TUTORIAL 1 - UniMAP Portal

advertisement
Tutorial 1
1.
Two musicians located in different cities wish to have a jam session over a
communications network. Find the maximum possible distance between the
musicians if they are to interact in real-time, in the sense of experiencing the same
delay in hearing each other as if they were 10 meters apart. The speed of sound is
approximately 330 meters/second. Assume that the network transmits the sound at the
8
speed of light in cable, 2.3 x 10 meters/second.
Solution:
The first step is to find the delay for the sound when the musicians are 10 meters apart:
t10 = 10/330 = 30.30 milliseconds
The maximum distance is the time required for a real-time 'experience' times the cable speed:
8
-3
d = (2.3 x 10 ) x (30.30 x 10 ) = 6,969,000 meters = 6969 kilometers
2.
Describe the step-by-step procedure that is involved from the time you deposit a letter in a
mailbox to the time the letter is delivered to its destination. What role do names, addresses
and mail codes play? How might the letter be routed to its destination? To what extent can the
process be automated?
Solution:
The steps involved in mailing a letter are:
1. The letter is deposited in mailbox.
2. The letter is picked up by postal employee and placed in sack.
3. The letter is taken to a sorting station, where it is sorted according to destination, as
determined by the mail code and grouped with other letters with the same destination
mail code. (If there is no mail code, then it is determined by the largest geographical
unit, for example, country (if specified), otherwise state (if specified), otherwise city
(if specified).)
4. The letter is shipped to the post office that handles the mail for the specific mail code
(or country or city).
5. The letter is then sorted by street address.
6. The letter is picked up at the post office by the postal worker responsible for delivering
to the specified address.
7. The letter is delivered according to the number and street.
The name is not really used, unless the street address is missing or incorrect. The name is
at the destination to determine who the letter belongs to. (Unless of course the letter is
being sent to a small town, where most inhabitants are known to the postal worker.)
Data Communication & Networks
DKT 224/3
The mail delivery process can be automated by using optical recognition on the mail
code. The letter can then be sorted and routed to the destination postal station, and even
to the destination neighborhood, depending on the amount of geographical detail built
into the mail code.
2b. Repeat part (a) for an e-mail message. At this point, you may have to conjecture different
approaches about what goes on inside the computer network.
Solution:
The steps involved in e-mailing a message are:
1. The message is sent electronically by clicking 'Send'. (In Chapter 2 we see that the
Simple Mail Transfer Protocol (SMTP) is used to do this.)
2. The mail provider of the sender sends a request to a name server for the network
address of the mail provider of the recipient. The mail provider is determined by the
information following the @ symbol.
3. If the mail provider finds the network address of the recipient's mail provider, then it
sends the message to that address.
4. Upon receipt of the message the mail provider either informs the recipient
automatically that there is mail or waits until mail is requested by the recipient,
depending on how the mail service is set up. The recipient is determined by the
information before the @ symbol.
2c. Are the procedures in parts (a) and (b) connection-oriented or connectionless?
Solution:
The transfer service of letters in a postal system is connectionless. Users do not set up
connections prior to the transfer of each letter. (Note however that the postal system may
have regularly scheduled shipments of bundles of mail from city to city, because the
volume of mail between cities is predictable. These regular shipments can be viewed as
pre-arranged "connections.")
E-mail transfer is also a connectionless service in that the user does not set up end-to-end
connections to send a message. We will see in Chapter 2, however, that e-mail protocols
use connection-oriented procedures to exchange messages.
NOTE: For parts (a) and (b) other step-by-step procedures are possible.
3. Suppose that the letter in problem 2 is sent by fax. Is this mode of communications
connectionless or connection-oriented? Real-time or non-real time?
Solution:
In order to send the letter by fax, a telephone connection must first be established. Therefore
the mode of communications is connection-oriented. The transfer of information across the
network occurs in real-time.
4. Discuss the advantages and disadvantages of transmitting fax messages over the Internet
instead of the telephone network.
Tutorial #1
Pn. Shahadah Ahmad
Data Communication & Networks
DKT 224/3
Solution: The comparison of fax transmission over the Internet and over the telephone network
reflect the differences between e-mail and telephone calls. The transmission of a fax message as
an attachment to e-mail means that the transfer of the message is not in real time and that delivery
is not necessarily confirmed. The transmission of a fax message over the telephone network, on
the other hand, is real time and is confirmed with fairly high certainty. On the other hand, the cost
of transmission of a fax message over the Internet is very inexpensive and is not distancesensitive. The transmission of fax messages over telephone networks may involve long distance
charges.
5. Give two features that the data link layer and transport layer have in common. Give two
features in which they differ. Hint: Compare what can go wrong to the PDUs that are handled by
these layers.
Solution: Features they have in common: • Both layers can provide recovery from transmission
errors. • Both layers can provide flow control. • Both layers can support multiplexing.
Features in which they differ: • The transport layer is end to end and involves the interaction of
peer processes across the network. The data link layer involves the interaction of peer-to-peer
processes that are connected directly. In general, the time that elapses in traversing a data link is
much smaller than the time traversing a network, where packets can become trapped in temporary
routing loops. Consequently, transport layer protocols must be able to deal with out-of-sequence
PDUs and a much larger backlog of PDUs than data link layers. • The data link layer is concerned
with framing and the transport layer is not. • The data link layer may be concerned with medium
access control, the transport layer does not have this concern.
6. Suppose an application layer entity wants to send an L-byte message to its peer process, using
an existing TCP connection. The TCP segment consists of the message plus 20 bytes of header.
The segment is encapsulated into an IP packet that has an additional 20 bytes of header. The IP
packet in turn goes inside an Ethernet frame that has 18 bytes of header and trailer. What
percentage of the transmitted bits in the physical layer correspond to message information, if L =
100 bytes, 500 bytes, 1000 bytes?
Solution:
TCP/IP over Ethernet allows data frames with a payload size up to 1460 bytes. Therefore, L =
100, 500 and 1000 bytes are within this limit.
The message overhead includes:
• TCP: 20 bytes of header
• IP: 20 bytes of header
• Ethernet: total 18 bytes of header and trailer.
Therefore
L = 100 bytes, 100/158 = 63% efficiency.
L = 500 bytes, 500/558 = 90% efficiency.
L = 1000 bytes, 1000/1058 = 95% efficiency.
Tutorial #1
Pn. Shahadah Ahmad
Data Communication &Network
DKT224/3
7. What are the responsibility of the transport link layer in the internet model.
The transport layer oversees the process-to-process delivery of the entire message.
It is responsible for
a. dividing the message into manageable segments
b. reassembling it at the destination
c. flow and error control
8. . What is the difference between a port address, a logical address, and a physical
address?
The physical address is the local address of a node; it is used by the data link layer
to deliver data from one node to another within the same network. The logical
address defines the sender and receiver at the network layer and is used to deliver
messages across multiple networks. The port address (service-point) identifies the
application process on the station.
9. How do the layers of the internet model correlate to the layers of the OSI model?
The application, presentation, and session layers of the OSI model are represented
by the application layer in the Internet model. The lowest four layers of OSI
correspond to the Internet model layers.
10. Match the following to one or more layers of the OSI model:
a. Route determination: network layer
b. Flow control: data link and transport layers
c. Interface to transmission media: physical layer
d. Access for the end user: application layer
11. In figure 2 , computer A sends a message to computer D via LAN1,routerR1 and
LAN2. Show the contents of the packets and frames at the network and data link
layer for each hop interface.
See Figure 2
Exercise1
Pn. Shahadah Ahmad
Data Communication &Network
DKT224/3
12. Suppose a computer sends a frame to another computer on a bus topology LAN.
The physical destination address of the frame is corrupted during the
transmission. What happen to the frame? How can the sender be informed
about the situation.
If the corrupted destination address does not match any station address in the network,
the packet is lost. If the corrupted destination address matches one of the stations,
the frame is delivered to the wrong station. In this case, however, the error
detection mechanism, available in most data link protocols, will find the error and
discard the frame. In both cases, the source will somehow be informed using one
of the data link control mechanisms .
Exercise1
Pn. Shahadah Ahmad
Download