CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Similar documents
ET4254 Communications and Networking 1

Chapter 15 Local Area Network Overview

Chapter 11 in Stallings 10 th Edition

Local Area Network Overview

CH : 15 LOCAL AREA NETWORK OVERVIEW

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Data and Computer Communications

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Data and Computer Communications. Chapter 11 Local Area Network

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

LAN Overview (part 2) Interconnecting LANs - Hubs

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 6 Connecting Device

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Ethernet. Introduction. CSE 3213 Fall 2011

LAN PROTOCOLS. Beulah A AP/CSE

Introduction to LAN Protocols

Introduction to LAN Protocols

CS343: Data Communication LAN Overview

Part3. Local Area Networks (LAN)

! High Data Rates (0.1 Mbps to 10 Gbps)! Short Distances (0.1 to 40 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Communication and Networks. Problems

Lecture 05 Chapter 16 High Speed LANs

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

===================================================================== Exercises =====================================================================

LAN Systems. Bus topology LANs

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

LAN Systems. Bus topology LANs

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Chapter 9 & 12: Wired LAN

Data Link Layer, Part 3 Medium Access Control. Preface

Computer Networks. Wenzhong Li. Nanjing University

CONNECTION-ORIENTED & CONNECTIONLESS NETWORKS

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Data Link Control Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Flow control: Ensuring the source sending frames does not overflow the receiver

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

More on LANS. LAN Wiring, Interface

CCNA Exploration1 Chapter 7: OSI Data Link Layer

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

Principles behind data link layer services

Redes de Computadores. Medium Access Control

Fibre Channel: This standard provides a low-cost, easily scalable approach to achieving very high data rates in local areas.

EE 122: Ethernet and

Data Link Layer -2- Network Access

Direct Link Networks (II)

Data Link Layer, Part 5. Medium Access Control

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Computer Networks Principles LAN - Ethernet

CSMA/CD (Collision Detection)

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Different network topologies

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Data Link Layer -2- Network Access

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

IEEE 802 LANs SECTION C

COS 140: Foundations of Computer Science

The MAC Address Format

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

This Lecture. BUS Computer Facilities Network Management. Information Sharing. Local Area Network

Monash University SAMPLE EXAM. Faculty Of Information Technology. Computer Facilities and Network Management

CS610- Computer Network Solved Subjective From Midterm Papers

Link Layer and Ethernet

Link Layer and Ethernet

COS 140: Foundations of Computer Science

CPE 548 Exam #1 (50 pts) February 17, 2016

Multiple Access Protocols

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Principles behind data link layer services:

Principles behind data link layer services:

CS6551 COMPUTER NETWORKS QUESTION BANK UNIT 1 PART A

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

ECE 653: Computer Networks Mid Term Exam all

The flow of data must not be allowed to overwhelm the receiver

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Applied Networks & Security

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Outline: Connecting Many Computers

1: Review Of Semester Provide an overview of encapsulation.

ECE 4450:427/527 - Computer Networks Spring 2017

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Applied Networks & Security

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Transcription:

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks are used to interconnect large systems such as mainframes, supercomputers, and mass storage devices. The key requirement here is for bulk data transfer among a limited number of devices in a small area. High reliability is generally also a requirement. SAN: A SAN is a separate network to handle storage needs. The SAN detaches storage tasks from specific servers and creates a shared storage facility across a high-speed network. Backbone LAN: A backbone LAN is a high-capacity LAN used to interconnect a number of lower-capacity LANs. 15.3 Network topology refers to the way in which the end parts or stations attached to the network are interconnected. 15.4 Bus: all stations attach, through appropriate hardware interfacing known as a tap, directly to a linear transmission medium, or bus. Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the bus. A transmission from any station propagates the length of the medium in both directions and can be received by all other stations. At each end of the bus is a terminator, which absorbs any signal, removing it from the bus. Tree: a generalization of the bus topology. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point known as the headend. One or more cables start at the headend, and each of these may have branches. The branches in turn may have additional branches to allow quite complex layouts. Again, a transmission from any station propagates throughout the medium and can be received by all other stations. Ring: the network consists of a set of repeaters joined by point-to-point links in a closed loop. Each station attaches to the network at a repeater and can transmit data onto the network through the repeater. Star: each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for transmission and one for reception. 15.5 To develop LAN standards.

15.6 No single technical approach will satisfy all requirements. Requirements with respect to cost, data rate, and range dictate a variety of technical alternatives. 15.7 Unacknowledged connectionless service: This service is a datagram-style service. It is a very simple service that does not involve any of the flow- and error-control mechanisms. Thus, the delivery of data is not guaranteed. Connection-mode service: This service is similar to that offered by HDLC. A logical connection is set up between two users exchanging data, and flow control and error control are provided. Acknowledged connectionless service: This is a cross between the previous two services. It provides that datagrams are to be acknowledged, but no prior logical connection is set up. 15.8 Type 1 operation supports unacknowledged connectionless service. There is no acknowledgment, flow control, or error control. Type 2 operation supports connection-mode service, using mechanisms similar to HDLC. Type 3 operation supports acknowledged connectionless service. Each transmitted PDU is acknowledged using a stop-and-wait technique. 15.9 (1) On transmission, assemble data into a frame with address and errordetection fields. (2) On reception, disassemble frame, and perform address recognition and error detection. (3) Govern access to the LAN transmission medium. 15.10 For a bridge that connects LANs A and B: (1) Read all frames transmitted on A and accept those addressed to any station on B. (2) Using the medium access control protocol for B, retransmit each frame on B. (3) Do the same for B-to-A traffic. 15.11 For any connected graph, consisting of nodes and edges connecting pairs of nodes, there is a spanning tree of edges that maintains the connectivity of the graph but contains no closed loops. 15.12 With a hub, only one attached station may transmit at a time. A switch can accommodate multiple simultaneous transmissions. 15.13 Store-and-forward switch: The layer 2 switch accepts a frame on an input line, buffers it briefly, and then routes it to the appropriate output line. Cut-through switch: The layer 2 switch takes advantage of the fact that the destination address appears at the beginning of the MAC (medium access control) frame. The layer 2 switch begins repeating the incoming frame onto the appropriate output line as soon as the layer 2 switch recognizes the destination address.

ANSWERS TO PROBLEMS 15.3 a. T = (8 106 bits)/(64 103 bps) = 125 seconds b. Transfer consists of a sequence of cycles. One cycle consists of: Data Packet = Data Packet Transmission Time + Propagation Time ACK Packet = ACK Packet Transmission Time + Propagation Time Define: C = Cycle time Q = data bits per packet T = total time required T d = Data Packet Transmit Time T a = ACK Packet Transmit Time T p = Propagation Time Then T p T a T d T = (D)/(200 106m/sec) = (88 bits)/(b bps) = (P bits)/(b bps) = (8 106 bits C sec/cycle)/(q bits/cycle) C = T a + T d + 2T p Q = P - 80 b1 C = (88)/(106) + (256)/(106) + (2 103)/(200 106) = 354 10-6 Q = 176 T = (8 106 354 10-6)/(176) = 16 sec b2 C = (88)/(10 106) + (256)/(10 106) + (2 103)/(200 106) = 44.4 10-6 Q = 176 T = (8 106 44.4 10-6)/(176) = 2 sec b3 C = (88)/(106) + (256)/(106) + (2 104)/(200 106) = 444 10-6 Q = 176 T = (8 106 444 10-6)/(176) = 20 sec

b4 C = (80)/(50 106) + (104)/(50 106) + (2 103)/(200 106) = 211.6 10-6 Q = 9,920 T = (8 106 211.6 10-6)/(9920) = 0.17 seconds c. Define Tr = Then Total repeater Delay = N/B C = Td + 2Tp + Tr Q = P - 80 T = (8 106 C)/(Q) We show results for N = 100 c1 C= (256)/(106) + (2 103)/(200 106) + (100)/(106) = 366 10-6 T = (8 106 366 10-6)/(176) = 16.6 sec c2 C = (256)/(10 106) + (2 103)/(200 106) + (100)/(10 106) = 45.6 10-6 T = ( 8 106 45.6 10-6)/(176) = 2.1 sec c3 C = (256)/(106) + (2 104)/(200 10-6) + (100)/(106) = 456 10-6 T = (8 106 456 10-6)/(176) = 20.7 sec c4 C = (104)/(50 106) + (2 103)/(200 106) + (100)/(50 106) = 212 10-6 T = (8 106 212 10-6)/(9920) = 0.17 sec

15.4 a. Assume a mean distance between stations of 0.375 km. This is an approximation based on the following observation. For a station on one end, the average distance to any other station is 0.5 km. For a station in the center, the average distance is 0.25 km. With this assumption, the time to send equals transmission time plus propagation time. b. 15.5 a. Again, assume a mean distance between stations of 0.375 km. b.

CHAPTER 16 HIGH-SPEED LANS ANSWERS TO QUESTIONS 16.1 A collection of multiple, centralized servers. 16.2 Nonpersistent: If the medium is idle, transmit; if the medium is busy, wait an amount of time drawn from a probability distribution and then check the medium. 1-persistent: If the medium is idle, transmit; if the medium is busy continue to listen until the channel is sensed idle; then transmit immediately. p-persistent: If the medium is idle, transmit with probability p, and delay one time unit with probability (1 p); if the medium is busy, continue to listen until the channel is idle and repeat. 16.3 Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to the medium to try to see if another transmission is in progress. If the medium appears idle, the station transmits. If a collision occurs, the workstations wait a random amount of time before trying again. 16.4 A station will attempt to transmit repeatedly in the face of repeated collisions. For the first 10 retransmission attempts, the mean value of the random delay is doubled. This mean value then remains the same for 6 additional attempts. After 16 unsuccessful attempts, the station gives up and reports an error. 16.5 Shielded twisted pair, high quality unshielded twisted pair (Category 5), relatively low quality unshielded twisted pair (Category 3) and optical fiber are transmission medium options for Fast Ethernet. 16.6 Fast Ethernet differs from 10BASE-T in two important ways. Two physical links are used between nodes -- one for transmitting, one for receiving (four links are used for Fast Ethernet using lower quality unshielded twisted pair (Category 3)). A different coding scheme 4B/5B-NRZI is used rather than Manchester Coding. 16.7 With full-duplex operation, a station can transmit and receive simultaneously.

ANSWERS TO PROBLEMS 16.3 Define PF i = Pr[fail on attempt i] P i = Pr[fail on first (i 1) attempts, succeed on i th] Then, the mean number of retransmission attempts before one station successfully retransmits is given by: For two stations: PF i = 1/2 K where K = MIN[i, 10] PF 1 = 0.5 P 1 = 0.5 PF 2 = 0.25 P 2 = 0.375 PF 3 = 0.125 P 3 = 0.109 PF 4 = 0.0625 P 4 = 0.015 The remaining terms are negligible E[retransmissions] = 1.637

CHAPTER 7 DATA LINK CONTROL PROTOCOLS ANSWERS TO QUESTIONS 7.2 The function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity. 7.3 A flow control protocol in which the sender transmits a block of data and then awaits an acknowledgment before transmitting the next block. 7.4 (1) The buffer size of the receiver may be limited. (2) The longer the transmission, the more likely that there will be an error, necessitating retransmission of the entire frame. With smaller frames, errors are detected sooner, and a smaller amount of data needs to be retransmitted. (3) On a shared medium, such as a LAN, it is usually desirable not to permit one station to occupy the medium for an extended period, thus causing long delays at the other sending stations. 7.5 A method of flow control in which a transmitting station may send numbered packets within a window of numbers. The window changes dynamically to allow additional packets to be sent. 7.6 The stop & wait approach requires acknowledgments after each frame. The sliding window flow control technique can send multiple frames before waiting for an acknowledgment. Efficiency can be greatly improved by allowing multiple frames to be in transit at the same time. 7.7 The inclusion of an acknowledgment to a previously received packet in an outgoing data packet. 7.8 Error control refers to mechanisms to detect and correct errors that occur in the transmission of frames. 7.9 Error detection; positive acknowledgment; retransmission after timeout; negative acknowledgment. 7.10 A feature that automatically initiates a request for retransmission when an error in transmission is detected.

7.11 Stop-and-wait ARQ: Based on stop-and-wait flow control. A station retransmits on receipt of a duplicate acknowledgment or as a result of a timeout. Go-back-N ARQ: Based on sliding-window flow control. When an error is detected, the frame in question is retransmitted, as well as all subsequent frames that have been previously transmitted. Selective-reject ARQ. Based on sliding-window flow control. When an error is detected, only the frame in question is retransmitted.