diff options
| author | mo khan <mo@mokhan.ca> | 2025-05-19 19:46:56 -0600 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2025-09-27 11:31:07 -0600 |
| commit | 1e67cfcc761f52aba82d680d06a2cc77345b1b59 (patch) | |
| tree | a9faa81580fdb06540a7181386499758fca512d8 | |
| parent | 368dca3fec8cd7232c52eb774f639eee99960356 (diff) | |
docs: convert pdf assignments to markdown
| -rw-r--r-- | assignments/1.md | 183 | ||||
| -rw-r--r-- | assignments/2.md | 215 | ||||
| -rw-r--r-- | assignments/3.md | 152 |
3 files changed, 550 insertions, 0 deletions
diff --git a/assignments/1.md b/assignments/1.md new file mode 100644 index 0000000..3d5f468 --- /dev/null +++ b/assignments/1.md @@ -0,0 +1,183 @@ +Assignment 1 - Instructions + +1 of 3 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +After completion of Units 1 and 2 20% of your �nal grade + +This assignment should be done after you have completed your study of +Unit 1 and Unit 2. Your assignment must be written in either MS-Word or +HTML and it must begin with a cover page containing the course number +and title, assignment number, your name and your student ID, as well as +the time you spent on the assignment. The �le containing the cover page +must be named or If you have more than one �le for the assignment, those +�les and all other �les should be accessible through the �le containing +the cover page, either directly or indirectly through hyperlinks. + +You need to create a root directory or folder named somewhere on the �le +system of your computer and keep all your work related to the course +under that directory; for this assignment you need to create a +subdirectory or subfolder named and put all the necessary �les for the +assignment under that dedicated subdirectory. When you submit your +assignment, you must compress the entire subdirectory of in a �le named +and send the compressed �le for marking. By default, you must answer +each of the questions in your own words with enough details to show your +work for your solutions, and ! Please read the university's academic +misconduct policy carefully before you begin the assignment. + +1.1 + +(5%) Run Traceroute, TRACERT (on Windows), or another similar utility +between a source and a destination in the country in which you reside. +Do this at three di�erent times of the day. Summarize your �ndings at +each of the times with respect to the following, and explain your +�ndings: + +• • + +average and standard deviation of the round-trip delays number of +routers in the path + +If you are not familiar with the utility, read the Microsoft article, +"How to Use TRACERT ." 1.2 + +(5%) What are the �ve layers in the Internet protocol stack? Develop a +table to summarise what each layer does. + +1.3 + +(5%) What are packet-switched network and circuit-switched network, +respectively? Develop a table to summarise their features, pros, and +cons. + +1.4 + +(5%) What are processing delay, queuing delay, transmission delay, and +propagation delay, respectively? Where does each delay occur? What is +tra�c intensity? Why should the tra�c intensity be no greater than one +(1) when designing a computer network? + +1.5 + +(5%) What is Web-caching? When may Web-caching be more useful in a +university? What problem does the conditional GET in HTTP aim to solve? + +1.6 + +(5%) Suppose you have a Web-based email account, such as Gmail, and you +have just sent a message to a friend, Alice, who accesses her mail from +her mail server using IMAP. Assume that both you and Alice are using a +smartphone to access emails via Wi-Fi at home. List all the network +protocols that may be involved in sending and receiving the email. +Discuss in detail how the message went from your smartphone to Alice's +smartphone---that is, how the message went through all the network +protocol layers on each of the network devices involved in the +communication. Ignore everything between your ISP and Alice's ISP. + +Solve the following network problems and show your work in detail. +5/19/25, 17:56 + +Assignment 1 - Instructions + +2 of 3 + +2.1 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +(20%) Consider that you are submitting your assignment in a compressed +�le from your computer at home to the university server that is hosting +your online course. Your large �le is segmented into smaller packets +before it is sent into the �rst link. Each packet is 10,000 bits long, +including 100 bits of header. Assume the size of the assignment �le is +10 MB. a. How many packets will the assignment �le be segmented into? b. +How many links can be identi�ed using TRACERT or Traceroute between your +computer and the university server? What are they? c. What is the speed +for each identi�ed link based on your best calculation? Show your work. +d. Assume you start uploading the assignment at t0. At what time will +the last packet be pushed into the �rst link? e. At what time will the +last packet arrive at the university server? + +2.2 + +(20%) Consider that you are submitting another assignment from your home +computer to the university server, and you have worked out a list of +network links between your computer and the university server. a. Based +on your best estimate and calculation, what is the total distance your +assignment data will travel to reach the university server? b. Suppose +the propagation speed over all the links is the same 2*10\^8 +meters/sec. What is propagation delay Tprop from your computer to the +university server? c. Further assume all the links have the same speed R +bps. What is the bandwidth-delay product R*Tprop? d. Now suppose the +assignment �le is sent continuously as one big �le. What is the maximum +number of bits that will be in the links at any given time? e. Based on +the results from c and d, what does the bandwidth-delay product imply? + +2.3 + +(20%) You have learned that a Web cache can be useful in some cases. In +this problem, you will investigate how useful a Web cache can be at a +home. First, you need to download Apache server and install and run it +as a proxy server on a computer on your home network. Then, write a +brief report on what you did to make it work and how you are using it on +all your devices on your home network. Assume your family has six +members. Each member likes to download short videos from the Internet to +watch on their personal devices. All these devices are connected to the +Internet through Wi-Fi. Further assume the average object size of each +short video is 100 MB and the average request rate from all devices to +servers on the Internet is three requests per minute. Five seconds is +the average amount of time it takes for the router on the ISP side of +your Internet link to forward an HTTP request to a server on the +Internet and receive a response. a. What is the average time for your +home router to receive a video object from your ISP router? b. What is +the tra�c intensity on the Internet link to your home router if none of +the requested videos is cached on the proxy server? c. If average access +delay is de�ned as what is the average access delay your family members +will experience when watching the short videos? d. If the total average +response time is de�ned as , and the miss rate of your proxy server is +0.5, what will be the total average response time? + +2.4 + +(10%) You have learned that a �le can be distributed to peers in either +client--server mode or peer-topeer (P2P) mode. Consider distributing a +large �le of F = 21 GB to N peers. The server has an upload rate of Us = +1 Gbps, and each peer has a download rate of Di = 20 Mbps and an upload +rate of U. For N = 10, 100, and 1,000 and U = 300 Kbps, 7000 Kbps, and 2 +Mbps, develop a table giving the minimum distribution time for each of +the combination of N and U for both client--server distribution and P2P +distribution. Comment on the features of client--server distribution and +P2P distribution and the di�erences between the two. + +Submit your completed assignment to Assignment 1 for assessment +(submission link will be available upon your course contract start +date). + +5/19/25, 17:56 + +Assignment 1 - Instructions + +3 of 3 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +1. Once you submit the assignment for grading, your submission is �nal. + To resubmit the assignment, you obtain special permission from your + instructor. +2. Please name your �le using the following template: + `<course shortname>`{=html}*\<assignment#\>*`<lastname>`{=html}`<firstname>`{=html}\_`<studentID>`{=html} + +Examples: + +• • • + +COMP101_Assignment1_DoeJane_1234567 +COMP101_Assignment1\_�le1_DoeJane_1234567 +COMP101_FinalAssignment_DoeJane_1234567 + +Copyright @ Athabasca University All Rights Reserved + +5/19/25, 17:56 + + diff --git a/assignments/2.md b/assignments/2.md new file mode 100644 index 0000000..a4a860c --- /dev/null +++ b/assignments/2.md @@ -0,0 +1,215 @@ +Assignment 2 - Instructions + +1 of 3 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +After completion of Units 3, 4, and 5 20% of your �nal grade + +This assignment should be done after you have completed your study of +Unit 3, Unit 4, and Unit 5. Your assignment must be written in either +MS-Word or HTML and it must begin with a cover page containing the +course number and title, assignment number, your name and your student +ID, as well as the time you spent on the assignment. The �le containing +the cover page must be named or If you have more than one �le for the +assignment, those �les and all other �les should be accessible through +the �le containing the cover page, either directly or indirectly through +hyperlinks. + +You need to create a root directory or folder named somewhere on the �le +system of your computer and keep all your work related to the course +under that directory; for this assignment you need to create a +subdirectory or subfolder named and put all the necessary �les for the +assignment under that dedicated subdirectory. When you submit your +assignment, you must compress the entire subdirectory of in a �le named +and send the compressed �le for marking. By default, you must answer +each of the questions in your own words with enough details to show your +work for your solutions, and Please read the university's academic +misconduct policy carefully before you begin the assignment. + +1.1 + +(5%) TCP provides a reliable data transfer service on top of IP's +unreliable best-e�ort service. Study related sections of the textbook +and articles from other sources. In your own words, explain how TCP +provides a reliable data transfer service. + +1.2 + +(5%) While the RDT protocols are essentially stop-and-wait protocols, +the GBN protocol allows the sender to send multiple packets without +waiting for acknowledgement from the receiving parties. How does GBN +achieve that? + +1.3 + +(5%) Invention and adoption of IPv6 is a big advance in computer +networking. What problems was IPv6 intended to solve? With the large +number of networking devices and applications using IPv4 still in use, +how is the transition from IPv4 to IPv6 being resolved? + +1.4 + +(5%) SNMP is a protocol for network management. It has seven message +types. What are the purposes of the SNMP GetRequest and SetRequest +messages? Why were UDP datagrams chosen to transport SNMP messages? + +1.5 + +(5%) In today's market and its applications, there are many SDN-enabled +networking devices. What are the preferrable features that an +SDN-enabled networking device usually has? + +1.6 + +(5%) BGP is a routing protocol used for routing among ISPs. One problem +that BGP faces is detecting loops in paths. What are the loops? Why +should loops be avoided? How does BGP detect the loops in paths? + +Solve the following network problems and show your work in detail. 2.1 + +(10%) UDP and TCP use 1's complement for their checksums to detect +errors. Suppose you have the following 8-bit bytes: 11011001, 01010010, +11001010, 10100100 and 01011001. a. What is the 1's complement of the +sum of these 8-bit bytes? Show all the details of your work. b. Why do +UDP and TCP take the 1's complement of the sum as their checksum, +instead of the just sum of these bytes? 5/19/25, 17:56 + +Assignment 2 - Instructions + +2 of 3 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +c. With the 1's complement scheme, how does the receiver detect errors? +d. With this checksum scheme, is it possible that any 1-bit error will + go undetected? How about a 2-bit error? Explain your answer. 2.2 + +(20%) The following table is used to compute the shortest path from A to +all other nodes in a network, according to the link-state algorithm, +which is better known as Dijkstra's shortest path algorithm. + +0 + +u + +2,u + +5,u + +1,u + +∞ + +∞ + +1 + +ux + +2,u + +4,x + +2,x + +∞ + +2 + +uxy + +2,u + +3,y + +4,y + +3 + +uxyv + +3,y + +4,y + +4 + +uxyvw + +5 + +uxyvwz + +4,y + +a. Interpret the table above in your words: what it is showing and what + are each row and each column showing? +b. Consider the network shown in the following diagram. With the + indicated link costs, use Dijkstra's shortest path algorithm to + compute the shortest path from x to all other network nodes. Show + how the algorithm works by computing a table like the one above. + +2.3 + +(20%) A router running classless interdomain routing (CIDR) has the +following entries in its routing table: Address/mask Next hop +135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 +Router 2 Default Router 3 How does a CIDR router route the packets it +receives? For each of the following IP addresses, explain what the +router will do if a packet with that address arrives. a. b. c. d. + +2.4 + +135.46.61.10 135.46.53.16 192.53.40.6 192.53.56.7 + +(20%) Consider that only a single TCP connection uses a 1 Gbps link, +which does not bu�er any data. Suppose that this link is the only +congested link between the sending and receiving hosts. Assume that the +TCP sender has a huge �le to send to the receiver and the receiver's +receive bu�er is much larger than the congestion window. Further assume +that each TCP segment size is 1,500 bytes; the two-way propagation delay +of this connection is 15 msec; and this TCP connection is always in the +congestion avoidance phase (ignore slow start). + +5/19/25, 17:56 + +Assignment 2 - Instructions + +3 of 3 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +a. What is the maximum window size (in segments) that this TCP + connection can achieve? +b. What is the average window size (in segments) and average throughput + (in bps) of this TCP connection? +c. How long would it take for this TCP connection to reach its maximum + window again after recovering from a packet loss? +d. Assume we want the 1 Gbps link to bu�er a �nite number of segments + and always keep the link busy sending data. How would you choose a + bu�er size? Justify your answer. + +Submit your completed assignment to Assignment 2 for assessment +(submission link will be available upon your course contract start +date). + +1. Once you submit the assignment for grading, your submission is �nal. + To resubmit the assignment, you obtain special permission from your + instructor. +2. Please name your �le using the following template: + `<course shortname>`{=html}*\<assignment#\>*`<lastname>`{=html}`<firstname>`{=html}\_`<studentID>`{=html} + +Examples: + +• • • + +COMP101_Assignment1_DoeJane_1234567 +COMP101_Assignment1\_�le1_DoeJane_1234567 +COMP101_FinalAssignment_DoeJane_1234567 + +Copyright @ Athabasca University All Rights Reserved + +5/19/25, 17:56 + + diff --git a/assignments/3.md b/assignments/3.md new file mode 100644 index 0000000..5317e4e --- /dev/null +++ b/assignments/3.md @@ -0,0 +1,152 @@ +Assignment 3 - Instructions + +1 of 2 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +After completion of Units 6 and 7 20% of your �nal grade + +This assignment should be done after you have completed your study of +Unit 6 and Unit 7. Your assignment must be written in either MS-Word or +HTML and it must begin with a cover page containing the course number +and title, assignment number, your name and your student ID, as well as +the time you spent on the assignment. The �le containing the cover page +must be named or If you have more than one �le for the assignment, those +�les and all other �les should be accessible through the �le containing +the cover page, either directly or indirectly through hyperlinks. + +You need to create a root directory or folder named somewhere on the �le +system of your computer and keep all your work related to the course +under that directory; for this assignment you need to create a +subdirectory or subfolder named and put all the necessary �les for the +assignment under that dedicated subdirectory. When you submit your +assignment, you must compress the entire subdirectory of in a �le named +and send the compressed �le for marking. By default, you must answer +each of the questions in your own words with enough details to show your +work for your solutions, and Please read the university's academic +misconduct policy carefully before you begin the assignment. + +1.1 + +(5%) What is the role of the anchor MSC in GSM networks? + +1.2 + +(5%) What are the main characteristics of LTE radio access networks? How +does LTE network di�er from previous generations of cellular networks? + +1.3 + +(5%) What does CSMA/CD stand for? How does the protocol work? Explain +why RTT on an Ethernet LAN is an important parameter for the CSMA/CD +protocol to work properly. + +1.4 + +(5%) What does CSMA/CA stand for? How does the protocol work? How can +collisions be avoided in the protocol? + +1.5 + +(5%) What techniques can be used for error-detection and +error-correction, respectively, on the data link layer? + +1.6 + +(5%) What wireless (Wi-Fi) network standards are used in today's +industries? What are the characteristics of the link speci�ed in each +standard? + +Solve the following network problems and show your work in detail. 2.1 + +(15%) For wireless and cellular networks, the space is a shared medium +for all sending and receiving hosts to use. Among the technologies +developed to make medium sharing work, a channel partitioning technology +called code division multiple access (CDMA) is widely used in today's +wireless and cellular networks. Begin with reading about the simple CDMA +protocol given in the textbook, and then study more advanced CDMA +schemes from other sources, including the Internet. Finally, choose one +CDMA scheme and explain, in your own words, how it works. Describe the +advantages that CDMA has over other coding schemes, such as TDM and FDM. +Include in your answer the titles and sources of the articles/documents +you consulted. + +2.2 + +(15%) Suppose host A has payload 1011 0110 1010 1011 to send to host B, +and A wants to use a two-dimensional checksum for host B to detect and +correct any 1-bit error that may occur during the transmission. +Furthermore, host A wants to minimize the length of the checksum to +conserve 5/19/25, 17:57 + +Assignment 3 - Instructions + +2 of 2 + +https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03... + +bandwidth of the communication channel. What would the value of the +checksum �eld be if an even parity scheme is used? Show all your work +and prove why the checksum you have worked out is the shortest. Prove +that any 1-bit error can be detected and corrected. 2.3 + +(20%) Assume a 1 Gbps Ethernet has two nodes, A and B, connected by a +180 m cable with three repeaters in between, and they each have one +frame of 1,024 bits to send to each other. Further assume that the +signal propagation speed across the cable is 2\*10\^8 m/sec;, CSMA/CD +uses back-o� intervals of multiples of 512 bits; and each repeater will +insert a store-and-forward delay equivalent to 20-bit transmission time. +At time t = 0, both A and B attempt to transmit. After the �rst +collision, A draws K = 0 and B draws K = 1 in the exponential backo� +protocol after sending the 48 bits jam signal. a. What is the one-way +propagation delay (including all repeater delays) between A and B in +seconds? At what time is A's packet completely delivered at B? b. Now +suppose that only A has a packet to send and that the repeaters are +replaced with switches. Suppose that each switch has an 8-bit processing +delay in addition to a store-and-forward delay. At what time, in +seconds, is A's packet delivered at B? In your calculations for a and b, +you must include all the delays that occur according to CSMA/CD, and you +must show the details of your work. + +2.4 + +(10%) Suppose an 802.11 station on a mobile network is con�gured to +always reserve the channel with the RTS/CTS sequence. At time t = 0, the +station wants to transmit 1024 bytes of data. All other stations on the +network are idle at that time. At what time will the station complete +the transmission? At what time can the station receive the +acknowledgement? + +2.5 + +(10%) Bluetooth is a widely used wireless communication technology. +Although it is not covered in detail in this course, you are asked to +conduct some research and reading on the Internet about Bluetooth +technology and describe and comment on the format of the Bluetooth +frame. Focus on its features and limitations. Is there anything in the +frame format that inherently limits the number of active nodes in a +network to eight active nodes? Explain. + +Submit your completed assignment to Assignment 3 for assessment +(submission link will be available upon your course contract start +date). + +1. Once you submit the assignment for grading, your submission is �nal. + To resubmit the assignment, you obtain special permission from your + instructor. +2. Please name your �le using the following template: + `<course shortname>`{=html}*\<assignment#\>*`<lastname>`{=html}`<firstname>`{=html}\_`<studentID>`{=html} + +Examples: + +• • • + +COMP101_Assignment1_DoeJane_1234567 +COMP101_Assignment1\_�le1_DoeJane_1234567 +COMP101_FinalAssignment_DoeJane_1234567 + +Copyright @ Athabasca University All Rights Reserved + +5/19/25, 17:57 + + |
