Solved

General Basic Network questions

Posted on 1997-03-16
3
642 Views
Last Modified: 2008-03-03
Some General Basic network questions

Please help. Thanks in advance.

HL.

1. To transmit packets with virtual-circuit transport, we first set up a
   virtual-circuit and then transmit the packets.
   The network is lightly loaded, and our packets do not face any
   queueing delay.  The virtual-circuit set up time is 400 ms.
   The packets travel over a path that goes through ten nodes, and the
   links transmit at 56 kbps.
   Each packet has 400 bits of data, a header of 5 bytes (to indicate the
   virtual-circuit number and the packet's sequence number), and a trailer
   of 2 bytes (for error detection).
 
   When we use datagram transport, no virtual-circuit is set up, but each
   packet needs a header of 10 bytes instead of 5 (to indicate the full
   destination address and source address, in addition to the packet's
   sequence number).  These packets also have the 2-byte trailer.  Assume
   that datagrams also happen to follow the same path through the ten nodes.
 
   (a) How long does it take to transmit N packets under each of the two
       mechanisms?
 
   (b) For what values of N is it faster to use virtual-circuit transport?

2. A series of packets of length 1000 bits are to be transmitted across a
   data link 4,000 km long at a data rate of 2 Mbps.
   If the link has a velocity of propagation of 200,000 km/s and a bit error
   rate (NOT packet error rate)
   of 0.0001, determine the link efficiency using the following protocols.
   Also, indicate the effect of bit errors on each of the results obtained.
   (a)  stop-and-wait
   (b)  selective repeat with a window size of 7
   (c)  go-back-N with a window size of 127

3. Consider the transfer of a file containing one million chars. from one station to another. What is the total elapsed time and effective throughput for the following cases:

a. A circuit-switched, star topology local network. Call setup time is negligible, and the data rate on the medium is
64 kbps.

b. A bus topology local network with 2 stations a distance D apart, a data rate of B bps, and a packet size P with 800 bits of overhead. Each packet is acknowledged with an 88 bit packet before the next is sent. The propagation speed on the
bus is 200m/us Solve for
1. D=1 km, B =1MBps, P =256 bits
2. D=1 km, B =10Mbps, P =256 bits
3. D=10 km, B = 1 Mbps, P = 256 bits
4. D=1km, B = 50 Mbps, p = 10000 bits

c. A ring topology with a total circular length of 2D, with the 2 stations a distance D apart. Acknowledgment is achieved by allowing a packet to circulate past the destination station, back to the source station. There are N  repeaters on the ring, each of which introduces a delay of one bit time. Repeat the calculation for each of b(1) through b(4) for N=10; 100; 1000.


0
Comment
Question by:liuh
3 Comments
 

Author Comment

by:liuh
ID: 1589451
Please reply with a best answer if you can thanks very much
0
 

Expert Comment

by:klos
ID: 1589452
What is this?!?  Someone's homework!?!  Please do your own homework!
0
 

Accepted Solution

by:
paulmew earned 50 total points
ID: 1589453
Get a life and stop wasting our time, I sincerely hope you fail your course with flying colours.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your audience prefer people in photos or no people? How can you best highlight what you’re selling? What are your competitors doing, and what can you do that is different and unique from them?  Continue reading to learn how to make your images …
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question