0% found this document useful (0 votes)
125 views14 pages

On Tap NWC203c Dapan

Here are the steps to solve this problem: 1. The total number of stations is 5. Each station needs a unique MAC address. So the total number of MAC addresses needed is 5. 2. Each bridge also needs a unique MAC address. There are 2 bridges, so 2 more MAC addresses are needed. 3. The total MAC addresses needed is: - Stations: 5 - Bridges: 2 - Total: 5 + 2 = 7 4. The standard MAC address size is 48 bits. 5. To represent 7 stations and bridges, we need at least 3 address bits (since 2^3 = 8 can represent addresses from 0 to 7). 6. Therefore,
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views14 pages

On Tap NWC203c Dapan

Here are the steps to solve this problem: 1. The total number of stations is 5. Each station needs a unique MAC address. So the total number of MAC addresses needed is 5. 2. Each bridge also needs a unique MAC address. There are 2 bridges, so 2 more MAC addresses are needed. 3. The total MAC addresses needed is: - Stations: 5 - Bridges: 2 - Total: 5 + 2 = 7 4. The standard MAC address size is 48 bits. 5. To represent 7 stations and bridges, we need at least 3 address bits (since 2^3 = 8 can represent addresses from 0 to 7). 6. Therefore,
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

ĐÁP ÁN PE SAMPLE NWC203c Spring 2022

Câu 1: Explain the difference between connectionless unacknowledged service and


connectionless acknowledged service. How do the protocols that provide these services
differ?

Câu 2. Explain the difference between connection-oriented acknowledged service and


connectionless acknowledged service. How do the protocols that provide these services
differ?

Câu 3: Explain the differences between PPP and HDLC.

Câu 1, 2, 3 thì xem lại video bài giảng của thầy hôm chữa đề và file word cũ nhé.
Câu 4:
A 1.5 Mbps communications link is to use HDLC to transmit information to the moon.
What is the smallest possible frame size that allows continuous transmission? The
distance between earth and the moon is approximately 375,000 km, and the speed of light
is 3 x 108 meters/second.

Go-back-N : Mỗi window có 7 fram .


Selective reject : Mỗi window có 4 fram .
Câu 5: Suppose HDLC is used over a 1.5 Mbps geostationary satellite link. Suppose that
250-byte frames are used in the data link control. What is the maximum rate at which
information can be transmitted over the link?

R = 1.5 Mbps, and nf =250 bytes or 2000 bits (250 x 8). The distance
that the information must travel is the earth-to-satellite distance, or d ≈
36,000 km.
The speed of light c is 3 x 10^8.
We can calculate the propagation delay and processing rate as follows:
tprop = d/c = 36 x 10^6 / (3 x 10^8) = 120 ms
tf = nf/R = 2000/(1.5 x 10^6 )= 1.33 ms
We can use either Go-Back-N or Selective Repeat ARQ. The default
window size is N = 7 (with a 3bit sequence number). 0 1 2 3 4 5 6 7 …

The maximum information rate is achieved with no error, and hence, no


retransmission.
tcycle = minimum time to transmit a group of N packets = tf + 2 tprop =
1.33 + 2x120 = 241.33 ms n = no. of bits transmitted in a cycle = N.nf =
7x2000 = 14,000 bits Rmax = no. of bits sent in a cycle / minimum
cycle time = n/tcycle = 58 kbps
If the extended sequence numbering option (7-bit) is used, the
maximum send window size would be N = 2^7 – 1 = 127, and hence,
the maximum information rate is: Rmax = N.nf / tcycle =
127x2000/(241.33x10-3) = 1.052 Mbps.

Câu 6:
Suppose that a multiplexer receives constant-length packet from N = 60 data sources.
Each data source has a probability p = 0.1 of having a packet in a given T-second period.
Suppose that the multiplexer has one line in which it can transmit eight packets every T
seconds. It also has a second line where it directs any packets that cannot be transmitted
in the first line in a T-second period. Find the average number of packets that are
transmitted on the first line and the average number of packets that are transmitted in the
second line.

Answer:
First, find out the probability of the k packets that have reached the T-
second. It can be computed with the help of binomial distribution that has
parameters as N=60 and shows the probability of p=0.1.
The average number for the arrivals of the packets can be given as Np=6.
Now, calculate the average number of packets received through the first line
as below:
Now, the average number of packets received is 4.59 that gets transmitted
through the first line. The remaining will get transmitted by the second line.
Now, the average number of packets transmitted through the second line
per T second can be obtained as below:

$$= 6-4.59 = 1.41

Therefore, it will transmit 1.41 packets on average per T second from the
second line.
Câu 7:
Consider the transfer of a single real-time telephone voice signal across a packet network.
Suppose that each voice sample should not be delayed by more than 20 ms.
a. Discuss which of the following adaptation functions are relevant to meeting the
requirements of this transfer: handling of arbitrary message size; reliability and
sequencing; pacing and flow control; timing; addressing; and privacy, integrity
and authentication.
b. Compare a hop-by-hop approach to an end-to-end approach to meeting the
requirements of the voice signal.

a/Message size is important because in real-time signals of voice it is necessary to


transfer a fixed packet size of that holds no more than 20 ms of the speech signal.
The handling of arbitrary message size is NOT as important as long as the desired
packet size for voice can be handled.

Sequencing is essential because each packet needs to arrive in the same sequence
that it was generated. Reliability is moderately important since voice transmission
can tolerate a certain level of loss and error.

Pacing and flow control are not as important because the synchronous nature of
the voice signal implies that the end systems will be matched in speed.

Timing, for real-time voice transfer, is important because this adaptation function
helps to control the jitter in the delivered signal.
Addressing is only during the connection setup phase if we assume some form of
virtual circuit packet switching method.

Privacy, integrity, and authentication have traditionally not been as important as the
other issues discussed above.

b/If the underlying network is reliable then the end-to-end approach is better because the
probability of error is very low so processing at the edge suffices to provide acceptable
performance.
If the underlying network is unreliable then the hop-by-hop approach may be required.
For example, if the probability of error is very high, as in a wireless channel, then error
recovery at each hop may be necessary to make effective communication possible.

Câu 8:
Consider the Stop-and-Wait protocol as described. Suppose that the protocol is modified
so that each time a frame is found in error at either the sender or receiver, the last
transmitted frame is immediately resent.

a. Show that the protocol still operates correctly.


b. Does the state transition diagram need to be modified to describe the new
operation?
c. What is the main effect of introducing the immediate-retransmission feature?

a/The sender in the stop-and-wait protocol described in the chapter retransmits a frame
when an acknowledgment is not received in time. The modified protocol says that the
frame is retransmitted every time the sender or receiver sees an error.
Therefore, the only difference is that frames are retransmitted sooner. So, the protocol
will work correctly.
b/ No. The state transition diagram will stay the same.

c/ The error recovery process will be faster with this modified protocol.

Câu 9:
Suppose that two peer-to-peer processes provide a service that involves the transfer of
discrete messages. Suppose that the peer processes are allowed to exchange PDUs that
have a maximum size of M bytes including H bytes of header. Suppose that a PDU is not
allowed to carry information from more than one message.

a. Develop an approach that allows the peer processes to exchange


messages of arbitrary size.

To exchange messages of arbitrary size, large messages must be segmented into


parts of M-H bytes each in length to be transmitted in multiple PDUs. Small
messages must be placed in a single PDU.
b. What essential control information needs to be exchanged between the peer
processes?

The peer processes need to communicate information that allows for the
reassembly of messages at the receiver. For example, the first PDU may contain
the message length. The last PDU may contain and end-of-message marker.
Sequence numbers may also be useful to detect loss in connection oriented
networks and to help in reconstruction of the messages in connectionless
networks. Lastly, since variable size PDUs are permitted, the size of the PDU must
be transmitted in the PDU header.
c. Now suppose that the message transfer service provided by the peer processes
is shared by several message source-destination pairs. Is additional control
information required, and if so, where should it be placed?

In this case, in addition to all of the header information mentioned in b), each PDU
must be labeled with a stream ID, so that the receiver can treat each stream
independently when reassembling messages.
Câu 10:
A 1 Mbyte file is to be transmitted over a 1 Mbps communication line that has a bit error
rate of p = 10-6.
a. What is the probability that the entire file is transmitted without errorsWe
conclude that it is extremely unlikely that the file will arrive error free.
b. The file is broken up into N equal-sized blocks that are transmitted separately.
What is the probability that all the blocks arrive correctly without error? Does
dividing the file into blocks help?
c. Suppose the propagation delay is negligible, explain how Stop-and-Wait ARQ can
help deliver the file in error-free form. On the average how long does it take to
deliver the file if the ARQ transmits the entire file each time?

Lời giải here http://bbcr.uwaterloo.ca/~lcai/ece418/Tut_6.pdf

Câu 11:

In this activity, you are given the network address of 192.168.100.0/24 to subnet and
provide the IP addressing for the Packet Tracer network. Each LAN in the network
requires at least 25 addresses for end devices, the switch and the router. The
connection between R1 to R2 will require an IP address for each end of the link.
a. Based on the topology, how many subnets are needed?
b. How many bits must be borrowed to support the number of subnets in the topology
table?
c. How many subnets does this create?
d. How many usable hosts does this create per subnet?

Based on the topology, how many subnets are needed? 5


⦁ How many bits must be borrowed to support the number of subnets in the topology
table? 3
⦁ How many subnets does this create? 8
⦁ How many usable hosts does this create per subnet? 28-3 – 2 = 30 máy
Câu 12:
Five stations (S1-S5) are connected to an extended LAN through transparent bridges (B1-
B2), as shown in the following figure. Initially, the forwarding tables are empty. Suppose
the following stations transmit frames: S1 transmits to S5, S3 transmit to S2, S4 transmits
to S3, S2 transmits to S1, and S5 transmits to S4. Fill in the forwarding tables with
appropriate entries after the frames have been completely transmitted.
Trước tiên, phải hiểu là ở đây chúng ta có 3 mạng LAN, và mỗi 1 mạng LAN đều được
bố trí theo dạng BUS nên khi 1 máy truyền dữ liệu, nó sẽ truyền theo kiểu broadcast (tức
là truyền đi đến tất cả các máy và các cổng mạng)
Câu 13:

1. Consider the network in Figure.

a) Use the Dijkstra algorithm to find the set of shortest paths from node 4 to other
nodes.

Iteration N D1 D2 D3 D5 D6

Initial
b) Find the set of associated routing table entries (Destination, Next Hop, Cost)

Destinatio Cost Next Hop


n
Câu này tự làm nhé

14)

You are a network technician assigned to install a new network for a customer. You
must create multiple subnets out of the 192.168.12.0/24 network address space to
meet the following requirements:
- The first subnet is the LAN-A network. You need a minimum of 50 host IP
addresses.
- The second subnet is the LAN-B network. You need a minimum of 40 host
IP addresses.
- You also need at least two additional unused subnets for future network
expansion.
Note: Variable length subnet masks will not be used. All of the device subnet masks
should be the same length.
Answer the following questions to help create a subnetting scheme that meets the stated
network requirements:

a. How many host addresses are needed in the largest required subnet?
b. What is the minimum number of subnets required?
c. The network that you are tasked to subnet is 192.168.12.0/24. What is the /24
subnet mask in binary?
d. The subnet mask is made up of two portions, the network portion, and the host
portion. This is represented in the binary by the ones and the zeros in the subnet
mask.
Questions:
In the network mask, what do the ones and zeros represent?

e. When you have determined which subnet mask meets all of the stated network
requirements, derive each of the subnets. List the subnets from first to last in the
table. Remember that the first subnet is 192.168.12.0 with the chosen subnet mask.

Subnet Prefix Subnet Mask


Address

Answer
a. How many host addresses are needed in the largest required subnet?
Soln: 50

b. What is the minimum number of subnets required?


Soln : According to the question , two subnet are required for LAN-A and LAN-B and two
subnets are needed to be left for future use Therefor the total number of subnets are 4 .

c. The network that you are tasked to subnet is 192.168.12.0/24. What is the /24
subnet mask in binary?

Soln : /24 is prefix length.


In binary, it is 11111111.11111111.11111111.11000000
There are 24 bits 1. It means that the address left 24 first bits for network portion

d. The subnet mask is made up of two portions, the network portion, and the host
portion. This is represented in the binary by the ones and the zeros in the subnet mask.
In the network mask, what do the ones and zeros represent?
Soln : In the nerwork mask, the ones represent the network portion and the zeroes
represent the host portion.

e. When you have determined which subnet mask meets all of the stated network
requirements, derive each of the subnets. List the subnets from first to last in the table.
Remember that the first subnet is 192.168.12.0 with the chosen subnet mask.

Subnet Prefix Subnet Mask


Address

192.168.12.0 /26 255.255.255.192

192.168.12.64 /26 255.255.255.192

192.168.12.12 /26 255.255.255.192


8

192.168.12.19 /26 255.255.255.192


2

Câu 15:

Suppose that Selective Repeat ARQ is modified so that ACK messages contain a list of
the next m frames that it expects to receive.

Solutions follow questions:

a. How does the protocol need to be modified to accommodate this change?

b. What is the effect of the change on protocol performance?

GIVENTHAT :
a) How does the protocol need to be modified ?

2 things are needed to be changed:-

The frame header needs to be modified to recieve the list of frames and Since the reciever
explicitly indicates which frames are needed to be transmitted.
Change in transmitter operation is needed. If the recieved list contains m oldest frames
that are yet to be recieved , then it can be used to skip retransmission of frames that have
already been received.
b) what is the effect of change on protocol performance?

Performance will surely increase if the error rate is high or delay is high. A single frame
can ask for the retransmission of several frames.

The complexity of the protocol will surely increase relative to the unchanged Selective
repeat ARQ

You might also like