Você está na página 1de 4

ECX5234

The Open University of Sri Lanka


DEPARTMENT OF ELECTRICAL & COMPUTER ENGINEERING ECX5234 Data Communications
Assignment #2 2011/2012 (Due 15th September 2011) Answer all questions. Q1. (a) If the average bit error rate is 1 in 105, what is the probability of having (i) single bit error (ii) single bit correct (iii) at least one error in a byte ? (b) In CRC, show the relationship between the following entities. (Size means the number of bits.) (i) The size of the dataword and the size of the codeword (ii) The size of the divisor and the remainder (iii) The degree of the polynomial generator and the size of the divisor (c) A data bit stream of 10011111 is transmitted using the CRC method with the generator polynomial x3+x+1 . (i) Draw the shift register implementation of the transmitter. (ii) Find the actual bit string transmitted. (iii) Suppose the 3rd bit from the left is inverted during transmission. Show whether this error can be detected at the receiver's end. (iv) Briefly discuss the capability of finding out different types of errors using the CRC method.

Q2.

(a) (i) Internet Protocol version 6 (IPv6) is the next-generation Internet Protocol version designated as the successor to IPv4. Justify this statement with sufficient reasons. (ii) Compare and contrast the fields in the main headers of IPv4 and IPv6. Make a table that shows the presence or absence of each field. (b) An ISP is granted a block of addresses starting with 190.100.0.0/16. The ISP wants to distribute these addresses to three groups of customers as follows: The first group has 32 customers; each needs 128 addresses. The second group has 64 customers; each needs 32 addresses. The third group has 128 customers; each needs 64 addresses. (i) Design the sub-blocks and give the slash notation for each sub block. (Present your answer by giving IP ranges of the first two customers and the last two customers of each group.) You need to show all the steps very clearly. (ii) Find out A. number of addresses granted to ISP B. total number of addresses allocated by the ISP C. number of addresses still available after these allocations.

(PTO)

ECX5234

Q3.

(a) (b) (c)

Differentiate between connectionless service and connection oriented service. Compare the TCP header and the UDP header. List the fields in the TCP header that are missing from UDP header. Give reasons for their absence. Describe the 3 way handshaking in TCP connection establishment.

Q4.

(a)

Explain the following methods used in DNS resolver: (i) Recursive resolution (ii) Iterative resolution Consider the diagram in fig.Q4. The network abc.com has 3 user machines u1.abc.com, u2.abc.com and u3.abc.com. Suppose the user at u1.abc.com types the URL www.xyz.com/handbook.htm into a browser to retrieve a 1000Mbit file. (i) List the sequence of DNS and HTTP messages sent/received from/by u1.abc.com as well as any other messages that leave/enter the abc.com network that are not directly sent / received by user1.abc.com. Start this from the point that the URL is entered into the browser until the file is completely received. Indicate the source and destination of each message. You can assume that HTTP cache of abc.com is initially empty and DNS requests are iterated queries. (ii) Now the machine u3.abc.com makes a request to exactly the same as u1.abc.com made. List the sequence of DNS and HTTP messages sent/received from/by u3.abc.com as well as any other messages that leave/enter the abc.com network that are not directly sent / received by u3.abc.com. Start this from the point that the URL is entered into the browser until the file is completely received. Indicate the source and destination of each message. (iii) Now assume that machine u2.abc.com needs to access the URL news.xyz.com. List the sequence of DNS and HTTP messages sent/received from/by u2.abc.com as well as any other messages that leave/enter the abc.com network that are not directly sent / received by user3.abc.com. Start this from the point that the URL is entered into the browser until the file is completely received. Indicate the source and destination of each message.

(b)

Figure Q4

(PTO)

ECX5234

Assignment #3 2011/2012 (Due 12th December 2011)

Answer all questions.

Q1.

(a)

Study about Distance Vector Routing algorithm and explain how count-to-infinity problem occurs using an example. How do you overcome this problem? Consider the network with link costs shown in figure Q1 below. Use the Distance Vector approach to show the distance vectors at node A. Hence determine the shortest path from A to F.

(b)

B 3 A 3 C 1

D 2

1 5 E

Figure Q1

(c)

Write short notes on the following protocols: (a) ICMP (b) IGMP (c) Spanning tree algorithm

Q2. (a) Briefly explain the principle of DSL technology. (b) Distinguish between DSL modem and a DSLAM. What type of topology is used when customers in an area use DSL modems use data transfer purposes? Explain your answer. (c) A virtual Private Network (VPN) provides privacy for LANs that communicate through the global internet. Explain this statement with reasons. (d) A communication channel is operating at a transmission rate of 1500 000 bps.

Packets arrive to the channel according to a Poisson process with a rate of 200 packets per second. The packets have an exponentially distributed length with a mean of 5 000 bits. We assume that the channel can be modeled as an M/M/1 system with queueing discipline FCFS (First- Come- First- Served). Find the server utilization, expected number of packets in the system, total time spent in the system and expected waiting time in a queue.

(PTO)

ECX5234

Q3. (a) Sketch the timing diagram for a Stop and Wait ARQ system showing both error free and data packet loss cases. Identify all the delay components and mark them in the same diagram. (b) The Stop-And-Wait ARQ is very inefficient when the channel has a large bandwidth and a long propagation delay. The product of the bandwidth and the round trip delay is called as the bandwidth-delay product. If we assume the channel as a pipe, the bandwidth-delay product will be the volume of the pipe in bits. If we do not use this full volume, we are inefficient. Therefore the bandwidth-delay product is a measure of the channel utilization which can be calculated as a percentage of the full volume. Now assume that, in a Stop-And-Wait system, the bandwidth of the channel is 1.2Mbps and the propagation delay is 10 ms. What is the bandwidth-delay product? If the data frames are 1500 bits, calculate the utilization percentage of the channel? (c) The above drawback in Stop and Wait system can be overcome using the technique pipelining and it is used in sliding window method. Explain the following: (i) Pipelining (ii) Sliding window method (iii)How sliding window method improves channel utilization. (d) Explain the term piggybacking and how it improves the efficiency of a bidirectional protocols. (e) The timer of a communication system has a time-out of 6 msec and its round trip delay is

2msec. Draw timing diagrams for the following cases: (i) The system uses Stop and Wait ARQ protocol. Draw the timing diagram for 4 frames if the 2nd frame is lost during transmission and all other frames are received successfully. Clearly mark all the important details on your diagram. Suppose that the above system uses Go-Back-N ARQ protocol with N = 5. Draw the timing diagram for 6 frames if the 2nd frame is lost during transmission and all other frames are received successfully. Clearly mark all the important details on your diagram.

(ii)

Q4. A new school is being setup and there is requirement for a local area network to be

implemented with access from every classroom. There are to be 100 PCs in the computer labs and another 50 dispersed in various rooms around the building, as well as 20 laptops which teachers will expect to be able to use in any room. It is expected that each PC will require no more than 50Kbits/s. Cost is to be the primary design consideration. You should consider the following design options: i. 802.11b/g Wireless LAN ii. 100 Base T Ethernet using UTP wiring iii. Ethernet using fibre optic cable. (a) State which of the above design options best suits for each of the customer requirements, giving your reasons for choosing the design and rejecting others. (b) Draw a network diagram illustrating all aspects stated in the scenario.

(PTO)

Você também pode gostar