0% found this document useful (0 votes)
2 views

Module1

The document discusses the importance of standards for protocols, lists various access technologies, and compares popular wireless Internet access technologies like Wi-Fi and cellular networks. It also covers the design of an application-level protocol for ATM transactions, the appropriateness of packet-switched vs circuit-switched networks, and calculations related to data transmission delays and bandwidth-delay products. Additionally, it evaluates the efficiency of data transfer methods for large data volumes and provides insights into the width of a bit in a network link.

Uploaded by

sakurahemi18
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Module1

The document discusses the importance of standards for protocols, lists various access technologies, and compares popular wireless Internet access technologies like Wi-Fi and cellular networks. It also covers the design of an application-level protocol for ATM transactions, the appropriateness of packet-switched vs circuit-switched networks, and calculations related to data transmission delays and bandwidth-delay products. Additionally, it evaluates the efficiency of data transfer methods for large data volumes and provides insights into the width of a bit in a network link.

Uploaded by

sakurahemi18
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Ques ons for the exercises:

1. Why are standards important for protocols? [R3]

Standards are important for protocols they provide a common language and
framework that enables interoperability, compa bility, scalability, and security while
facilita ng easier development and regulatory compliance. They are the building
blocks that enable diverse technologies and systems to work together effec vely in
our interconnected world.

2. List six access technologies. Classify each one as home access, enterprise access, or
wide-area wireless access. [R4]
1. Cable internet: home
2. Digital Subscriber Line (DSL): home
3. Ethernet (100 Mbps to 10Gbps): enterprise

4. Wireless LAN (known as Wifi): home and enterprise


5. LTE 4G: wide-area wireless.
6. 5G: wide-area wireless.

3. Describe the most popular wireless Internet access technologies today. Compare and
contrast them. [R10]
There are two popular wireless Internet access technologies today: Wi-Fi and Cellular
Data Networks (4G LTE / 5G).

Wi-Fi 4G LTE / 5G
Usage Commonly used for local wireless
Are designed for wide-area wireless
internet access within a limited area
internet access and mobile
(homes, offices, coffee shops, etc.). It
communica on. Usable large
is designed for short-range
geographical areas.
connec ons.
Speed Depending on the Wi-Fi standard and
the specific router and devices in use. Offer high-speed data
Can provide high-speed connec ons
Coverage Limited coverage Extensive coverage
Cost Provided as part of an internet Offered by mobile service providers,
service package for homes or users pay for data usage as part of
businesses. In public spaces, Wi-Fi their mobile phone plans. Costs can
may be free or require a fee or login vary depending on data limits and
creden als. network speeds.
Security Cellular networks tend to be more secure due to encryp on and
authen ca on measures.
4. Design and describe an applica on-level protocol to be used between an automa c
teller machine and a bank’s centralized computer. Your protocol should allow a user’s
card and password to be verified, the account balance (which is maintained at the
centralized computer) to be queried, and an account withdrawal to be made (that is,
money disbursed to the user). Your protocol en es should be able to handle the all-
too-common case in which there is not enough money in the account to cover the
withdrawal. Specify your protocol by lis ng the messages exchanged and the ac on
taken by the automa c teller machine or the bank’s centralized computer on
transmission and receipt of messages. Sketch the opera on of your protocol for the
case of a simple withdrawal with no errors, using a diagram similar to that in Figure
1.2 . Explicitly state the assump ons made by your protocol about the underlying
end-to-end transport service. [P1]

5. Consider an applica on that transmits data at a steady rate (for example, the sender
generates an N-bit unit of data every k me units, where k is small and fixed). Also,
when such an applica on starts, it will con nue running for a rela vely long period of
me. Answer the following ques ons, briefly jus fying your answer:
1. Would a packet-switched network or a circuit-switched network be more
appropriate for this applica on? Why?
2. Suppose that a packet-switched network is used and the only traffic in this
network comes from such applica ons as described above. Furthermore,
assume that the sum of the applica on data rates is less than the capaci es
of each and every link. Is some form of conges on control needed? Why?
[P3]
1. In this case, a circuit-switched network would be more appropriate.
Circuit-switched networks establish dedicated communica on paths
for the dura on of the connec on, ensuring a constant, guaranteed
bandwidth, which is well-suited for applica ons with fixed, con nuous
data transmission requirements. In contrast, packet-switched
networks share network resources and may introduce variable delays
due to packet queuing and rou ng, which might not be ideal for
applica ons needing steady, predictable data transmission.

2. Even if the sum of the applica on data rates is less than the capaci es
of each link in a packet-switched network, some form of conges on
control is s ll needed. This is because packet-switched networks rely
on shared resources, and conges on can occur due to varia ons in
traffic pa erns, temporary spikes in data rates, or network failures.
Conges on control mechanisms are essen al to ensure fair resource
alloca on, prevent packet loss, and maintain the overall network
performance. Without conges on control, network performance
could degrade, causing delays, packet loss, and poten ally affec ng
the quality of service for applica ons.

6. In this problem, we consider sending real- me voice from Host A to Host B over a
packet switched network (VoIP). Host A converts analog voice to a digital 64 kbps bit
stream on the fly. Host A then groups the bits into 56-byte packets. There is one link
between Hosts A and B; its transmission rate is 2 Mbps and its propaga on delay is
10 msec. As soon as Host A gathers a packet, it sends it to Host B. As soon as Host B
receives an en re packet, it converts the packet’s bits to an analog signal. How much
me elapses from the me a bit is created (from the original analog signal at Host A)
un l the bit is decoded (as part of the analog signal at Host B)? [P7]
Because this is a packet switched network, the data will be transmi ed packet by
packet. A packet is 56 byte and the analog to digital conversa on rate is 64 kbps, thus
the preparing me Tp for a packet is:

Processing delay = = = 0.007 sec = 7 msec


The me to transmit the packet is: Transmission delay = =

= 2.24*10-4 sec = 0.224 msec
Propaga on delay: dprop : 10msec
Total delay = Processing delay + Transmission delay + Propaga on delay
= 7 ms + 0.224 ms + 10 ms
= 17.224 ms

7. Suppose you would like to urgently deliver 40 terabytes of data from Boston to Los
Angeles. You have available a 100 Mbps dedicated link for data transfer. Would you
prefer to transmit the data via this link or instead use FedEx over-night delivery?
Explain. [P24]
According to chapter 1.3.1 page 23 in the book we have the formula L (bits) / R
(bits/sec) for transmission data.
Packet L = 40 terabytes = 4 * 1013 * 8 (bits).
Transmission rate = 100 Mbps = 100 * 106 (bits/sec).

Time to transfer the packet = = 3200000 seconds = about 888.9 days = about 37 days

Based on the calcula on, if we you the link it will take us 37 days to transfer the data.
This is an urgent case so I would like to use FedEx's overnight delivery service.

8. Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected
by a direct link of R = 5 Mbps. Suppose the propaga on speed over the link is
2.5*108 meters/sec.
1. Calculate the bandwidth-delay product, R *dprop
2. Consider sending file of 800,000 bits from host A to host B. Suppose the file is
sent con nuously as one large message. What is the maximum number of
bits that will be in the link at any given me?
3. Provide an interpreta on of the bandwidth delay product.
4. What is the width (in meters) of a bit in the link?
5. Derive a general expression for the width of a bit in terms of propaga on
speed s, the transmission rate R, and the length of the link m. [P25]
1. The distance between two hosts A and B = m = 20,000 km = 2 * 10 7 meters
Trasmission rate (R) of the direct link between A and B: 5 Mbps = 5*10 6 bits
Propaga on speed over the link: s = 2.5 * 108 meters/sec

Propaga on delay: dprop = =( 2 * 107 ) / (2.5 * 108) = 0.08 sec

Bandwidth-delay product : R *dprop = 5*106*0.08 = 400000 bits.


2. In order to calculate maximum number of bits in the link, we use the Bandwidth-
delay product.
= > The maximum number of bits in the link = Bandwidth-delay product = 400000
bits.

3. The bandwidth-delay product represents the maximum amount of data that


can be transferred in a network link at any given me. It is a measure of the
link's capacity to hold data during the propaga on delay. In this case, the
bandwidth-delay product of a link is the maximum number of bits in the link.

4. To find the width of a bit in the link:

Way 1:

= = (2 * 107 ) / 400000 = 50 meters/bit


Way 2 (a er figuring out ques on 8.5) :


Formula to calculate the length of 1 bit on the transmission line:
( )
= (2.5 * 108) / (5*106) = 50 meters/bit
( )

5. A general expression for the width of a bits:



= = =
∗ ∗ ∗

You might also like