Preview

Homework Network and Concept

Better Essays
Open Document
Open Document
955 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Homework Network and Concept
Final Exam of Computer Networks (ICE 1230)
2008.5. 27.
Answer in English and Total 15 points

1. Why is it said that packet switching employs statistical multiplexing? Contrast statistical multiplexing with the multiplexing that takes place in TDM. (1 point)
Answer: In a packet switched network, the packets from different sources flowing on a link do not follow any fixed, pre-defined pattern. In TDM circuit switching, each host gets the same slot in a revolving TDM frame.

2. In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second interval. Will Bob necessarily return the favor and provide chunks to Alice in the same interval? Why or why not? (1 point)
Answer: It is not necessary that Bob will also provide chunks to Alice. Alice has to be in the top 4 neighbors of Bob for Bob to send out chunks to her; this might not occur even if Alice provides chunks to Bob throughout a 30 second interval.

3. What is a way using Last-Modified: header line in HTTP? (1 point)
Answer: The header line is used by Conditional GET to check whether the object asked has been modified.

4. We saw that there is no network-layer protocol that can be used to identify the hosts participating in a multicast group. Given this, how can multicast applications learn the identities of the hosts that are participating in a multicast group? (1 point)
Answer: The protocol must be built at the application layer. For example, an application may periodically multicast its identity to all other group members in an application-layer message.
5 In these days, the Internet needs to include the wireless communications network in addition to the wired networks. What is a way to extend the congestion control of TCP in this case? Why? (2 point)
Answer: Packet losses occur from network congestion and wireless communication. Since the wired Internet does not consider the packet loss due to errors in wireless communication, the congestion control of TCP should be revised. A way

You May Also Find These Documents Helpful

  • Good Essays

    1 Which statements are true concerning the shared memory buffering used by an Ethernet switch? (Choose two.)…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    2) The 2 methods of packet switching are firstly Datagram approach and secondly Virtual circuit approach…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw310 Week6

    • 372 Words
    • 2 Pages

    Based on the graph I believe that the congestion on the server starts around 5,000 bytes and continues to increase for the next 11 seconds of the transmission. The flight size starts around 1m42s and reach the higest point when the the transmission is around 32,000 bytes.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 468 Words
    • 2 Pages

    Virtual Circuit switching and datagram switching: Both transmit data using packet multiplexing. The packets are stored and then forwarded from each node in the path.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    39. (T or F) Asynchronous transfer mode is designed to provide a slow-speed version of packet switching for organizations that have only limited amounts of data to send.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    In my opinion, these days, packet switching is more commonly used because it is used in LAN technologies or set ups. I would think that circuit switching is used for analog lines and networks, but during these days where most organizations are changing to digital and especially VoIP, packet switching would be more common.…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Packet switching – Where the transmission between technology breaks the data up into blocks and then into packets. Every packet contains information that will lead it to the destination. Every packet travels independently through the network and given different routes in the network. Once it reaches the network of its destination than the original message is reassembled.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    1. Which of the following protocols are examples of TCP/IP transport layer protocols? (More than one answer could be correct.)…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Better Essays

    Signal Theory

    • 1153 Words
    • 5 Pages

    In this report I will be writing about Signal Theory and all of its aspects, this involves talking about how data is transferred over a network, what a packet is and what information it contains, asynchronous and synchronous transmission, errors that data may encounter and what protocols are in place to avoid this from happening.…

    • 1153 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Behavior of TCP

    • 1860 Words
    • 8 Pages

    In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol’ s Alice’s Adventures in Wonderland) from your computer to a remote server. We’ll study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; we’ll see TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and we’ll look at TCP’s receiver-advertised flow control mechanism. We’ll also briefly consider TCP connection setup and we’ll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server.…

    • 1860 Words
    • 8 Pages
    Powerful Essays