Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Solve the following problems.

problem 1) Compute the total time required to transfer 1500 KByte file in the following cases, assuming a RTT of 10ms, a packet size of 1500 bytes, and the initial 3 RTT of handshaking before the actual data is sent.

(a) The bandwidth is 10 Mbps and data packets can be sent continuously.

(b) The bandwidth is 10 Mbps, but after we finish sending each data packet we must wait one RTT before sending the next

(c) The bandwidth is infinite, i.e., the transmit time is zero, but only up to 25 packets can be sent per RTT

problem 2) This problem demonstrate possible danger of incorporating randomization in design. Let A and B be two stations attempting to transmit on the ethernet. Each has the steady queue of frames ready to send; A’s frames will be numbered A1, A2 and so on, and B’s similarly. Let T = 51.2μs is the exponential backoff base unit. Assume A and B simultaneously attempt to send frame 1, collide, and happen to choose backoff times of 0 x T and 1 x T, respectively. Therefore, A transmits A1 while B waits. At the end of this transmission, B will attempt to retransmit B1 while A will attempt to transmit A2. These first attempts will collide, but now A backs off for either 0 x T or 1 x T, while B backs off for time equal to one of 0 x T, ..., 3 X T.

(a) Determine the probability that A wins this second backoff race immediately after its first collision.

(b) Suppose A wins the second backoff race. A transmits A2 and, when it is finished, A and B collide again as A tries to transmit A3 while B tries once more to transmit B1. Determine the probability that A wins this third backoff race immediately after the first collision.

(c) Provide a reasonable lower bound for the probability that A wins all the remaining backoff races.

(d) What then happens to frame B1? This situation is called as the ethernet capture effect.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96743

Have any Question? 


Related Questions in Computer Network & Security

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Your assignment must be in microsoft word formatnote your

Your assignment must be in Microsoft Word format Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1: Firewall Rule Design The fo ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Assignmentnetwork architecture paper using either the osi

Assignment Network Architecture Paper: Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and acr ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro