2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !
!is pu"lication is protected "# $op#rigt and %ritten per&ission sou
1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Solution of Selected Exercises from the End of Chapter Exercise s Chapter 1 - Introduction And Overview 1.1 List ten industries that depend on computer networking. 1.2 Provide a brief history of the Internet describing when and how it was started. 1.3 List the layers in the TP!IP model" and give a brief e#planation of each. Answer: The TCP/IP consists of 5 layers. The layers and their short explanation is as follows: Layer 1: Physical: Protocols in the Physical layer specify details about the underlyin trans!ission !ediu! and the associated hardware. Layer ": #etwor$ Interface Protocols in the #etwor$ Interface layer specify details about co!!unication between hiher layers of protocols and the underlyin networ$. Layer %: Internet: Protocols in the Internet layer for! the funda!ental basis for the Internet. Layer % protocols specify co!!unication between two co!puters across the Internet Layer &: Transport: Protocols in the Transport layer pro'ide for co!!unication fro! an application prora! on one co!puter to an application prora! on another. Layer 5: Application: Protocols in the top layer of the TCP/IP stac$ specify how a pair o applications interact when they co!!unicate. 1.$ %hat is a protocol suite" and what is the advantage of a suite& Answer: protocols are desined in co!plete( cooperati'e sets called suites or fa!ilies( instead of creatin each protocol in isolation. )ach protocol in a suite handles one aspect of co!!unication* toether( the protocols in a suite co'er all aspects of co!!unication. The entire suite is desined to allow the protocols to wor$ toether e+ciently. 1.' (escribe the TP!IP layering model" and e#plain how it was derived. 1.) Provide reasons for Internet growth in recent years. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 1.* %hat is interoperability" and why is it especially important in the Internet& 1.+ ,ccording to the te#t" is it possible to develop Internet applications without understanding the architecture of the Internet and the technologies& -upport your answer. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Answer: ,es( possible to write code that co!!unicates o'er a networ$( without understandin the hardware and software technoloies that are used to transfer data fro! one application to another. -owe'er( $nowlede of the underlyin networ$ syste! allows a prora!!er to write better code. 1.. To what aspects of networking does data communications refer& Answer: .ata co!!unications refers to the study of low/le'el !echanis!s and technoloies used to send infor!ation across a physical co!!unication !ediu!( such as a wire( radio wa'e( or liht bea!. 1.1/ %hat is a communication protocol& onceptually" what two aspects of communication does a protocol specify& Answer: A co!!unication protocol refer to a speci0cation for networ$ co!!unication. 1a2or aspects of a protocol are syntax 3for!at4 and se!antics 3!eanin4 of the protocol. 1.11 List ma0or standardi1ation organi1ations that create standards for data communications and computer networking. Answer: 5arious national and international orani6ations are in'ol'ed in standardi6ation of co!!unications and networ$in ser'ices. To list few: International 7rani6ation for 8tandardi6ation 3I874 International Teleco!!unications 9nion( Teleco!!unication 8tandardi6ation 8ector 3IT9/T4 Institute of )lectrical and )lectronics )nineers 3I)))4 Internet )nineerin Tas$ :orce 3I)T:4 1.12 2ive a brief e#plain of the layers in the I-3 3pen -ystem Interconnection model. Answer: I87 78I !odel consists of ; layers( na!ely: Layer ;: Application Layer <: Presentation Layer 5: 8ession Layer &: Transport Layer %: #etwor$ Layer ": .ata Lin$ Layer 1: Physical =eader is expected to 0nd out short explanation of each layer. 1.13 %hat is packet4switching" and why is packet switching relevant to the Internet& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Answer: Pac$et switchin di'ides data into s!all bloc$s( called pac$ets( and includes an identi0cation of the intended recipient in each pac$et. Pac$et switchin chaned networ$in in a funda!ental way( and pro'ided the basis for the !odern Internet. Pac$et switchin allows !ultiple senders to trans!it data o'er a shared networ$. 1.1$ 5#plain how headers are added and removed as data passes through a layered model. Answer: each layer on the sendin co!puter prepends extra infor!ation onto the pac$et* the correspondin protocol layer on the recei'in co!puter re!o'es and uses the extra infor!ation. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter - 2 Internet Trends 2.1 (escribe the evolution in audio that has occurred in the Internet. Answer: The trend in audio processin has been as follows: Alert 8ounds -u!an 5oice Audi Clips -ih/:idelity Audio 2.2 ,ssume that one hundred million new computers are added to the Internet each year. If computers are added at a uniform rate" how much time elapses between two successive additions& 2.3 (escribe Internet applications that you use regularly that were not available to your parents when they were your age. 2.$ %hy was sharing of computational resources important in the 1.)/s& 2.' %hat shift in Internet use occurred when the %orld %ide %eb first appeared& 2.) The plot in 6igure 2.1 shows that Internet growth did not start until after 1..'. %hy is the figure misleading& Answer: =esearchers co!puters wor$in for the Ad'anced =esearch Pro2ects Aency 3A=PA4 of 98 .epart!ent of .efense 3.o.4 needed powerful and co!puters were incredibly expensi'e. The A=PA budet was insu+cient to fund !any co!puters. The A=PA planned to interconnect all co!puters with a data networ$ and de'ise software that would allow a researcher to use whiche'er co!puter was best suited to perfor! a i'en tas$. 2.* List the steps in the transition in graphics presentation from the early Internet to the current Internet. Answer: The trend in the raphic presentation has been as follows: Text >raphic I!aes 5ideo Clips :ull/ 1otion 5ideo 2.+ %hat Internet technology is the telephone system using& Answer: 8o!e current telephone syste!s uses 5oice/7'er IP technoloy. =eader is encouraed to refer to later chapters for details. 2.. 5#tend the plot in 6igure 2.2" and estimate how many computers will be connected to the Internet by 2/2/. 2.1/ %hat impact is Internet technology having on the cable television industry& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ) ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 2.11 List four new Internet applications" and tell the groups for which each is important. 2.12 %hy is the switch from wired Internet access to wireless Internet access significant& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou * ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 3 - Internet Applications And etwor! "ro#rammin# 3.2 %hat are the two basic communication paradigms used in the Internet& Answer: There are 'arious approaches( but accordin to textboo$( we can specify the! as 8trea! Paradi! and 1essae Paradi!. 3.12 2ive si# characteristics of Internet stream communication. Answer: Characteristics of Internet strea! co!!unication can be listed as follows: Connection/oriented 1/to/1 co!!unication 8e?uence of indi'idual bytes Arbitrary lenth transfer 9sed for !ulti!edia applications @uilt on 9.P protocol 3.$ 2ive si# characteristics of Internet message communication. Answer: Characteristics of Internet !essae co!!unication can be listed as follows: Connectionless 1any/to/!any co!!unication 8e?uence of indi'idual !essaes )ach !essae li!ited to <& Abytes 9sed by !ost applications @uilt on TCP protocol 3.13 If a sender uses the stream paradigm and always sends 1/2$ bytes at a time" what si1e blocks can the Internet deliver to a receiver& Answer: strea! paradi! does not pro'ide any uarantees for bloc$ si6es( so all depends on indi'idual transfer. 3.) If a sender wants to have copies of each data block being sent to three recipients" which paradigm should the sender choose& Answer: The !essae paradi! is suitable for such transfer( since it allows !any/to/ !any co!!unication 3.21 %hat are the three surprising aspects of the Internet7s message delivery semantics& Answer: The InternetBs !essae deli'ery has the followin undesirable characteristics: 1essaes can be lost 1essaes can be duplicated 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou + ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 1essaes can be deli'ered out/of/order 3.1. 2ive the general algorithm that a connection4oriented system uses. Answer: The interaction between two connection/oriented parties can be su!!ari6ed as: 8ettin/up connection between two parties )xchane infor!ation Ter!inate the connection 3.2' %hen two applications communicate over the Internet" which one is the server& Answer: The application that waits for so!e other applications to contact is called ser'er( and the application that contact other one is called client. 3.1$ ompare and contrast a client and server application by summari1ing characteristics of each. 3.' %hat is the di8erence between a server and a server4class computer& Answer: The ser'er ter! refers to a prora! that waits passi'ely for co!!unication( and not to the co!puter on which it executes. -owe'er( when a co!puter is dedicated to runnin one or !ore ser'er prora!s( the co!puter itself is so!eti!es called a ser'er. -ardware 'endors contribute to the confusion because they classify co!puters that ha'e fast CP9s( lare !e!ories( and powerful operatin syste!s as ser'er !achines. 3.2/ an data 9ow from a client to a server& 5#plain. Answer: ,es( data !ay Cow in both directions 3clientser'er and ser'er client4. 3.1' List the possible combinations of clients and servers a given computer can run. 3.* an all computers run multiple services e8ectively& %hy or why not& 3.22 %hat two identifiers are used to specify a particular server& Answer: A particular ser'er is identi0ed by the followin identi0ers: An identifier for the co!puter on which a ser'er runs 3IP Address4 An identifier for a particular ser'ice on the co!puter 3Port #u!ber4 3.+ List the steps a client uses to contact a server after a user specifies a domain name for the server. Answer: The steps that a client uses to contact a ser'er can be su!!ari6ed as follows: 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 8tart after ser'er is already runnin 7btain ser'er na!e fro! user 9se .#8 to translate na!e to IP address 8pecify that the ser'ice uses port # Contact ser'er and interact te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. Chapter $ - Traditional Internet Applications $.1 %hat does a browser cache" and why is caching used& Answer: A browser sa'es the Last/1odi0ed date infor!ation alon with the cached copy. Cachin pro'ides an i!portant opti!i6ation for web access because users tend to 'isit the sa!e web sites repeatedly. $.2 %hat are the characteristics of -:TP& Answer: The followin can be i'en as !a2or characteristics of 81TP :ollows a strea! paradi! 9ses textual control !essaes 7nly transfers text !essaes Allows a sender to specify recipientsB na!es and chec$ each na!e 8ends one copy of a i'en !essae $.3 True or false; a multi4national company can choose to divide its domain name hierarchy in such a way that the company has a domain name server in 5urope" one in ,sia" and one in <orth ,merica. Answer: 7ne of the !ain features of the .o!ain #a!e 8yste! 3.#84 is autono!y. The .#8 is desined to allow each orani6ation to assin na!es to co!puters or to chane those na!es without infor!in a central authority. )ach orani6ation is free to choose the details of its ser'ers. A lare orani6ation that runs its own ser'er can choose to place all na!es for the orani6ation in a sinle physical ser'er( or can choose to di'ide its na!es a!on !ultiple ser'ers. $.$ =ow does >:L allow an application to specify fields such as a name and address& Answer: D1L does not assin any !eanin to tas( ta na!es can be created as needed. In particular( ta na!es can be selected to !a$e data easy to parse or access. If two co!panies aree to exchane corporate telephone directories( they can de0ne an D1L for!at that has data ite!s such as an e!ployeeBs na!e( phone nu!ber( and oEice. $.' %hat details does an application protocol specify& Answer: An application protocol !ay specify the followin details: The syntax and se!antics of !essaes that can be exchaned Fhether the client or ser'er initiates interaction Actions to be ta$en if an error arises 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u / ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, -ow the two sides $now when to ter!inate co!!unication $.) (oes the I(<, standard re?uire changes in (<- servers& in (<- clients& 5#plain. Answer: #o( instead of !odifyin the underlyin .#8( I.#A uses A8CII to store all na!es. That is( when i'en a do!ain na!e that contains a non/ A8CII character( I.#A translates the na!e into a se?uence of A8CII characters( and stores the result in the .#8. :or the clients 3the latest 'ersions of the widely/used browsers( :irefox and Internet )xplorer4 can accept and display non/A8CII do!ain na!es because they each i!ple!ent I.#A. $.* %hat are the four =TTP re?uest types" and when is each used& Answer: The four co!!on -TTP re?uest types and their usae can be i'en as follows: >)T: =e?uests a docu!ent* ser'er responds by sendin status infor!ation followed by a copy of the docu!ent -)A.: =e?uests status infor!ation* ser'er responds by sendin status infor!ation( but does not send a copy of the docu!ent P78T: 8ends data to a ser'er* the ser'er appends the data to a speci0ed ite! P9T 8ends data to a ser'er* the ser'er uses the data to co!pletely replace the speci0ed ite! $.+ %hat are the two main email access protocols& Answer: Two !a2or e!ail access protocols are: Post 7Eice Protocol 3P7P4 Internet 1ail Access Protocol 3I1AP4 $.. %here is an email access protocol used& Answer: An e!ail access protocol is used for users to access their !ailboxes( either to send or to recei'e e!ail !essaes. $.1/ %hy is a protocol for a standardi1ed service documented independent of an implementation& $.11 -earch the web to find out about iterative (<- lookup. @nder what circumstances is iterative lookup used& $.12 an a browser use transfer protocols other than =TTP& 5#plain. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, $.13 (escribe the steps a browser takes to determine whether to use an item from its cache. Answer: A browser sa'es the Last/1odi0ed date infor!ation alon with the cached copy. @efore it uses a docu!ent fro! the local cache( a browser !a$es a -)A. re?uest to the ser'er and co!pares the Last/ 1odi0ed date of the ser'erBs copy to the Last/1odi0ed date on the cached copy. If the cached 'ersion is stale( the browser downloads the new 'ersion. Alorith! &.1 su!!ari6es cachin. $.1$ =ow does an 6TP server know the port number to use for a data connection& Answer: @efore !a$in a re?uest to the ser'er( a client allocates a protocol port on its local operatin syste! and sends the port nu!ber to the ser'er. The client binds to the port to await a connection( and then trans!its a P7=T co!!and o'er the control connection to infor! the ser'er about the port nu!ber bein used. $.1' %hat are the two key aspects of application protocols" and what does each include& Answer: Application/layer protocols specify two aspects of interaction are i'en below: .ata =epresentation: 8yntax of data ite!s that are exchaned( speci0c for! used durin transfer( translation of inteers( characters( and 0les between co!puters .ata Transfer: Interaction between client and ser'er( !essae syntax and se!antics( 'alid and in'alid exchane error handlin( ter!ination of interaction $.1) %hat is the overall purpose of the (omain <ame -ystem& Answer: The o'erall purpose of .o!ain #a!e 8yste! 3.#84to pro'ide a ser'ice that !aps hu!an/readable sy!bolic na!es to co!puter addresses. $.1* %hy was :I:5 invented& Answer: 1ulti/purpose Internet 1ail )xtensions 31I1)4 standard allows the transfer of non/text data in a !essae. 1I1) specifies how a binary 0le can be encoded into printable characters( included in a !essae( and decoded by the recei'er. $.1+ 2ive e#amples of web protocols that illustrate each of the two aspects of an application protocol. $.1. an -:TP transfer an email message that contains a period on a line by itself& %hy or why not& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, $.2/ True or false; a web server must have a domain name that begins with www. 5#plain. Answer: :alse. An arbitrary co!puter can run a web ser'er( e'en if the co!puterBs do!ain na!e does not contain www. :urther!ore( a co!puter that has a do!ain na!e beinnin with www is not re?uired to run a web ser'er. 9sin the 0rst label in a do!ain na!e to denote a ser'ice 3e..( www4 is !erely a con'ention to help hu!ans. $.21 True or false; a (<- server can return a di8erent IP address for a given name" depending on whether the lookup specifies email or web service. 5#plain. Answer: ,es( a corporation !ay decide to use the na!e corporation.co! for both web and e!ail ser'ices. Fith the .#8( it is possible for the corporation to di'ide the wor$load between separate co!puters by !appin type A loo$ups to one co!puter and type 1D loo$ups to another. $.22 -ummari1e the characteristics of =T:L. Answer: -T1L has the followin eneral characteristics: 9ses a textual representation .escribes paes that contain !ulti!edia :ollows a declarati'e rather than procedural paradi! Pro'ides !ar$up speci0cations instead of for!attin Per!its a hyperlin$ to be e!bedded in an arbitrary ob2ect Allows a docu!ent to include !etadata $.23 %hen does a domain name server send a re?uest to an authoritative server and when does it answer the re?uest without sending to the authoritative server& $.2$ %hat are the four parts of a @AL" and what punctuation is used to separate the parts& Answer: The 9=L into four co!ponents: a protocol( a co!puter na!e( a docu!ent na!e( and para!eters. The co!puter na!e and protocol port are used to for! a connection to the ser'er on which the pae resides. And the docu!ent na!e and para!eters are used to re?uest a speci0c pae. $.2' =ow does a browser know whether an =TTP re?uest is syntactically incorrect or whether the referenced item does not e#ist& $.2) %hen a user re?uests an 6TP directory listing" how many TP connections are formed& 5#plain. Answer: :TP uses two types of connections to perfor! its functionality( na!ely te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. A control connection is reser'ed for co!!ands. )ach ti!e the ser'er needs to download or upload a 0le( the ser'er opens a new connection. A data connection is used to transfer 0les. $.2* List the three types of protocols used with email" and describe each. Answer: Three !a2or type of protocols bein used with e!ail are: Transfer: A protocol used to !o'e a copy of an e!ail !essae fro! one co!puter to another Access: A protocol that allows a user to access their !ailbox and to 'iew or send e!ail !essaes =epresentation A protocol that speci0es the for!at of an e!ail !essae when stored on dis$ $.2+ True or false; when a user runs an 6TP application" the application acts as both a client and server. 5#plain your answer. Answer: True( An :TP !ay in'ert the client/ser'er relationship for data connections. That is( when openin a data connection( the client acts li$e a ser'er 3i.e.( waits for the data connection4 and the ser'er acts li$e a client 3i.e.( initiates the data connection4. $.2. ,ssuming I-3 has assigned < country codes" how many top4level domains e#ist& $.3/ ,ccording to the original email paradigm" could a user receive email if the user7s computer did not run an email server& 5#plain. te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 3 ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, PART II %ata Communications Chapter & - Overview of %ata Communications '.1 %hat are the conceptual pieces of a data communications system& A communication can be a simple or a complex one depending on the technology, the need and the environment being deployed. A complex communication system involving many parties and different types of services may involve the following conceptual pieces: Information Sources Source Encoder and Source Decoder Encryptor and Decryptor hannel Encoder and hannel Decoder !ultiplexor and Demultiplexor !odulator and Demodulator "hysical hannel and #ransmission '.2 %hich piece of a data communications system prevents transmission errors from corrupting data& #he channel encoder and decoder parts of a communication system are responsible for protecting against possible errors during transmission. '.3 %hat three disciplines are involved in data communications& Data communication involves concepts from physics, mathematics, and electrical engineering. '.$ %hat are the motivations for data communications& #he following ideas provide motivation for data communications and help define the scope: #he sources of information can be of arbitrary types #ransmission uses a physical system !ultiple sources of information can share the underlying medium '.' %hich piece of a data communications system handles analog input& #he input to a communication system is first handled by source encoder, which receives information and transforms into a format that is suitable for further processing for transmission. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter '- Information Sources and Si#nals ).1 %hen shown a graph of a sine wave" what is the ?uickest way to determine whether the phase is 1ero& ).2 2ive three e#amples of information sources other than computers. ).3 %hy are sine waves fundamental to data communications& Sine waves are especially important in information sources because natural phenomena produce sine waves. ).$ %hy is an analog signal used to appro#imate a digital signal& $rom an engineering perspective, $ourier%s result is impractical for digital signals because accurate representation of a digital signal re&uires an infinite set of sine waves instead an approximate conversion of a signal from digital to analog can be used. So engineers build e&uipment to generate analog waves that closely approximate the digital signal ).' (escribe the di8erence between lossy and lossless compressions" and tell when each might be used. 'ossy compression is generally used with data that a human consumes, such as an image, a segment of video, or an audio file. #he (ey idea is that the compression only needs to preserve details to the level of human perception. #hat is, a change is acceptable if humans cannot detect the change. 'ossless compression preserves the original data without any change. #hus, lossless compression can be used for documents or in any situation where data must be preserved exactly. ).) If the ma#imum fre?uency audible to a human ear is 2/"/// =1" at what rate must the analog signal from a microphone be sampled when converting it to digital& #he sampling rate ) * + f max , so the signal should be sampled at *x*,,,,, ) -,,,,, ./ ).* %hat does 6ourier analysis of a composite wave produce& 0ith $ourier analysis, it is possible to decompose a composite signal into its constituent parts, a set of sine functions, each with a fre&uency, amplitude, and phase. ).+ %hat is the analog bandwidth of a signal& Analog bandwidth of signal can be defined as to be the difference between the highest and lowest fre&uencies of the constituent parts 1i.e., the highest and lowest fre&uencies obtained by $ourier analysis2 ).. <ame a common household device that emits an aperiodic signal. ).1/ 3n a fre?uency domain graph" what does the y4a#is represent& A fre&uency domain graph shows a set of simple sine waves that constitute a composite function. #he y3axis gives the amplitude, and the x3axis gives the fre&uency. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, ).11 %hy do some coding techni?ues use multiple signal elements to represent a single bit& ).12 Is bandwidth easier to compute from a time domain or fre?uency domain representation& %hy& It is easier to compute bandwidth from a fre&uency3domain representation ).13 %hat time elapses between samples for the P: encoding used in the telephone system& In commercial "! used telephone system 4,,, samples5s and each sample is represented by 4 bits. #herefore, data generation rate is 6-,,,, bits5s. So time elapsed between samples can be calculated as 75rate ) 756-,,,, s. ).1$ -uppose an engineer increases the number of possible signal levels from two to four. =ow many more bits can be sent in the same amount of time& 5#plain. #he number of levels that can be represented by n bits is given by * n . So if number of levels changes from * -, it means number of bits goes from 7 * ).1' -tate and describe the four fundamental characteristics of a sine wave. #here are four important characteristics of signals that relate to sine waves: $re&uency: the number of oscillations per unit time 1usually seconds2 Amplitude: the difference between the maximum and minimum signal heights "hase: how far the start of the sine wave is shifted from a reference time 0avelength: the length of a cycle as a signal propagates across a medium ).1) %hat is the bandwidth of a digital signal& 5#plain. According to the definition of analog bandwidth, a digital signal has infinite bandwidth because $ourier analysis of a digital signal produces an infinite set of sine waves with fre&uencies that grow to infinity. ).1* %hat aspect of a signal does the :anchester 5ncoding use to represent a bit& !anchester Encoding uses bit timing and transitions. It specifies that a 7 corresponds to a transition from , volts to a positive voltage level. orrespondingly, a , corresponds to a transition from a positive voltage level to /ero. $urthermore, the transitions occur in the 8middle9 of the time slot allocated to a bit. ).1+ %hen converting an analog signal to digital" what step follows sampling& After sampling, the samples are matched to &uanti/ation levels. ).1. %hen is a wave classified as simple& A signal is classified as simple when consist of a single sine wave that cannot be decomposed further. ).2/ %hat is the definition of baud& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, :aud is defined as the number of times that a signal can change per second ).21 %hat is a synchroni1ation error& If a receiver misses the exact5precise start5stop point of a signal, a mismatch in interpretation produce errors. Such errors are called synchroni/ation error. ).22 %hat is the chief advantage of a (i8erential :anchester 5ncoding& #he most important property of differential encoding is that the encoding wor(s correctly even if the two wires carrying the signal are accidentally reversed. . 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter ( - Transmission )edia *.1 List the three forms of optical Bber" and give the general properties of each. #here are three forms of optical fibers that provide a choice between performance and cost: !ultimode 3 Step Index: #he least expensive, and is used when performance is unimportant. #he boundary between the fiber and the cladding is abrupt which causes light to reflect fre&uently. #herefore, dispersion is high. !ultimode 3 ;raded Index: Slightly more expensive than the step index fiber. It has the advantage of ma(ing the density of the fiber increase near the edge5 It reduces reflection and lowers dispersion. Single !ode: #he most expensive, and provides the least dispersion. #he fiber has a smaller diameter and other properties that help reduce reflection. It is used for long distances and higher bit rates. *.2 If a telephone system can be created with a signal4to4noise ratio of $/ dC and an analog bandwidth of 3/// =1" how many bits per second could be transmitted& 6irst we should convert $/ dC to a real number" namely if $/ D 1/ log1/ -!< -!< D 1/"/// <sing the Shannon%s capacity expression ) : log * 17 = S5>2 ) ?,,,, log * 17= 7,,,,,2 ) to be determined by reader *.3 %hat is the di8erence between guided and unguided transmission& 0e use the terms guided and unguided transmission to distinguish between physical media such as copper wiring or optical fibers that provide a specific path 1guided2 and a radio transmission that travels in all directions through free space 1unguided2 . Informally, engineers use the terms wired and wireless. *.$ %hat are the three energy types used when classifying physical media according to energy used& #hree types of energy used when classifying physical media are electrical, electromechanical 1radio2, and light *.' %hat is dispersion& In optics, dispersion is the phenomenon in which the phase velocity of a wave depends on its fre&uency. !edia having such a property are termed dispersive media. *.) %hat is propagation delay& "ropagation delay can be defined as the time re&uired for a signal to traverse 1travel from one end to the other end2 the medium *.* %hat is the appro#imate conical angle that can be used with InfraAed technology& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ) ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *.+ If a system has an input power level of .///" and an output power level of 3///" what is the di8erence when e#pressed in dC& Decibel is expressed as 7, log 7, 1" out 5" in 2 7, log 7, 1?,,,,5@,,,,2 ) *.. %hat happens when noise encounters a metal ob0ect& 0hen it hits metal, electromagnetic radiation induces a small signal. Aandom noise can interfere with signals used for communication. !etals absorb radiation, metal acts as a shield. "lacing metal between a source of noise and a communication medium can prevent noise from interfering with communication. *.1/ (raw a diagram that illustrates the cross section of a coa#ial cable. *.11 5#plain how twisted pair cable reduces the e8ect of noise. Aeader is encouraged to analy/e $ig.B.* a2 and b2 and interpret *.12 If you are installing computer network wiring in a new house" what category of twisted pair cable would you choose& %hy& >owadays, the trend is using wireless rather than cabled solutions, but depend on &uality of service and cost limitations an appropriate category of twisted pair cable *.13 an laser communication be used from a moving vehicle& 5#plain. *.1$ If two signal levels are used" what is the data rate that can be sent over a coa#ial cable that has an analog bandwidth of ).2 :=1& <sing the D ) * : log * C relationship, D ) *D6.*Dlog * * ) *D6.*D7 ) 7*.- !bps *.1' %hat is the chief disadvantage of optical fiber as opposed to copper wiring& Eptical fibers are less suitable for bending or pulling, also needs speciali/ed e&uipment and highly &ualified technicians to install5maintain *.1) %hat light sources and sensors are used with optical fibers& 'ight sources and sensors that are used with optical fibers are: #ransmission: 'ight Emitting Diode 1'ED2 or InFection 'aser Diode 1I'D2 Aeception: photo3sensitive cell or photodiode *.1* %hat are the two broad categories of wireless communications& 0ireless technologies can be classified into two broad categories as follows: #errestrial: ommunication uses e&uipment such as radio or microwave transmitters that is relatively close to the earth%s surface. >on3terrestrial: Some of the e&uipment used in communication is outside the earth%s atmosphere 1e.g., a satellite in orbit around the earth2. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou * ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *.1+ If messages are sent from 5urope to the @nited -tates using a 253 satellite" how long will it take for a message to be sent and a reply to be received& #he speed of a signal can be approximated as 1v2 ) ?x7,4 m5s. #he relation between #ime, Distance and Speed is given by: #ime ) Distance 5 Speed. So, the time ta(en for a signal to travel between Europe and <SA depends on the distance between the points5location being used. Aeader is encouraged to find out the closest and farthest points between two continents and calculate the time re&uired to ma(e a complete round trip. *.1. List the three types of communications satellites" and give the characteristics of each. !aFor categori/ation of communication satellites: 'ow Earth Erbit 1'EE2: !edium Earth Erbit 1!EE2 ;eostationary Earth Erbit 1;EE2 Aeader expected to write a paragraph for the characteristics of each *.2/ =ow many 253 satellites are needed to reach all populated areas on the earth& #heoretically ? 1three2 satellites suffice to cover the whole surface of the earth, but in practice many more are used to cover and delivery &uality service *.21 If a system has an average power level of 1//" an average noise level of 33.33" and a bandwidth of 1// :=1" what is the e8ective limit on channel capacity& Shannon theorem specify the maximum data rate that could be achieved over a transmission system that experiences noise: ) : log * 17 = S5>2 where is the effective limit on the channel capacity in bits per second, : is the bandwidth, and S5> is the signal3to3noise ratio. <sing the formulae, we can calculate for the above given values: ) 7,,,,,,,,,, D log * 17 = 7,,5??.??2 ) 7,,,,,,,,,, D log * - ) *,,,,,,,,,, ) *,, !bps *.22 %hat is the relationship between bandwidth" signal levels" and data rate& If a transmission system uses C possible signal levels and has an analog bandwidth :, >y&uist%s #heorem states that the maximum data rate in bits per second, D, is: D ) * : log * C *.23 %hat three types of wiring are used to reduce interference form noise& #here are three forms of wiring that help reduce interference from electrical noise, these are namely: <nshielded #wisted "air 1<#"2 oaxial able Shielded #wisted "air 1S#"2 *.2$ 5#plain why light does not leave an optical fiber when the fiber is bent into an arc. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou + ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *.2' %hy might low4fre?uency electromagnetic radiation be used for communications& 5#plain. te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. Ch * - +elia,ilit- And Channel Codin# +.1 List and e#plain the three main sources of transmission errors. #here are three main categories of transmission errors: Interference: Electromagnetic radiation emitted from devices such as electric motors and bac(ground cosmic radiation cause noise that can disturb radio transmissions and signals traveling across wires. Distortion: 0ires have properties of capacitance and inductance that bloc( signals at some fre&uencies while admitting signals at other fre&uencies. All physical systems distort signals. As a pulse travels along an optical fiber, the pulse disperses. Attenuation. As a signal passes across a medium, the signal becomes wea(er. Signals on wires or optical fibers become wea(er over long distances, Fust as a radio signal becomes wea(er with distance. +.2 =ow do transmission errors e8ect data& #ransmission errors can effect data in different ways, namely it can create single3bit errors, burst errors, and5or erasures. +.3 %hat does an ideal channel coding scheme achieve& +.$ %hat are the characteristics of a A& A codes have many mathematical and usage characteristics, but we can mention the following ones: Arbitary message length Excellent error detection $ast hardware implementation +.' (efine the concept of =amming distance. #he .amming distance is defined as the number of differences in a given two strings of n bits each 1i.e., the number of bits that must be changed to transform one bit string to the other2. +.) List and e#plain the function of the two hardware building blocks used to implement A computation. +.* =ow does one compute the minimum number of bit changes that can transform a valid codeword into another valid codeword& #his is related to .amming distance. 0e define minimum .amming distance, which is minimum among the .amming distance between each and every pair of codeword. !inimum .amming distance the minimum number of errors that can change a valid codeword into an invalid one 1error2 +.+ ompute the =amming distance for the following pairs; E////" ///1F" E/1/1" ///1F" E1111" 1//1F" and E ///1" 111/F. #he .amming distance for the following pairs is: 1,,,,, ,,,72 ) 7 1,7,7, ,,,72 ) 7 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u / ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 17777, 7,,72 ) * 1 ,,,7, 777,2 ) - +.. In a burst error" how is burst length measured& $or a burst error, the burst si/e, or length, is defined as the number of bits from the start of the corruption to the end of the corruption. +.1/ 2ive an e#ample of a block error code used with character data. +.11 %hat is a codeword" and how is it used in forward error correction& 0e can define the set of all possible messages to be a set of datawords, and define the set of all possible encoded versions to be a set of codewords. So each possible code se&uence is considered to be a codeword. +.12 5#plain the concept of code rate. Is a high code rate or low code rate desirable& ode rate can be defines as the ratio of a dataword si/e to the codeword si/e. !athematically, the code rate, A, for an 1 n, ( 2 error coding scheme is given as: A ) (5n, where ( is the number of information bits, and n is the number of bits in a codeword. +.13 2enerate a A, parity matri# for a E2/" 12F coding of the dataword 1///11/11111. 7 , , , 7 7 7 , 7 7 7 7 7 7 , 7 , 7 , , +.1$ -how the division of 1//1/1/1/1/ by 1/1/1. +.1' 5#press the two values in the previous e#ercise as polynomials. X 10 + X 7 + X 5 + X 3 + X X 4 + X
+ 1 +.1) %rite a computer program that implements the E*"$F cyclic redundancy code in 6igure +.11. +.1* %rite a computer program that computes a 1)4bit Internet checksum. +.1+ %hat can a A, scheme achieve that a single parity bit scheme cannot& AA can correct single bit errors. .owever, single parity bit can only detect single 1or odd2 number of errors. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Ch . - Transmission )odes ..1 %hat are the advantages of parallel transmission& %hat is the chief disadvantage& A parallel mode of transmission has two chief advantages: .igh speed: :ecause it can send > bits at the same time, a parallel interface can operate > times faster than an e&uivalent serial interface. !atch to underlying hardware: Internally, computer and communication hardware uses parallel circuitry. #hus, a parallel interface matches the internal hardware well. #he main disadvantage of parallel transmission is number of cables re&uired, for long distance communication, this is an important consideration. ..2 (escribe the di8erence between serial and parallel transmission. #ransmission modes can be divided into two fundamental categories: Serial: one bit is sent at a time "arallel: multiple bits are sent at the same time ..3 %hen using a synchronous transmission scheme" what happens when a sender does not have data to send& #o insure that the sender and receiver stay synchroni/ed, a frame starts with a special se&uence of bits. $urthermore, most synchronous systems include a special idle se!uence 1or idle "#te2 that is transmitted when the sender has no data to send ..$ %hat is the chief characteristic of asynchronous transmission& Asynchronous transmission can occur at any time, with an arbitrary delay between the transmission of two data items, it allows the physical medium to be idle for an arbitrary time between two transmissions. ..' %hich type Eor typesF of serial transmission is appropriate for video transmission& 6or a keyboard connection to a computer& ..) @se the %eb to find the definition of the (5 and (T5 pinouts used on a (C4 2' connector. =int; pins 2 and 3 are transmit or receive. 3n a (5 type connector" does pin 2 transmit or receive& ..* Is a modem classiBed as (T5 or (5& A modem is classified as Data ommunications E&uipment 1DE2 ..+ %hen transmitting a 324bit 27s complement integer in big4endian order" when is the sign bit transmitted& Engineers use the term little$endian to describe a system that sends the 'eas Significant :it 1'S:2 first, and the term "ig$endian to describe a system that sends the !ost Significant :it 1!S:2 first. According to the definition given, for a ?*3bit *%s complement integer in big3endian order, the sign bit, namely !S:. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, ... %hat is a start bit" and with which type of serial transmission is a start bit used& Some systems use extra bits allow the receiver%s hardware to synchroni/e with the incoming signal. In some asynchronous systems, the extra bits are (nown as a %rea&"leG in others, the extra bits are (nown as start "its. ..1/ %hen two humans hold a conversation" do they use simple#" half4duple#" or full4 duple# transmission& It depends, but most appropriate type of communication between two reasonable human being would be half3 duplex. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 1/ - )odulation And )odems 1/.1 -earch the %eb and find a constellation diagram for 32 G,:. =ow many points are defined in each ?uadrant& 1/.2 List the three basic types of analog modulation. #hree maFor categories of analog modulation are: Amplitude !odulation 1A!2 $re&uency !odulation 1$!2 "hase !odulation 1"!F 1/.3 In phase shift keying" is it possible to have a phase shift of ./ degree& of 2*/ degree& of 3)/ degree& (raw an e#ample to e#plain your answer. 1/.$ %hen using amplitude modulation" does it make sense for a 1 =1 carrier to be modulated by a 2 =1 sine wave& %hy or why not& In modulation generally the idea is to carry a low3fre&uency signal with a high3fre&uency carrier signal. So, it will not be appropriate to modulate a 7 ./ carrier with a * ./ sine wave. 1/.' @sing -hannon7s Theorem" e#plain why practical amplitude modulation systems keep the carrier near ma#imum strength. 1/.) ,ssuming a signal4to4noise ratio of 3/ dC" what is the ma#imum data rate that can be achieved for the dialup bandwidth illustrated in 6igure 1/.11& #he bandwidth of the system is ?,,, H 6,, ) *,-,, ./. Since, S5> is given, we%ll use Shannon%s capacity expression ) : log * 17 = S5>2. 0e should convert ?, d: to real value, which means S5> ) 7,,,,. So ) *,-,, log * 17 = 7,,,,2 ) the result to be determined by the reader 1/.* %hat is the di8erence between shift keying and modulation& Instead of modulation that is proportional to a continuous signal, digital schemes use discrete values. #o distinguish between analog and digital modulation, we use the term shift 'e#ing (&eaning a"ru%t changes) rather than modulation 1continuous, smooth changes2. 1/.+ 6igure 1/.. shows a full4duple# configuration with four wires" two of which are used to transmit in each direction. ,rgue that it should be possible to use three wires instead. 1/.. In the previous ?uestion" why are four wires preferable& #he number of wires being used will determine the speed and mode of operation, namely a system being half3 duplex or full3duplex. So depending on the speed re&uired and5or mode of operation *3wire or -3wire cabling is used. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 11 - )ultiplexin# And %emultiplexin# 0Channeli1atio n2 11.1 In a hierarchical 6(: system" e#plain how a high4capacity channel is divided into sub4channels. 11.2 -uppose < users compete using a statistical T(: system" and suppose the underlying physical transport can send H bits per second. %hat is the minimum and ma#imum data rate that an individual user can e#perience& If we neglect the overhead generated by statistical #D!, a system will have two possibilities: !inimum: If all channels have e&ual data then the rate will be C5> bps !aximum: If only one channel active and the others are passive, then rate will be C bps 11.3 2ive an e#ample of multiple#ing in a non4electronic communication system. xing 1D!2 11.$ =ow does 6(: use electromagnetic radiation& In $D!, a set of radio stations can transmit electromagnetic signals simultaneously without interference provided they each use a separate channel 1i.e., carrier fre&uency2 11.' In a hierarchical T(: system" at what bit rate does the output of a given level need to operate& E5#press the answer in terms of the number and bit rate of inputs.F #he bit rate can be calculated ) >umber of input lines x bit rate of individual line = framing bits 11.) Is a T(: system re?uired to use round4robin service& Some #D! systems use a round3robin service while some others may not use round3robin, variations exist, based on the need. 11.* %hat are the four basic types of multiple#ing& #here are four basic approaches to multiplexing that each have a set of variations and implementations. $re&uency Division !ultiplexing 1$D!2 0avelength Division !ultiplexing 10D!2 #ime Division !ultiplexing 1#D!2 ode Division !ultiple 11.+ 5#plain how a range of fre?uencies can be used to increase data rate. #o increase the overall data rate, a sender divides the fre&uency range of the channel into C carriers, and sends 7 5C of the data over each carrier. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 11.. %hat is a guard band& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u ) ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, $or proper communication without interference, we should choose a set of carrier fre&uencies with a gap between them (nown as a guard band. #he guard band reduces or eliminates the possible interference between neighboring carrier signals. 11.1/ -uppose an 3412 circuit is twenty percent the cost of an 34$+ circuit. %hat multiple#ing technology can an I-P use to lower the cost of sending data at the 34$+ rate. 5#plain. An IS" may use inverse multiplexing, which can utili/e - x E37*, which will cost I 4, of a E3-4, assuming no cost for e&uipment at the multiplexing5demultiplexing. 11.11 3f the four basic multiple#ing techni?ues" is (: always the best& 5#plain. In terms of resource utili/ation 1speed, channel2 D! is the best, but in terms of complexity in implementation and getting the system up and running may not be optimum solution. 11.12 ,n 6(: system may assign each channel a range of fre?uencies. @sing a range is essential when which type of modulation is used for each carrier& A range of fre&uencies may be used in $D! for increasing data rate or increasing immunity against noise5inference. 11.13 %hat is the key mechanism used to combine or separate wavelengths of light in a %(: system& "risms form the basis of optical multiplexing and demultiplexing. A multiplexor accepts beams of light of various wavelengths and uses a prism to combine them into a single beamG a demultiplexor uses a prism to separate the wavelengths. 11.1$ 5#plain why framing and synchroni1ation are important in a T(: system. #D! re&uires that a demultiplexor stays synchroni/ed with the multiplexor. :ecause a demultiplexor cannot tell where a slot begins, a slight difference in the cloc(s used to time bits can cause a demultiplexor to misinterpret the bit stream. #o prevent misinterpretation, #D! used in the phone system includes an extra framing channel as input. Instead of ta(ing a complete slot, framing inserts a single bit in the stream on each round. 11.1' -earch the %eb to find the length of a chip se?uence used in (:, phone systems. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u * ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapte 12 - Access And Interconnection Technolo#ies 12.1 If a customer intends to receive more data than they receive" which forms of (-L would be appropriate& In this case ADS' would be more appropriate choice 12.2 %hy would a service provider choose =ybrid 6iber oa# instead of 6iber To The Premises& It depends on the existing infrastructure or cost related issues. Each case should be considered on its own circumstances 12.3 %hy did the designers of the -ynchronous (igital =ierarchy choose unusual values for data rates instead of e#act powers of ten& 12.$ Two neighbors" who live on the same street" both use ,(-L service" but measurements show that one subscriber can download at appro#imately 1.' :bps and the other can download at 2./ :bps. 5#plain. ADS' is adaptive. #hat is, when a pair of ADS' modems are powered on, they probe the line between them to find its characteristics, and then agree to communicate using techni&ues that are optimal for the line. 0hen ADS' starts, both ends probe the available fre&uencies to determine which fre&uencies wor( well and which experience interference. Also, the two ends assess the signal &uality at each fre&uency, and use the &uality to select a modulation scheme. If a particular fre&uency has a high signal3to3noise ratio, ADS' selects a modulation scheme that encodes many bits per baudG if the &uality on a given fre&uency is low, ADS' selects a modulation scheme that encodes fewer bits per baud. 12.' %hat is an access technology& Internet access technology refers to a data communications system that connects an Internet subscriber 1typically a private residence or business2 to an Internet Service "rovider 1IS"2, such as a telephone company or cable company. 12.) 5#plain how the si1e of a -3<5T frame is computed. Digital telephony ta(es 4,,,, "! samples per second, which means that a sample is ta(en every 7*J K seconds. SE>E# uses the time to define frame si/e. $or example, at the S#S37 transmission rate of J7.4-, !bps, exactly 6-4, bits are transferred in 7*J K seconds, which means that a frame consists of 47, each being 43 bit octet. 12.* 2ive e#amples of narrowband and broadband access technologies. #he following can be given as examples of narrowband access technologies: Dialup telephone connections 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u + ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 'eased circuit using modems $ractional #7 data circuits ISD> and other telco data services #he following can be given as examples of broadband access technologies: DS' technologies able modem technologies 0ireless access technologies Data circuits at #7 speed or higher 12.+ %hat is the advantage of %i:,> access technology compared to satellite& %hat is the advantage of satellite& 0hen two system are compared we should consider data rate, speed5delay, cost and other performance issues. Aeader is expected to evaluate and compare them. 12.. %hy do service providers distinguish between upstream and downstream communication& A typical residential subscriber receives much more information than the subscriber transmits, Internet access technologies are designed to transfer more data in one direction than the other. #he networ(ing industry uses the term downstream to refer to data traveling from an IS" to a subscriber, and upstream to refer to data traveling from a subscriber to an IS". 12.1/ Telephone companies once promoted I-(< as a high4speed access technology. %hy has use of I-(< declined& 0hen ISD> was first proposed, 7*4 Cbps seemed much faster than dialup modems. So telephone companies promoted the technology a lot. :ut, the newer local loop technologies provide higher data rates at lower cost, relegating ISD> to a few special cases. :ecause the speed5&uality offered by ISD> stayed behind some other newer technologies, it%s almost abandoned. 12.11 If you had a choice between (-L and cable modem" which would provide the highest potential data rate& In theory, a cable system can support data rates of J* !bps downstream and J7* Cbps upstream. In practice, the rate can be much less. $irst, the data rate of a cable modem only pertains to communication between the local cable office and the subscriber%s site. Second, the bandwidth is shared among a set of > subscribers, where the si/e of the set is controlled by the cable provider. $rom a subscriber%s point of view, sharing the bandwidth with other subscribers can be a disadvantage because the effective data rate available to each individual subscriber varies over time. In the worst case, if > subscribers share a single fre&uency, the amount of capacity available to an individual subscriber will be 7 5>. DS' provide constant or near3constant service. So the decision of selecting DS' or cable modem will depend on the type of application5environment. 12.12 If someone shows you a copper cable and claims that it is an I3412 circuitJ" what error have they made& %hat is the correct name they should have used& It%s an error of reference to wrong type of media. Synchronous #ransport Signal 1S#S2 standards refer to the electrical signals used in the digital circuit interface 1i.e., over copper2, while the Eptical arrier 1E2 standards refer to the optical signals that propagate across the fiber. 12.13 If you lease a T1 circuit" what e?uipment will be installed between the circuit and a computer at your site& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. 12.1$ %hat type of multiple#ing does ,(-L use& ADS' uses a scheme (nown as Discrete !ulti #one modulation 1D!#2 that combines fre&uency division multiplexing and inverse multiplexing techni&ues. 12.1' @se the %eb to find the appro#imate si1e of a movie on (K(. =ow long does it take to download a movie over a T1 line& 3ver a T3 line& EIgnore overhead.F 12.1) %hy is a splitter used with (-L& 'ifting a receiver can generate noise that interferes with DS' signals. #o provide complete isolation, ADS' uses an $D! device (nown as a splitter that divides the bandwidth by passing low fre&uencies to one output and high fre&uencies to another. 12.1* %here is a head4end modem located& , tail4end modem& An access technology re&uires a pair of modems, with one at the subscriber%s site and one at the provider%s site. #he industry uses the term head3end modem to refer to a modem used at the central office, and the term tail3end modem to refer to a modem used at the subscriber%s location. te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u + ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, "A+T III "ac!et Switchin# and etwor! Technolo#ies Chapter 13 - 3ocal Area etwor!s4 "ac!ets5 6rames5 And Topolo#ie s 7?.7 What is circuit switching, and what are its chief characteristics? #he term circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation from paths used by other pairs of senders and receivers. ircuit switching is usually associated with telephone technology because a telephone system provides a dedicated connection between two telephones. #he circuit switching has the following main characteristics: "oint3to3point communication Separate steps for circuit creation, use, and termination "erformance e&uivalent to an isolated physical path 7?.* What are the characteristics of LANs, MANs, and WANs? #here are lots of details that can be said and discussed for categori/ation of networ( types based on geography, few points are highlighted below: 'ocal Area >etwor( 1'A>2: 'east expensiveG spans a single room or a single building !etropolitan Area >etwor( 1!A>2 !edium expenseG spans a maFor city or a metroplex 0ide Area >etwor( 10A>2 !ost expensiveG spans sites in multiple cities 7?.? Name the two sublayers of Layer 2 rotocols defined by !""", and gi#e the urose of each$ #he 'ayer * protocols defined by IEEE defines two sub3layers as mentioned below: 'ogical 'in( ontrol 1''2 Addressing and demultiplexing !edia Access ontrol 1!A2 Access to shared media 7?.- !n a circuit%switched networ&, can multile circuits share a single otical fiber? "'lain$ It%s possible. Since the circuit switching means that the communication between two parties is not affected in any way by communication among other parties, even if all communication is multiplexed over a common medium. In particular, circuit switching must provide the illusion of an isolated path for each pair of communicating entities. 7?.J (i#e a definition of the term frame$ In a pac(et3switched networ(, each fra&e corresponds to a pac(et processed at data lin( layer. 7?.6 What is a oint%to%oint networ&? #he term %oint$to$%oint refers to a communication mechanism that connects exactly two communicating entities. 7?.B Write a air of comuter rograms, one that accets a data file as inut and roduces a byte stuffed #ersion of the file according to the maing in )igure *+$*2, and another that remo#es byte stuffing$ ,how that your rograms 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, interoerate with those written by others$ 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 7?.4 -an the wires of a ring networ& be arranged in a straight line .e$g$, down a hallway/? "'lain$ #he name ring arises because one can imagine the computers and the cables connecting them arranged in a circle as .owever, in practice, the cables in a ring networ( do not form a circle. Instead, they run along hallways or rise vertically from one floor of a building to another. 7?.@ What are the four basic LAN toologies? #he four basic 'A> topologies are star, ring, mesh and bus 7?.7, !n a ac&et switching system, how does a sender transfer a large file? #he pac(et switching system re&uires a sender to divide each message into bloc(s of data that are (nown as %ac'ets. #he si/e of a pac(et variesG each pac(et switching technology defines a maximum pac(et si/e. So, a large file will be divided into smaller pieces and sent. 7?.77 !f someone wanted to broadcast a coy of a #ideo resentation, is a circuit switching system or a ac&et switching referable? Why? "ac(et switching has the characteristic of establishing arbitrary, asynchronous communication means that can allow a sender to communicate with one recipient or multiple recipients. Also, a given recipient can receive messages from one sender or multiple senders. 7?.7* 0efine unicast, multicast, and broadcast addresses$ "'lain the meaning of each$ #hree categories of communication types are listed and described below: <nicast: <ni&uely identifies a single computer, and specifies that only the identified computer should receive a copy of the pac(et :roadcast: orresponds to all computers, and specifies that each computer on the networ( should receive a copy of the pac(et !ulticast: Identifies a subset of the computers on a given networ(, and specifies that each computer in the subset should receive a copy of the pac(et 7?.7? Why is byte stuffing needed? 0hat happens if the payload of a frame includes one or more bytes with control values5characters, such as EE#, SE., which can be mista(en an actual control characterL #he solution lies with using a techni&ue (nown as "#te stuffing that allows transmission of arbitrary data without confusion. So each such case is replaced with a matching se&uence which try to eliminate the confusion. 7?.7- (i#en an !""" MA- address, how can one tell if the address refers to unicast? In the -43bit IEEE !A address one bit determine the type of connection. #he value of the bit at position 4 specifies type of communicationG , 1unicast2 7 1multicast2 7?.7J 1ow does a comuter attached to a shared LAN decide whether to accet a ac&et? 'A> transmits pac(ets over a shared medium. In a typical 'A>, each computer on the 'A> monitors the shared medium, extracts a copy of each pac(et, and then examines the address in the pac(et to determine whether the pac(et should be processed or ignored. 7?.76 What term is used to describe the metadata that accomanies a ac&et? 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, #he header is used to describe metadata that contains information used to process the frame. In particular, a header usually contains an address that specifies the intended recipient. 7?.7B !n a mesh networ&, how many connections are re2uired among 23 comuters? #he expression to calculate number of connections in a mesh networ( is given by 1n * 3n25*. So for *, computers then number of connections re&uired will be ) 1*, * H *,25* 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 1$ - The IEEE )AC Su,-3a-er 7-.7 "'lain the three basic aroaches used to arbitrate access to a shared medium$ #he three basic approaches used to arbitrate access to a shared medium are: ontrolled access protocols Aandom access protocols hanneli/ation protocols 7-.* Why is -,MA4-A needed in a wireless networ&? In wireless networ(s there is a hidden ter&inal*station %ro"le&, where some stations may not see5detect the transmission between some other parties. #o ensure that all stations share the transmission media correctly, wireless 'A>s use a modified access protocol (nown as +arrier ,ense -ulti%le Access .ith +ollision A/oidance 1+,-A*+A2. Instead of depending on all other computers to receive all transmissions, the S!A5A used with wireless 'A>s triggers a brief transmission from the intended receiver before transmitting a pac(et. #he idea is that if both the sender and receiver transmit a message, all computers within range of either will (now a pac(et transmission is beginning. 7-.? "'lain olling and the two general olling olicies$ #he %olling uses a centrali/ed controller, which cycles through stations on the networ( and gives each an opportunity to transmit a pac(et 7-.- !n the Aloha rotocol, what haens if two stations attemt simultaneous transmission on the inbound fre2uency, and how is the roblem handled? If two stations simultaneously attempt to transmit on the inbound fre&uency, the signals will interfere and the two transmissions will be garbled. 0e use the term collision, and say that the two transmitted pac(ets collide in the medium. #he protocol handles a collision by re&uiring a sender to retrans&it each lost pac(et. 7-.J What is binary e'onential bac&off? Doubling the range of the random delay after each collision is (nown as "inar# e0%onential "ac'off. In essence, exponential bac(off means that an Ethernet can recover &uic(ly after a collision, because each computer agrees to wait longer times between attempts when the cable becomes busy. Even in the unli(ely event that two or more computers choose delays that are approximately e&ual, exponential bac(off guarantees that contention for the cable will be reduced after a few collisions. 7-.6 (i#e an e'amle of a networ& that uses dynamic channel allocation$ 7-.B List the three main tyes of channeli5ation and the characteristics of each$ #he three types of channeli/ation are $re&uency division multiple access 1$D!A2G onsists of a mechanism that allows independent stations to choose carrier fre&uencies that will not conflict with the carriers used by other stations. #ime division multiple access 1#D!A2G Each active participant is assigned a se&uence number from 7 to >, and stations transmit in order 7, *, ?, ... >. ode division multiplexingG Allows multiple stations to transmit at the same time by encoding each transmission with some mathematically proven strategy. 7-.4 !n a reser#ation system, how does a controller form a list of stations that will transmit in a gi#en round? A reser/ation system, often used with satellite transmission, employs a two3step process in which each round of pac(et transmissions is planned in advance. In the first step, each potential sender specifies whether they 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ) ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, have a pac(et to send during the next round and the controller transmits a list of the stations that will be transmitting. In the second step, stations use the list to (now when they should transmit 7-.@ "'and the acronym -,MA4-0, and e'lain each art$ #he acronym S!A5D stands for +arrier ,ense -ulti$Access with +ollision Detection, which means the following: +arrier ,ense: Instead of allowing a station to transmit whenever a pac(et becomes ready, Ethernet re&uires each station to monitor the cable to detect whether another transmission is already in progress. -ulti%le Access: #he system allows multiple users5hosts to ma(e use of a common5shared media +ollision Detection. A collision can occur if two stations wait for a transmission to stop, find the cable idle, and both start transmitting. 7-.7, Why does -,MA4-0 use a random delay? .1int6 thin& of many identical comuters on a networ&$/ Aandomi/ation is used to avoid having multiple stations transmit simultaneously as soon as the cable is idle. #hat is, the standard specifies a maximum delay, d, and re&uires each station to choose a random delay less than d after a collision occurs. In most cases, when two stations each choose a random value, the station that chooses the smallest delay will proceed to send a pac(et and the networ( will return to normal operation. 7-.77 What is a to&en, and how are to&ens used to control networ& access? A special control message is called a to'en. In a to(en passing system, when no station has any pac(ets to send, the to(en circulates among all stations continuously. 0hen a station captures the to(en, it sends its data, and when transmission completed, it releases the to(en. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou * ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 1& - 7ired 3A Technolo#- 0Ethernet And */2832 7J.7 What is an "thernet hub, and what wiring is used with a hub? An electronic device that serves as the central interconnection is (nown as a hu". .ubs were available in a variety of si/es, with the cost proportional to si/e$ #he hubs are becoming old3fashioned, and being replaced with switches. 7J.* 1ow large is the ma'imum "thernet frame, including the -7-? According to $ig. 7J.7 a conventional Ethernet frame has the following fields: .eader: 7- bytes 1fixed2 "ayload: -637J,, bytes 1there is a minimum frame si/e because of collision detection2 A: - bytes 1fixed2 Accordingly an Ethernet frame will be maximum 7J74 bytes and minimum 6- bytes 7J.? What category of twisted air wiring is needed for a *3 Mbs networ&? *33 Mbs? *333 Mbs? #he three maFor categories of Ethernet and their wiring is listed below: 7, !bps: 7,:ase# 1Ethernet2 ategory J 7,, !bps: 7,,:ase# 1Ethernet $ast2 ategory JE 7 ;bps: 7,,,:ase# 1;igabit Ethernet2 ategory 6 7J.- 1ow can a recei#er tell whether an "thernet frame uses the 832$+ standard? #o (eep the two versions of Ethernet compatible, a convention is used: If bytes 7?37- of an Ethernet frame contain a numeric value less than 7J,,, the field is interpreted as a pac(et length and the 4,*.? standard appliesG otherwise, the field is interpreted as a type field and the original Ethernet standard applies. 7J.J 1ow did a comuter attach to a 9hic&net "thernet? .ardware used with #hic(net was divided into two maFor parts: #ransceiver: A networ( interface card 1>I2 handled the digital aspects of communication, and a separate electronic device called a transcei/er connected to the Ethernet cable and handled carrier detection, conversion of bits into appropriate voltages for transmission, and conversion of incoming signals to bits. A<I: A physical cable (nown as an Attach&ent 1nit Interface 1A1I2 connected a transceiver to a >I in a computer. A transceiver was usually remote from a computer. 7J.6 1ow were comuters attached to a 9hinnet "thernet? #hinnet Ethernet 1formally named 102ase2 uses a thinner coaxial cable that was more flexible than #hic(net. #he wiring scheme differed dramatically from #hic(net. Instead of using A<I connections between a computer and a transceiver, #hinnet integrates a transceiver directly on the >I, and runs a coaxial cable from one computer to another. 7J.B Which style of "thernet wiring re2uires more hysical wires in an office building? .ub5switch type of Ethernet wiring re&uires more physical wires, but gradually 'A> wiring is being replaced with wireless options available 7J.4 1ow is the tye field in the "thernet header used? 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou + ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, #he type field in an Ethernet frame provides multiplexing and demultiplexing that allows a given computer to have multiple protocols operating simultaneously. 7J.@ Loo& u switches and hubs on the Web$ !f you were offered a switch or hub that oerated at the same bit rate for the same rice, which would you choose? Why? 7J.7, !n an 832$+ "thernet frame, what is the ma'imum ayload si5e? #he 4,*.? Ethernet ma(es use of 43bytes of the original5conventional Ethernet for 3ogical 3in' +ontrol * ,u"$ 4etwor' Attach&ent 5oint (33+ * ,4A52 header instead of extending5increasing the header. #his is for sa(e of bac(ward compatibility. So the maximum pay load is reduced from 7J,, bytes to 7-@* bytes. 7J.77 When it is used, where is an LL-4,NA: header laced? 0hen it is used, ''5S>A" header is placed after the original header, in the beginning of the payload area. 7J.7* (i#e an e'amle of a networ& with differing hysical and logical toologies$ 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 1' - 7ireless etwor!in# Technolo#ies 76.7 What is the Wi%)i Alliance? 0i3fi Alliance is a group of vendors who build wireless e&uipment. It is a non3profit organi/ation that tests and certifies wireless e&uipment using the 4,*.77 standards. 76.* What features are controllable in a software radio? $eatures that can be controlled in a software programmable radio are: $re&uency: #he exact set of fre&uencies used at a given time "ower: #he amount of power the transmitter emits !odulation: #he signal and channel coding and modulation !ultiplexing: Any combination of D!A, #D!A, $D!A and others Signal Direction: Antennas can be tuned for a specific direction !A "rotocol: All aspects of framing and !A addressing 76.? Name three wireless :AN technologies, and gi#e a short descrition of each$ ategori/ation of "ersonal Area >etwor( 1"A>2 technologies and their short description can be given as follows: :luetooth : ommunication over a short distance between a small peripheral device such as a headset or mouse and a system such as a cell phone or a computer InfraAed: 'ine3of3sight communication between a small device, often a hand3held controller, and a nearby system such as a computer or entertainment center IS!: ommunication using fre&uencies set aside for Industrial wireless Scientific and !edical devices, an environment where electromagnetic interference may be present 76.- What are the three bloc&s of fre2uencies used by wireless LANs and :ANs? #he following range of fre&uencies are allocated for the usage of 'A>s and IS! applications without paying license fee: Aange of @,* 3 @*4 !./ Aange of *.- 3 *.-4* ;./ Aange of J.B*J H J.4J, ;./ 76.J (i#e the numeric refi' !""" standards use for Wi%)i networ&s$ IEEE standards use the following common notation for 0i3$i networ(s IEEE 4,*.77 IEEE 4,*.77a IEEE 4,*.77g IEEE 4,*.77g $ew others also being developed 76.6 9o what does a cell tower connect? ellular systems were originally designed to provide voice services to mobile customers. ellular systems are being used to provide data services and Internet connectivity. Each cell contains a tower, and a group of 1usually adFacent2 cells is connected to a !obile Switching enter. #he center trac(s a mobile user, and manages handoff as the user passes from one cell to another. 76.B What is 7)!0, and where is it used? te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. Aadio $re&uency Identification 1A$ID2 technology uses an interesting form of wireless communication to create a mechanism whereby a small tag contains identification information that a receiver can 8pull9 from the tag. A$ID mostly used for inventory control, sensors, passports, and other applications. 76.4 List three sread sectrum techni2ues, and gi#e a general descrition of each$ ommon spread spectrum techni&ues and their general description is given below: DSSS 1Direct Se&uence Spread Spectrum2: Similar to D!A where a sender multiplies the outgoing data by a se&uence to form multiple fre&uencies and the receiver multiplies by the same se&uence to decode $.SS 1$re&uency .opping Spread Spectrum 2: A sender uses a se&uence of fre&uencies to transmit data, and a receiver uses the same se&uence of fre&uencies to extract data E$D! 1Erthogonal $re&uency Division !ultiplexing 2: A fre&uency division multiplexing scheme where the transmission band is divided into many carriers in such a way that the carriers do not interfere 76.@ Name the four generations of cellular technology, and describe each$ #he telecommunications industry divides cellular technologies into four generations that are labeled 7;, *;, ?;, and -;, with intermediate versions labeled *.J; and ?.J;. #he generations can be characteri/ed as follows: 7;: #he first generation began in the latter 7@B,s, and extended through the 7@4,s. #he systems, which were originally called cellular mobile radio telephones, used analog signals to carry voice. *; and *.J;: #he second generation began in the early 7@@,s and continues to be used. #he main distinction between 7; and *; arises because *; uses digital signals to carry voice. #he label *.J; is used for systems that extend a *; system to include some ?; features. ?; and ?.J;: #he third generation began in the *,,,s, and focuses on the addition of higher3speed data services. A ?; system offers download rates of -,, Cbps to * !bps, and is intended to support applications such as web browsing and photo sharing. ?; allows a single telephone to roam across >orth America, Mapan, and Europe. -;: #he fourth generation began around *,,4, and focuses on support for real3time multimedia, such as a television program or high3speed video download. In addition, -; phones include multiple connection technologies, such as 0i3$i and satelliteG at any time, the phone automatically chooses the best connection technology available 76.7, What is a ;,A9 satellite? A maFor change in satellite occurred with the emergence of a technology (nown as a Nery Small Aperture #erminal 1NSA#2 that uses dishes less than three meters in diameter. A typical NSA# antenna is less than one meter in diameter. 76.77 Name the three chief fre2uency bands used by communication satellites, and gi#e the effect of weather on each$ !aFor fre&uency bands used by communication satellites and the effect of weather on each of them is given as follows: :and: !edium Cu :and: !oderate Ca :and: Severe 76.7* Why is a satellite dish shaed in the form of a arabola? 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u / ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, #he parabolic shape means that electromagnetic energy arriving from a distant satellite is reflected to a single focus point. :y aiming the dish at a satellite and placing a detector at the focus point, a designer can guarantee that a strong signal is received. 76.7? List the !""" standards that ha#e been roosed or created for wireless LANs$ #he &uestion needs to be clarified further. :ut, the point is IEEE has created many wireless networ(ing standards that handle various types of communication. Each standard specifies a fre&uency range, the modulation and multiplexing to be used, and a data rate. $igure 76.6 lists the maFor standards that have been created or proposed, and gives a brief description of each. In *,,B, IEEE 8rolled up9 many of the existing 4,*.77 standards into a single document (nown as 4,*.773*,,B. #he document describes basics, and has an appendix for each variant. 76.7- What are ,!), and 0!),, and why are they needed? #he wireless standard defines timing parameters as follows: SI$S 1Short Inter3$rame Space2 of 7, Ksec DI$S 1Distributed Inter3$rame Space2 of J, Ksec #he SI$S parameter defines how long a receiving station waits before sending an AC or other responseG the DI$S parameter, which is e&ual to SI$S plus two Slot #imes, defines how long a channel must be idle before a station can attempt transmission. 76.7J Why do most wireless LANs use an infrastructure aroach rather than an ad hoc aroach? In practice few ad hoc networ(s exist. Instead, an organi/ation or service provider deploys a set of access points, and each wireless host communicates through one of the access points. #he wired connections that extend to access points usually consist of twisted pair Ethernet. 76.76 1ow many satellites are used in (:,, and how accurate is a (:, system? ;"S uses *- total satellites orbit the earth, arranged in six orbital planes. Accuracy of ;"S systems differs, and ranges between *3*, meters 1military versions have higher accuracy2 76.7B Why must a wireless comuter associate with a secific base station? If a pair of access points is too close together, an overlap will exist in which a wireless host can reach both access points. $urthermore, most wireless 'A>s connect to the Internet. #o handle overlap, 4,*.77 networ(s re&uire a wireless host to associate with a single access point. #hat is, a wireless host sends frames to a particular access point, which forwards the frames across the networ(. 76.7@ An 832$** header contains two destination addresses$ "'lain the urose of each$ An 4,*.77 header contains two destination addresses as follows: Destination 7: A" or wireless computer%s !A Destination *: Aouter%s !A address 76.*, Name the two tyes of WiMA< technologies, and describe the urose of each$ #wo main versions of 0i!AO are being developed that differ in their overall approach, namely: $ixed 0i!AO: Aefers to systems built using IEEE standard 4,*.763*,,-, which is informally called 4,*.76d. It is designed to provide connections between a service provider and a fixed location, rather than between a provider and a cell phone. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, !obile 0i!AO: Aefers to systems built according to standard 4,*.76e3*,,J, which is informally abbreviated 4,*.76e. #he technology offers handoff among access points, which means a mobile 0i!AO system can be used with portable devices such as laptop computers or cell phones. 76.*7 (i#e the characteristics of =W> technology$ <ltra 0ideband 1<0:2 communication utili/es spreading data across many fre&uencies re&uires less power to reach the same distance. #he (ey characteristics of <0: are: <ses wide spectrum of fre&uencies onsumes very low power Short distance 1* to 7, meters2 Signal permeates obstacles such as walls Data rate of 77, at 7, meters, and up to J,, !bps at * meters IEEE unable to resolve disputes and form a single standard 76.** What is a cell cluster, and how does a designer use clusters? In cellular communication interference can be minimi/ed if an adFacent pair of cells do not use the same fre&uency. #o implement the principle, cellular planners employ a cluster approach in which a small pattern of cells is replicated. 76.*? !n addition to osition, what does (:, ro#ide? In addition to position5location information, ;"S provides time synchroni/ation that is used in some communication networ(s 76.*- What is (,M, and what standards does it comrise? #he 6lo"al ,#ste& for -o"ile +o&&unications 16,-2 is created as a system that was intended as a worldwide standard. It comprise many standards and usages, so the &uestion needs to be clarified for a precise answer. 76.*J Loo& u ?)0M on the Web, and gi#e a one%aragrah descrition in your own words$ 76.*6 0oes it ma&e sense to use !r0A for alications such as file transfer? Why or why not? 76.*B What are the third%generation cellular technologies that use code%di#ision multile'ing? #hird3generation cellular technologies that use D!A can be classified as: 0D!A 1<!#S = .SD"A2 D!A *,,, 1ENDE = ENDN2 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 1( - 3A Extensions4 6i,er )odems5 +epeaters5 9rid#es5 and Switches 7B.7 -an a bridge connect a Wi%)i networ& to an "thernet? -an a switch? Why or why not? 7B.* (i#e a recise statement of conditions under which an adati#e bridge will forward a ac&et$ 0hen a frame arrives from a given segment, the bridge extracts the source address from the header, and adds the address to a list of computers attached to the segment. #he bridge must then extract the !A destination address from the frame, and use the address to determine whether to forward the frame using forwarding table. 7B.? -onsult the Web to find a descrition of the sanning tree algorithm, and write a comuter rogram that simulates bridges forming a sanning tree$ 7B.- 0o comuters on a bridged "thernet recei#e sanning tree ac&ets? "'lain$ Ethernet bridges communicate among themselves. omputer on the bridged Ethernet are not aware of the spanning tree. 7B.J When bridging is used with a satellite lin&, two bridges are tyically used, one on each side$ "'lain why$ 7B.6 When an otical fiber is used to e'tend a connection to a LAN, what additional de#ices are needed? $iber modems are re&uired to extend a 'A> connection with fiber optic cable 7B.B !f a tele#ision set ro#ides a wired e'tension for a remote infrared sensor, what technology is li&ely used? 7B.4 -onsider a ac&et sent on a bridged LAN to a none'istent address$ Across how many segments will bridges forward the ac&et? 7B.@ ,uose a networ& contains three "thernet segments oerating at *33 Mbs connected by two bridges and that each segment contains one comuter$ !f two comuters send to a third, what is the ma'imum data rate a gi#en sender can achie#e? 9he minimum? En a Ethernet 'A> only one station at a time can be active. So, the maximum rate that can be achieved is 7,, !bps, the minimum , !bps 1no transmission2 7B.7, Write a comuter rogram that simulates a bridge function$ Let two files of data simulate frames transmitted on two segments to which the bridge attaches$ Assume that each simulated frame contains a source and destination address$ 9o erform the simulation, read a frame from the first file, then a frame from the second file, and so on$ )or each frame, dislay whether the bridge will forward a coy of the frame to the other LAN segment$ 7B.77 "'tend the rogram in the re#ious e'ercise to simulate a ;LAN switch$ 1a#e the rogram begin by reading configuration information that secifies a set of hosts and a set of #irtual LANs to which they should be attached$ -reate a file of frames that each secify the comuter sending the frame .i$e$, the ort on the switch o#er which the frame arri#es/ and a destination address$ ,how how each frame is forwarded$ 7B.7* According to )igure *@$A, can two comuters attached to a switched LAN transmit ac&ets simultaneously? "'lain$ If the figure is analy/ed carefully, it can be seen that, two computers pair of computers can communicate simultaneously without effecting each other. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 7B.7? "'tend )igure *@$A to ha#e fi#e orts$ 7B.7- !n the re#ious e'ercise, write an e2uation that gi#es the number of simulated bridges needed as a function of the number of orts$ 7B.7J !f two comuters are connected on a bridged networ&, are changes re2uired in addressing or in alications? "'lain$ omputers and applications running on the computers attached to a bridged networ( are not aware of the fact they are connected through a bridge. >o changes are re&uired on them. 7B.76 =se a networ& analy5er to obser#e traffic on a bridged "thernet$ What do you obser#e after a bridge reboots? In satellite lin(s there is long delays between two points. Aeader is encouraged to elaborate on this point. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 1* - 7A Technolo#ies And %-namic +outin# 74.7 What are the two concetual arts of a WAN address? onceptually, hierarchical addressing divides each address into two parts: 1site, computer at the site2. In practice, instead of a identifying a site, each pac(et switch is assigned a uni&ue number, which means that the first part of an address identifies a pac(et switch and the second part identifies a specific computer. 74.* What are the concetual arts of a traditional ac&et switch, and to what does it connect? A pac(et switch consists of a small computer system with a processor, memory, and I5E devices used to send and receive pac(ets. Early pac(et switches were constructed from conventional computersG the pac(et switches used in the highest3speed 0A>s re&uire special3purpose hardware. A pac(et switch, the device provides local connections for computers at the site as well as connections for data circuits that lead to other sites. 74.? What benefit does dynamic routing offer? Dynamic routing builds an initial forwarding table when a the router bootsG the program then alters the table as conditions in the networ( change. Dynamic routing allows a large networ( with redundant connections to handle occasional hardware failures. 74.- What is a routing loo? In a routing loo% situation, each pac(et switch thin(s the next pac(et switch in the set is the shortest path to a particular destination. As a result, a pac(et can circulate among the pac(et switches indefinitely 74.J When comuter rograms running on two ac&et switches e'change distance%#ector information, the rograms must agree on a message format$ -reate a secification for an unambiguous message format$ 1int6 consider differences in the way comuters reresent information$ 74.6 Write a comuter rogram that imlements 0iB&straCs algorithm for finding shortest aths in a grah$ 74.B !nto what two concetual ieces is a modern ac&et switch di#ided? #he &uestion can be interpreted differently. :ut, if we assume the functional bloc(s of a pac(et switch, most 0A>s separate a pac(et switch into two parts: a 'ayer * switch that connects local computers and a 'ayer ? router that connects to other sites. 74.4 "'lain the store and forward aradigm$ #o perform store and forward processing, a pac(et switch "uffers pac(ets in memory. #he store operation occurs when a pac(et arrives: I5E hardware inside the pac(et switch places a copy of the pac(et in memory. #he forward operation occurs once a pac(et has arrived and is waiting in memory. #he processor examines the pac(et, determines its destination, and sends the pac(et over the I5E interface that leads to the destination. 74.@ )igure *8$D shows how addresses can be assigned to comuters that connect to a ac&et switch$ ,uose the hardware for one of the interfaces on a switch fails and a networ& administrator mo#es a comuterCs connection to an unused interface$ Will the new configuration wor& correctly? Why or why not? 74.7, Write a comuter rogram that ta&es as inut a forwarding table and a series of ac&ets, and generates as outut a statement of how each ac&et should be forwarded$ 7emember to handle ac&ets that ha#e an incorrect address$ 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, 74.77 -onsider a WAN with two ac&et switches$ Assume each switch has a forwarding table entry for each local address .i$e$, the address of each comuter that attaches to the switch/ lus a default entry that oints to the other switch$ =nder what circumstances will the scheme wor&? =nder what circumstances will the scheme fail? 74.7* What are the two basic aroaches used to erform a distributed route comutation, and how does each wor&? #here are two basic approaches used to perform distributed route computation: 'in(3State Aouting 1'SA2, which uses DiF(stra%s algorithm: In 'SA routing, pac(et switches periodically send messages across the networ( that carry the status of a lin( between two pac(et switches. Each status message is broadcast to all switches. Every switch runs software that collects incoming status messages and uses them to build a graph of the networ(. Distance3Nector Aouting 1DNA2, which uses another approach: Each lin( in the networ( is assigned a weight, and the distance to a destination between two pac(et switches is defined to be the sum of weights along the path between the two. In DNA scheme, a router send a complete list of destinations and the current cost of reaching each networ( that can be reached. In both 'SA and DNA schemes pac(et switches to exchange messages periodically. 74.7? When a ac&et switch recei#es a distance%#ector message from a neighbor, will the switchCs forwarding table always change? "'lain$ $orwarding table will change only when newly advertised values are better 1shorter2 than existing routes. So forwarding table for router may remain stable as long as no changes in the networ( topology and no changes cost to reach them. 74.7- -an a comuter use an "thernet interface to communicate with a WAN? "'lain$ 74.76 !f a WAN connects N sites, what is the minimum number of digital circuits needed? What is the ma'imum number that can be resent? 74.7J "'tend the re#ious e'ercise by imlementing a comuter rogram that uses the secified message format$ 1a#e another student imlement a rogram from the same secification, and see if they interoerate correctly$ te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. Chapter 1. - etwor!in# Technolo#ies "ast And "resent 7@.* What is ,?N"9? #he term ,#nchronous 7%tical 4E8wor' 1,74E82 in >orth America, is (nown as the ,#nchronous Digital 9ierarch# 1,D92 in Europe. SE>E# uses time3division multiplexing to multiplex the circuits onto an underlying fiber. SE>E# permits a physical ring to be constructed with the purpose of providing redundancy. A device (nown as an Add$Dro% -ulti%le0or is used to connect a site to a SE>E# ring. #he term arises because the Add3Drop !ultiplexor either inserts or terminates a set of data circuits that each connect to another Add3Drop !ultiplexor on the ring. SE>E# specifies details such as how data is framed, how lower3capacity circuits are multiplexed into a high3capacity circuit, and how synchronous cloc( information is sent along with data. SE>E# and the associated #D! hierarchy was originally designed as a system to carry digital voice telephone calls. 7@.J >y why name does a consumer &now 0?-,!, technology? 7@.? Which would you e'ect to ha#e smaller delay, ;,A9 technology or WiMA< technology? Why? #he 0i!AO technology has smaller delay than NSA#, since in NSA# a satellite is used as a relay point, which has a long distance to travel for a complete round3trip, while in 0i!AO communication is limited within a limited location. 7@.4 Which comany was well%&nown for a to&en ring technology? I:! chose to create a to(en passing 'A> technology that was (nown as I2- 8o'en :ing. 7@.- What technology o#ershadowed and e#entually edged out )00!? #he high cost and special expertise needed to install fiber discouraged most organi/ations from replacing copper wiring. As wor( on $ast Ethernet progressed, $DDI proponents created a version of $DDI called DDI that ran over copper wiring. <ltimately, Ethernet proved to have lower cost, and $DDI technologies vanished. 7@.7 What technology has relaced "thernet hubs? Ethernet switches replaced hubs, and N'A> switches replaced switches. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u ) ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, "A+T I: Internetwor!in# ;sin# TC"<I" Chapter 2/ - Internetwor!in#4 Concepts5 Architecture5 and "rotocol s *,.7 !n the E%layer reference model used with the 9-:4!: !nternet rotocols, what is the urose of each of the fi#e layers? #he J3layers of #"5I" and their purpose is given as follows: 'ayer 7 1"hysical2: "rotocols in the "hysical layer specify details about the underlying transmission medium and the associated hardware. 'ayer * 1>etwor( Interface2: "rotocols in the >etwor( Interface layer specify details about communication between higher layers of protocols and the underlying networ(. 'ayer ? 1Internet2: "rotocols in the Internet layer form the fundamental basis for the Internet. 'ayer ? protocols specify communication between two computers across the Internet 'ayer - 1#ransport2: "rotocols in the #ransport layer provide for communication from an application program on one computer to an application program on another. 'ayer J 1Application2: "rotocols in the top layer of the #"5I" stac( specify how a pair o applications interact when they communicate. *,.* Will the !nternet be relaced by a single networ&ing technology? Why or why not? Incompatibilities ma(e it impossible to form a large networ( merely by interconnecting the wires among networ(s. #he beauty of the Internet is interconnection of wide range of technologies from various manufacturers. Diversity of the products and solutions is a richness instead of limitation as long as they all adopt the same set of protocols. *,.? =sers #iew the !nternet as a single networ&$ What is the reality, and to what does a userCs comuter attach? Internet is a /irtual networ' system because the communication system is an abstraction. #hat is, although a combination of hardware and software provides the illusion of a uniform networ( system, no such networ( exists. Internet protocol software hides the details of physical networ( connections, physical addresses, and routing information. >either users nor application programs are aware of the underlying physical networ(s or the routers that connect them. Internet software provides the appearance of a single, seamless communication system to which many user computers attach. #he system offers universal service: each computer is assigned an address, and any computer can send a pac(et to any other computer. *,.- What is the chief difficulty in ro#iding uni#ersal ser#ice? #he main difficulty in providing universal service is incompatibilities among networ( hardware, frames, and addresses prevent a bridged networ( from including arbitrary technologies. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *,.J What are the two reasons an organi5ation does not use a single router to connect all its networ&s? An organi/ation seldom uses a single router to connect all of its networ(s. #here are two maFor reasons: :ecause the router must forward each pac(et, the processor in a given router is insufficient to handle the traffic passing among an arbitrary number of networ(s. Aedundancy improves internet reliability. #o avoid a single point of failure, protocol software continuously monitors internet connections and instructs routers to send traffic along alternative paths when a networ( or router fails. *,.6 !f a gi#en router can connect to at most K networ&s, how many routers, R, are re2uired to connect N networ&s? Write an e2uation that gi#es R in terms of N and K$ A router re&uire an interface of each networ( to be connected. Since > networ(s to be connected by a router having C, then number of routers re&uired will be >5C. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 21- I"4 Internet Addressin# *7.7 What does the !nternet address hierarchy allow a local manager to do? It allows a local manager to divide the networ( into subnetwor(s for better management in terms of security, traffic segregation. *7.* ,uose you are an !,: that owns a 4 22 address bloc&$ -an you accommodate re2uests from si' customers who need addresses for F, *E, 23, D*, *28, and 2A3 comuters, resecti#ely? !f so, how? !f not, e'lain why$ If an IS" owns 5** address bloc(, then number of addresses available will be * ?*3** ) * 7, ) 7,*- 0e should loo( at the distribution of these available addresses in a very efficient way. $or example, if we want to assign a bloc( for *6, addresses, * 4 ) *J6 is less and * @ )J7* is a lot 1lots of addresses are wasted2. #he reader is expected to analy/e the situation accordingly and answer the remaining of the &uestion. *7.? Write a comuter rogram that reads as inut a networ& refi' in -!07 notation and a re2uest for a number of hosts$ Assume the re2uest has been gi#en to the !,: that owns the refi', and assign a -!07 refi' that accommodates the re2uest without wasting addresses$ *7.- -an a host ha#e more than one !: address? "'lain$ Pes. A host computer with multiple networ( connections is said to be &ulti$ho&ed. !ulti3homing is sometimes used to increase reliability. >amely, if one networ( fails, the host can still reach the Internet through the second connection. Also multi3homing may be used to increase performance connections to multiple networ(s can ma(e it possible to send traffic directly and avoid routers, which are sometimes congested. *7.J -ould !: be redesigned to use hardware addresses instead of the +2%bit addresses it currently uses? Why or why not? !A adresses can not be used, because the Internet can include multiple networ( technologies and each technology can define its own !A addresses. :ut if the Internet were to be designed from the beginning, for sure so many things would be different, probably much easier. :t because of bac(ward compatibility and various tries by different companies made the system complicated. *7.6 !n the original classful address scheme, was it ossible to determine the class of an address from the address itself? "'lain$ Pes, since in the classful addressing scheme initial bit1s2 gives indication about the class being used. *7.B !f an !,: assigned you a 428 address bloc&, how many comuters could you assign an address? 0hen an organi/ation is assigned 5*4 IDA address, it means *4 bits out of ?* bits are fixed, so ?*3*4 ) - bits available for user space. So number of users * - 3* ) -, since the all ,s and all 7s address are having special use and can%t be assigned to a user. *7.4 ,uose you are an !,: with a 4 2D address bloc&$ "'lain whether you accommodate a re2uest from a customer who needs addresses for 2EE comuters$ .1int6 consider the secial addresses$/ $or 5*- address bloc(, number of available addresses will be * ?*3*- ) * 4 ) *J6. .owever, a suffix with all ,s address is reserved for networ( ID and a suffix with all 7s address is reserved for broadcast address, so number of addresses that can be assigned to computers5hosts will be *J6 3* ) *J-. *7.@ Write a comuter rogram that reads an address in -!07 notation and rints the resulting address and mas& in binary$ 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *7.7, What is a >er&eley broadcast address? #he <niversity of alifornia at :er(eley developed and distributed an early implementation of #"5I" protocols as part of :SD <>IO. #he :SD implementation contained a nonstandard feature that has affected many subse&uent implementations. Instead of using a host suffix of all ones to represent a directed broadcast address, the :er(eley implementation uses a host suffix that contains all /eroes 1i.e., identical to the networ( address2. #he address form is (nown informally as 2er'ele# "roadcast. *7.77 Write a comuter rogram that accets a dotted decimal address as inut and dislays a string of +2 bits$ *7.7* 1ow many !: addresses are assigned to a router? "'lain$ #he number of I" addresses assigned to a router depends on the number of networ(s connected to the router. :ut a router at least should have two I" addresses 1one to internal networ(, the other one for external connection2 *7.7? Write a comuter rogram that reads an !: address in dotted decimal form and determines whether the address is a multicast address$ *7.7- Write a comuter rogram that translates between -!07 slash notation and an e2ui#alent dotted decimal #alue$ *7.7J ,uose you are an !,: that owns a 4 22 address bloc&$ ,how the -!07 allocation you would use to allocate address bloc&s to four customers who need addresses for A3 comuters each$ #he 5** address bloc( can be assigned as follows: ddd.ddd.ddd.,,5*6 ddd.ddd.ddd.,75*6 ddd.ddd.ddd.7,5*6 ddd.ddd.ddd.775*6 *7.76 !s the -!07 refi' *$2$+$D 4 2F #alid? Why or why not? *7.7B !f an !,: offers a 4 *@ address bloc& for N dollars er month and a 4 *A address bloc& for *$E N dollars er month, which has the cheaest cost er comuter? >umber of addresses in 57B bloc( * ?*37B ) * 7J "rice per address: * 7J 5> ) * 7J 5> >umber of addresses in 576 bloc( * ?*376 ) * 76 "rice per address: * 76 57.J> ) *x* 7J 57.J> ) 7.??x* 7J 5> So 576 address bloc( will be cheaper in comparison with the price given for 57B bloc(. *7.74 Write a comuter rogram that reads a +2%bit host address and a +2%bit mas& in -!07 notation and tells whether the address is one of the secial addresses$ 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 22- %ata#ram 6orwardin# **.? What are the two basic communication aradigms that designers consider when designing an internet? #wo basic communication paradigms that designers consider when designing an internet are: +onnection$oriented service +onnectionless service **.- !f a datagram contains one 8%bit data #alue and no header otions, what #alues will be found in header fields H. LEN and TOTAL LENGTH? .. 'E> indicated header in ?*3&uantities, since no options, then this value will be J. #he #E#A' 'E>;#. indicated the number of bytes in a datagram including the header. #his means Jx- bytes = 7 143bits2 ) *7 bytes **.J Write a rogram to e'tract all fields from an !: datagram header$ :rint the #alues in he'adecimal or dotted decimal as aroriate$ **.77 Write a comuter rogram to e'tract the source and destination addresses from an !: datagram, and rint them in dotted decimal notation$ **.7* Write a comuter rogram that ta&es as inut an !: forwarding table as in )igure 22$+b and a se2uence of destination addresses$ )or each destination address, search the table se2uentially to find the correct ne't ho, and outut the results$ **.7? 1ow does the !nternet design accommodate heterogeneous networ&s that each ha#e their own ac&et format? #o overcome heterogeneity, the Internet "rotocol defines a pac(et format that is independent of the underlying hardware. #he result is a uni/ersal, /irtual pac(et that can be transferred across the underlying hardware intact. #he Internet pac(et format is not tied directly to any hardware. #he underlying hardware does not understand or recogni/e an Internet pac(et. **.7B What is the ma'imum length of an !: datagram? In the current version of the Internet "rotocol 1I" version -2, a datagram can contain at most 6- C 16JJ?J2 octets, including the header. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ) ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 23 - Support "rotocols And Technolo#ies *?.7 ,uose a user secified a directed broadcast address as a destination for ing$ What results are ossible? "'lain$ *?.* "'and )igure 2+$*+ to show the maings that will be used if a third alication also attemts to reach the same web ser#er$ *?.? When a router uses a forwarding table to loo& u a ne't%ho address, the result is an !: address$ What must haen before the datagram can be sent? Each router along the path uses the destination I" address in the datagram to select a next3hop address, encapsulates the datagram in a hardware frame, and transmits the frame across one networ(. A crucial step of the forwarding process re&uires a translation: forwarding uses I" addresses, and a frame transmitted across a physical networ( must contain the !A address of the next hop. *?.- What is the chief urose of NA9? 4etwor' Address 8ranslation 14A82 technology provides trans%arent communication in the sense that a host at the site appears to have a normal Internet connection, and a host in the Internet always appears to receive communication from a single computer rather than from one of many computers that may exist at the site. *?.J When using a wireless router, what are the ossible !: addresses that can be assigned to hosts? *?.6 1ow many resonses does a comuter e'ect to recei#e when it broadcasts an A7: re2uest? "'lain$ AA" message is broadcasted to all stations5nodes on a 'A> networ(, but the response is only one that comes from only one station. #he station that I" address matches the I" address being loo(ed for through the broadcast message responds. *?.B (i#en an "thernet frame, what fields does a host need to e'amine to determine whether the frame contains an !-M: message? I!" uses I" to transport each error message: when a router has an I!" message to send, it creates an I" datagram and encapsulates the I!" message in the datagram. #he I!" message is placed in the payload area of the I" datagram, and then datagram is encapsulated in a frame. So an Ethernet frame should be chec(ed for I" and then within I" we should chec( the field type to determine if it contains an I!" message. *?.4 As an alternati#e to 01-:, de#ise a distributed algorithm that imlements a bidding scheme$ Assume that one coy of the algorithm will run on each comuter, and ha#e the algorithm assign each comuter a uni2ue host address$ *?.@ 9o otimi5e reassembly, some #ersions of the Linu' oerating system send the last fragment of an !: datagram first, and then send the remaining fragments in order$ "'lain why sending the last fragment first does not wor& well with NA:9$ *?.7, ,uose a comuter recei#es two A7: relies for a single re2uest$ 9he first rely claims that the MA- address is M1, and the second rely claims that the MA- address is M2$ 1ow does A7: handle the relies? *?.77 What is the chief difference between >??9: and 01-:? #he main difference is that the :EE#" protocol re&uired manual administration. So before a computer could use :EE#" to obtain an address, a networ( administrator had to configure a :EE#" server to (now the computer%s I" address. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou * ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *?.7* What term is used to describe the maing between a rotocol address and a hardware address? #ranslation from a computer%s I" address to an e&uivalent hardware address is (nown as address resolution, and an I" address is said to be resol/ed to the correct !A address. #he #"5I" protocol being used for this is called Address Aesolution "rotocol 1AA"2. Address resolution is local to a networ(. *?.7? Ma&e a list of the &ey networ& information that can be configured when a comuter boots$ *?.7- ,ome networ& alications defer configuration until a ser#ice is needed$ )or e'amle, a comuter can wait until a user attemts to rint a document before the software searches for a#ailable rinters$ What is the chief ad#antage of deferred configuration? 9he chief disad#antage? *?.7J 1ow many octets does an A7: message occuy when used with !: and "thernet addresses? According to $ig *?.? an AA" message has B3lines of each being ?*3bit 1- bytes or octets2, therefore, number of octets in an AA" can be determined as Bx- ) *4 octets *?.76 Many NA9 de#ices choose the *3$3$3$3 48 address bloc& from )igure 2+$*3 because it ro#ides the most generality$ "'lain why$ :ecause 7,.,.,., 54 address bloc( is a lass A bloc( which has the largest number set of I" addresses *?.7B What crucial information used by NA:9 is not a#ailable in most !: fragments? In addition to (eeping a table of source and destination addresses, >A"# uses port numbers to associate each datagram with a #" or <D" flow. #hat is, instead of stopping at the I"3layer, >A"# operates on transport3 layer headers. Entries in the translation table used by >A"# contain a -3tuple of source and destination I" addresses and protocol port numbers. *?.74 1ow does a comuter &now whether an arri#ing frame contains an !: datagram or an A7: message? #he t#%e field in the frame header specifies that the frame contains an AA" message. A sender must assign the appropriate value to the type field before transmitting the frame, and a receiver must examine the type field in each incoming frame. Ethernet uses type field 00;0< to denote an AA" message. *?.7@ What tyes of addresses are used in layers below A7:? AA" forms a conceptual boundary in the protocol stac(G layers above AA" use I" addresses, and layers below AA" use !A addresses. *?.*, !f a datagram has an incorrect #alue in one of the header fields, which !-M: error message will be recei#ed? I!" will issue 8"arameter "roblem9 1Q 7*2 error message *?.*7 01-: ermits a ser#er to be located on a remote networ&$ 1ow can the comuter send 01-: messages to a ser#er on another networ&? D." does not re&uire each individual networ( to have a server. Instead, a D9+5 rela# agent forwards re&uests and responses between a client and the server. At least one relay agent must be present on each networ(, and the relay agent must be configured with the address of the appropriate D." server. 0hen the server responds, the relay agent forwards the response to the client *?.** !n )igure 2+$**, the !,: has assigned one !: address to the site$ Which is the assigned address? #he I" address of the site is connected through the >A# is 7*4.*7,.*-.6 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou + ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *?.*? -reate a NA:9 translation table for a case where three comuters at a site ha#e 9-: connections to three searate web ser#ers in the !nternet$ *?.*- When does Algorithm 2+$* create a new entry in an A7: cache? In AA", the receiver extracts the sender%s address binding when it receives a message and updates the cache if the cache already contains an entry for the sender. If the message was a re&uest and target is the station5node in &uestion, then a new entry will be added to the AA" cache. *?.*J A7: only ermits address resolution to occur on a single networ&$ 0oes it ma&e sense to send an A7: re2uest to a remote ser#er in an !: datagram? Why or why not? *?.*6 ,ome #ersions of the traceroute rogram send !-M: messages and others send =0: messages$ "'eriment with the #ersion on your comuter to determine which it sends$ *?.*B !f a routing loo e'ists, which !-M: error message will be sent? "'lain the rocess$ #he 8i&e E0ceeded or Destination 1nreacha"le messages may be issued to report an error when a datagram cannot be delivered successfully. A destination address is unreachable if no route exists to the addressG a datagram times out if either the ##' count in the header expires or fragments of the datagram do not arrive before the reassembly timer expires. *?.*4 -an A7: be used on a networ& that does not ro#ide broadcast? Why or why not? te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. Chapter 2$ - The 6uture I" 0I"v'2 *-.7 What is the fragmentable art of an !:#A datagram? $ragmentable part of an I"v6 datagram can include data as well as headers. *-.* What is the rimary moti#ation for a change from !:#D to !:#A? #he primary motivation for defining a new version of I" arose from the address space limitation. Since larger addresses are necessary to accommodate continued growth of the Internet. *-.? "'tend the rogram in the re#ious e'ercise to imlement 5ero comression$ *-.- 1ow large is the smallest !:#A datagram header? I"v6 datagram header consists of a base header = /ero or more extension header. Since, smallest header is being as(ed, we assume /ero extension header and consider I"v6 will have only base header. If we loo( at I"v6 header format in $ig. *-.?, it shows that 7,x- bytes ) -, bytes. *-.J What is the hourglass model of !nternet communication? >etwor(ing professionals say that Internet communication follows an hourglass &odel, and that I" lies at the position where the hourglass is thin. It means I" lies at the center of Internet communication, all applications use I", and I" runs over all underlying networ( technologies. *-.6 Write a comuter rogram that reads a *28%bit binary number and rints the number in colon he' notation$ *-.B List the maBor features of !:#A, and gi#e a short descrition of each$ #he maFor features in I"v6 can be grouped into five broad categories: Address ,i=e: Each I"v6 address contains 7*4 bits. 9eader >or&at: #he I"v6 datagram header is completely different than the I"v- header. Almost every field in the header has been changedG some have been replaced. E0tension 9eaders: I"v6 encodes information into separate headers. A datagram consists of the base I"v6 header followed by /ero or more extension headers, followed by data. ,u%%ort >or :eal$8i&e 8raffic: I"v6 includes a mechanism that allows a sender and receiver to establish a high3&uality path through the underlying networ( and to associate datagrams with that path. E0tensi"le 5rotocol: I"v6 does not specify all possible protocol features. I"v6 provides a scheme that allows a sender to add additional information to a datagram. *-.4 What does the NEXT HEADER field secify in an !:#A datagram header? #he 4EX8 9EADE: field is used to specify the type of information that follows the current header. $or example, if the datagram includes an extension header, the 4EX8 9EADE: field specifies the type of the extension header. If no extension header exists, the 4EX8 9EADE: field specifies the type of data being carried in the payload. *-.@ List the three !:#A address tyes, and gi#e a brief e'lanation of each$ te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u / ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, #he I"v6 address has thefollowing types: <nicast: #he address corresponds to a single computer. A datagram sent to the address is routed along a shortest path to the computer. !ulticast: #he address corresponds to a set of computers, and membership in the set can change at any time. I"v6 delivers one copy of the datagram to each member of the set. Anycast: #he address corresponds to a set of computers that share a common prefix. A datagram sent to the address is delivered to exactly one of the computers *-.7, Why does !:#A use searate e'tension headers instead of fields in a single, fi'ed header? #he extension scheme ma(es I"v6 more flexible than I"v-, and means that new features can be added to the design as needed. #his allows a sender to add additional information to a datagram. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 2& - ;%"4 %ata#ram Transport Service *J.7 (i#en an "thernet frame, what fields must be e'amined to determine whether the frame carries a =0: message? #ype field of an Ethernet frame should be examined to determine whether the frame carries an I", and then loo( at protocol field of the I" datagram. Se&uential examination of fields is needed. *J.* 0o alications need to e'change =0: control messages before e'changing data? "'lain$ <D" uses a connectionless communication paradigm, which means that an application using <D" does not need to preestablish communication before sending data, nor does the application need to inform the networ( when finished. Instead, an application can generate and send data at any time. *J.? !f an alication uses =0: to send an 8G byte message across an "thernet, how many frames will tra#erse the networ&? *J.- What endoint #alues must be secified by an alication that engages in *%to%* communication? !n *%to% many? !n many%to%*? Endpoint values that must be specified by an application are given as follows for different cases: In 73to37 communication, an application specifies the local port number, remote I" address, and remote protocol port numberG <D" only passes the application messages that arrive from the specified sender. In 73to3many communication, an application specifies the local port number, and remote protocol port numberG <D" passes the application all messages that arrive from the specified sender. In many3to37 communication, the application specifies the local port number, but informs <D" that the remote endpoint can be any system. <D" then passes the application all messages that arrive for the specified port. *J.J What is the concetual difference between !: and end%to%end rotocols? I" is incapable of supporting multiple applications because fields in the datagram header only identify computers. #hat is, from I"%s point of view, the source and destination fields in a datagram identify a host computerG an I" address does not contain additional bits to identify an application program on the host. 0e say that I" treats a computer as an end%oint of communication. In contrast, transport3layer protocols are (nown as end$to$end %rotocols because a transport protocol allows an individual application program to be an endpoint of communication. *J.6 What haens if a =0: message containing a ayload of *E33 data bytes is sent across an "thernet? Aecall from chapter 7J that, the Ethernet payload is in the range of -637J,, bytes 1there is a minimum frame si/e because of collision detection2. If a <D" message containing 7J,, bytes to be sent across an Ethernet, then it will be divided into two frames. #he reader is encouraged to wor( out the si/e of each frame. "lease note the minimum si/e of an Ethernet frame. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *J.B List the features of =0:$ <D" has the following features: End$to$end. <D" is a transport protocol that can distinguish among multiple application programs running on a given computer. +onnectionless. #he interface that <D" supplies to applications follows a connectionless paradigm. -essage$oriented. An application that uses <D" sends and receives individual messages. 2est$effort. <D" offers applications the same best3effort delivery semantics as I". Ar"itrar# Interaction. <D" allows an application to send to many other applications, receive from many other applications, or communicate with exactly one other application. 7%erating ,#ste& Inde%endent. <D" provides a means of identifying application programs that does not depend on identifiers used by the local operating system. *J.4 -alculate the si5e of the largest ossible =0: message$ .1int6 the entire =0: message must fit in an !: datagram$/ #heoretically, the maximum allowable I" pac(et si/e 1including header2 is 6JJ?J bytes. #he normal 1without options2 I" header is Jx- bytes. #he <D. header is *x- ) 4 bytes. #he total number of bytes used for header will be I" header = <D" header ) *,=4 ) *4 bytes. So the maximum <D" payload will be 6JJ?J 3 *4) 6JJ,B bytes. *J.@ What is a seudo header, and when is one used? #o allow <D" to verify that messages reach the correct destination without incurring the overhead of additional header fields, <D" extends the chec(sum. 0hen computing the chec(sum, <D" software includes a %seudo header that contains the source, destination, and type 1i.e. "AE#E2 fields from the I" datagram and a <D" datagram length. So, the sender computes a chec(sum as if the <D" header contained extra fields. *J.7, What are the semantics of =0:? <D" provides applications with exactly the same best3effort delivery semantics as I", which means messages can be: 'ost Duplicated Delayed Delivered out3of3order orrupted 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 2' - TC"4 +elia,le Transport Service *6.* Assume that messages sent between two rograms can be lost, dulicated, delayed, or deli#ered out of order$ 0esign a rotocol that reliably allows the two rograms to agree to communicate$ (i#e your design to someone, and see if they can find a se2uence of loss, dulication, and delay that ma&es the rotocol fail$ *6.- When using a sliding window of si5e N, how many ac&ets can be sent without re2uiring a single A-G to be recei#ed? If the si/e of the window is >, then it means a sender can transmit up to > pac(ets without waiting for an AC, as long as other controls are in place. *6.J 1ow does 9-: handle ac&et loss? #o handle pac(et loss, transport protocols use %ositi/e ac'nowledge&ent with retrans&ission. 0henever a frame arrives intact, the receiving protocol software sends a small ac'nowledge&ent 1A+?2 message that reports successful reception. #he sender ta(es responsibility for ensuring that each pac(et is transferred successfully. 0henever it sends a pac(et, the sending3side protocol software starts a timer. If an AC arrives before the timer expires, the software cancels the timerG if the timer expires before an AC arrives, the software sends another copy of the pac(et and starts the timer again. #he action of sending a second copy is (nown as retrans&itting, and the copy is commonly called a retrans&ission. *6.B What layers of a rotocol stac& are used on a router? A host? In order to perform re&uired function, a router ma(e use of layer 7 1physical2, layer 1data lin( or interface2 * and layer ? 1networ( layer2 of a protocol stac(. A host ma(e use of all layers of a protocol stac(, including application layer. *6.@ What are the techni2ues a transort rotocol uses? A transport protocol uses various techni&ues, such as: <ses parity bits, a chec(sum, or a cyclic redundancy chec( 1A2 for tac(ling transmission errors <ses se&uencing to handle duplicates and out3of3order delivery <ses retransmission to handle lost pac(ets <ses some techni&ues to avoid replay <ses flow control to prevent data overrun <ses techni&ues to avoid congestion
*6.77 List the features of 9-:$
$eatures of #" can be listed as follows: +onnection 7rientation. #" provides connection3oriented service in which an application must first re&uest a connection to a destination, and then use the connection to transfer data. 5oint$8o$5oint +o&&unication. Each #" connection has exactly two endpoints. +o&%lete :elia"ilit#. #" guarantees that the data sent across a connection will be delivered exactly as sent, complete and in order. >ull Du%le0 +o&&unication. A #" connection allows data to flow in either direction, and allows either application program to send data at any time. ,trea& Interface. #" provides a stream interface in which an application sends a continuous se&uence of octets across a connection. :elia"le +onnection ,tartu%. #" allows two applications to reliably start communication. 6raceful +onnection ,hutdown. :efore closing a connection, #" insures that all data has been delivered and that both sides have agreed to shut down the connection. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *6.7* What are the main roblems a transort rotocol must sol#e to achie#e reliable transfer? An end3to3end transport protocol must be carefully designed to achieve efficient, reliable transfer. #he maFor problems are: 1nrelia"le +o&&unication. !essages sent across the Internet can be lost, duplicated, corrupted, delayed, or delivered out of order. End ,#ste& :e"oot. At any time during communication, either of the two end systems might crash and reboot. 9eterogeneous End ,#ste&s. A powerful sender can generate data so fast that it overruns a slow receiver. +ongestion In 8he Internet. If senders aggressively transmit data, intermediate switches and routers can become overrun with pac(ets, analogous to a congested highway. *6.76 Why does a sto%and%go rotocol ha#e esecially low throughut o#er a ("? satellite channel that oerates at two megabits er second? In case of using a satellite channel, there is a long delay for round3trip. So a sender needs to wait long time to get a confirmation 1AC2 for a transmitted pac(et. *6.7B "'tend the diagrams in )igure 2A$+ to show the transmission of si'teen successi#e ac&ets$ *6.74 What is the chief cause of ac&et delay and loss in the !nternet? #he main cause of pac(et delay and loss in the Internet is congestion. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 2( - Internet +outin# And +outin# "rotocols *B.- List the characteristics of 7!:$ AI" has the following characteristics: :outing .ithin An Autono&ous ,#ste&. AI" is designed as an I;" used to pass information among routers within an AS 9o% +ount -etric. AI" measures distance in networ( ho%s, where each networ( between the source and destination counts as a single hopG AI" counts a directly connected networ( as one hop away. 1nrelia"le 8rans%ort. AI" uses <D" to transfer messages among routers. 2roadcast 7r -ulticast Deli/er#. AI" is intended for use over 'A> technologies that support broadcast or multicast 1e.g., Ethernet2. ,u%%ort >or +ID: And ,u"netting. AI" version * includes an address mas( with each destination address. ,u%%ort >or Default :oute 5ro%agation. In addition to specifying explicit destinations, AI" allows a router to advertise a default route. Distance @ector Algorith&. AI" uses the distance$/ector approach 5assi/e @ersion >or 9osts. AI" allows a host to listen passively and update its forwarding table. "assive AI" is useful on networ(s where a host selects among multiple routers. *B.J List the two broad categories of !nternet routing, and e'lain each$ I" routing can be partitioned into two broad categories: Static routing: #he term static routing characteri/es an approach that creates a forwarding table when the system starts and does not change entries unless an administrator manually alters them. Dynamic routing: #he term dynamic routing characteri/es an approach in which route propagation software runs on the system and continuously updates the forwarding table to insure that each datagram follows an optimum route. #he software communicates with other systems to learn optimum routes to each destination, and continually chec(s for networ( failures that cause routes to change. *B.6 List and e'lain the characteristics of >(:$ #he :;" has the following characteristics: :outing A&ong A,. :ecause it is intended for use as an Exterior ;ateway "rotocol, :;" provides routing information at the AS level. #hat is, all routes are given as a path of AS. 5ro/ision >or 5olicies. :;" allows the sender and receiver to enforce policies. In particular, a manager can configure :;" to restrict which routes :;" advertises to outsiders. >acilities >or 8ransit :outing. :;" classifies each AS transit system if it agrees to pass traffic through to another AS, or as a stu" system if it does not. #he classification allows :;" to distinguish between IS"s and other AS. :;" allows a corporation to classify itself as a stub even if it is &ulti$ ho&ed :elia"le 8rans%ort. :;" uses #" for all communication. #hat is, a :;" program on a router in one AS forms a #" connection to a :;" program on a router in another AS, and then sends data across the connection. #" ensures that the data arrives in the correct order and that no data is missing. *B.B ,uose that all routers in the !nternet contain a default routeH show that a routing loo must e'ist$ *B.7* What two entries are needed in the forwarding table of a tyical host? A typical host forwarding table has the entries for the networ(1s2 that can be reached and the mas( being used. te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. *B.7? ,uose a router in an organi5ation uses a routing rotocol to declare that a gi#en destination is ten hos away when the destination is only three hos away$ !s the declaration necessarily an error? "'lain$ >o, it%s not necessarily an error. It%s usually used for reliability. In case the shortest path to destination is not available, then an alternative longer route may be used. *B.7- List and e'lain the two tyes of !nternet routing rotocols$ All Internet routing protocols fall into one of two categories: Interior ;ateway "rotocols 1I;"s2: #he routers within an AS use an Interior 6atewa# 5rotocol 1I652 to exchange routing information. Several I;"s are availableG each AS is free to choose its own I;". An I;" is easy to install and operate, but an I;" may limit the si/e or routing complexity of an AS. Exterior ;ateway "rotocols 1E;"s2: A router in one AS uses an E0terior 6atewa# 5rotocol 1E652 to exchange routing information with a router in another AS. E;"s are usually more complex to install and operate than I;"s, but E;"s offer more flexibility and lower overhead 1i.e., less traffic2. An E;" can implement %olic# constraints that allow a system manager to determine exactly what information is released outside the organi/ation. *B.7J When a router recei#es a 7!: message, how does the router di#ide each !: address into a refi' and suffi'? *B.*, Where is >(: used? #he 2order 6atewa# 5rotocol 12652 is used as Exterior ;ateway "rotocol in the Internet, the protocol has survived three maFor revisions. Nersion - is the current standard, and is officially abbreviated 265$4. *B.*7 What tye of routing algorithm does 7!: emloy, and where is 7!: used? AI" is an Interior ;ateway "rotocol that uses a distance vector algorithm to propagate routing information. *B.*? What is the e'ected conse2uence when a router ad#ertises routes to a gi#en destination? *B.*- What is an autonomous system? 0e use the term Autono&ous ,#ste& 1A,2 to capture the concept of groups of routers. An AS is a contiguous set of networ(s and routers all under control of one administrative authority. #here is no exact meaning for ad&inistrati/e authorit# (the term is sufficiently flexible to accommodate many possibilities, but normally it means an organi/ation, company or an IS"2. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u ) ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, "A+T : Other Aspects of Computer etwor!in# Chapter 2* - etwor! "erformance 0=oS and %i>Serv2 *4.7 Which of delay or throughut ro#ides the most fundamental limit on erformance? Why? *4.* !f two users create a chat session o#er the !nternet, what category of Io, will they be using? *4.? "'lain why !,:s count the number of ac&ets recei#ed er unit time instead of merely the number of bytes recei#ed er unit time$ #he capacity of switches and routers is measured in pac(ets per second. A router or switch performs next3 hop forwarding once per pac(et, the computational effort expended is proportional to the number of pac(ets processed rather than the number of bits in a pac(et. *4.- List and describe the three rimary measures of networ& erformance$ "rimary measures of networ( performance are the following: 'atency 1delay2: #he time re&uired to transfer data across a networ( #hroughput 1capacity2: #he amount of data that can be transferred per unit time Mitter 1variability2: #he changes in delay that occur and the duration of the changes *4.J "stimate the comutational ower needed to imlement fine%grain Io, in the core of the !nternet6 assume a *3 (bs lin& deli#ering *333 byte ac&ets and N arithmetic oerations er ac&et, and calculate the number of oerations a rocessor needs to erform er second$ *4.6 :ro#ide an e'lanation of delay and throughut in terms of bits being transmitted$ #hroughput is a measure of capacity, not speed. #hroughput specifies how many bits can enter the networ( per unit time, measures networ( capacity. "ropagation delay specifies the time a single bit remains in transit in a networ(. *4.B -omare the throughut of a *33 Mbs networ& and a * (bs networ&$ In terms of speed or capacity obviously, a 7 ;bps will be faster than a 7,, !bps. .owever, we should loo( at the number of users on each networ( in order to ma(e a meaningful comparison *4.4 :rofessionals sometimes refer to a J&neeK in the delay cur#e$ 9o understand what they mean, lot the effecti#e delay for #alues of utili5ation between 0 and 0.95$ -an you find a #alue of utili5ation for which the cur#e aears to increase sharly? 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *4.@ (i#e fi#e tyes of delay along with an e'lanation of each$ #he following can be given as types of delay: "ropagation Delay: #he time re&uired for a signal to travel across a transmission medium Access Delay: #he time needed to obtain access to a transmission medium 1e.g., a cable2 Switching Delay: #he time re&uired to forward a pac(et Rueuing Delay: #he time a pac(et spends in the memory of a switch or router waiting to be selected for transmission Server Delay: #he time re&uired for a server to respond to a re&uest and send a response *4.7, (i#e e'amles of rocessing that ma&e goodut less than the channel caacity$ #he goodput rate is less than the capacity of the hardware because protocols impose overhead. Some networ( capacity is not available to user data because protocols: Send pac(et headers, trailers, and control information Impose a limit on the window si/e 1receive buffer2 <se protocols to resolve names and addresses <se a handsha(e to initiate and terminate communication Aeduce the transmission rate when congestion is detected Aetransmit lost pac(ets *4.77 1ow does M:L, forwarding differ from con#entional !: forwarding? -ulti5rotocol 3a"el ,witching 1-53,2 is a connection3oriented communication mechanism built on top of I". At one end of a path, each datagram is encapsulated in an !"'S header and inFected into the !"'S pathG at the other end, each datagram is extracted, the !"'S header is removed, and the datagram is forwarded to its destination. #he I" forwarding is connectionless, each pac(et is forwarded individually. *4.7* What are the two tyes of Io,? #he two types of Ruality of Service 1RoS2 and their short explanation are as follows: $ine3;rain: A provider allows a customer to state specific RoS re&uirements for a given instance of communicationG a customer ma(es a re&uest each time a flow is created oarse3;rain: A provider specifies a few broad classes of service that are each suitable for one type of trafficG a customer must fit all traffic into the classes *4.7? -onsider a web browser$ What tye of Io, would be aroriate for a tyical flow where the browser downloads a web age? Why? *4.7- "'lain the four stes used to imlement Io,$ lassification And "olicing: 0hen a pac(et arrives, a router classifies the pac(et by assigning the pac(et a flow identifier. Ence an identifier has been assigned, the router performs policing, which means that the router verifies that the pac(et does not violate parameters for the flow. $orwarding omputation: 0hen computing a next3hop, a router or switch can use the flow identifier. Eutput Rueuing: !ost implementations of RoS create a set of &ueues for each output port. #raffic Scheduling: A traffic scheduler implements the RoS policies by selecting a pac(et to send whenever a port is idle. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *4.7J 1ow can throughut be measured? #hroughput is a measure of the rate at which data can be sent through the networ(, specified in bits per second 1bps2. #hroughput can be measured several ways, one must be careful to specify exactly what has been measured. #here are several possibilities: apacity of a single channel Aggregate capacity of all channels #heoretical capacity of the underlying hardware Effective data rate achieved by an application 1goodput2 *4.76 =se pi! to measure networ& latency to local and distant sites$ What is the minimum and ma'imum !nternet delay you can find? *4.7B Would you e'ect access delays to be longer on a LAN or on a WAN? Iueuing delays? Why? *4.74 !f your !,: uses lea&y buc&et to schedule ac&et transmission, will your throughut be higher with large ac&ets or small ac&ets? "'lain$ *4.7@ What is 0iff,er#? #he IE#$ created Differentiated ,er/ices 1Diff,er/2 to define a coarse3grain RoS mechanism. #he DiffServ effort produced a definition of how classes can be specified and how the 8A5E 7> ,E:@I+E field in an I"v- or I"v6 header can be used to specify the class of a datagram. *4.*, !f one ings !: address *2@$3$3$*, the latency is e'tremely low$ "'lain$ :ecause it a local host address. So all delay types 1if any2 involved are minimal *4.*7 What is Bitter, and what are the two aroaches used to o#ercome Bitter? Nariance in delay is (nown as a networ(%s Bitter and it is an important measure in real3time voice and video. *4.** Why is measurement of networ& erformance difficult? !easuring networ( performance can be difficult for four reasons: Aoutes can be asymmetric onditions change rapidly !easurement can affect performance #raffic is bursty *4.*? 0ownload a coy of the rogram ttcp and use it to measure throughut on a local "thernet$ What is the goodut? "stimate the lin& utili5ation achie#ed$ *4.*- What name is used for the form of throughut that is the most meaningful to a user? <sers typically assess the effecti/e data rate that an application achieves by measuring the amount of data transferred per unit timeG the term good%ut is sometimes used to describe the measure. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou $ ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *4.*J 1ow much data can be Jin flightK between a sending ground station, a satellite, and a recei#ing station? 9o find out, comute the delay%throughut roduct for a ("? satellite networ& that oerates at + Mbs$ Assume that the satellite orbits at 23,333 miles abo#e the earth, and that radio transmissions roagate at the seed of light$ :its present in a networ( ) D x #, where D is delay and # is throughput measured in bits per second #he delay in ;EE satellite networ( is the time traveled from a source 1transmitter2 to a destination 1receiver2. #he distance traveled by signal is * times distance of a ;EE from the earth, which is *x*,,,,, ) -,,,,, miles. #he time ta(en to travel this distance, t ) distance5speed. 0e can assume throughput # as ? !bps, assuming the bandwidth is fully utili/ed without any congestion or pac(et3drops. Aeader is encouraged to utili/e these facts5numbers and calculate the number of bits present in the networ( *4.*6 1ow does data traffic differ from #oice traffic? Data traffic is bursty, while voice traffic is normally in a smooth aggregate form *4.*B List the four main categories of Io, that were deri#ed from A9M, and gi#e the meaning of each$ A#! specifies the following four types of RoS categories: :A 1onstant :it Aate2: Data enters the flow at a fixed rate, such as data from a digiti/ed voice call entering at exactly 6- Cbps N:A 1Nariable :it Aate2: Data enters the flow at a variable rate within specified statistical bounds A:A 1Available :it Aate2: #he flow agrees to use whatever data rate is available at a given time <:A 1<nspecified :it Aate2: >o bit rate is specified for the flow *4.*4 What four arameters are used to characteri5e a ;>7 flow? N:A as(s users to specify the following: Sustained :it Aate 1S:A2 "ea( :it Aate 1":A2 Sustained :urst Si/e 1S:S2 "ea( :urst Si/e 1":S2 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ' ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 2. - )ultimedia And I" Telephon- 0:oI"2 *@.7 >ecause it tra#els in =0:, an 79: message can be dulicated$ 0oes a recei#er need to &ee a coy of all re#iously recei#ed messages to determine whether an incoming message is a dulicate? Why or why not? A receiver does not need to (eep a copy of all previously received messages to determine if an incoming message is a duplicate. Since, each pac(et includes a ,EC1E4+E 41-2E:G the se&uence is incremented by one for each pac(et. As with #", a sender chooses a random starting se&uence to help avoid replay problems. *@.* !f #oice is con#erted to digital form using :-M, how many bits of data will be roduced in one%half second? #he commercial "! used in digital telephony uses 6-,,, bps. So reader is encouraged to calculate data produced in one3half second. *@.? When 1$+2+ is used to send data along with audio or #ideo, which transort rotocol is used? $or the data #" transport protocol is used, however, for real3time traffic 1audio5video2 <D" is used. *@.- Loo& u the e*AD$ara domain$ Which organi5ation is resonsible for the domain? *@.J "'lain how a Bitter buffer ermits the laybac& of an audio stream e#en if the !nternet introduces Bitter$ #he implementation of a Fitter buffer is straightforward. A receiver maintains a list of data items, and uses timestamps to order the list. :efore it begins playbac(, a receiver delays for d time units, which means the data being played is d time units behind the data that is arriving. #hus, if a given pac(et is delayed less than d, the contents of the pac(et will be placed in the buffer before it is needed for playbac(. In other words, items are inserted into a Fitter buffer with some variation in rate, but the playbac( process extracts data from a Fitter buffer at a fixed rate. *@.6 0efine multimedia data$ What are the two techni2ues used to o#ercome Bitter? 0e use the term &ulti&edia to refer to data that contains audio or video, and may include text. #he phrase real$ti&e &ulti&edia refers to multimedia data that must be reproduced at exactly the same rate that it was captured. #o overcome Fitter and achieve smooth playbac( of real3time data, two chief techni&ues are employed: 8i&esta&%s. A sender provides a timestamp for each piece of data. A receiver uses the timestamps to handle out3of order pac(ets and to display the data in the correct time se&uence. Ditter 2uffer. #o accommodate Fitter 1i.e., small variances in delay2, a receiver buffers data and delays playbac(. *@.B !f an 79: message is interceted as it tra#els across the !nternet, can the timestam field be interreted? !f so, how? !f not, why not? 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou ) ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, *@.4 Which asects of !: telehony does 1$+2+ handle? #he 9.33 standard consists of a set of protocols that wor( together to handle all aspects of telephone communication, such as: .andles all aspects of a digital telephone call Includes signaling to set up and manage the call Allows the transmission of video and data while a call is in progress Sends binary messages that are defined by A,4.1 and encoded using 2asic Encoding :ules 12E:2 Incorporates protocols for security <ses a special hardware unit (nown as a -ulti%oint +ontrol 1nit to support conference calls Defines servers to handle tas(s such as address resolution , authenticationE authori=ation, accounting, and features, such as call forwarding *@.@ 79: contains a comanion rotocol &nown as the Rea"#Time $otro" %rotoco" .RT$%/ that allows a recei#er to reort the 2uality of messages recei#ed to a sender$ 1ow can adati#e #ideo encoding use the status of recei#ed messages? *@.7, What are the si' basic methods used with ,!:? #he SI" protocol ma(es use of the following method: I>NI#E 1Session creation2: an endpoint is invited to participate in the session AC 1Ac(nowledgment2: response to I>NI#E :PE 1Session termination2: call is ended A>E': "ending re&uest cancellation 1no effect if re&uest has been completed2 AE;IS#EA: Aegistration of user%s location E"#IE>S: Ruery to determine capabilities of called party *@.77 -onsider the oeration of an !: telehone and an analog telehone$ Which would be better during time of war? Why? *@.7* 7ead the 7)- about ,!:, and modify )igure 2F$F to show the messages e'changed when call forwarding occurs$ 1int6 loo& at ,!: re&irectio messages$ *@.7? What are the uroses of the "N=M and 97!: rotocols? #he IE#$ has proposed two protocols that correspond to the mappings needed for the two subproblems: E><! 1short for E.76- ><!bers2 solves the problem of converting an E.76- telephone number into a <niform Aesource Identifier 1<AI2. #AI" 1#elephone Aouting over I"2 solves the problem of finding a user in an integrated networ(. A location server or other networ( element can use #AI" to advertise routes. *@.7- "'tend the re#ious e'ercise$ "stimate the si5e .in octets/ of an !: datagram that carries one%2uarter of a second of audio encoded in :-M, laced in an 79: ac&et, and encasulated in =0:$ 1int6 7)- *88F defines the si5e of an 79: header$ #he commercial "! produces 6-,,,,5- bps ) 76,,,, bps. 0e assume all these information bits are sent as a single pac(et5datagram. A#" protocol adds -x?* ) 7*4 bits. #he <D" adds *x?* ) 6- bits. And the I" adds Jx?* ) 76, bits. So, the resulting I" datagram si/e will be 76,,,, = 7*4 = 6- = 76, bps. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou * ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 3/ - etwor! Securit- ?,.* Name the techni2ue used in security attac&s$ #here are numerous techni&ues used in security attac(s and experts use different terminology to describe them. According to textboo( we can list the following problems: 0iretapping: !a(ing a copy of pac(ets as they traverse a networ( to obtain information Aeplay: Sending pac(ets captured from a previous session :uffer overflow: Sending more data than a receiver expects in order to store values in variables beyond the buffer Address Spoofing: $a(ing the I" source address in a pac(et to tric( a receiver into processing the pac(et >ame Spoofing: <sing a misspelling of a well3(nown name or poisoning a name server with an incorrect binding DoS and DDoS: $looding a site with pac(ets to prevent the site from successfully conducting normal business SP> flood: Sending a stream of random #" SP> segments to exhaust a receiver%s set of #" connections. #his can be considered a sub3category of DoS and DDoS attac(s Cey :rea(ing: Automatically guessing a decryption (ey or a password to gain unauthori/ed access to data "ort Scanning: Attempting to connect to each possible protocol port on a host to find a vulnerability "ac(et interception: Aemoving a pac(et from the Internet which allows substitution and man3in3the middle attac(s ?,.? List the maBor security roblems on the !nternet, and gi#e a short descrition of each$ #here are numerous problems exist and experts use different terminology to describe them. According to textboo( we can list the following problems: "hishing: !as&uerading as a well3(nown site such as a ban( to obtain a user%s personal information, typically an account number and access code !isrepresentation: !a(ing false or exaggerated claims about goods or services, or delivering fa(e or inferior products Scams: Narious forms of tric(ery intended to deceive naive users into investing money or abetting a crime Denial of Service: Intentionally bloc(ing a particular Internet site to prevent or hinder business activities and commerce 'oss of ontrol: An intruder gains control of a computer system and uses the system to perpetrate a crime 'oss of Data: 'oss of intellectual property or other valuable proprietary business information ?,.- Why is deri#ing a security olicy difficult? Security policies are complex because they involve human behavior as well as computer and networ( facilities. Assessing the costs and benefits of various security policies also adds complexity. In particular, a security policy cannot be defined unless an organi/ation understands the value of its information. ?,.77 0o, attac&s often send 9-: ,LN segments$ -an an attac&er also create a 0o, attac& by sending 9-: data segments? "'lain$ 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou + ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, ?,.7* List and describe the eight basic security techni2ues$ #here are various security techni&ues5technologies being used, such as: .ashing Data integrity Encryption "rivacy Digital Signatures !essage authentication Digital ertificates Sender authentication $irewalls Site integrity Intrusion Detection Systems Site integrity Deep "ac(et Inspection S ontent Scanning Site integrity Nirtual "rivate >etwor(s 1N">s2 Data privacy as well as site integrity ?,.74 ,uose an attac&er finds a way to store an arbitrary binding in your local 0N, ser#er$ 1ow can the attac&er use such a wea&ness to obtain your ban& account information? In doing so an attac(er can direct a user from a legitimate address 1correct ban( address2 to an incorrect5fa(e address and when the user enters personal5account information, they can be captured5stored and later be used to access user%s actual ban( account to ma(e transaction. ?,.7@ !f a assword contains eight uer and lower%case letters and digits, how many ossible asswords might an attac&er need to try to gain access? #he issue here is total number of characters in the set and the number of characters being used. Since the password being mentioned consists of uppercase 1*6 possibilities2, lowercase 1*6 possibilities and digits 17, possibilities2, the reader is encouraged to calculate the possibility of matching 4 characters out of 6* 1*6=*6=7,2. ?,.*, ,uose a comany de#ises a security olicy which secifies that only 17 ersonnel are authori5ed to see ayroll files$ What tye of mechanism is needed to imlement the olicy? "'lain$ te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, recording, or li(e%ise. )or in'or&ation regarding per&ission*s+, %rite to, Rigts and Per&issions -epart&ent, Pearson Education, Inc., Upper Saddle River, NJ 0./01. Chapter 31 - etwor! )ana#ement 0S)"2 ?7.7 What is a rotocol analy5er? A %ac'et anal#=er, also called a %rotocol anal#=er, captures and displays pac(ets or statistics about pac(ets ?7.* (i#e an e'amle of a rotocol mechanism that hides an error$ $or example, routing protocols bypass failures and intermittent pac(et loss can go unnoticed because #" automatically retransmits. ?7.? 7ead about how A,N$* encodes names and #alues$ Write a comuter rogram to encode and decode A,N$* names such as the name assigned to ip'Recei(e)$ ?7.- !f a user comlains that they cannot access a gi#en ser#ice, which asects of )-A:, could the comlaint otentially in#ol#e? #his is related to 8$ault Detection and orrection9, but also it may involve directly or indirectly 8onfiguration and Eperation9 aspects of $A"S. ?7.J A,N$* defines the e'act format of an integer$ Why doesnCt the A,N$* standard merely state that each integer is a +2%bit #alue? AS>.7 uses a combination of length and value for each obFect being transferred to accommodate large values without wasting space on every transfer,. #o encode an integer, AS>.7 sends a pair of values: a length, 3, followed by 3 octets that contain the integer. #o permit encoding of arbitrarily large integers, AS>.7 also allows the length to occupy more than one octetG extended lengths normally are not needed for the integers used with S>!". ?7.6 What does a flow analysis tool hel a manager understand? $low analysis tools, such as a >et$low analy/er, also help a manager spot trends. Instead of merely reporting on overall traffic, a flow analy/er can help a manager spot changes in specific types of traffic. ?7.B 0ownload free ,NM: manager software, and attemt to contact a de#ice such as a rinter$ ?7.4 What are the two basic oerations that ,NM: uses? #he S>!" protocol uses a fetch$store %aradig& in which there are two basic operations: fetch, used to obtain a value from a device, and store, used to set a value in a device. Each obFect that can be fetched or stored is given a uni&ue nameG a command that specifies a fetch or store operation must specify the name of the obFect. ?7.@ !f a firewall malfunctions, which asect of )-A:, does the situation fall under? Why? #his is related to 8onfiguration and Eperation9 aspects of $A"S. :ecause the configurations must be consistent across all devices and as new e&uipment and services are added or policies change, a networ( manager must consider all configurations to insure the entire networ( implements the changes correctly. ?7.7, What is the chief ad#antage of aending inde' information to a name instead of using a con#entional array that is inde'ed by integers? 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission sou . ld "e o"tained 'ro& 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u / ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, ?7.77 !t has been argued that one should not use a networ& to debug a roblem in the networ&$ Why does ,NM: use the same networ& that it is debugging? <sing an application protocol for networ( management, such as S>!", wor(s well for two reasons. $irst, in cases where a special hardware failure prevents communication, a manager can communicate with devices that remain functional, and use success or failure to help locate the problem. Second, using conventional transport protocols means a manager%s pac(ets will be subFect to the same conditions as normal traffic. #hus, if delays are high, a manager will find out immediately. ?7.7* )ind two e'amles of manageable elements other than those listed in )igure +*$2$ ?7.7? Write a rogram that reads an arbitrarily large integer in decimal, encodes the integer into the format illustrated in )igure +*$+, and rints the result$ ?7.7- What terms does networ& management software use instead of c"iet and )er(er? #o avoid confusion between application programs that users invo(e and applicationsthat are reserved for networ( managers, networ( management systems avoid the terms client and ser/er. Instead, the client application that runs on the manager%s computer is called a &anager, and a server that runs on a networ( device is called an agent ?7.7J 0oes ,NM: define a name for each ossible M!> #ariable? "'lain$ Each obFect to which S>!" has access must be defined and given a uni&ue name. ollectively, the set of all obFects S>!" can access is (nown as a -anage&ent Infor&ation 2ase 1-I22. #he S>!" standard only specifies the message format and describes how messages are encoded. A separate standard specifies !I: variables along with the meaning of fetch and store operations on each variable. Separate standards documents specify !I: variables for each type of device. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 1 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, Chapter 32 - Trends In etwor!in# Technolo#ies And ;ses ?*.7 (i#e e'amles of new networ&ing trends for business$ ?*.* "'lain how content caching ermits the !nternet to scale$ ?*.? Why are cellular telehone ro#iders esecially interested in !:#A? Some cellular operators, especially in Asia, see I"v6 as a way to allow I" addressing on cell phones, but operators also have the option of devising a layer * addressing scheme. ?*.- A web site with N hysical ser#ers may not be able to rocess N times as many re2uests er second because shared resources can imose a bottlenec&$ Name two resources that are shared$ #he load balancer which greets incoming re&uests is shared between all the bac(bone servers, also a database server may be shared between them. ?*.J Where is a load balancer used? A load balancer allows a site to have multiple computers each running an identical web server, and distributes incoming re&uests among the physical servers. So if a server has many users connected to it, in order to improve performance a load balancer can be used to distribute load over multiple servers. ?*.6 !n addition to ermitting scaling, ser#er #irtuali5ation may also allow a site to sa#e energy during times when the load is low .e$g$, on a wee&end/$ "'lain how$ Instead of separate physical computers to be used as standalone servers, server virtuali/ation allows multiple services to be run on a single computer proving multiple services. So energy and other benefits such as management, licensing, and costs can be substantial. ?*.B 0oes a distributed data center aroach ma&e sense for a business in which each web re2uest re2uires access to a central database? Why or why not? ?*.4 What does digital #ideo offer users? <sing I" for video creates interesting opportunities, such as: #N and the Internet converge, ma(ing it easy to watch television programs on a computer or use a digital television as a computer display. I" ma(es it easier to deploy onde&and video, in which a user can access content when desired, control playbac( with pause and rewind functions, and capture live content for later viewing. ?*.@ Name three e'amles of social networ& alications$ #here are numerous social networ( examples, such as $aceboo(, !yspace, and Pou#ube ?*.7, With what general use is eer%to%eer comuting often associated? Some of the most widely3(nown p*p systems have been created to allow the sharing of music files. ?*.77 1ow are the !nternet and cellular telehone systems con#erging? It is expected that cellular phones will soon be converted away from other protocols to I". In particular, once cellular carriers begin to use 0i!AO, the entire system will be I", meaning that cellular service and the Internet have converged. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 2 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing, ?*.7* When otical fiber is used to deli#er data to a home or business, how much faster can data be sent than with 0,L or a cable modem? Aeader is encouraged to search for the latest technology being used for optical fiber as well as DS' and5or cable modem for a meaningful comparison between them. ?*.7? Name two technologies used to increase the seed of routers and switches$ hip vendors offer various solutions to increase the speed of router and switches, such as: A solution is use of multi3core "<s that each contain several processors. Ene approach distributes incoming pac(ets among the 4 cores, which means that one core only handles 1*4 of the pac(ets. Another option is use of networ' %rocessors. 0e can thin( of a networ( processor as a fast "< that includes multiple cores plus special instructions to handle common pac(et processing tas(s at high speed. ?*.7- Where are sensor networ&s being used? #here a numerous applications for sensors. Sensors are being used to measure the environment 1e.g., monitor air and water &uality or gather weather information2, trac( the movements of wild animals, help farmers monitor crops, monitor people in office buildings, and assess traffic on highways. Sensors can also be used in residential buildings. It is already possible to install sensors that measure temperature and humidity, or monitor a home for dangers such as smo(e and carbon monoxide. ?*.7J What technologies are being used to ro#ide remote access to #illages? Ad hoc networ(ing can be used in rural areas and developing countries. In the <S, farmers are using ad hoc technology to connect rural farms to the Internet. Each farmer sets up a wireless station 1usually on a tall building, such as a silo2, and the stations agree to forward pac(ets, as needed. In developing countries, ad hoc networ(s are used as an inexpensive way to provide Internet access to an entire village. 2009 Pearson Education, Inc., Upper Saddle River, NJ. All rigts reserved. !is pu"lication is protected "# $op#rigt and %ritten per&ission so 1 u 3 ld "e o"tained 'ro& te pu"liser prior to an# proi"ited reproduction, storage in a retrieval s#ste&, or trans&ission in an# 'or& or "# an# &eans, electronic, &ecanical, potocop#ing,
Computer Networking Beginners Guide: An Introduction on Wireless Technology and Systems Security to Pass CCNA Exam, With a Hint of Linux Programming and Command Line