Exercises for the Lectures on Communication Networks

Size: px
Start display at page:

Download "Exercises for the Lectures on Communication Networks"

Transcription

1 Exercises for the Lectures on Prof. Jochen Seitz & Dipl.-Ing. Karsten Renhak Department of University of Technology Ilmenau October 5, 010 [Jochen.Seitz

2 Contents 1 Communication Services and Protocols Terms and Definitions Classification of Communication Services Protocol Mechanisms 4.1 Error Detection Bit-Oriented Data Link Layer Acknowledged Data Transmission Flow Control Service Primitives Service Access Point Transport Layer Connection Establishment Layered Communication Architectures Switching and Multiplexing Switching Techniques Multiplexing Code Division Multiple Access Cooperation of Layers Network Layer and Data Link Layer Satellite Communications Switching Technology Switching Systems Routing Integrated Services Digital Network (ISDN) Bit Rate and Signal Rate Channel Capacity Pulse Code Modulation Coding on the S 0 -Interface Coding on the U k0 -Interface The Internet Protocols The Internet and the ISO/OSI Basic Reference Model Addresses in the Internet Detailed Flow through the Protocol Layers Abbreviations 15

3 3 1 Communication Services and Protocols 1.1 Terms and Definitions 1. Explain the model of a communication service.. Define the term service interface. 3. How are communication services and communication protocols related? 1. Classification of Communication Services In telephone networks, communication services are classified as follows: bearer service tele service value-added service service attributes Explain the differences of these classes. appropriate class and give reasons for this: Assign the following services to the most 1. telephony. telefax 3. call waiting signal 4. toll-free phone call using call diversion 6. premium rate service using packet data transmission over the public telephone network

4 4 Protocol Mechanisms.1 Error Detection In order to detect bit errors which may occur during transmission due to interferences, protocols often stipulate check sums. 1. Which layers use this protocol mechanism?. Explain how a parity check works. What s the disadvantage of this kind of error detection mechanism? 3. A more sophisticated algorithm is the cyclic redundancy check. Let us assume the generator polynomial x 4 + x The bit sequence contains important user information for which the frame check sequence (FCS) has to be computed. Please detail the FCS generation process and the FCS checking process. 4. What happens, if an error has been detected?. Bit-Oriented Data Link Layer One of the most important data link layer protocols is the High-Level Data Link Control (HDLC) protocol. It is bit-oriented, thus it may transport an arbitrary amount of bits. An HDLC frame starts with a start-of-frame bit pattern ( ). Then, there is an address field and a control field (used for frame numbering and acknowledging). Thereafter, there is user data to be transported, which is secured by a frame check sequence. Finally, the frame is ended by an end-of-frame bit pattern (again ). The frame structure is depicted in figure 1. Bits n 8 8 start-of-frame address control user data frame check end-of-frame bit pattern field field sequence bit pattern Figure 1: HDLC frame Given this frame format, complete the frame to transmit the string Okay coded with the international 7-bit code (without parity bit). The generator polynomial for the frame check sequence is x 8 + x 4 + x 3 + x. Can you identify problems related to the frame format? How can these be solved?.3 Acknowledged Data Transmission Assume a character-oriented data link layer protocol that works in half-duplex mode. The communication partners are a primary station and a secondary station. The primary station initiates the communication by sending the control character ENQ. The secondary stations responds with the control character ACK, if it is ready to receive data. Otherwise, it sends a NAK control character. If the secondary station can receive data, the primary station transmits a data frame. Once this frame has been received correctly,

5 5 the secondary station again sends an ACK character. In order to provide a means for synchronization, each transmission must start with a SYN character. Develop protocol mechanisms dealing with the following errors: 1. Loss of ENQ. Loss of the ACK character stating that the secondary station is ready to receive. 3. Permanent errors on the physical line. 4. Bit error within the data frame. 5. Loss of an acknowledgment (ACK) for a data frame. Which problem may arise if you consider the points 4 and 5? How can you cope with these problems..4 Flow Control Describe how credit-based flow control works. Given is a maximum window size of 4. Acknowledgments are sent within every packet (piggybacked acknowledgments). Complete the chart in figure with the according credit and the sending and receiving sequence numbers. S 0 Sender Sliding Window (Credit 4) Receiver C time 4 S: Sequence number of the last packet sent R: Expected number of the next packet to be received (all packets with a number less than R are acknowledged) C: Upper window edge (maximum number of the packet to be sent) Figure : Sliding Window

6 6 3 Service Primitives 3.1 Service Access Point A specific protocol entity can use the service of the underlying layer by exchanging service primitives at the service access point (SAP). 1. Discuss the characteristics of such a service access point.. Give examples for a service access point: a) in the public telephone network b) in the Internet 3. Transport Layer Connection Establishment To illustrate the quite abstract terms service, protocol, and service primitive, the example of establishing a connection on the transport layer shall be worked out in detail. 1. For connection establishment on the transport layer, distinguish between service provider and service user.. Which service primitives have to be used for connection establishment on the transport layer? 3. Specify the connection establishment service a) using a finite state machine b) using message sequence charts 4. Specify the according protocol. Assume a datagram-oriented network layer that is very reliable. 5. Describe successful connection establishment with a message sequence chart. 6. What would have to be changed in the establishment procedure if the network layer service were connection-oriented? Sketch another message sequence chart depicting this case. 7. Now consider a quite unreliable network layer service. The network layer is able to avoid phantom packets, erroneous packets and packets that are out of sequence. Which problems may occur nevertheless and what would you build into the transport layer protocol to cope with these problems. 3.3 Layered Communication Architectures Generally, communication systems are described by layered communication architectures. What is the advantage of this? Discuss the optimal number of layers in such an architecture.

7 7 4 Switching and Multiplexing 4.1 Switching Techniques Describe the switching technique used in the following communication networks. Identify those networks that provide a physical channel that is connected through from the sender to the receiver. 1. plain old (analogue) telephone network. Internet 3. public digital telephone network (e.g. ISDN) 4. snail mail (letter) 4. Multiplexing Complete the following statements or check the correct answers: 1. Multiplexing is used to improve the symbol rate to better exploit the physical channel to allow different transmissions over one physical channel in parallel. Using... multiplex, each transmission activity gets the complete channel bandwidth. 3. Using... multiplex, each transmission activity can use only a fraction of the channel bandwidth. 4. One physical channel with bandwith B shall be used for many transmission activities synchronistically. Which multiplex technique is to be used? space multiplex time multiplex frequency multiplex 4.3 Code Division Multiple Access Explicate the functionality of code division multiple access (CDMA) with the following example: Two senders A and B share the same physical medium using CDMA. A uses chipping sequence CS A = + ++, B uses chipping sequence CS B = A wants to send 101, while B has to send 100. Detail the transmission by showing which (physical) signals are sent out by the two senders, how these signals interfere with each other, and how the mixture of these two signals must be decoded by the receivers accordingly, which know the chipping sequence of the senders.

8 8 5 Cooperation of Layers 5.1 Network Layer and Data Link Layer Assume a network layer entity utilizing the services of the data link layer that features the following constraints: The maximum amount of data to be handled by the data link layer entity is 1, 500byte. The data link layer entities work at a transmission speed of 4Mbit/s. At the data link layer, frames are sent according to the stop-and-wait principle. The data link layer guarantees delivery in sequence. The transport layer entity delivers a 0.6 MByte service data unit (SDU) to the network layer entity. 1. Which protocol mechanisms must be implemented by the network layer entities?. Draw a message sequence chart depicting data link and network link layer entities that describes this data transfer. 3. An acknowledgment frame on the data link layer is 1kbit long. How long does the complete transfer from the delivery of the transport layer SDU at the sender s N-SAP to the indication of the received SDU at the receiver s N-SAP? Ignore the processing time within the entities and the protocol control information that has to be attached to the data. Consider only the error-free case. 5. Satellite Communications Let us consider a communication network with satellite links as depicted in figure 3. Both sender and receiver possess entities of all seven layers of the ISO/OSI basic reference model. The other three network components are equipped with entities of layers one to three only. The following constraints must be considered when analyzing the communication in this network: The transport layer entity on the sender side would like to send 5.5Kbyte data to the receiver. The network layer entity on the sender side has to fragment the data into smaller portions, because the data link layer can only cope with a Kbyte SDU per frame. The protocol overhead to be added by the network layer is 00byte. The data link layer works according to the stop-and-wait principle, which means that a sending data link layer entity has to wait for an acknowledgment by the receiving entity before it can transmit the next frame.

9 9 50 ms 50 ms Sender Receiver 5 ms 5 ms Figure 3: Scenario The durations given in figure 3 refer to the data link layer and specify how long it takes until the frame has reached the receiving data link layer entity. These durations are the same in both directions and are constant, since we assume a frame of constant length on the data link layer. To simplify the computation we do not care about the processing time in the entities. How long does the transmission of the aforementioned 5.5Kbyte take? [Hint: Try to illustrate the process with a message sequence chart!]

10 10 6 Switching Technology 6.1 Switching Systems Switching systems can be classified according to the technology they implement. 1. Which technology is best suited for the following use cases? a) transmission of a huge amount of data in a limited time; b) transmission of a huge amount of data without time limits; c) transmission of a quite small amount of data without time limits; d) transmission of a quite small amount of data in a limited time.. Discuss the quality of service degree each of the switching technologies is able to guarantee. 6. Routing Look at the network depicted in figure 4. It consists of six nodes. The links between nodes have different costs that are given in the figure, too. The routing algorithm that is used to build the routing tables for all nodes aims at taking the most cost-effective path. If two paths have equal costs, the shortest path (with the least number of nodes) is chosen. 5 Router 3 Router 3 5 Router Router 6 1 Router 4 1 Router 5 Figure 4: Sample Network 1. Construct the routing tables for all six nodes.. Assume that the link between routers 4 and 5 breaks down. How does this affect the six routing tables?

11 11 7 Integrated Services Digital Network (ISDN) 7.1 Bit Rate and Signal Rate The unit of bit rate is bit/s, whereas the signal rate is given in baud. 1. How are these two units related?. Under which circumstances are signal rate and bit rate equal? 3. Is it possible that the bit rate is smaller than the signal rate? 4. Why can a signal not carry an arbitrary amount of bits? 7. Channel Capacity A transmission channel (approximated by an ideal low pass) has a cut-off frequency of f Chmax = 4kHz and a signal-to-noise ratio of 40dB. Which bit rate can theoretically be achieved over this channel? 7.3 Pulse Code Modulation 1. Which kind of multiplexing is the basis for PCM?. A PCM30 frame is depicted in figure 5. Knowing that an ISDN-B-channel works at 64kbit/s, compute the duration of one single time slot and of one complete PCM30 frame. 3. What is the effective bit rate to transmit user data (voice) using PCM30? How much overhead has to be transmitted (in percent)? Frame Alignment/ Synchr. Telephone Channel 1 Telephone Channel... Telephone Channel Signaling Channel Channel Telephone Telephone Channel 30 Slot t 3 x 8 bit = 56 bit PCM30 frame Figure 5: PCM30 frame structure 7.4 Coding on the S 0 -Interface At the subscriber installation, ISDN uses the modified Alternate Mark Inversion (AMI) code. This is a pseudo-ternary code that codes a binary 1 by zero voltage and a binary 0 by alternating impulses of +0.75V or 0.75V respectively.

12 1 1. Explain the term pseudo-ternary.. Compare the bit rate to the signal rate. 3. Encode the bit sequence using modified AMI. 4. Describe the characteristics of this code. 7.5 Coding on the U k0 -Interface 1. On the subscriber line from the telephone exchange to the subscriber s home, 4B3T-coding was used (cf. table 1). Use this coding scheme to code the bit sequence Bit Sequence S1 Sn S Sn S3 Sn S4 Sn Table 1: 4B3T-Coding. With the introduction of Euro-ISDN, the coding scheme on the subscriber line was changed to the B/1Q-code. According to table, two bits are coded by one signal that can have four different voltage levels, Hence, this signal is called quaternary. Sketch the signal of exercise 1 coded with the B/1Q-code. Bit Sequence Quart Table : Coding Table for B/1Q-Code

13 13 8 The Internet Protocols 8.1 The Internet and the ISO/OSI Basic Reference Model In the Internet, the communication systems are defined in layers, too. However, the resulting architecture is much simpler than the ISO/OSI Basic Reference Model. 1. Give the full names for the following Internet protocols and classify them into the according ISO/OSI layer: a) TCP b) IP c) HTTP d) UDP e) ARP f) FTP g) DHCP Explain the functions of each of the given protocols.. Discuss the advantages and disadvantages of the reduction of the number of protocols in the Internet reference model. 3. Where does Internet telephony, a.k.a. Voice over IP, fit into the Internet reference model. Explain your answer. 8. Addresses in the Internet The Internet reference model also incorporates service access points between different layers. These SAPs have to be addressed in a unique way. 1. Which types of addresses have to be differentiated in the Internet on the different layers?. An Internet user should only handle addresses on the application layer. In order to communicate, this addresses have to be mapped onto addresses of the layers below. Explain how this mapping is done. 3. Let us assume a PC that is located within the university s WLAN network. Its assigned IP address is The PC user would like to retrieve the web site of the Internet Engineering Task Force ( Try to identify the addresses on each layer this PC has to use in order to send an HTTP request to the IETF s web server.

14 Detailed Flow through the Protocol Layers The last part of exercise 8. shall now be used to illustrate how all the layers cooperate. Answer the following questions for this. 1. Which protocols are needed on which layer?. Which protocol entities are necessary and where do you find them? 3. Which functionalities are provided by the network layer? 4. What would happen, if the IETF switched off the web server for maintenance?

15 15 9 Abbreviations A AMI Alternate Mark Inversion C CDMA CS Code Division Multiple Access Chipping Sequence F FCS Frame Check Sequence H HDLC High-Level Data Link Control I IETF ISDN ISO Internet Engineering Task Force Integrated Services Digital Network International Organization for Standardization N N-SAP Network Layer Service Access Point O OSI Open Systems Interconnection P PCM Pulse Code Modulation S SAP SDU Service Access Point Service Data Unit B1Q 4B3T Two Binary One Quaternary line encoding scheme Four Binary Three Ternary line encoding scheme

ISDN principles. By: Ogah, Oshoriamhe Frederick Instructor: Prof. Werner Henkel Course: Wireline Communications Date: November 30, 2004

ISDN principles. By: Ogah, Oshoriamhe Frederick Instructor: Prof. Werner Henkel Course: Wireline Communications Date: November 30, 2004 ISDN principles By: Ogah, Oshoriamhe Frederick Instructor: Prof. Werner Henkel Course: Wireline Communications Date: November 30, 2004 Introduction ISDN = Integrated Services Digital Network ISDN is more

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY TUTORIAL QUESTION BANK Course Name Course Code Class Branch COMPUTER NETWORKS AIT003 Year 2018 19

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Faculty of Science Final Examination. Computer Science B Basics of Computer Networks

Faculty of Science Final Examination. Computer Science B Basics of Computer Networks Student Name: Student Number: Faculty of Science Final Examination Computer Science 308-435B Basics of Computer Networks Examiner: Prof. Hans Vangheluwe Friday, April 27 th, 2001 Associate Examiner: Prof.

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Basics of datacommunication

Basics of datacommunication Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

UNIT - IV Ques.4 Ques.5

UNIT - IV Ques.4 Ques.5 Immediately write your Roll No Bharati Vidyapeeth s Institute of Computer Applications and Management A-4, Paschim Vihar, New Delhi-63. Second Internal Examination 2012-15 Paper Code: MCA207 Subject: Data

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Computer Networks (16MC811) Year & Sem: II-MCA & I-Sem Course : MCA

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1 Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name Course Code Class Branch COMPUTER NETWORKS AIT003 Year

More information

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays. Chapter2: analog and digital signals can take one of two forms: 1. periodic 2. nonperiodic Periodic analog signals can be classified as: 1. simple 2. composite A sine wave is represented by three parameters:

More information

Osi Reference Model And Explain The Various Layers And Its Applications

Osi Reference Model And Explain The Various Layers And Its Applications Osi Reference Model And Explain The Various Layers And Its Applications OSI Reference model describes networking concept in seven layers. All applications and utilities that communicate with network fall

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer Science Chapter - 2 Switching and Network Architecture

More information

Chapter 1 : Introduction to Computer Networks

Chapter 1 : Introduction to Computer Networks Topic List: A. Need to Share Resources B. Layering Concept and Example C. TCP/IP and OSI Layering Models D. Connection Oriented vs. Connectionless Transfer E. Top-Down and Bottom Up Approaches to study

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve

More information

Architectures of Communication Subsystems

Architectures of Communication Subsystems Architectures of Communication Subsystems Open System Interconnection Reference Model Computer Networks Lecture 2 http://goo.gl/pze5o8 Connection-Oriented versus Connectionless Communication 2 Connection-Oriented

More information

Few Multiplexing Applications

Few Multiplexing Applications Few Multiplexing Applications by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/ The

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Chapter 2. Communicating Over The Network

Chapter 2. Communicating Over The Network Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1 Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error

More information

Chapter 7: Data Link Control. Data Link Control Protocols

Chapter 7: Data Link Control. Data Link Control Protocols Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error

More information

Layered Architecture

Layered Architecture CS311: DATA COMMUNICATION Layered Architecture by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/

More information

The SpaceWire Transport Protocol. Stuart Mills, Steve Parkes University of Dundee. International SpaceWire Seminar 5 th November 2003

The SpaceWire Transport Protocol. Stuart Mills, Steve Parkes University of Dundee. International SpaceWire Seminar 5 th November 2003 The SpaceWire Transport Protocol Stuart Mills, Steve Parkes University of Dundee International SpaceWire Seminar 5 th November 2003 Introduction Background The Protocol Stack, TCP/IP, SCPS CCSDS and SOIF

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

Transmission SIGNALs

Transmission SIGNALs Chapter 6 Digital Communications Basics 6.1 Introduction 6.2 Transmission media 6.3 Source of signal impairment 6.4 Asynchronous Transmission 6.5 Synchronous Transmission 6.6 Error Detection Methods 6.7

More information

Networks: Access Management

Networks: Access Management Networks: Access Management Class Notes # 3 Protocols and Layers (part 1) September 19, 2003 Functions A small set of functions form the basis of all protocols. Not all protocols have all functions; this

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

CS 43: Computer Networks. 15: Transport Layer & UDP October 5, 2018

CS 43: Computer Networks. 15: Transport Layer & UDP October 5, 2018 CS 43: Computer Networks 15: Layer & UDP October 5, 2018 Reading Quiz Lecture 15 - Slide 2 Layer Moving down a layer. Current perspective: lication is the boss Usually executing within the OS kernel. The

More information

Computer Networks 1DV201

Computer Networks 1DV201 Computer Networks 1DV201 1 Link to coursepage http://w3.msi.vxu.se/users/ofl/1dv201/index.html 2 Chapter 1-3 Introduction 3 Topic and Scope Computer networks and internets: an overview of concepts, terminology,

More information

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Computer Facilities and Network Management BUS3150 Tutorial - Week 13 Computer Facilities and Network Management BUS3150 Tutorial - Week 13 *** FOR TUTORS ONLY *** The answers provided here are only brief guides. If you have any comments or suggestions for improvement to

More information

Open Systems Interconnection Model

Open Systems Interconnection Model OPEN SYSTEMS INTERCONNECTION AND TCP/IP PROTOCOL SUITE TCP/IP P Open Systems Interconnection Model An ISO standard that covers all aspects of network communications A layered framework consisting of seven

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Protocol architectures

Protocol architectures Protocol architectures Gruppo Reti TLC name.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Protocol architectures - 1 Architectures and protocols CCITT definition Communication:

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Communication Networks

Communication Networks Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency

More information

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

William Stallings Data and Computer Communications. Chapter 7 Data Link Control William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

3. Data Link Layer 3-2

3. Data Link Layer 3-2 3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link

More information

July 19, 1999 (Version 1.0) White Paper

July 19, 1999 (Version 1.0) White Paper July 19, 1999 (Version 1.0) White Paper Summary This white paper gives an overview of ISDN modem technologies and how Xilinx high volume programmable devices can be used to implement complex system level

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network?

Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network? CS368: Exercise 5 Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network? a) Stop_and_Wait b) Go-Back-N c) Selective-Repeat Q23-6.

More information

The TCP/IP Architecture. Jean Yves Le Boudec 2017

The TCP/IP Architecture. Jean Yves Le Boudec 2017 The TCP/IP Architecture Jean Yves Le Boudec 2017 Objective Understand Layered Model of Communication Systems Know what MAC, IP addresses and DNS names are Textbook Chapter 2: Introduction of edition 1

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

The TCP/IP Architecture Jean Yves Le Boudec 2014

The TCP/IP Architecture Jean Yves Le Boudec 2014 The TCP/IP Architecture Jean Yves Le Boudec 2014 Objective Understand Layered Model of Communication Systems Know what MAC, IP addresses and DNS names are Chapter 2: Introduction Textbook 2 TCP/IP is a

More information

The TCP/IP Architecture Jean Yves Le Boudec 2014

The TCP/IP Architecture Jean Yves Le Boudec 2014 The TCP/IP Architecture Jean Yves Le Boudec 2014 Objective Understand Layered Model of Communication Systems Know what MAC, IP addresses and DNS names are Chapter 2: Introduction Textbook 2 TCP/IP is a

More information

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8] Code No: RR410402 Set No. 1 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) With a neat diagram, explain the functionality of layers, protocols

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

ELC 537 Communication Networks

ELC 537 Communication Networks Modern Academy for Engineering and Technology Electronics Engineering and Communication Technology Dpt. ELC 537 Communication Networks Prepared by: Dr. Nelly Muhammad Hussein Sections & Objectives Principles

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information