Ask Computer Network & Security Expert

Assignment

This assignment is open notes, open book. Point values are as given; there are 100 total points possible. Please read each question carefully All work is single authorship. Display all references; do not merely quote a reference, but do explain any referenced material in your own words. For full credit, all work must be shown; this includes calculations, derivations, proofs, graphs, as well as your arguments and reasoning. Your methods and reasoning are important.

Problems

1. Consider a three layer protocol in which Layer 3 encapsulates Layer 2 and Layer 2 encapsulates Layer 1. Assume minimalist headers with fixed length packets. Assume the following characteristics of the layers: Layer 1, 6 octet address length, 512 octet payload; Layer 2, 4 octet address length , 256 octet payload; Layer 3, 8 octet address length, 1024 octet payload. Note that in the minimalist header arrangement, no error detection or correction will be used; however, there must be a scheme (that you must devise) to allow a multipacket datagram at each separate layer. You may assume that there is some sort of routing or other address translation protocol that will identify which addresses are to be used. Assume that the data communications channel in use do form a data communications network. (Hint: do recall what is needed for a data communications network as contrasted with an arbitrary graph.)

1.1. For each of the three layers, separately calculated, how many items (nodes) can be addressed? Do not simply show an answer, but ex-plain your reasoning (hint: combinatorics).

1.2. We have discussed functors as a formal, theoretical description be-tween layers of a network. In terms of these three layers, illustrate the functors between the layers, and explain how functors address the di?erences in topology and relevant information content at the di?erent layers

1.3. Assume that the datagram has 5 layer 1 packets. How does this datagram encapsulate in layer 2?

1.4. Taking the above result, or a made-up one of your choosing if you cannot calculate such a result, how does this data from layer 2 en-capsulating layer 1 data then encapsulate in layer 3?

1.5. Assuming that the only information of interest is the payload of layer 1, what is the overall e?ciency of the final encapsulated data stream in layer 3 for the layer 1 datagram described above?

1.6. Assuming that only the information in the starting layer 1 datagram payload is the signal, and the rest of all packets at all layers is noise with respect to this very restricted view of the information content of a channel, what is the e?ective Shannon-Hartley theorem relation between "channel capacity" and "bandwidth" for this specific data-gram?

2. Consider a set of intersecting rings as in the following figure. Here, a small square represents a node, including nodes that can transfer packets between rings, and each ring has an arrow that indicates the di-rection of packet flow on that ring. Each ring is labeled by a lower case Greek letter with the first ring labeled.

2.1. Display the adjacency matrix for the network in the figure.

2.2. Which, if any, nodes are equivalent on the network and why? (Hint: recall that equivalence in this context has to do with the number of links to a node as well as the information flow directions to and from a node.)

2.3. Which nodes, if any, represent single points of failure of the network?

2.4. Display the weight matrix for the network.

2.5. Using Dykstra's algorithm, calculate a route from node S to node D on the network as displayed in Fig. 1. Show each step of the algorithm as you develop the route.

1758_A Set of Intersecting Rings.jpg

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92026688

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As