Data communications and net-centric computing homeworklan

Assignment Help Computer Networking
Reference no: EM13350963

Data Communications and Net-centric Computing Homework

LAN SECTION

Q1. List A below contains the layers of the internet protocol. List B contains items and applications associated with these layers. Recreate the answer table show below in your answer booklet and put the protocol layers in their correct order. In the next column. Put the application or item associated with that layer. User all the terms in your answer.

LIST A: network, data-link, application, physical, transport

LIST B: UDP, Cat-5 cable, Ethernet(IEEE 802.3), FTP(file transfer protocol), IP

1433_Data Communications and Net-centric Computing Homework.png

Q2. In a Local Area Network you might encounter the following items of equipment.

State what layer each piece of equipment operates on and briefly describe its function/operation. (Point form answer are preferred)

  • Firewalls
  • Routers
  • Repeaters
  • Bridges (switches)

Q3. Name three well-known LAN topologies.

CSMA, CRC, Errors, Transmission System SECTION

Q4. Considering Media Access Control protocols:

a) What does CSMA/CA stand for?

b) Identify the differences between CSMA/CD and CSMA/CA

Q5. There are three type of persistence protocol used in CSMA.

a) State the name of one persistence protocol

b) State to rules use by the persistence protocol named in the previous question.

Q6. Calculate the Frame Check Sequences (FCS) for the following block of binary data, using the pattern (divisor) 10 11. Use any method. Show your working. Show the final code word that will be transmitted.

          1 1 1 1 0 1 1

Q7. A new martian probe requires a communications system that supports a data rate of 12,000bps. The system selected uses FSK encoding with 8 levels.

a) How many bits are required to encode each level?

b) Assuming error free operation, calculate the bandwidth required for the system?

Q8. A communications link with a Bit error rate (BER) of 104 is used to send 1,250 byte packets of data.

a) Calculate the average number of transmissions required for the frame to be received without error.

b) To improve the efficiency of the line, it has been proposed to use Jumbo Packets of Size 12,500 bytes (10 times the current size). Do the same calculation for these larger packets.

c) Given the results of the last two calculations, comment on whether you support the Jumbo Packet proposal as a way to increase efficient use of the line and explain why.

IP, Windowing, Routing SECTION

Q9. You are given the IPv4 address 192.168.111.222 and subnet mask 255.255.224.0

a) What is the network-id?

b) What is the host-id?

c) Identify the following IP addresses as either suitable or unsuitable to be used as host addresses on the above subnet? Write the answer in your answer booklet.

IP Address:

                                       i.      192.168.0.0

                                      ii.      192..168.96.0

                                    iii.      192.168.100.225

                                    iv.      192.168.128.255

                                     v.      192.168.96.222

Q10. A sliding window protocol using Go-Back-N and a window size of 4, is been used to send frames from station A to station B. The following frames have been sent,  received and processed by the respective stations:

2005_Data Communications and Net-centric Computing Homework1.png

a) List the frame(s) now contained within A's sliding window.

b) Station A can be sure that some frames have been received by B. Which frames are they?

c) Which frame(s) will next be sent by A?

d) If the protocol is changed to Selective Reject, how would the efficiency change for normal error-free-operation?

Q11.   Given the following network answer the question below:

1935_Data Communications and Net-centric Computing Homework2.png

Use an appropriate algorithm to identify the shortest path from A to all other nodes in the network. Show all working.

a) What is the shortest path from A to E. given the path as an ordered list of node numbers (list the nodes in the order that they occur in the path).

b) What is the path length of the shortest path from A to E.

c) What is the hop count of the shortest path from A to E.

UDP/TCP, BDP, FDM SECTION

Q12. Transport Control Protocol (TCP) and User Datagram Protocol (UDP) are both Transport Layer protocols. In what ways are TCP and UDP similar and how do they differ? Compare the feature, operation and applications. (Discussion or point form answers are acceptable.)

a) A 65 Mbps (64,000,000 bits per second) channel has propagation delay of 10mS from A to B and 20mS from B to A. What is the bandwidth-delay product between A and B? (10mS is 10 milliseconds or 10X 10-3 seconds.) Show your working.

b) If the link is going to be used to send 1000bytes packets, calculate the minimum window size required to achieve a line efficiency better than 0.8. Show your working

60_Data Communications and Net-centric Computing Homework3.png

Q13. 4 analogue voice channels are FDM multiplexed together for transmission over a transmission system. Each channel has a bandwidth of 3 kHz. Guard bands of 400 Hz are used. The next available frequency slots starts at 20KHz.

a) Draw a frequency domain plot of the multiplexed signal.

b) What is the minimum bandwidth required to transmit the multiplexed signal?

ATM, Timing, Compression SECTION

Q14.  4,800 bytes of payload are transmitted over ATM between two stations.

a) How many cells will be required?

b) What percentage of the resulting data stream is overhead?

c) How would the percentage overhead change if only 2400 bytes was transmitted?

Q15. This question relates to the simple network shown below. In this network, packets sent from Node 1 are received at Node 2 and then forwarded on to the next node. From the moment a packet arrives at Node 2, it experiences a sequence of delays before arriving at the next node. Assume the network suffers some congestion.

a) List all four delays each packet will encounter.

b) Which of these delays is most sensitive to congestion?

213_Data Communications and Net-centric Computing Homework4.png

Q16. A video-conferencing application is expected to transmit images of 720 X 576 pixel, at 10 frames per second. Pixels are in RGB colour, encoded using 3 bytes per pixel. The application will use a lossy compression algorithm which gives 8:1 compression.

a) Calculate the amount of data (in bytes) required for each uncompressed image.

b) Calculate the amount of data (in bytes) required for each compressed image.

c) Calculate the rate at which compressed video data must be transmitted (in bits per second).

d) The total network overhead (transport, network and data-link layers) is 18% of the application payload. Calculate the channel capacity required to send the video (in bits per second).

Reference no: EM13350963

Questions Cloud

Resistance to change can have a crippling effect on an : resistance to change can have a crippling effect on an organization. innovation and learning will suffer as employees
There is an interesting article connecting cause and : there is an interesting article connecting cause and hazardous waste and effect analysis. the authors have used effect
Cnsider the power system below1 write the ybus matrix2 : consider the power system below.1. write the ybus matrix.2. identify the bus types and the unknown variables of the
I found your views on benchmarking and qfd very insightful : i found your views on benchmarking and qfd very insightful. the pace at which technology and product life cycles are
Data communications and net-centric computing homeworklan : data communications and net-centric computing homeworklan sectionq1. list a below contains the layers of the internet
The significance and value of hofstedes work cannot be : the significance and value of hofstedes work cannot be overstated......the criticisms levelled against him are dwarfed
Q1-write introduction to spc statistical process : q1-write introduction to spc statistical process control?q2-describe the use of spc tools used at d2d?q3-how could
The idea of six sigma has been mentioned in one of the dqs : the idea of six sigma has been mentioned in one of the dqs. the lecture notes submit to that technique and allied
Part-1general energy storage systems gess was founded in : part-1general energy storage systems gess was founded in 2002 by ian redoks a ph.d. candidate in physics who was

Reviews

Write a Review

Computer Networking Questions & Answers

  Content validation-web pages before put in public domain

Do you believe that any form of document content validation must be applied to web pages before they are placed in  public domain? That is, some form of assurance that they don't contain completely incorrect information.

  Write main advantage of using domain controlled network

Write down the main advantages to using Domain controlled network? Write down some concerns and disadvantages to switching to domain network?

  How does server stack deliver packet to http server software

A computer in the Computing Department has just been turned on. The user starts up their web browser and requests to see the Macquarie University home page. The home page www.mq.edu.au resides on a server on the administration subnet.!

  Networking the computers

Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install in their dorm suite since a(n) (2)____________________ network was too co..

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

  Explain multiprogramming and time-sharing environment

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

  Conduct a research on network address translation

Research network address translation (NAT). While conducting your research, consider purpose of NAT, compatibility with IPv6, and functions of automatic IP assignment and automatic name resolution.

  How company can manage snmp from corporate location

Write one-page proposal of how company can manage SNMP from corporate location. Include details on versions, basic operations, and MIBs. Describe the benefits of this kind of centralized monitoring.

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  Describe three components found in a web system

Describe one type of variable or method that can be used to exchange data between web pages.

  Explain are lans a stable technology or changing

Are LANs a stable technology or are they changing just as rapidly as other forms of communication technologies? Should software licenses be dropped completely?

  Question 1give details for the following terms as used in

question 1give details for the following terms as used in cryptographya block cipherb primitive rootc confusiond

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd