Display the weight matrix for the network

Assignment Help Computer Networking
Reference no: EM131271961

Assignment

This assignment is open notes, open book. Point values are as given; there are 100 total points possible. Please read each question carefully All work is single authorship. Display all references; do not merely quote a reference, but do explain any referenced material in your own words. For full credit, all work must be shown; this includes calculations, derivations, proofs, graphs, as well as your arguments and reasoning. Your methods and reasoning are important.

Problems

1. Consider a three layer protocol in which Layer 3 encapsulates Layer 2 and Layer 2 encapsulates Layer 1. Assume minimalist headers with fixed length packets. Assume the following characteristics of the layers: Layer 1, 6 octet address length, 512 octet payload; Layer 2, 4 octet address length , 256 octet payload; Layer 3, 8 octet address length, 1024 octet payload. Note that in the minimalist header arrangement, no error detection or correction will be used; however, there must be a scheme (that you must devise) to allow a multipacket datagram at each separate layer. You may assume that there is some sort of routing or other address translation protocol that will identify which addresses are to be used. Assume that the data communications channel in use do form a data communications network. (Hint: do recall what is needed for a data communications network as contrasted with an arbitrary graph.)

1.1. For each of the three layers, separately calculated, how many items (nodes) can be addressed? Do not simply show an answer, but ex-plain your reasoning (hint: combinatorics).

1.2. We have discussed functors as a formal, theoretical description be-tween layers of a network. In terms of these three layers, illustrate the functors between the layers, and explain how functors address the di?erences in topology and relevant information content at the di?erent layers

1.3. Assume that the datagram has 5 layer 1 packets. How does this datagram encapsulate in layer 2?

1.4. Taking the above result, or a made-up one of your choosing if you cannot calculate such a result, how does this data from layer 2 en-capsulating layer 1 data then encapsulate in layer 3?

1.5. Assuming that the only information of interest is the payload of layer 1, what is the overall e?ciency of the final encapsulated data stream in layer 3 for the layer 1 datagram described above?

1.6. Assuming that only the information in the starting layer 1 datagram payload is the signal, and the rest of all packets at all layers is noise with respect to this very restricted view of the information content of a channel, what is the e?ective Shannon-Hartley theorem relation between "channel capacity" and "bandwidth" for this specific data-gram?

2. Consider a set of intersecting rings as in the following figure. Here, a small square represents a node, including nodes that can transfer packets between rings, and each ring has an arrow that indicates the di-rection of packet flow on that ring. Each ring is labeled by a lower case Greek letter with the first ring labeled.

2.1. Display the adjacency matrix for the network in the figure.

2.2. Which, if any, nodes are equivalent on the network and why? (Hint: recall that equivalence in this context has to do with the number of links to a node as well as the information flow directions to and from a node.)

2.3. Which nodes, if any, represent single points of failure of the network?

2.4. Display the weight matrix for the network.

2.5. Using Dykstra's algorithm, calculate a route from node S to node D on the network as displayed in Fig. 1. Show each step of the algorithm as you develop the route.

1758_A Set of Intersecting Rings.jpg

Reference no: EM131271961

Questions Cloud

Compute the maximum throughput t for a pure aloha : Compute the maximum throughput T for a pure ALOHA and a slotted ALOHA random access system, along with the load L that achieves the maximum in each case.
Case study - poseidon plc : Prepare a 2,500 word report responding to the concerns raised by the Board - The Board are particularly concerned that they are able to explain their presence as being beneficial to the local environment whilst they feel that they cannot really den..
Derive a formula for the optimal power allocation : Derive a formula for the optimal power allocation on a fading broadcast channel to maximize sum-rate.
Defining policy and its role in corporate culture : Defining policy and its role in corporate culture? Write a report on how an organization can achieve ISO 27001 certification.
Display the weight matrix for the network : Display the weight matrix for the network. Using Dykstra's algorithm, calculate a route from node S to node D on the network as displayed in Fig. 1. Show each step of the algorithm as you develop the route.
How do we effectively communicate with adolescents : How do we effectively communicate WITH adolescents? (in families, in schools, in the media, etc.) -  How do we teach adolescents to communicate effectively?
Differences between formulas and functions : Discuss the differences between formulas and functions. Pick a function in Excel and discuss how that function is used to calculate results in your worksheets. Review your classmates' posts to make sure that you're not duplicating formulas or func..
Which of following is not one of the duties of a pharmacist : Which of the following is not one of the duties of a pharmacist? Today, the pharmacy technician performs many duties formerly completed by the pharmacist. However, it's still not appropriate for the pharmacy technician to
Word processing program : In your XXAssign3 folder created in Assignment1, use a word processing program like Word or Writer to create a file called security.

Reviews

Write a Review

Computer Networking Questions & Answers

  What is still need to be completed main referencesr

7502ICT - Advanced Networking: Project. In order to keep track of the progress of the project, you will have to submit an interim progress report describing (a) brief overview of the project (b) what work has been completed so far and (c) what is s..

  What is security forensic

What is security Forensic? How can an organization ensure that personnel does not become part of the security problem.

  Discuss how the mcqm system connects all processes

Start the paper with a brief overview and description of FDA and ISO regulations that exist to protect consumers. Briefly discuss how the MCQM system connects all processes critical to compliance.

  Read and prints highest valued legal scrabble word

You are to write a program that will read a file of scrambled 7-letter strings, and then prints out the highest valued legal Scrabble word(s). Before reading the file, your program will store a list of words read from the file words.txt.

  How would you explain the concept of packet switching

How would you explain the concept of packet switching

  Identifying potential malicious attacks threats and

identifying potential malicious attacks threats and vulnerabilitiesyou have just been hired as an information security

  Cisco packet tracer configure using two switch

cisco packet tracer configure using two switch two routers and 4pcs , pc 1 have to ping p 3 while pc 2 have to ping pc 4. Create two vlans , vlan 1 for pc 1 and pc 3 , vlan 2 for pc 2 and 4

  What are the pitfalls of networking

By now, we should all know the "benefits" of networking from a technological sense (being more efficient, productive, etc.). However, based on your experience, what are the pitfalls of networking?

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. Can we solve these problems by using IPv6. Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment

  Suppose a client computer with ip address 1271929230 in

suppose a client computer with ip address 127.192.92.30 in building zz requests a large web page from the server in

  Long-distance communication in a wan infrastructure

How can cables like UTP and coaxial cable be used for long-distance communication in a WAN infrastructure? Where are these cables used most often?

  Your friend would like to change the tcp congestion control

explain why receiving three duplicate acks indicate a smaller amount of congestion than a timeout?your friend would

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd