Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Troubleshooting Computer Networking: St. Bernard Data Transfer, Protocols, Connection Hand, Study notes of Operating Systems

This course covers various computer networking topics including data transfer rates, layered protocols, semaphore usage, connection handling, delay-bandwidth product, Aloha system comparison, network configuration, secure communication protocol design, and functions of repeaters, bridges, routers, and gateways. It also covers LAN characteristics, connection-oriented vs connectionless systems, MAC protocol efficiency comparison, token ring recovery process, IPv4 address classes, subnet calculation, and ARP vs RARP. The course addresses questions such as the range for higher data rates than 300 Mbps cable, pros and cons of layered protocols, semaphore usage in networking, client program operation and result handling, importance of delay-bandwidth product in network efficiency, time to send a 1 KB file over high-speed cable and through 20 routers, definition of Aloha system and comparison with turn-based transmission, network configuration for 25 PCs with Ethernet, hybrid data link protoc

Typology: Study notes

Pre 2010

Uploaded on 08/09/2009

koofers-user-bgz
koofers-user-bgz 🇺🇸

10 documents

1 / 2

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
More on Computer networking problems.
1. Imagine that you have trained your St. Bernard, Bernie to carry a box of three tapes
instead of brandy. These tapes each contain 10 GBs. The dog can run at a speed of 30
km/hour. For what range of distances does Bernie have a higher data rate than a 300
Mbps cable?
2. What are the advantages of layered protocols? Cite at least two disadvantages of
layered protocols.
3. Consider the following problem. Both the sender and the receiver might be interested
in doing the same thing when only one of them is allowed to do that, if at all. For
instance, if A and B engaged in communication want to talk at the same time it may not
be allowed to do so. In Operating systems, one manages such processes using semaphore
type global variables. Obviously, in networking it is not at all possible to do so. How
would it be handled and at what layer?
4. A client program connects to a server and sends an operation, gets a result back. What
happens then? Is the connection open, so that the client can send more operations? What
are the pros and cons of keeping the connection open or closing it down after each
operation?
5. Why is delay-bandwidth product so important in network efficiency estimate?
6. Suppose you are to send a 1 kB file over a high-speed local cable to your nearest router
at a rate of 500 Mbps. After it reaches the router it would traverse a total distance of 5000
km going through 20 routers during its traversal. At each router your file is stored for
precisely 10 msec. and then retransmitted (again at a rate of 500 Mbps). How long will it
take to reach the destination? How efficient is it?
7. What is an ALOHA system? How does it compare with a communication system
where each host station must wait for its turn to transmit? Which one is better and under
what circumstances?
8. You are to configure a network of 25 PCs each running either Windows NT 4 or
Lynux. This would be basically an Ethernet network providing minimally PC-to-PC
communication. Garner whatever information you require from the web, and obtain a
detail configuration using cables, a hub (minimally a 4-port one) or a bridge, a network
adapter card (provide appropriate vendor and model numbers), etc. Indicate the steps
you'd require to set up the interface, the protocols, etc. Imagine that this is going to be
used by your technicians in future. Use the textbook and the relevant information from
the web.
9. Consider a situation where a sender is communicating with receiver with a maximum
secrecy. Sender doesn't want its location to be publicly traceable while it is
communicating with the receiver. Accordingly, it wants the receiver to do FEC when bit
pf2

Partial preview of the text

Download Troubleshooting Computer Networking: St. Bernard Data Transfer, Protocols, Connection Hand and more Study notes Operating Systems in PDF only on Docsity!

More on Computer networking problems.

  1. Imagine that you have trained your St. Bernard, Bernie to carry a box of three tapes instead of brandy. These tapes each contain 10 GBs. The dog can run at a speed of 30 km/hour. For what range of distances does Bernie have a higher data rate than a 300 Mbps cable?
  2. What are the advantages of layered protocols? Cite at least two disadvantages of layered protocols.
  3. Consider the following problem. Both the sender and the receiver might be interested in doing the same thing when only one of them is allowed to do that, if at all. For instance, if A and B engaged in communication want to talk at the same time it may not be allowed to do so. In Operating systems, one manages such processes using semaphore type global variables. Obviously, in networking it is not at all possible to do so. How would it be handled and at what layer?
  4. A client program connects to a server and sends an operation, gets a result back. What happens then? Is the connection open, so that the client can send more operations? What are the pros and cons of keeping the connection open or closing it down after each operation?
  5. Why is delay-bandwidth product so important in network efficiency estimate?
  6. Suppose you are to send a 1 kB file over a high-speed local cable to your nearest router at a rate of 500 Mbps. After it reaches the router it would traverse a total distance of 5000 km going through 20 routers during its traversal. At each router your file is stored for precisely 10 msec. and then retransmitted (again at a rate of 500 Mbps). How long will it take to reach the destination? How efficient is it?
  7. What is an ALOHA system? How does it compare with a communication system where each host station must wait for its turn to transmit? Which one is better and under what circumstances?
  8. You are to configure a network of 25 PCs each running either Windows NT 4 or Lynux. This would be basically an Ethernet network providing minimally PC-to-PC communication. Garner whatever information you require from the web, and obtain a detail configuration using cables, a hub (minimally a 4-port one) or a bridge, a network adapter card (provide appropriate vendor and model numbers), etc. Indicate the steps you'd require to set up the interface, the protocols, etc. Imagine that this is going to be used by your technicians in future. Use the textbook and the relevant information from the web.
  9. Consider a situation where a sender is communicating with receiver with a maximum secrecy. Sender doesn't want its location to be publicly traceable while it is communicating with the receiver. Accordingly, it wants the receiver to do FEC when bit

error rate is generally low, otherwise (when the error rate is high) it is willing to let the receiver use ARQ if need arises. The data link layer protocol, thus, requires to be a hybrid one such that it could adaptively switch back and forth between FEC and ARQ modes as needed. Design (specify steps and functions) such a hybrid protocol defending any non- trivial design choice you lean on. The bit error rate could dynamically change within the interval of 10^(-2) to 10^(-8).

  1. What are the principal differences among a repeater, a bridge, a router and a gateway? Who or what uses them?
  2. Explain the typical characteristics of a LAN in terms of network types, bit rate, geographic extent, delay-bandwidth product, addressing and cost. For each characteristics, can you find a LAN that deviates from the typical? Which of the characteristics is most basic to a LAN?
  3. What is the difference between a connection oriented and a connectionless system? Under what conditions one would be the preferred architecture over the other?
  4. In a LAN, which MAC protocol has a higher efficiency: ALOHA or CSMA-CD? What about a WAN? Explain.

14. Compare and contrast the average delay on a token ring network with n^ active nodes

with that of a CSMA/CD system. Under what conditions one is better than the other?

  1. What happens if the token in a token ring network gets corrupted? How does the system recover from such a state? Whose job is it to remove the injected message on the ring (along other debris) and then introduce a fresh token?
  2. Identify the range of IPv4 addresses spanned by class A, class B and class C?
  3. A host in an organization has an IP address 150.32.64.34 and a subnet mask 255.255.240.0. What is the address of the subnet? What is the range of IP addresses that a host can have on this network?
  4. ARP is used to find the MAC address that corresponds to an IP address; RARP is used to find the IP address that corresponds to a MAC address. True, or false?