Ans

advertisement
Answers of Exercise 7
1. Explain what are the connection-oriented communication and the connectionless communication.
Give some examples for each of the above two types of communications.
Answer:
Connection-oriented communication operates analogous to a telephone system. When two
computers communicate they must establish a connection through network. After both
computers agree to communicate, the network system forms a data path called a connection.
The connection stays in place until the computers decide it is no longer needed, I.e., they
have no data to exchange. Either computer can choose to terminate the connection.
Examples of connection-oriented communication are Frame Relay, ATM, TCP, FTP, etc.
Connectionless communication operates analogous to the postal mail system. No connection
will be established before exchange data between two computers or end stations. Whenever it
has data to send, a computer must place the data in the appropriate frames format, attach
the address of the computer to which the data should be delivered, and then pass the packet
to the network. The connectionless network system transports the packet to the prescribed
destination and delivers it.
Examples of connectionless communication are Ethernet, Token Ring, FDDI, IP, email, etc.
2. Describe concepts of delay, throughput, bit corruption (error), disordered packet,
duplicate packet, lost packet, flow control and network congestion, respectively.
Answer:
Delay: It specifies how long it takes for a bit or packet of data to travel across the network
from one computer to another.
Answers of Exercise 7
Throughput: It is measure of the rate at which data can be transmitted in a network. The term
bandwidth is sometimes used as a synonym for throughput. The effective throughput is less
than the hardware bandwidth.
Bit corruption (error): Any change of bits introduced as data passes across a network. Bit
corruptions or errors can be caused by electrical interference or hardware malfunctions.
Disordered packet: When two computers communicate over a connectionless network and
exchange data consisted of a sequence of packets. Two connective packets may go different
routes to arrive a same destination. The later packet may arrive a destination early. This results
in the order of packet received is different from that sent.
Duplicated packet: Malfunctioning hardware can cause packets to be duplicated. Duplication
often arise in WANs caused, for example, by retransmission, but can also occur in LANs when
a bridge cycle exists.
Lost packet: When a computer or some network device detects bit errors in a packet, the whole
data of the packet will be discarded. When a switch or a router has no enough memory to store
all received packets, it also discard packets. Thus, the receiver can not receive some packets,
call lost packet.
Flow control: Computers do not all operate at the same speed. Data overrun occurs when a
computer sends data across a network faster than the destination can be absorb it. Consequently
data is lost.
Network congestion: Network congestion arises in network systems that include multiple links.
When more packets arrive than can be sent, the queue grows and effective delay increase.
This situation is known as congestion. If congestion persists, a packet switch will run out of
memory and begin discarding packets. Furthermore, if the situation continues, the entire
network can become unusable. This is known as congestion collapse.
Answers
3. Professionals sometimes refer to a “knee” in the delay curve.
To understand what they mean, plot the effective delay for
D
values of utilization between 0 and 0.95. Explain why
utilization of a network should not approach to 1.
20D0
Answer: The delay curve is given on the right.
The figure shows that the delay increases slowly
when U<0.8, and increases very fast when U>0.9.
That is, network utilization should be less than 0.9,
otherwise, long delay will occur and throughput will
decrease abruptly.
4D0
D0
of Exercise 7
1
4. Match the following to one of the ISO 7 layers:
.5 .8 .95
0
a. Route determination.  Network layer
b. Flow control.  Data link layer
c. Provides reliable end-to-end transmission of entire message.  Transportation Layer
d. Reassembly of data packets into a message.  Transportation layer
e. Provides format and code conversion services.  Presentation layer
f. Provides user services such as electronic mail and file transfer.  Application layer
g. Provides verification of login and logout.  Session Layer
h. Mechanical, electrical, and functional interface.  Physical layer
U
5. Why does a stop-and-go protocol have especially low throughput over a satellite channel
that operates at two megabits per second. How to improve throughput using different
flow control method?
Answer: Because propagation delay over a satellite channel is very large, much time will
spend on waiting ACK from a receiver. Thus low throughput will be expected when using
stop-and-go protocol. The sliding window flow control can improve the throughput.
Download