We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
GREED «20 Pm
<
co ]
PROBLEMS
1. tape at you have tse your St Hemant, Bemie ts earry abot of tite ran.
‘apes lateal of 2 Mask of brandy. (Wen your disk Gills up, you eitser Bat aa
cenergene).) These tpes each canis Tei
where 18 knw. For wht range of distances sh
rave this a tanarkioa lite wba dats re Cexlading overhead) i 18D
ms yur ane earge HF) Bertie pee 1
capacity Iabebe i the uta ate eh ramon Tne edna
x6 isTRODUCTION cme.
2 Am altcatioe wy LAN is snply a tye tmeshanng sytem with terminals fo al
veers, Ge two alvantiges of a cleat server ster dure a AN.
3. The perfomance of chien seever assem is stly incre hy te mae ne:
sweet chunceriice the Bandwidth oF te network ht 1 NAW MARY Dee W ea
Aeanspth and the [leey has bow many secon takes the ist Bo Fe
fem the chem ithe server) Give an cumple ofa network that ett high a
‘width but abo high items. Thea give ancxale of one that has Soh Tow ban ith
ad bw latency
A. Beside bandh an Lateey, hat ether parameter is nace! to give a pd chars
‘eration f the quty of sence affeied Py a aeeeh ws! fh guzed Soe
Wale? it vidal?) inal amsactin Ualic
S.A fntor is the delay of stre-anforwund packet-iching ysten is hoa long
‘She ta cus und found pocket fyagh ach, IPexcag ime fe 1 pene ic
fs ely 0 Dea mje factor inthe reynome Ua centaerver sem where Be le
ent iin Now York al the server isin California? Astine the jrougatin ped kt
upper and bert be 23 We sped of Lattin vacuum
6 Achentservr system uses 3 lee etuuel, withthe stele a height 4
Am. Wha Ise Resteme delay espomsew BES?
t
Inthe ute whe everyone has heme termed connec wa compar nc,
Instant public vefeeasine on ingurtant pemling leptin vill become prec
[Uimatey, cust, ystatunes cv Pe clit te et the wal ef the peop Be
‘expmwal dvety. The ponive apeevel such dice! éemncrory are ily ob Ws
‘ducass some of the megane aspects
A. Five uate ate fo he sunt [ns rant yin subset Usineem each pair of
utes the desiery muy pul: hislspeed Ine, + medhur-speed ie. 3 oa'spced
neo 9 line. ITE takes TM) ent of enmptt dime ¥» generic and inspect ch
topetogy. how Tang Wi a ake Inspec ao He?
9 Addaleomuae of handcant aihoet i the eapacty ead when mahiple Ree at
temp access the channel atthe same ame. As 2 simpli exarple supe th
fief diva ina haceoe sts wth each ofthe a nt timing we the eh
‘el with peobuiy danny eich ein What faction ofthe eet wil be wasted he
Seaton?
10, What are jue reaunsfor using Layered pote? What
fusing aered poten?
AM, The president ofthe Specialy Paint Cop, gets the ea to work wih lal heer
bower» pradice an vst beer can (a8 ab ani-iter measure). The presient
her egal departmert lok toi end they im em ak engineering oe help Aw
SL the che’ eanieer calls is counterpart a the beewery to dacs the techie
‘spect f the prejct. The engincen then rept ck untbew rsperlive gal depart
‘es, which thea confer by telephone 16 umafge the legal wey, Filly, the Two
fepoeate presifentsdincuse the fnancll ve ofthe deal. What principle of « snl:
bSer protocol i the sense of the OS! me does tis commiticaicn recta
coe penile disadvantage
6 Bo T° f° Bp
Edit Annotate Fill&Sign Convert allcap. 1 PROBLEMS a7
12. Two networks each provide reliable connection-riented serylee, One of them offers
arelishle byte aiream and the otber offers a tellahle message siteum. Are these identl+
Ifso. why in the distinction made If not, give an example of bow tney differ.
ai when Jiscussing retwuvk peotacule? Give an etample
cal
1. What does"
14. In Fig. 1-19 0 service is shrwn. Ate any other servi
where? If nol, WhY noe?
1S. In some networks, the dats nk layer hundles transmission errars by requesting that
damaged frames he retransmitted. Ifthe probability of w frame's being damaged is p.
what is the mean nurnber af tranmivsions required Wo seed a frame? Assurne that
acknowledgements ure never lot
-potation”
plicit in this Figure? If 0,
16. Asystern has an r-layer protocol hierarchy, Apptisations generate messages of length
Mfbytes. At cach of the layers, an f-iyte beodkr is added, What fraction of the net-
andi i filled with Beaders?
17. What is the main difference between TCP and! UDP?
IB. The suboct of Fig. 1-281b) was designed (0 withtand a nuclear war. How many
bombs waruld # lake 4o partition the nes into two disconnected sets? Assume that
any bonh wipes out w node and all ofthe lanky crinnected ta it
19. The Internet is roughly sloubling in size every 18 moeths
te put the number of hosts on Hat 610 mithion In 2009. Use
these data ta compule the expected umber of Tateret hosts Inthe year 2018, Dv you
believe this? Explain why of why not
20, When a file ix transferred between to computers, (wu icknowledgement strategies
are possiNte. In the fis ane, the file és chopped up into packets, which are individu
ally acknowledged hy the receiver. but the [ile tanfer as a whole is ot ackow=
edged. In the second ome. the pockets are not acknowledged lnulvilually, but the ex-
tire file acknowledged hen itarrives. Discuss these tw appraches.
Mobile phone network operators need to know where thei sufweribers’ mobile phones
thence their wets) are lnculed. Explain why this Is had for users, Now give reasons
why this is god for users.
222, How loong was abit in the original 82.3 standard in meters Use a transmission speed
EID Mbps and assume the propagation speed in cue is 2/9 the spued of Hight in
vacwum,
23, An image is 1600 x 1200 piveh with 3 bytewpieel Avume the image is
uncompressed. How long dec Ii take transmit over a St-khps modem channel?
Over a F-MMbps cable modem? Over a MEMMps Ethernet? Over 1MbMtyps Ethernet?
(ver gigabit Ethernet?
24, Eihernet and wireless netwerks have some similarity und seme differences. One
roperty of Etheract ix that ely ine Frame at a time can be tramamitted on Ethernet
Does 802.11 share this prepety with Ethernet? Discuss your answer,
25, List wo advantages and twee disadvantages of having international standard for net-
work protocols
88 INTRODUCTION CHAP. 1
26, When a sysiem has a permanent prt an removable part (such 9s 3 CD-ROM drive
tnd the CD-ROM), itis important thst the system be stanearuized, so that different
jmpanies can make both the permanent anal removable parts aml everything. sil
works together. Give tree examples outs the computer industry where such inler-
s° B° T° mB pm
Edit Annotate Fill & Sign Convert All88 INTRODUCTION CHAP. 1
26, When a system has a permanent part and a removable part (such as a CD-ROM drive
and the CD-ROM), it is important that the system be standardized, so that different
companies ean muke both the permanem and removable pare and everything still
works together, Give three examples outside the computer industry where such inter
national wundarus exist. Now give three areus outside the computer industry where
they do mot exis
27. Suppose the algorithms used ta implement the operations at layer & is changed. How
does this impact operations at layers k= 1 and A +1
28. Suppose there isa change in the service (sel of uperations) provided by layer k, How
does this impact services at Layers kel and ke
29. Provide a list of reasons for
best-case delay,
MO, What are the disud vantages of using small, [xed-length cells in ATM?
3H. Make a list of activities that you do every day in which computer networks ate used.
How would your life be altered if these networks were suddenly switched aff?
32 Find out what networks are used at your schuvtl or place of work. Deserlhe the net
ork types. topulegicn, and awatching methnds used there.
the response time of a etient may be larger than the
33. The ping program allows you ts sendy test packet to a given locatlam and see bow
long it takes tv det there and back, Try using ring ty see how fong it takes tn get from
your locatin W several known locations, Fromm these data plot the one-way transit
time ever the Internet ay a function of distance. It is best w use universities since the
location of their servers is known very accurately. For example, berkefeueda is in
Berkeley, Callfurnia; mitedu ts in Cambrulge, Massachusers; sual is | An
The Netherlanils; wuw.usvoledhau is an Sydney, Australia: amd wy) ta
Cape Town, South Africa
3M. Goto IETF's Web
ec. enw ietfierg. tu see what they are dating
like and write 4 hall-page repent on the problem and the proposed sali
35, The Interne! is ace up of a large number of networks. Their arrany
the lopolagy uf the Iniernet. A considerable amount of informatie about the Internet
twpategy iy available on tine, Use a search engine to fied out more about the Intersiet
wpology an write a shit report summarizing your findings,
36. Search the Intcmet tu find out some of the imporuint peering points used for routing
packets in the Internet al present.
4
Write a program that mmptemenis message Maw from the top layer tthe bottom layer
mock! Your program should Include a separate protocol fune=
of headers are sequence up wi 64 characters, Bich protocel
hay te purumeters: a message passed from the higher layer protecol ta char
buffer) and the size of the message, This function attaches is header in front of the
mesuage, prints the now message on (he standard utp, and then invokes the protocol
function of the lower-layer protocol. Program input is an application message (a se~
quence of 80 characters oF bess),