Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question

1. Following two questions are related to congestion control in wired networks. Let us assume that size of buffer is infinite.

A. assumes "token bucket" mechanism for congestion control. Explain how to compute a queuing delay for example (from when a packet comes in a bucket to when it goes out). Note that, you do not have to use mathematical equations.

B. assumes "dynamic window management" for congestion control. Describe what problems arise under a large window size on connection created.

In IEEE 802.11, a node retransmits a packet if previous transmission of a packet is unsuccessful. If TCP over 802.11 is used, together protocols can generate a large number of retransmissions of a given packet to make sure its reliable transmission. Explain the reason that the retransmissions are need for both TCP and 802.11 even though these have same purpose.

2. The EDCF (superior DCF) in IEEE 802.11e maintains 4 different queues to support way in categories (AC) (See the sides). IEEE 802.11e explains only MAC and PHY layers. Still though upper layer as in IP layer can categorize characteristics of 4 different packets (Voice, Video, Best Effort, and Background), MAC layer does not check any category because of encapsulation. Describe how EDCF identifies 4 different AC of packets from an upper layer without reference of IP or TCP headers.

3. Following question is related to SPEED routing protocol-
Multiple speeds are computed in MAC layer. The forwarder with highest speed is selected on MAC layer feedback. This selection could not produce a shortest path. Clarify the reason that SPEED uses this approach in its place of other shortest or reliable path selections and advantage of this approach against shortest and reliable pathways

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9132631

Have any Question?


Related Questions in Computer Engineering

Suppose that we have a block cipher and want to use it as a

Suppose that we have a block cipher and want to use it as a hash function. Let X be a specified constant and let M be a message consisting of a single block, where the block size is the size of the key in the block ciphe ...

Research the history of specification languages and write a

Research the history of specification languages, and write a report on the successes or failures of some of these languages. Include 5 languages which are successful and 5 which have failed. All work should be typed writ ...

Respond to the statement below in at least 100 words

Respond to the statement below in at least 100 words. Original answers only. If developers are making decisions on the requirements, then how do they know that the software will work properly for the end user? Developers ...

Writing a research paperprepare a research paper on

Writing a Research Paper Prepare a research paper on Antisocial Personality Disorder. In this project, you will modify a research paper. You will add and format text and format the document using themes and paragraph for ...

Suppose that alices rsa parameters are ma91 ea7 and da31

Suppose that Alice's RSA parameters are m_A=91, e_A=7, and d_A=31. And suppose that Bob's RSA modulus is m_B=187. a)If Bob's public exponent is e_B=13 and Alice wants to encrypt the message signature pair (x, delta)=(70, ...

Simple scenario bull at the beginning of each semester

Simple Scenario • At the beginning of each semester, students get a course catalogue containing a list of course offerings for the semester. Information about each course, such as professor, department, and prerequisites ...

Part 1whats the importance of a documentation plan please

Part 1: What's the importance of a Documentation Plan? Please provide an example of a Documentation Plan that you would use. Part 2: How do you calculate how long a project will take? These questions are for my Introduct ...

Can someone please wirte a complete algorith in c language

Can someone please wirte a complete algorith in c language that works without any errors on Visual Studio 2015 Given a list of integers, write a C function, similar to the partition process in QuickSort, that will rearra ...

Question suppose your il license encodes your name sex and

Question : Suppose your IL license encodes your name, sex, and birthday month/year which can be used by police officers and bouncers to determine if you are who your license says you are. What kind of encoding would this ...

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As