Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Similar documents
Monash University SAMPLE EXAM. Faculty Of Information Technology. Computer Facilities and Network Management

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Module 10 Frame Relay and ATM

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

Chapter 10. Circuits Switching and Packet Switching 10-1

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

BROADBAND AND HIGH SPEED NETWORKS

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Bandwidth-on-Demand up to very high speeds. Variety of physical layers using optical fibre, copper, wireless. 3BA33 D.Lewis

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

UNIT - IV Ques.4 Ques.5

ATM Technology in Detail. Objectives. Presentation Outline

Ethernet Switches (more)

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

1. Data Link Layer (Layer 2)

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CS 4453 Computer Networks Winter

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer


ATM Logical Connections: VCC. ATM Logical Connections: VPC

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

Principles behind data link layer services:

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

DCN Questions CHAPTER 1:- NETWORKING FUNDAMENTALS

QUESTION BANK EVEN SEMESTER

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Module 3. Wide Area Networking (WAN)

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

1. Data Link Layer Protocols

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

Faculty of Science Final Examination. Computer Science B Basics of Computer Networks

CS603 TCP/IP Technology. Protocols and standards OSI model TCP / IP protocol suite addressing versions underlying technologies.

Chapter 8 OSI Physical Layer

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)

Chapter 15 Computer and Multimedia Networks

Chapter 3 Packet Switching

Data Link Layer, Part 3 Medium Access Control. Preface

TIME SCHEDULE. 2 Physical Layer 15. Course General Outcomes: Sl. G.O On completion of this course the student will be able :

Communication Networks

CS610- Computer Network Solved Subjective From Midterm Papers

Asynchronous Transfer Mode

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Wireless Networks. Communication Networks

Layer 2 functionality bridging and switching

CCNA Guide to Cisco Networking, Third Edition

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

CS1302 / Computer Networks

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Computer Networks (Introduction to TCP/IP Protocols)

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Local Area Network Overview

Links. CS125 - mylinks 1 1/22/14

Outline: Connecting Many Computers

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Data Communication and Network. Introducing Networks

Packet Switching Techniques

Part3. Local Area Networks (LAN)

Defining Networks with the OSI Model. Module 2

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking

ECE 653: Computer Networks Mid Term Exam all

Ch. 4 - WAN, Wide Area Networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Module 10 Frame Relay and ATM

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

TERM EXAMS CS610- COMPUTER NETWORKS

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

CS6551 COMPUTER NETWORKS QUESTION BANK UNIT 1 PART A

Data Communications SYLLABUS. Transmission Impairments, Transmission Media. Data-Digital Signals, Analog Data-analog Signals.

Data Communication & Computer Networks MCQ S

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Data and Computer Communications

DigiPoints Volume 1. Leader Guide. Module 12 Asynchronous Transfer Mode. Summary. Outcomes. Objectives. Prerequisites

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Lecture 05 Chapter 16 High Speed LANs

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

CHAPTER -1. Introduction to Computer Networks

ITEC 3800 Data Communication and Network. Introducing Networks

Transcription:

Computer Facilities and Network Management BUS3150 Tutorial - Week 13 *** FOR TUTORS ONLY *** The answers provided here are only brief guides. If you have any comments or suggestions for improvement to this, please let me know so that your improvements may be included in this document. Objective of this tutorial: The objective of this tutorial is to strengthen the conceptual understanding of the material covered in the lecture by reflecting on the material in small groups. The tutor will provide feedback to enhance your understanding and diminish misunderstandings, if any. How to participate in the tutorial: Form groups of four to five students in each and discuss the answers for the following reflective questions with the group members. After spending about ten minutes for each question, discussing with group members, discuss your solutions with the tutor and other groups. The tutor will provide feedback on your solutions. Question 1 - Why do Frame Relay networks use bandwidth more efficiently than X.25? X.25 implements flow and error control between each node in the network. This creates a significant overhead, however it is acceptable for physical links with a high probability of bit error. Frame Relay works with more modern and reliable physical links and therefore does not implement hop-by-hop flow and error control. This reduces overhead and improves bandwidth efficiency. Question 2 - Name the ATM layers defined by the ITU-T standard and briefly explain their function. ATM Adaption Layer (AAL): accepts transmissions from upper-layer services and maps them into ATM cells. The two parts are the Convergence Sublayer (CS) and the Segmentation and Reassembly (SAR) Sublayer. ATM Layer: provides routing, traffic management, switching, and multiplexing services. Physical Layer: cell delineation, bit timing and the physical medium. Question 3 - What is the difference between a Virtual Channel and a Virtual Path within an ATM network? An individual logical connection in ATM is referred to as VCC (Virtual Channel Connection) and a group of VCCs that have the same end points is called a Virtual Path Connection (VPC). A VPC must be established to the required destination node before a VCC. The VPC must have sufficient capacity to support a VCC to the negotiated quality of service.

Question 4 - What is the function of the VCI and VPI in an ATM cell header? VCI is a Virtual Channel Identifier and VPI is a Virtual Path Identifier. A sequence of VCIs and VPIs in each switch define a VCC and VPC (respectively) through the network. These identifiers are local to each physical connection between two network elements. Therefore the value of the VCI and VPI change as a cell travels from node to node through these physical links in the network. Question 5 - What is the purpose of Header Error Control (HEC) in an ATM cell? The primary function of the HEC is to check that there are no bit errors in the ATM cells header. For example, if there is a bit error in the VCI or VPI, the cell would not reach its destination and may be routed along an incorrect path through the network. Bit errors in the cells playload (i.e. user data) are dealt with by the end systems, typically in the AAL layer. A secondary function of the HEC is cell boundary synchronisation. On a cell based physical layer, there is a requirement to find the start of a cell. This may be achieved by evaluating a checksum over 4 octets (32 bits) and comparing it with the fifth octet (the HEC) to see if it matches. If it does match for a number of consecutive cells (i.e. not a freak occurrence), then we may be confident we have found the cell boundary. If it does not match, we can advance one bit interval and try again until we find the match. Question 6 - What are the different types of ATM services? See Week 12 lecture notes slides 31 to 34 inclusive. Also look at AAL. Also covered during this tutorial is selected multiple choice questions from the sample exam. In order to maximise your use of this tutorial, please attempt all multiple choice questions from the sample exam.

Solutions to the sample exam multiple choice questions. 1. The layer of the OSI model can use the trailer of the frame for error detection. (a) physical (b) data link (c) transport (d) presentation 2. When data are transmitted from device A to device B, the header from A s layer 4 is read by B s layer. (a) physical (b) transport (c) application 3. In the OSI model, as a data packet moves from the lower to the upper layers, headers are. (a) added (b) removed (c) rearranged (d) modified 4. In a connection, more than two devices can share a single link. (a) point-to-point (b) multipoint (c) primary (d) secondary 5. In transmission, the channel capacity is shared by both communicating devices at all times. (a) simplex (b) half-duplex (c) full-duplex (d) half-simplex 6. When one of the components of a signal has a frequency of zero, the average amplitude of the signal. (a) is greater than zero (b) is less than zero (c) is zero (d) a or b

7. What is the bandwidth of a signal that ranges from 1 MHz to 4 MHz? (a) 4 MHz (b) 1 KHz (c) 3 MHz 8. The of a composite signal is the difference between the highest and the lowest frequencies contained in that signal. (a) frequency (b) period (c) bandwidth (d) amplitude 9. PCM is an example of conversion. (a) digital-to-digital (b) digital-to-analog (c) analog-to-analog (d) analog-to-digital 10. The outer metallic sheath in coaxial cable functions as. (a) a connector (b) a second conductor (c) a shield against noise (d) b and c 11. In an optical fiber, the inner core is the cladding (a) more dense than (b) less dense than (c) the same density as (d) another name for 12. Manchester and differential Manchester encoding are both types of encoding. (a) unipolar (b) NRZ (c) biphase (d) bipolar 13. The minimum bandwidth of Manchester and differential Manchester is that of NRZ. (a) the same as (b) twice (c) thrice

14. The data rate is sometimes called the rate. (a) baud (b) bit (c) signal 15. addresses on headers change as a packet moves from network to network but the addresses do not. (a) Logical; port (b) Logical; network (c) Logical; physical (d) Physical; logical 16. A simple parity-check code can detect errors. (a) an even-number of (b) two (c) no errors (d) an odd-number of 17. Which of the following would not be found in a data message in a bit stuffed protocol like HDLC? (a) 1010101010 (b) 01111110101 (c) 0000000111 (d) 111000011110000 18. In the Protocol, if no acknowledgment for a frame has arrived, we resend all outstanding frames. (a) Stop-and-Wait ARQ (b) Go-Back-N ARQ (c) Selective-Repeat ARQ 19. augments the CSMA algorithm to detect collision. (a) CSMA/CA (b) CSMA/CD (c) either (a) or (b) (d) both (a) and (b) 20. In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK to the sender. (a) 5 (b) 6 (c) 7 (d) any of the above

21. In Stop-and-Wait ARQ, for n information frames sent by the transmitter, the receiver must also respond with the following number of acknowledgements: (a) n (b) 2n (c) n - 1 (d) n + 1 22. The IEEE 802.3 Standard defines CSMA/CD as the access method for firstgeneration 10-Mbps Ethernet. (a) 1-persistent (b) p-persistent (c) non-persistent 23. The layer of Ethernet consists of the LLC sublayer and the MAC sublayer. (a) data link (b) physical (c) network 24. uses four twisted-pair cables that connect each station to a common hub. (a) 10Base5 (b) 10Base2 (c) 10Base-T (d) 10Base-F 25. The IEEE 802.11 standard for wireless LANs defines two services: and. (a) BSS; ASS (b) ESS; SSS (c) BSS; ESS (d) BSS; DCF 26. For SNMP, defines the general rules for naming objects, defining object types, and showing how to encode objects and values. (a) MIB (b) BER (c) SMI 27. IP is datagram protocol. (a) an unreliable (b) a connectionless (c) both a and b

28. The term means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees. (a) reliable delivery (b) connection-oriented delivery (c) best-effort delivery 29. In ATM, a virtual connection is defined by. (a) VPI (b) VCI (c) DLCI (d) a combination of (a) and (b) 30. In ATM, connection between two endpoints is accomplished through. (a) TPs (b) VPs (c) VCs (d) all of the above