Computer Networks. Homework 1 Due Date June 11, 2013
|
|
- Clement Davis
- 5 years ago
- Views:
Transcription
1 Computer Networks Homework 1 Due Date June 11, 2013 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached to the hub. Loop: each node connects to two other nodes to form a closed loop. Fully connected: Each node if directly connected to all other nodes 1. For each case above, give the average number of hops between stations. 2. Prove that for any fixed set of node locations, the minimum possible total length of a tree interconnecting all nodes is less than the minimum possible length of any ring interconnecting all nodes. Problem 1 Solution 1. The number of hops is one less than the number of nodes visited. For a star topology, the fixed number of hops is 2. For a loop topology, the furthest distance from a source node is situated at N/2 hops if the number of nodes in the loop is even, and at (N-1)/2 hops if the number of nodes in the loop is odd. o Even Case: Notice that there are 2 nodes located at i hops from the source, for 1<= i <= N/2-1, and only one node, the furthest from the source, located at hops from the source. Therefore, the average number of hops is: 2 (N 1) N 2! 1 i!1 i + N 2 = N 2 4(N 1) o Odd Case: In this case, there are exactly 2 nodes located at i hops from the source, for 1<= i <= (N - 1)/2. Therefore, the average number of hops is: 2 (N 1) N 2! 1 i!1 N + 1 i = 4 For a fully connected topology, each node is directly connected to all other nodes. Therefore, the number of hops is simply Since a tree is defined to be any geometry which interconnects all nodes so that there is a single path between any two nodes but not loops or circuits, a tree can be formed from any ring configuration by deleting one link. Thus, for any ring configuration of a fixed set of node
2 locations, a tree configuration, with shorter total length than the length of the ring, that interconnects all these nodes can be found by removing one link from the original ring. Problem 2 Two musicians located in two different cities are connected by a network that transmits the sound in a cable at the speed of light of 2.3 x 10 8 meters/second. The two musicians want to hear themselves playing music in real-time as if they were 10 meters apart of each other in the same room. Given that the speed of sound is approximately 330 meters/second, find the maximum possible distance between the musicians in order for them to interact in real-time. Problem 2 Solution The first step is to find the delay for the sound when the musicians are 10 meters apart: t 10 = 10/330 = milliseconds The maximum distance is the time required for a real-time 'experience' times the cable speed: Problem 3 d = (2.3 x 10 8 ) x (30.30 x 10-3 ) = 6,969,000 meters = 6969 kilometers The propagation delay is the time that is required for the energy of a signal to propagate from one point to another. a. Find the propagation delay for a signal traversing the following networks at the speed of light in cable (2.3 x 10 8 meters/second): A circuit board 10 cm A room 10 m A building 100 m A metropolitan area 100 km A continent 5000 km Up and down to a geostationary satellite 2 x km Solution a. To find the propagation delay, divide distance by the speed of light in cable. Thus we have: a circuit board t prop = x seconds a room t prop = x 10-8 seconds a building t prop = x 10-7 seconds a metropolitan area t prop = x 10-4 seconds a continent t prop = seconds up and down to a geostationary satellite t prop = seconds b. How many bits are in transit during the propagation delay in the above cases, if bits are entering the above networks at the following transmission speeds: 10,000 bits/second; 1 megabit/second; 100 megabits/second; 10 gigabits/second?
3 Solution The number of bits in transit is obtained by multiplying the transmission rate R by the propagation delay: Distance (m) 10 Kbps Gbps x x x x x x x10 9 Problem 4 Consider the following networks and assume that a signal traversing the following networks at the speed of light in cable (2.3 x 10 8 meters/second): A circuit board 10 cm A room 10 m A building 100 m A metropolitan area 100 km A continent 5000 km Up and down to a geostationary satellite 2 x km How long does it take to send an L-byte file and to receive a 1-byte acknowledgment back? Let L=1, 10 3, 10 6, and 10 9 bytes? Solution The total time required to send a file and receive an acknowledgment of its receipt is given by: t total = L message /R + L ack /R +2* t prop = L message /R + L ack /R + 2*d/c, where (1) L message is the message length in bits, L ack is the acknowledgment length in bits, R is the transmission bit rate, d is the distance traversed, and The parameter c is the speed of light. Equation (1) shows that there are two main factors that determine total delay: 1. Message and ACK transmission time, which depends on the message length and the transmission bit rate; 2. Propagation delay, which depends solely on distance. When the propagation delay is small, message and ACK transmission times determine the total delay. On the other hand, when the bit rate becomes very large, the propagation delay provides a delay component that cannot be reduced no matter how fast the transmission rate becomes. The tables below show the two main components of the total delay in microseconds.
4 Distance Table 1 Message Length = 1 Byte Distance Table 2 Message Length = 1000 Bytes
5 8.00E E Distance E E E E E E E E E E E E Table 3 Message Length = 10 6 Bytes Distance E E E E E E E E E E E E+06 Table 4 Message Length = 10 9 Bytes
6 Problem 5 Assume that writing a program of N lines of code costs N 2 units. If the program is written in a modular form, however, a module of m lines costs a 2 + m 2 to develop. The cost a 2 is caused by the need to follow the specifications of the modular construction. 1. Compute the number of modules, k, which minimizes the cost of writing a program of N lines assuming that each module has N/k lines? 2. For what value of N is it preferable to decompose a program of N lines into modules rather than to write it as a single program? Solution 5 1. Assume that the program can be decomposed into k modules where the size of each module N/k lines. The cost of writing these modules is: C k = k a 2 + N K 2 = ka 2 + N2 k 2. Note that the function C(k) increases to infinity for k going to zero and for k going to infinity. Thus, we expect that there is a minimum value. To find the value of k that corresponds to that minimum, we calculate the derivative of C(k) with respect to k and we set it to zero. This gives: dc(k) dk = a2 - N2 = 0 k2 k = N a C k = N a a2 + N2 N a = 2Na We can find the values of N such as C * < N 2 (i.e, it is preferable to decompose the program into modules). This is the case when 2Na < N 2, i.e., N > 2a.
NETWORK PROBLEM SET Due Date 6/28/2014
NETWORK PROBLEM SET Due Date 6/28/2014 Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: Star: one central node (hub) and all other nodes are attached to the
More informationNETWORK PROBLEM SET Solution
NETWORK PROBLEM SET Solution Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: 1. For a packet-switched network of N nodes, the number of hops is one less than
More informationTYPES OF COMPUTER NETWORKS
TYPES OF COMPUTER NETWORKS What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.
More informationIntroduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.
Introduction The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block Diagram Intro-1
More informationCPSC 441 Tutorial-1. Department of Computer Science University of Calgary
CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the
More informationProblem-1: Solution-1:
Problem-1: olution-1: Tollbooths are 75 km apart, and the cars propagate at 100km/hr. A tollbooth services a car at a rate of one car every 12 seconds. a) There are ten cars. It takes seconds, or 2 minutes,
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationCOM-208: Computer Networks - Homework 1
COM-208: Computer Networks - Homework 1 1. Design an application-level protocol to be used between an TM (automatic teller machine) and a bank s centralized server. The protocol should allow: verifying
More informationPRACTICE QUESTIONS ON RESOURCE ALLOCATION
PRACTICE QUESTIONS ON RESOURCE ALLOCATION QUESTION : Internet Versus Station Wagon A famous maxim, sometimes attributed to Dennis Ritchie, says Never underestimate the bandwidth of a station wagon full
More informationIntroductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36
Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network
More information70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET
70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded?
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationRead Chapter 1 of Kurose-Ross
CSE 422 Notes, Set 1 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5 th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationQUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 QUESTION 5 QUESTION 6
QUESTION 1 Three packet-switching networks each contain 8 nodes, A - H. The first network has a star topology with a central switch; the second is a (bidirectional) ring; and the third is a fully interconnected
More informationChapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.
Chapter 6 Local Area Networks and Media Access Control School of Info. Sci. & Eng. Shandong Univ. 6.1 MULTIPLE ACCESS COMMUNICATIONS FIGURE 6.1 Multiple access communications FIGURE 6.2 Approaches to sharing
More information12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers 12.3 Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter 12-1 RANDOM ACCESS 12.4 In random access
More informationWhy Your Application only Uses 10Mbps Even the Link is 1Gbps?
Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Contents Introduction Background Information Overview of the Issue Bandwidth-Delay Product Verify Solution How to Tell Round Trip Time (RTT)
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationChapter 8 Communications and Networks
Chapter 8 Communications and Networks Today Group work Review the 6 parts of the IT model Communications and networks Discussion Think about it Imagine a traveling business person. This person s company
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationHomework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below:
Homework 1 50 points Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth
More informationComputer Networks and Internet
Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data
More informationCHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS
CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks
More information8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks
8. Networks Why networked embedded systems General network architecture ISO seven network layers Networks I 2 C, CAN, Ethernet Internet-enabled embedded systems Sensor networks Computers as Components
More informationIntroduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationIntroduction to Networks
Introduction to Networks Network Topology How we interconnect network users Network Hierarchy The connection between network topology and geographical size Telecommunication (Phone Networks) Circuit Switching
More informationData Communication & Computer Networks INFO
Data Communication & Computer Networks INFO Instructor: Dr. A. SARI Department: Management Information Systems Course Code: MIS 305 Academic Term: 2013/2014 Fall Title: Data Communication & Computer Networks
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More informationWide Area Networks (WANs) Slide Set 6
Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals
More informationDifferent network topologies
Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical
More informationReview of Network Technologies
Indian Institute of Technology Kharagpur Review of Network Technologies Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 2: Review of network technologies On completion,
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationKIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B
KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationUNIVERSITI TUN HUSSEIN ONN MALAYSIA FINAL EXAMINATION SEMESTER I SESSION 2009/10
UNIVERSITI TUN HUSSEIN ONN MALAYSIA FINAL EXAMINATION SEMESTER I SESSION 2009/10 SUBJECT NAME SUBJECT CODE COURSE DATA COMMUNICATION BEP4223 4BEE EXAMINATION DATE NOVEMBER 2009 DURATION INSTRUCTION 3 HOURS
More information1 Q1. Attempt any THREE 09 1 Give the difference between Human Network and
Sanjivani Rural Education Society s CLASS-TEST-I YEAR:- 2015-16 SANJIVANI K.B.P.POLYTECHNIC, KOPARGAON Model Answer Sub:- Computer Network Sub. Code:- 17429 Class :- Div:- A & B SYCM Dept. :- Computer
More informationIntroduction to Networks
Introduction to Networks CAN1103 Slide Set 1 Rishi Heerasing SOBISE 1 Learning Objectives Define and identify the different types of networks Describe the history of LANs and WANs Discuss LAN and WAN integration,
More informationBrief Summary of the Chapter: CHAPTER 1 NETWORKING AND OPEN STANDARDS In this chapter we are going to study about computer Networks, associated terminology and related concept along with network devices.
More informationLesson 1: Network Communications
Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationDATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network
87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;
More informationLecture 6: Example LAN: Ethernet
Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks
More informationDiscussion Chapter#1
The Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4314: Data Communication Instructor: Dr. Aiman Abu Samra T.A.: Eng. Alaa O. Shama Discussion Chapter#1 Main
More informationProblem Session Encode:
Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 17, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM30 - Computer Networking
More informationA Study of Protection Switching: Wrapping or Steering
Study of Protection Switching: Wrapping or Steering Jason Fan Luminous Networks, Inc. March 2001, IEEE 802.17 Luminous Networks/Jason Fan 1 Wrapped Protection Wrapped protection is analogous to LSR Wrapping
More informationTypes of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN
Types of Computer and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area ) 1 MAN (Metropolitan Area ) 2 WAN (Wide Area ) 3 Problems to be discussed when presenting
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationUNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012
Student Number: UNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012 ECE 361 Computer Networks This test is Closed Book 75 Minutes Examiner: A. Leon-Garcia Question Mark
More informationTypes of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11
Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single
More informationLocal Area Network(LAN)
Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building
More informationNetwork Working Group Request for Comments: 1434 IBM March Data Link Switching: Switch-to-Switch Protocol
Network Working Group Request for Comments: 1434 R. Dixon D. Kushi IBM March 1993 Status of this Memo Data Link Switching: Switch-to-Switch Protocol This memo provides information for the Internet community.
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction
More informationLAN Overview (part 2) Interconnecting LANs - Hubs
LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationComputer Communication Networks Lecture No. 1
Computer Communication Networks Lecture No. 1 Reference books used in lectures 1- Computer Networks, Tanenbaum 2- Communication networks, Sharam Hekmat 3- Computer Networks, a system approach, L. Peterson
More informationBasics of datacommunication
Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into
More informationQuestion Points Score total 100
CS457: Computer Networking Date: 3/21/2008 Name: Instructions: 1. Be sure that you have 8 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationSource-Route Bridging
25 CHAPTER Chapter Goals Describe when to use source-route bridging. Understand the difference between SRB and transparent bridging. Know the mechanism that end stations use to specify a source-route.
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationECE/CSC 570 Section 001. Final test. December 11, 2006
ECE/CSC 570 Section 001 Final test December 11, 2006 Questions 1 10 each carry 2 marks. Answer only by placing a check mark to indicate whether the statement is true of false in the appropriate box, and
More informationIntroduction to Computer Science (I1100) Networks. Chapter 6
Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and
More informationReview For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University
School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationComputer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1
Computer Networks Chapter 12 Topics: Communication links LAN / WAN Internet / WWW CMPUT101 Introduction to Computing (c) Yngvi Bjornsson 1 Computer Networks A computer network is a set of independent computer
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes
CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between
More informationCSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58
CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion
More informationMidterm Exam CSCE 232: Computer Networks Fall Instructions:
Midterm Exam CSCE 232: Computer Networks Fall 2007 Last Name: First Name: Student ID: Instructions: 1. This is a close-book and close-notes exam. 2. There are seven questions in total. The number of points
More informationCCM 4300 Lecture 2 Computer Networks: Wireless and Mobile Communication Systems. Dr Shahedur Rahman School of Science and Technology
CCM 4300 Lecture 2 Computer Networks: Wireless and Mobile Communication Systems Dr Shahedur Rahman School of Science and Technology 1 Recap of Last Session defined a computer network and identified some
More informationCSE 1 23: Computer Networks
CSE 1 23: Computer Networks Total Points: 47.5 Homework 2 Out: 10/18, Due: 10/25 1. The Sliding Window Protocol Assume that the sender s window size is 3. If we have to send 10 frames in total, and the
More informationModule 11 - Fiber Optic Networks and the Internet
Module 11 - Fiber Optic Networks and the Internet Dr. Alan Kost Associate Research Professor Of Sciences, University Of Arizona Dr. Alan Kost is an Associate Research Professor of Sciences in the University
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More information2IC10 Computer Networks Assignments week 4
2IC10 Computer Networks Assignments week 4 Mark van Eijk, s448073 Bas Kloet, s461462 Physical Layer 1 Question What is the most used physical medium nowadays? Why? Does that specific medium have the best
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationCopyright of the University of East Anglia Version 1
UNIVERSITY OF EAST ANGLIA School of Computing Sciences Main Series Examination 2015-16 NETWORKS CMP-5037B/CMP-6009B Time allowed: 2 hours Answer any THREE questions. Notes are not permitted in this examination.
More informationHomework Set 3 Due Thursday, 07/14
Homework Set 3 Due Thursday, 07/14 Problem 1 A room contains two parallel wall mirrors, on opposite walls 5 meters apart. The mirrors are 8 meters long. Suppose that one person stands in a doorway, in
More informationChapter 9 Introduction to Networks
Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationCMSC 611: Advanced. Interconnection Networks
CMSC 611: Advanced Computer Architecture Interconnection Networks Interconnection Networks Massively parallel processor networks (MPP) Thousands of nodes Short distance (
More informationExtending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10
Extending the LAN Info 341 Networking and Distributed Applications Context Building up the network Media NIC Application How to hook things together Transport Internetwork Network Access Physical Internet
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A
KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationINTRODUCTORY COMPUTER NETWORKS PHYSICAL LAYER, DIGITAL TRANSMISSION FUNDAMENTALS. Faramarz Hendessi
INTRODUCTORY COMPUTER NETWORKS PHYSICAL LAYER, DIGITAL TRANSMISSION FUNDAMENTALS Faramarz Hendessi Introductory Computer Networks Lecture 5 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi
More informationComputer Networks. Homework #4: No Grading
Computer Networks Homework #4: No Grading Problem #1. Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would
More informationTelematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute
More informationOutline. EEC-682/782 Computer Networks I. Course Objectives. Outline of Lectures
Outline EEC-682/782 Computer Networks I Lecture 1 Wenbing Zhao w.zhao1@csuohio.edu (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Syllabus Introduction to
More informationLenuţa Alboaie Computer Networks
Concepts and fundamental notions Lenuţa Alboaie adria@info.uaic.ro 1 Content Concepts Definitions Computer networks necessity and use Classification Topologies Components Hardware & Software Aspects 2
More informationCOMPONENTS OF DATA COMMUNICATION
COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.
More informationLecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996
Lecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996 RHK.S96 1 Review: ABCs of Networks Starting Point: Send bits between 2 computers Queue
More information