P. 1
SIT202_Assignment1 - Copy - Copy - Copy - Copy (2)

SIT202_Assignment1 - Copy - Copy - Copy - Copy (2)

|Views: 216|Likes:
Published by Ramana Muruga

More info:

Published by: Ramana Muruga on Oct 07, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Assignment Tasks All working must be shown for numerical problems. 1.

2 points: Compare and contrast the go-back-N recovery method with the selective retransmission error recovery method. 2. Error detection is of the most crucial importance for network users. a. 1 point: Propose a generator. b. 1 point: c. 1 point: Show the whole message sent by the sender. 3. 3 points: Define, compare and contrast the sliding window protocol with the stop-and-wait protocol. 4. 2 points: Consider sending an object of size M = 100 Kbytes from server to client. Let S = 536 bytes and RTT = 100 msec. Suppose the transport protocol uses static windows with window size W. a. For a transmission rate of 28kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency. b. Repeat a) for 100 kbps. c. Repeat a) for 1 Mbps. d. Repeat a) for 10 Mbps 5. 3 points: Consider a broadcast channel with N nodes and a transmission rate of R bps. Suppose the broadcast channel uses polling (with an additional polling node) for multiple accesses. Suppose the amount of time from when a node completes transmission until the subsequent node is permitted to transmit (that is, the polling delay) is tpoll. Suppose that within a polling round, a given node is allowed to transmit at most Q bits. What is the maximum throughput of the broadcast channel? 6. 2 points: Describe the operation of the IEEE 802.3 medium access control protocol. Identify and discuss the features of this protocol that allow it to perform well during traffic bursts. 7. Define frequency-division-multiplexing (FDM) and time-division-multiplexing (TDM). a. 1 point: Compare and contrast FDM and TDM. b. 1 point: What advantages does TDM have over FDM in a circuit-switched network? 8. You are to design a LAN for the factory layout shown below.

the file server can support only 30 users. You have been commissioned by the CEO of a business to build a new network to support its two branches. b. Cables cost. 3 points: What legal issues exist for such a network in respect to the CEO’s requirements? b. b. Your manager has allocated the following project to you: Design a LAN for the factory layout that is shown in the figure. 1 point: Compare and contrast signing long messages with and without message digests. if deemed necessary. does the employe have a case? 9. 3 points: What must be specified to satisfy the CEO’s requirements? c. fibre optics. discuss: a. but use UTP (no thin coax) and. . C2. c. Traffic must be localized. with two keys k = 4. All repeaters. 2 points: What does it mean for a wireless network to be operating in “infrastructure mode”? If the network is not in infrastructure mode. 11. C1. This means that the traffic generated by users of one department cannot affect another department's LAN unless accessing a resource on that other department's LAN. compare and contrast key management in systems that exploit symmetric encryption with systems that exploit public key encryption. 12. you must use thin coax (no UTP) and. k = 12. what mode of operation is it in. however. bridges. a. 3 points: Provide a list of the equipment you use (with quantities) and the total cost of the LAN. The message is as follows: Computer networks are important to business b. Digital signatures a. one in Victoria and one in Queensland. The CEO has asked that all traffic between the two branches and within each branch be monitored.    Your tasks are as follows: a. This means that each department must have access to the resources of all other departments. 1 point: If an existing employee claims this is a violation of privacy. Based on this description. For this purpose you should use two Caesar ciphers. Thus. if deemed necessary. and hubs must reside in the wiring closets (WC's). fibre optics. The task is to encrypt a plaintext message using polyalphabetic encryption. 13. 2 points: Repeat (b). Which elements of this encryption must be treated securely? 2 points: Define. and what is the difference between that mode of operation and infrastructure mode? 3 points: Encryption is very important. Your company received the following design requirements:   All resources are shared. 2 points: Provide a diagram for your design. Remember: file servers may not be shared by multiple departments. File services are important to the factory. 10. C2. C1.You work for a company that designs LANs. and the repeating pattern C1. 1 point: Explain the reasons for using message digests in signing messages. The CEO claims it is so that employees do not use the network for purposes other than work.

d. 1 point: If the branches were in different states of Australia. would the implications change? .

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->