Data communications and net-centric computing homeworklan

Assignment Help Computer Networking
Reference no: EM13350963

Data Communications and Net-centric Computing Homework

LAN SECTION

Q1. List A below contains the layers of the internet protocol. List B contains items and applications associated with these layers. Recreate the answer table show below in your answer booklet and put the protocol layers in their correct order. In the next column. Put the application or item associated with that layer. User all the terms in your answer.

LIST A: network, data-link, application, physical, transport

LIST B: UDP, Cat-5 cable, Ethernet(IEEE 802.3), FTP(file transfer protocol), IP

1433_Data Communications and Net-centric Computing Homework.png

Q2. In a Local Area Network you might encounter the following items of equipment.

State what layer each piece of equipment operates on and briefly describe its function/operation. (Point form answer are preferred)

  • Firewalls
  • Routers
  • Repeaters
  • Bridges (switches)

Q3. Name three well-known LAN topologies.

CSMA, CRC, Errors, Transmission System SECTION

Q4. Considering Media Access Control protocols:

a) What does CSMA/CA stand for?

b) Identify the differences between CSMA/CD and CSMA/CA

Q5. There are three type of persistence protocol used in CSMA.

a) State the name of one persistence protocol

b) State to rules use by the persistence protocol named in the previous question.

Q6. Calculate the Frame Check Sequences (FCS) for the following block of binary data, using the pattern (divisor) 10 11. Use any method. Show your working. Show the final code word that will be transmitted.

          1 1 1 1 0 1 1

Q7. A new martian probe requires a communications system that supports a data rate of 12,000bps. The system selected uses FSK encoding with 8 levels.

a) How many bits are required to encode each level?

b) Assuming error free operation, calculate the bandwidth required for the system?

Q8. A communications link with a Bit error rate (BER) of 104 is used to send 1,250 byte packets of data.

a) Calculate the average number of transmissions required for the frame to be received without error.

b) To improve the efficiency of the line, it has been proposed to use Jumbo Packets of Size 12,500 bytes (10 times the current size). Do the same calculation for these larger packets.

c) Given the results of the last two calculations, comment on whether you support the Jumbo Packet proposal as a way to increase efficient use of the line and explain why.

IP, Windowing, Routing SECTION

Q9. You are given the IPv4 address 192.168.111.222 and subnet mask 255.255.224.0

a) What is the network-id?

b) What is the host-id?

c) Identify the following IP addresses as either suitable or unsuitable to be used as host addresses on the above subnet? Write the answer in your answer booklet.

IP Address:

                                       i.      192.168.0.0

                                      ii.      192..168.96.0

                                    iii.      192.168.100.225

                                    iv.      192.168.128.255

                                     v.      192.168.96.222

Q10. A sliding window protocol using Go-Back-N and a window size of 4, is been used to send frames from station A to station B. The following frames have been sent,  received and processed by the respective stations:

2005_Data Communications and Net-centric Computing Homework1.png

a) List the frame(s) now contained within A's sliding window.

b) Station A can be sure that some frames have been received by B. Which frames are they?

c) Which frame(s) will next be sent by A?

d) If the protocol is changed to Selective Reject, how would the efficiency change for normal error-free-operation?

Q11.   Given the following network answer the question below:

1935_Data Communications and Net-centric Computing Homework2.png

Use an appropriate algorithm to identify the shortest path from A to all other nodes in the network. Show all working.

a) What is the shortest path from A to E. given the path as an ordered list of node numbers (list the nodes in the order that they occur in the path).

b) What is the path length of the shortest path from A to E.

c) What is the hop count of the shortest path from A to E.

UDP/TCP, BDP, FDM SECTION

Q12. Transport Control Protocol (TCP) and User Datagram Protocol (UDP) are both Transport Layer protocols. In what ways are TCP and UDP similar and how do they differ? Compare the feature, operation and applications. (Discussion or point form answers are acceptable.)

a) A 65 Mbps (64,000,000 bits per second) channel has propagation delay of 10mS from A to B and 20mS from B to A. What is the bandwidth-delay product between A and B? (10mS is 10 milliseconds or 10X 10-3 seconds.) Show your working.

b) If the link is going to be used to send 1000bytes packets, calculate the minimum window size required to achieve a line efficiency better than 0.8. Show your working

60_Data Communications and Net-centric Computing Homework3.png

Q13. 4 analogue voice channels are FDM multiplexed together for transmission over a transmission system. Each channel has a bandwidth of 3 kHz. Guard bands of 400 Hz are used. The next available frequency slots starts at 20KHz.

a) Draw a frequency domain plot of the multiplexed signal.

b) What is the minimum bandwidth required to transmit the multiplexed signal?

ATM, Timing, Compression SECTION

Q14.  4,800 bytes of payload are transmitted over ATM between two stations.

a) How many cells will be required?

b) What percentage of the resulting data stream is overhead?

c) How would the percentage overhead change if only 2400 bytes was transmitted?

Q15. This question relates to the simple network shown below. In this network, packets sent from Node 1 are received at Node 2 and then forwarded on to the next node. From the moment a packet arrives at Node 2, it experiences a sequence of delays before arriving at the next node. Assume the network suffers some congestion.

a) List all four delays each packet will encounter.

b) Which of these delays is most sensitive to congestion?

213_Data Communications and Net-centric Computing Homework4.png

Q16. A video-conferencing application is expected to transmit images of 720 X 576 pixel, at 10 frames per second. Pixels are in RGB colour, encoded using 3 bytes per pixel. The application will use a lossy compression algorithm which gives 8:1 compression.

a) Calculate the amount of data (in bytes) required for each uncompressed image.

b) Calculate the amount of data (in bytes) required for each compressed image.

c) Calculate the rate at which compressed video data must be transmitted (in bits per second).

d) The total network overhead (transport, network and data-link layers) is 18% of the application payload. Calculate the channel capacity required to send the video (in bits per second).

Reference no: EM13350963

Questions Cloud

Resistance to change can have a crippling effect on an : resistance to change can have a crippling effect on an organization. innovation and learning will suffer as employees
There is an interesting article connecting cause and : there is an interesting article connecting cause and hazardous waste and effect analysis. the authors have used effect
Cnsider the power system below1 write the ybus matrix2 : consider the power system below.1. write the ybus matrix.2. identify the bus types and the unknown variables of the
I found your views on benchmarking and qfd very insightful : i found your views on benchmarking and qfd very insightful. the pace at which technology and product life cycles are
Data communications and net-centric computing homeworklan : data communications and net-centric computing homeworklan sectionq1. list a below contains the layers of the internet
The significance and value of hofstedes work cannot be : the significance and value of hofstedes work cannot be overstated......the criticisms levelled against him are dwarfed
Q1-write introduction to spc statistical process : q1-write introduction to spc statistical process control?q2-describe the use of spc tools used at d2d?q3-how could
The idea of six sigma has been mentioned in one of the dqs : the idea of six sigma has been mentioned in one of the dqs. the lecture notes submit to that technique and allied
Part-1general energy storage systems gess was founded in : part-1general energy storage systems gess was founded in 2002 by ian redoks a ph.d. candidate in physics who was

Reviews

Write a Review

Computer Networking Questions & Answers

  Define a new generation of wireless lan technology

In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN techno..

  Starting and ending security and integrity levels of object

In Lipner's model consider moving the program from development into production. Write down the starting and ending security and integrity levels of this object.

  List possible ways to interconnect three computers

List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

  Suggest network design to support requirements of company

Suggest network design to support requirements of Silfinate Company following this move. Give your colleagues with feedback on their designs.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Content validation-web pages before put in public domain

Do you believe that any form of document content validation must be applied to web pages before they are placed in  public domain? That is, some form of assurance that they don't contain completely incorrect information.

  Explaining ethical or unethical actions

Should Iris have placed CD back at coffee station and forgotten entire thing? Describe why that action would have been ethical or unethical.

  Explain main components of good security policy

Write down the main components of good security policy? Write down some of the most common attacks, and how can the network be protected against these attacks?

  Determine about the crash if rip is used

The node in Denver crashes completely. How do the other nodes in the country find out about the crash if RIP is used? If OSPF is used?

  Describe what is meant by cybersecurity architecture

Describe what is meant by Cybersecurity Architecture. List and describe the principles that must be supported.

  Implement tftp using the user datagram protocol

File system module design: This component is responsible for accessing the le systems of the sender and the receiver. The sender and the receiver have to read and write corresponding les, respectively. These operations are part of the actions in t..

  Design entire cabling system for medical instrument

You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd