Exercises. Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?

Slides:



Advertisements
Similar presentations
Data Link Layer Protocols Flow Control in Data Link Layer.
Advertisements

Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Chapter 6 Errors, Error Detection, and Error Control.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Calculating “a”. a Used as a term in analyzing many network characteristics Has a physical interpretation Represents the number of frames on a link.
ECE358: Computer Networks Spring 2012
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Medium Access Control Sublayer
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Binary Exponential Backoff Binary exponential backoff refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
CS3502: Data and Computer Networks DATA LINK LAYER - 2 WB version.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CS 4396 Computer Networks Lab
Network Layer4-1 Lower limit on the number of check bits r We want to design a code m with m message bits and r check bits Allowing all single errors to.
Cyclic Code. Linear Block Code Hamming Code is a Linear Block Code. Linear Block Code means that the codeword is generated by multiplying the message.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
1 TCP III - Error Control TCP Error Control. 2 ARQ Error Control Two types of errors: –Lost packets –Damaged packets Most Error Control techniques are.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Probabilistic Search Verification of the Go-Back-N Protocol Adeyemi Aladesawe Annjana Ramesh Lingxue Li Nanjun Lu.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
CSCI 465 D ata Communications and Networks Lecture 10 Martin van Bommel CSCI 465 Data Communications & Networks 1.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
COMMUNICATION NETWORKS NETW 501 TUTORIAL 9 Presented by: Eng. Hana Hesham Eng. Mohamed Atef.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
Exercises on Data Link Layer.
Chapter 12 Media Access Control (MAC)
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Chapter Two Fundamentals of Data and Signals
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Overview Jaringan Komputer (2)
Lecture 7 review Consider a link running the Go-Back-N protocol. Suppose the transmission delay and propagation delay are both 1ms, the window size is.
Data Communication Networks
CSE 313 Data Communication
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Chapter 6 Multiple Radio Access.
Presentation transcript:

Exercises

Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?

Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol? Answer. – Transmission delay: 1000/ = 1ms. – The last bit of the frame reaches the receiver at time 271ms. ACK is received at the sender at 541ms. In 541ms, 1ms is used to send data. Link efficiency is 1/541.

Problem 2 Still the Stop&Wait protocol. The link length is 200m. Signal travels at a speed of m/s. The file is bytes. The server divides the file into frames of 500 bytes. Data rate is 10Mbps. How long does it need for the server to send the entire file? (Assuming no frame loss.)

Problem 2 Still the Stop&Wait protocol. The link length is 200m. Signal travels at a speed of m/s. The file is bytes. The server divides the file into frames of 500 bytes. Data rate is 10Mbps. How long does it need for the server to send the entire file? (Assuming no frame loss.) Answer. – Transmission delay: 500*8/ = 400us. – The propagation delay is 200/ = 1us. – The last bit of the frame reaches the receiver at time 401us. ACK is received at the sender at 402us. Every 402us, a data frame can sent, hence the total time is 402*2000 = us.

Problem 3 Consider a link with propagation delay of 1ms and the transmission delay of 1ms. Assume Stop&Wait is used and assume that every one of four ACKs is lost. Assume the timeout the sender uses is 3ms. What is the link efficiency?

Problem 3 Consider a link with propagation delay of 1ms and the transmission delay of 1ms. Assume Stop&Wait is used and assume that every one of four ACKs is lost. Assume the timeout the sender uses is 3ms. What is the link efficiency? Answer. The first three frames are transmitted correctly using 3*3=9ms. At time 9ms, the sender started to send the fourth frame. Because the ACK was lost, the sender will timeout and retransmit at 13ms. This time it will go through. So the efficiency is 3/13, that is, every 13ms, three frames will go through.

Problem 4 Consider the Go-back-N protocol. Suppose the link delay is d seconds, the frame size is f bits and the data rate is r bit/s. Find the minimum window size such that the link efficiency is 100%, in the case that the frame never gets lost. Assume the ACK frame is very small.

Problem 4 Consider the Go-back-N protocol. Suppose the link delay is d seconds, the frame size is f bits and the data rate is r bit/s. Find the minimum window size such that the link efficiency is 100%, in the case that the frame never gets lost. Assume the ACK frame is very small. [Answer:] The time to send a frame is f/r. The minimum window size to achieve 100% efficiency should allow the sender keep on sending before getting the first ACK. If the sender sends at time 0, at time d+f/r, the receiver gets the frame and he immediately sends back ACK which will be received by the sender at time d+d+f/r. So the window size should be (2d+f/r)/(f/r) = 1+2dr/f.

Problem 5 An Ethernet has three stations, A, B, and C. A is at one end of the network, B and C are at the other end of the network. The propagation delay from one end to the other end is 10us. A, B, and C has data frame to send at 0, 5, and 15us, respectively. Each data frame is 40us. What happens?

Problem 5 An Ethernet has three stations, A, B, and C. A is at one end of the network, B and C are at the other end of the network. The propagation delay from one end to the other end is 10us. A, B, and C has data frame to send at 0, 5, and 15us, respectively. Each data frame is 40us. Answer. At time 0, A will send. At time 5, B will send, because the signal from A has not propagated to B yet. At time 10, B will notice the collision, and will send a jam signal, and stop sending. At time 15, A will notice the collision, and will send a jam signal, and stop sending. After sending the jam signal, what will happen is determined by the random numbers A and B pick. A and B will pick random numbers from {0,1}. If both picked 1, they will defer for 51.2us. In this case, C will eventually get to send. C will start to send 9.6us after the jam from A finishes (9.6us is the inter-frame interval of Ethernet.) There will be an another collision if either A or B picks 0 (which has become somewhat painful to analyze…).

Problem 6 Consider the (7,4) Hamming code we discussed in the class. The parity checking matrix is shown below. Suppose the received vector is [ ]. Which of the following statement is true? a)There is no error and the received vector is a codeword. b)There is one error bit and the original codeword is c)There is one error bit and the original codeword is d)None of the above

Problem 6 Consider the (7,4) Hamming code we discussed in the class. The parity checking matrix is shown below. Suppose the received vector is [ ]. Which of the following statement is true? a)There is no error and the received vector is a codeword. b)There is one error bit and the original codeword is c)There is one error bit and the original codeword is d)None of the above Answer: C. The syndrome is 010.

Problem 7 In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to send, but the medium is busy. After the medium is free (for the inter-frame gap, 9.6us in some Ethernet), A, B, and C will all send, which results in a collision. They will perform the random back-off algorithm. What is the probability that they will collide again before a successful frame transmission? a)2/3. b)3/4. c)5/8. d)None of the above.

Problem 7 In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to send, but the medium is busy. After the medium is free (for the inter-frame gap, 9.6us in some Ethernet), A, B, and C will all send, which results in a collision. They will perform the random back-off algorithm. What is the probability that they will collide again before a successful frame transmission? a)2/3. b)3/4. c)5/8. d)None of the above. Answer: c. There are 8 possibilities and three will not cause collision – one selects 0, the other two selects 1.

Problem 8 Hypothetically, suppose it turns out that there cannot be more than 8 stations in any Ethernet. Which of the following statement is true? a)The minimum size of the Ethernet frame can be significantly reduced. b)The back-off algorithm should be modified. c)Both of the above. d)None of the above.

Problem 8 Hypothetically, suppose it turns out that there cannot be more than 8 stations in any Ethernet. Which of the following statement is true? a)The minimum size of the Ethernet frame can be significantly reduced. b)The back-off algorithm should be modified. c)Both of the above. d)None of the above. Answer: b. never has to choose a large window size.