first. How large must T be to ensure no queuing before the second link? Explain. 11. (P24) You need to transfer urgently 300 T data from Lausanne to London. You have available a 1 Gbps dedicated link for data transfer; alternatively, you can send the hard drives by post with 48-hour delivery. Is it faster to transmit the data via this link or instead use the post? Explain. 12. (P25) Two hosts, and, are separated by 20,000 kilometers and are connected by a direct link of R = 2 Mbps. The signal propagation speed over the link is meters/sec. a. Calculate the bandwidth-delay product, R d prop. b. Consider sending a large data stream from Host to Host. What is the maximum number of bits that will be in transit on the link at any given time? 4
5 c. Visualize the link as a pipe filled with a sequence of bits. What is the length (in meters) of a bit in the link, i.e., what fraction of the link corresponds to one bit? d. Express the length of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m (are all needed?). 13. (Open question) To reduce the complexity of the system, the Internet is based on a set of layered protocols and the payload is encapsulateddecapsulated whenever it is transferred from one layer to another. Think of another real-world system that is structured in layers and uses encapsulation/decapsulation whenever the payload is transferred from one layer to another. Describe the layers of the system and the encapsulation-decapsulation process. (Hint: a postal service) 14. (Open question) Imagine yourself being the engineer who is responsible for the security part in the following applications. Which type of security attack would you prefer to avoid in each case? Explain why and provide a high-level systematic solution to address the attack. a. n online banking system which should enable customers use their private accounts and perform financial transactions (just like TM banking). b. weather website which should be available 24 hours per day. c. chat application (similar to Snapchat) which should provide ephemeral and private messaging to assure senders that their messages are burnt after reading. I.e. once the recipient of a message has viewed its content, the message is automatically deleted. The recipient may make a message copy, but in that case the sender is explicitly notified. 5
70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET
70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded?
More informationCPSC 441 Tutorial-1. Department of Computer Science University of Calgary
CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the
More informationPROBLEMS AND EXERCISES
Departamento de Tecnología Electrónica Computer Networking Unit 1: Computer Networks and Internet PROBLEMS AND EXERCISES Introduction 1-79 TDM How long does it take to send a file of 640,000 bits from
More informationHomework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below:
Homework 1 50 points Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More information2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.
2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:
More informationA closer look at network structure:
T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationComputer Networks and the Internet. CMPS 4750/6750: Computer Networks
Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationComputer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So
Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.2 Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems,
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationIntroductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36
Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationCS519: Computer Networks
Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets
More informationFull file at
Computer Networking: A Top-Down Approach Featuring the Internet, 4th Edition Solutions to Review Questions and Problems Version Date: October 29, 2007 This document contains the solutions to review questions
More informationAnnouncements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:
Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted
More informationSince enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time
Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationComputer Networks. Homework #4: No Grading
Computer Networks Homework #4: No Grading Problem #1. Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationNETWORK PROBLEM SET Solution
NETWORK PROBLEM SET Solution Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: 1. For a packet-switched network of N nodes, the number of hops is one less than
More informationComputer Networks Summer 2013
Computer Networks Summer 2013 Problem 1 Homework 2 Due Date: 6/17/2013 Two hosts A and B are each connected to a switch S via 10-Mbps links as shown in Figure 1. The propagation delay on each link is 20
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS ATM SWITCHING ATM is a connection-oriented transport concept An end-to-end connection (virtual channel) established prior to transfer of cells Signaling used for connection
More informationComputer Communication Networks
Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless
More informationData Communication & Networks Final Exam (Fall 2008) Page 1 / 13. Course Instructors: Engr. Waleed Ejaz. Marks Obtained Marks
Data Communication & Networks Final Exam (Fall 2008) Page 1 / 13 Data Communication & Networks Fall 2008 Semester FINAL Thursday, 4 th December 2008 Total Time: 180 Minutes Total Marks: 100 Roll Number
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationLecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:
More informationChapter I: Introduction
Chapter I: Introduction UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross The work core mesh of interconnected routers packet-switching:
More informationEE-311 Data Communication & Networks
National University of Computer & Emerging Sciences, Islamabad, Pakistan Name: Roll No: EE-311 Data Communication & Networks Summer 2007 Final Thursday, 2 nd August 2007 Total Time: 3 Hours Total Marks:
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 30, Lecture 3. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 3 August 30, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 Homework Small revision of the Wireshark
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Computer Networks and The Inter Sec 1.3 Prof. Lina Battestilli Fall 2017 Outline Computer Networks and the Inter (Ch 1) 1.1 What is the Inter? 1.2 work
More informationCMPE 344 Computer Networks Spring Foundations. Reading: Peterson and Davie,
CMPE 344 Computer Networks Spring 2017 Foundations Reading: Peterson and Davie, 1.1-1.5 Sources of slides: Computer networks: A systems Approach by Peterson and Davie, Morgan Kaufmann, 2010 CN5E by Tanenbaum
More informationOutline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching
Outline Computer Communication and Networks 1 Department of Computer Science & Information Technology University of Balochistan Lecture 03 1/26 2/26 Two major components The mesh of packet switches and
More informationINTRODUCTORY COMPUTER
INTRODUCTORY COMPUTER NETWORKS TYPES OF NETWORKS Faramarz Hendessi Introductory Computer Networks Lecture 4 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 Types of Networks Circuit
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 04 Wide Area Networks Delivered By: Engr Tahir Niazi Wide Area Network Basics Cover large geographical area Network of Networks WANs used to be characterized with
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationEECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering
Department of Computer Science and Engineering EECS 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 9, 2016 Instructions: Examination time: 180 min.
More informationComputer Networks. Homework 1 Due Date June 11, 2013
Computer Networks Homework 1 Due Date June 11, 2013 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached
More informationOutline Computer Networking. Circuit Switching. Circuit Switching
line 5-5- omputer Networking 5-6 Lecture : Virtual ircuits Peter Steenkiste ircuit switching refresher Virtual ircuits - general Why virtual circuits? How virtual circuits? -- tag switching! Two modern
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS SWITCHING A switch is a mechanism that allows us to interconnect links to form a larger network. A switch is a multi-input, multi-output device, which transfers packets
More informationAssignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points.
Assignment #1 Csci4211 Spring 2017 Due on Feb. 13th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Describe the special properties of the following transmission
More informationLecture 6. TCP services. Internet Transport Layer: introduction to the Transport Control Protocol (TCP) A MUCH more complex transport
Lecture 6. Internet Transport Layer: introduction to the Transport ontrol Protocol (TP) RF 793 (estensioni RF 1122,1323,2018,2581,working group tsvwg) A MUH more complex transport for three main reasons
More informationQ23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network?
CS368: Exercise 5 Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network? a) Stop_and_Wait b) Go-Back-N c) Selective-Repeat Q23-6.
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationCS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University
CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Why not spawn processes
More informationcs/ee 143 Fall
cs/ee 143 Fall 2018 13 4 Internetworking 4.1 W&P, P6.1 (a) 2 points. How many IP addresses need to be leased from an ISP to support a DHCP server (with L ports) that uses NAT to service N clients at the
More informationAdvanced Computer Networks Spring Set #1
Advanced Computer Networks Spring 2019- Set #1 Prof. Zygmunt J. Haas Computer Science Department The University of Texas at Dallas ECSS 4.405 Richardson, TX 75080 http://www.utdallas.edu/~haas/courses/acn
More informationDC Assignment III. Communication via circuit switching implies that there is a dedicated communication path between two stations.
DC Assignment III 1. Explain circuit-switched Network with neat Diagrams. Communication via circuit switching implies that there is a dedicated communication path between two stations. That path is a connected
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationChapter 3 Packet Switching
Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination
More informationComputer Networks - Midterm
Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if
More informationComputer Networks - Midterm
Computer Networks - Midterm October 28, 2016 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Computer Networks and The Internet Sec 1.4-1.5 Prof. Lina Battestilli Outline Computer Networks and the Internet (Ch 1) 1.1 What is the Internet? 1.2 network
More informationNext Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points
Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies
More informationLast Lecture. Nuts-and-bolts description of the Internet. ! The topology. ! The communication links. ! The core. ! The edge
Last Lecture Nuts-and-bolts description of the Internet! The topology! The core! The edge! The communication links SUNY AT BUFFALO; CSE489/589 MODERN NETWORKING CONCEPTS; Fall 2010; INSTRUCTOR: HUNG Q.
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationCOMP 562: Advanced Topics in Networking
COMP 562: Advanced Topics in Networking Qian Zhang Spring 2009 HKUST Introduction 1-1 Course Info Instructor: Qian Zhang www.cs.ust.hk/~qianzh Course web site http://www.cs.ust.hk/~qianzh/comp562 2009/comp562
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #1 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Intersession 2009 Question Paper NOTE: Students may take this
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationPage 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011
More informationPPP. Point-to-Point Protocol
PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,
More informationCSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1
CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 Due 11:59pm Friday October 6 Instructions: 1. Please submit your homework using the on-line electronic submission system (via
More informationFour sources of packet delay
Outline q Major Internet components q Network architecture and protocols q Switching strategies q Internet protocol stack, history q to network performance Four sources of packet delay q 1. nodal processing:
More informationCOM-208: Computer Networks - Homework 3
COM-208: Computer Networks - Homework 3 1 Application Layer 1. (P22) Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of u s = 30 Mbps, and each peer has a download
More informationLecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee
Agenda Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee Packet switching technique Packet switching protocol layers (X.25) Frame Relay ١ Dr. Ahmed ElShafee, ACU Fall 2011,
More informationLecture (04 & 05) Packet switching & Frame Relay techniques
Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I Agenda Packet switching technique Packet switching protocol layers (X.25)
More informationIntegrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)
Digital Local Loop Technologies Integrated t Services Digital it Network (ISDN) Handles voice and data Relatively l high h cost for low bandwidth (Skip) Digital Subscriber Line (DSL) Cable modems Hybrid
More informationReview problems (for no credit): Transport and Network Layer
Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 4: Packet switching performance metrics Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should Be
More informationVTU-NPTEL-NMEICT Project
PROBLEMS Module 05: Performance Metrics RTT (Round Trip Time) 1. Calculate the total time required transfer a 1.5 MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1-KB data and
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes
CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationCommunication Networks
Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency
More informationCS 4390 Computer Networks
CS 4390 Computer Networks UT D application transport network data link physical Session 04 Packet Switching dapted from Computer Networking a Top-Down pproach 1996-2012 by J.F Kurose and K.W. Ross, ll
More informationComputer Networks. Homework #3: Due 11 November 2015 (Wednesday) Just before Midterm#2!
Computer Networks Homework #3: Due 11 November 2015 (Wednesday) Just before Midterm#2! Problem #1. Assume you need to write and test a client-server application program on two hosts you have at home. a.
More informationPerformance Modeling
Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia
More informationNetwork core and metrics
Network core and metrics latency propaga-on transmit queue Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and
More informationChapter 24. Transport-Layer Protocols
Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable
More informationBasic Reliable Transport Protocols
Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. D. Raychaudhuri & M. Ott
ECE544 Mid-Term Page ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. & M. Ott Instructions: This is a 2 hr, OPEN BOOK exam. (Only the textbook, Peterson & Davie, Computer Networks, A Systems
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More information