Display the weight matrix for the network

Assignment Help Computer Networking
Reference no: EM131271961

Assignment

This assignment is open notes, open book. Point values are as given; there are 100 total points possible. Please read each question carefully All work is single authorship. Display all references; do not merely quote a reference, but do explain any referenced material in your own words. For full credit, all work must be shown; this includes calculations, derivations, proofs, graphs, as well as your arguments and reasoning. Your methods and reasoning are important.

Problems

1. Consider a three layer protocol in which Layer 3 encapsulates Layer 2 and Layer 2 encapsulates Layer 1. Assume minimalist headers with fixed length packets. Assume the following characteristics of the layers: Layer 1, 6 octet address length, 512 octet payload; Layer 2, 4 octet address length , 256 octet payload; Layer 3, 8 octet address length, 1024 octet payload. Note that in the minimalist header arrangement, no error detection or correction will be used; however, there must be a scheme (that you must devise) to allow a multipacket datagram at each separate layer. You may assume that there is some sort of routing or other address translation protocol that will identify which addresses are to be used. Assume that the data communications channel in use do form a data communications network. (Hint: do recall what is needed for a data communications network as contrasted with an arbitrary graph.)

1.1. For each of the three layers, separately calculated, how many items (nodes) can be addressed? Do not simply show an answer, but ex-plain your reasoning (hint: combinatorics).

1.2. We have discussed functors as a formal, theoretical description be-tween layers of a network. In terms of these three layers, illustrate the functors between the layers, and explain how functors address the di?erences in topology and relevant information content at the di?erent layers

1.3. Assume that the datagram has 5 layer 1 packets. How does this datagram encapsulate in layer 2?

1.4. Taking the above result, or a made-up one of your choosing if you cannot calculate such a result, how does this data from layer 2 en-capsulating layer 1 data then encapsulate in layer 3?

1.5. Assuming that the only information of interest is the payload of layer 1, what is the overall e?ciency of the final encapsulated data stream in layer 3 for the layer 1 datagram described above?

1.6. Assuming that only the information in the starting layer 1 datagram payload is the signal, and the rest of all packets at all layers is noise with respect to this very restricted view of the information content of a channel, what is the e?ective Shannon-Hartley theorem relation between "channel capacity" and "bandwidth" for this specific data-gram?

2. Consider a set of intersecting rings as in the following figure. Here, a small square represents a node, including nodes that can transfer packets between rings, and each ring has an arrow that indicates the di-rection of packet flow on that ring. Each ring is labeled by a lower case Greek letter with the first ring labeled.

2.1. Display the adjacency matrix for the network in the figure.

2.2. Which, if any, nodes are equivalent on the network and why? (Hint: recall that equivalence in this context has to do with the number of links to a node as well as the information flow directions to and from a node.)

2.3. Which nodes, if any, represent single points of failure of the network?

2.4. Display the weight matrix for the network.

2.5. Using Dykstra's algorithm, calculate a route from node S to node D on the network as displayed in Fig. 1. Show each step of the algorithm as you develop the route.

1758_A Set of Intersecting Rings.jpg

Reference no: EM131271961

Questions Cloud

Compute the maximum throughput t for a pure aloha : Compute the maximum throughput T for a pure ALOHA and a slotted ALOHA random access system, along with the load L that achieves the maximum in each case.
Case study - poseidon plc : Prepare a 2,500 word report responding to the concerns raised by the Board - The Board are particularly concerned that they are able to explain their presence as being beneficial to the local environment whilst they feel that they cannot really den..
Derive a formula for the optimal power allocation : Derive a formula for the optimal power allocation on a fading broadcast channel to maximize sum-rate.
Defining policy and its role in corporate culture : Defining policy and its role in corporate culture? Write a report on how an organization can achieve ISO 27001 certification.
Display the weight matrix for the network : Display the weight matrix for the network. Using Dykstra's algorithm, calculate a route from node S to node D on the network as displayed in Fig. 1. Show each step of the algorithm as you develop the route.
How do we effectively communicate with adolescents : How do we effectively communicate WITH adolescents? (in families, in schools, in the media, etc.) -  How do we teach adolescents to communicate effectively?
Differences between formulas and functions : Discuss the differences between formulas and functions. Pick a function in Excel and discuss how that function is used to calculate results in your worksheets. Review your classmates' posts to make sure that you're not duplicating formulas or func..
Which of following is not one of the duties of a pharmacist : Which of the following is not one of the duties of a pharmacist? Today, the pharmacy technician performs many duties formerly completed by the pharmacist. However, it's still not appropriate for the pharmacy technician to
Word processing program : In your XXAssign3 folder created in Assignment1, use a word processing program like Word or Writer to create a file called security.

Reviews

Write a Review

Computer Networking Questions & Answers

  Evaluate two siem and two network management solutions

Research and evaluate two SIEM and two Network Management Solutions. Students are to research and evaluate two SIEM and two Network management solutions.

  Find some way to understand the principles

Can we find some way to understand the principles by which our network is classifying handwritten digits? And, given such principles, can we do better?

  Design a simple layout of omni directional antennas

Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice and design a simple layout of omni directional antennas to cover the entire warehouse.

  Operating systems

The figure below shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each inter¬section.

  Find the minimum distance of the encoding function

Coding of Binary Information and Error Detection (IX)Minimum Distance of the Encoding Function

  Small internet works prepare a network simulation you will

small internet works prepare a network simulation. you will first be build the existing office network. next you will

  Choose all the necessary and suitable mac address

Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description. State clearly in your submission the choices you have made for these addresses.

  List all the five nonproprietary internet applications and

q1. list five nonproprietary internet applications and the application-layer protocols that they use.q2. what

  What are the major business objectives and processes

What are the major business objectives and processes (operations) that the hotel company carries out and list the information systems that are used to support their portal and describe how they are related to the overall business objectives and pro..

  Data and process modeling

The next phase in the project development cycle is to develop a logical model of the system based on the system requirements. The first step is about the "what" step. We need to show what the system will do, without worrying about how it will do..

  Clock controlled access and high-bandwidth internet access

Zippy Car, a medium-sized business wants to house the company-owned web servers in a facility that offers round-the-clock controlled access and high-bandwidth internet access.

  Question 1examine the concept of data information and

question 1examine the concept of data information and knowledge in information warfare.question 2the progression of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd