summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2025-05-19 19:46:56 -0600
committermo khan <mo@mokhan.ca>2025-09-27 11:31:07 -0600
commit1e67cfcc761f52aba82d680d06a2cc77345b1b59 (patch)
treea9faa81580fdb06540a7181386499758fca512d8
parent368dca3fec8cd7232c52eb774f639eee99960356 (diff)
docs: convert pdf assignments to markdown
-rw-r--r--assignments/1.md183
-rw-r--r--assignments/2.md215
-rw-r--r--assignments/3.md152
3 files changed, 550 insertions, 0 deletions
diff --git a/assignments/1.md b/assignments/1.md
new file mode 100644
index 0000000..3d5f468
--- /dev/null
+++ b/assignments/1.md
@@ -0,0 +1,183 @@
+Assignment 1 - Instructions
+
+1 of 3
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+After completion of Units 1 and 2 20% of your �nal grade
+
+This assignment should be done after you have completed your study of
+Unit 1 and Unit 2. Your assignment must be written in either MS-Word or
+HTML and it must begin with a cover page containing the course number
+and title, assignment number, your name and your student ID, as well as
+the time you spent on the assignment. The �le containing the cover page
+must be named or If you have more than one �le for the assignment, those
+�les and all other �les should be accessible through the �le containing
+the cover page, either directly or indirectly through hyperlinks.
+
+You need to create a root directory or folder named somewhere on the �le
+system of your computer and keep all your work related to the course
+under that directory; for this assignment you need to create a
+subdirectory or subfolder named and put all the necessary �les for the
+assignment under that dedicated subdirectory. When you submit your
+assignment, you must compress the entire subdirectory of in a �le named
+and send the compressed �le for marking. By default, you must answer
+each of the questions in your own words with enough details to show your
+work for your solutions, and ! Please read the university's academic
+misconduct policy  carefully before you begin the assignment.
+
+1.1
+
+(5%) Run Traceroute, TRACERT (on Windows), or another similar utility
+between a source and a destination in the country in which you reside.
+Do this at three di�erent times of the day. Summarize your �ndings at
+each of the times with respect to the following, and explain your
+�ndings:
+
+• •
+
+average and standard deviation of the round-trip delays number of
+routers in the path
+
+If you are not familiar with the utility, read the Microsoft article,
+"How to Use TRACERT  ." 1.2
+
+(5%) What are the �ve layers in the Internet protocol stack? Develop a
+table to summarise what each layer does.
+
+1.3
+
+(5%) What are packet-switched network and circuit-switched network,
+respectively? Develop a table to summarise their features, pros, and
+cons.
+
+1.4
+
+(5%) What are processing delay, queuing delay, transmission delay, and
+propagation delay, respectively? Where does each delay occur? What is
+tra�c intensity? Why should the tra�c intensity be no greater than one
+(1) when designing a computer network?
+
+1.5
+
+(5%) What is Web-caching? When may Web-caching be more useful in a
+university? What problem does the conditional GET in HTTP aim to solve?
+
+1.6
+
+(5%) Suppose you have a Web-based email account, such as Gmail, and you
+have just sent a message to a friend, Alice, who accesses her mail from
+her mail server using IMAP. Assume that both you and Alice are using a
+smartphone to access emails via Wi-Fi at home. List all the network
+protocols that may be involved in sending and receiving the email.
+Discuss in detail how the message went from your smartphone to Alice's
+smartphone---that is, how the message went through all the network
+protocol layers on each of the network devices involved in the
+communication. Ignore everything between your ISP and Alice's ISP.
+
+Solve the following network problems and show your work in detail.
+5/19/25, 17:56
+
+ Assignment 1 - Instructions
+
+2 of 3
+
+2.1
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+(20%) Consider that you are submitting your assignment in a compressed
+�le from your computer at home to the university server that is hosting
+your online course. Your large �le is segmented into smaller packets
+before it is sent into the �rst link. Each packet is 10,000 bits long,
+including 100 bits of header. Assume the size of the assignment �le is
+10 MB. a. How many packets will the assignment �le be segmented into? b.
+How many links can be identi�ed using TRACERT or Traceroute between your
+computer and the university server? What are they? c. What is the speed
+for each identi�ed link based on your best calculation? Show your work.
+d. Assume you start uploading the assignment at t0. At what time will
+the last packet be pushed into the �rst link? e. At what time will the
+last packet arrive at the university server?
+
+2.2
+
+(20%) Consider that you are submitting another assignment from your home
+computer to the university server, and you have worked out a list of
+network links between your computer and the university server. a. Based
+on your best estimate and calculation, what is the total distance your
+assignment data will travel to reach the university server? b. Suppose
+the propagation speed over all the links is the same 2*10\^8
+meters/sec. What is propagation delay Tprop from your computer to the
+university server? c. Further assume all the links have the same speed R
+bps. What is the bandwidth-delay product R*Tprop? d. Now suppose the
+assignment �le is sent continuously as one big �le. What is the maximum
+number of bits that will be in the links at any given time? e. Based on
+the results from c and d, what does the bandwidth-delay product imply?
+
+2.3
+
+(20%) You have learned that a Web cache can be useful in some cases. In
+this problem, you will investigate how useful a Web cache can be at a
+home. First, you need to download Apache server  and install and run it
+as a proxy server on a computer on your home network. Then, write a
+brief report on what you did to make it work and how you are using it on
+all your devices on your home network. Assume your family has six
+members. Each member likes to download short videos from the Internet to
+watch on their personal devices. All these devices are connected to the
+Internet through Wi-Fi. Further assume the average object size of each
+short video is 100 MB and the average request rate from all devices to
+servers on the Internet is three requests per minute. Five seconds is
+the average amount of time it takes for the router on the ISP side of
+your Internet link to forward an HTTP request to a server on the
+Internet and receive a response. a. What is the average time for your
+home router to receive a video object from your ISP router? b. What is
+the tra�c intensity on the Internet link to your home router if none of
+the requested videos is cached on the proxy server? c. If average access
+delay is de�ned as what is the average access delay your family members
+will experience when watching the short videos? d. If the total average
+response time is de�ned as , and the miss rate of your proxy server is
+0.5, what will be the total average response time?
+
+2.4
+
+(10%) You have learned that a �le can be distributed to peers in either
+client--server mode or peer-topeer (P2P) mode. Consider distributing a
+large �le of F = 21 GB to N peers. The server has an upload rate of Us =
+1 Gbps, and each peer has a download rate of Di = 20 Mbps and an upload
+rate of U. For N = 10, 100, and 1,000 and U = 300 Kbps, 7000 Kbps, and 2
+Mbps, develop a table giving the minimum distribution time for each of
+the combination of N and U for both client--server distribution and P2P
+distribution. Comment on the features of client--server distribution and
+P2P distribution and the di�erences between the two.
+
+Submit your completed assignment to Assignment 1 for assessment
+(submission link will be available upon your course contract start
+date).
+
+5/19/25, 17:56
+
+ Assignment 1 - Instructions
+
+3 of 3
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+1. Once you submit the assignment for grading, your submission is �nal.
+ To resubmit the assignment, you obtain special permission from your
+ instructor.
+2. Please name your �le using the following template:
+ `<course shortname>`{=html}*\<assignment#\>*`<lastname>`{=html}`<firstname>`{=html}\_`<studentID>`{=html}
+
+Examples:
+
+• • •
+
+COMP101_Assignment1_DoeJane_1234567
+COMP101_Assignment1\_�le1_DoeJane_1234567
+COMP101_FinalAssignment_DoeJane_1234567
+
+Copyright @ Athabasca University All Rights Reserved
+
+5/19/25, 17:56
+
+
diff --git a/assignments/2.md b/assignments/2.md
new file mode 100644
index 0000000..a4a860c
--- /dev/null
+++ b/assignments/2.md
@@ -0,0 +1,215 @@
+Assignment 2 - Instructions
+
+1 of 3
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+After completion of Units 3, 4, and 5 20% of your �nal grade
+
+This assignment should be done after you have completed your study of
+Unit 3, Unit 4, and Unit 5. Your assignment must be written in either
+MS-Word or HTML and it must begin with a cover page containing the
+course number and title, assignment number, your name and your student
+ID, as well as the time you spent on the assignment. The �le containing
+the cover page must be named or If you have more than one �le for the
+assignment, those �les and all other �les should be accessible through
+the �le containing the cover page, either directly or indirectly through
+hyperlinks.
+
+You need to create a root directory or folder named somewhere on the �le
+system of your computer and keep all your work related to the course
+under that directory; for this assignment you need to create a
+subdirectory or subfolder named and put all the necessary �les for the
+assignment under that dedicated subdirectory. When you submit your
+assignment, you must compress the entire subdirectory of in a �le named
+and send the compressed �le for marking. By default, you must answer
+each of the questions in your own words with enough details to show your
+work for your solutions, and Please read the university's academic
+misconduct policy  carefully before you begin the assignment.
+
+1.1
+
+(5%) TCP provides a reliable data transfer service on top of IP's
+unreliable best-e�ort service. Study related sections of the textbook
+and articles from other sources. In your own words, explain how TCP
+provides a reliable data transfer service.
+
+1.2
+
+(5%) While the RDT protocols are essentially stop-and-wait protocols,
+the GBN protocol allows the sender to send multiple packets without
+waiting for acknowledgement from the receiving parties. How does GBN
+achieve that?
+
+1.3
+
+(5%) Invention and adoption of IPv6 is a big advance in computer
+networking. What problems was IPv6 intended to solve? With the large
+number of networking devices and applications using IPv4 still in use,
+how is the transition from IPv4 to IPv6 being resolved?
+
+1.4
+
+(5%) SNMP is a protocol for network management. It has seven message
+types. What are the purposes of the SNMP GetRequest and SetRequest
+messages? Why were UDP datagrams chosen to transport SNMP messages?
+
+1.5
+
+(5%) In today's market and its applications, there are many SDN-enabled
+networking devices. What are the preferrable features that an
+SDN-enabled networking device usually has?
+
+1.6
+
+(5%) BGP is a routing protocol used for routing among ISPs. One problem
+that BGP faces is detecting loops in paths. What are the loops? Why
+should loops be avoided? How does BGP detect the loops in paths?
+
+Solve the following network problems and show your work in detail. 2.1
+
+(10%) UDP and TCP use 1's complement for their checksums to detect
+errors. Suppose you have the following 8-bit bytes: 11011001, 01010010,
+11001010, 10100100 and 01011001. a. What is the 1's complement of the
+sum of these 8-bit bytes? Show all the details of your work. b. Why do
+UDP and TCP take the 1's complement of the sum as their checksum,
+instead of the just sum of these bytes? 5/19/25, 17:56
+
+ Assignment 2 - Instructions
+
+2 of 3
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+c. With the 1's complement scheme, how does the receiver detect errors?
+d. With this checksum scheme, is it possible that any 1-bit error will
+ go undetected? How about a 2-bit error? Explain your answer. 2.2
+
+(20%) The following table is used to compute the shortest path from A to
+all other nodes in a network, according to the link-state algorithm,
+which is better known as Dijkstra's shortest path algorithm.
+
+0
+
+u
+
+2,u
+
+5,u
+
+1,u
+
+∞
+
+∞
+
+1
+
+ux
+
+2,u
+
+4,x
+
+2,x
+
+∞
+
+2
+
+uxy
+
+2,u
+
+3,y
+
+4,y
+
+3
+
+uxyv
+
+3,y
+
+4,y
+
+4
+
+uxyvw
+
+5
+
+uxyvwz
+
+4,y
+
+a. Interpret the table above in your words: what it is showing and what
+ are each row and each column showing?
+b. Consider the network shown in the following diagram. With the
+ indicated link costs, use Dijkstra's shortest path algorithm to
+ compute the shortest path from x to all other network nodes. Show
+ how the algorithm works by computing a table like the one above.
+
+2.3
+
+(20%) A router running classless interdomain routing (CIDR) has the
+following entries in its routing table: Address/mask Next hop
+135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23
+Router 2 Default Router 3 How does a CIDR router route the packets it
+receives? For each of the following IP addresses, explain what the
+router will do if a packet with that address arrives. a. b. c. d.
+
+2.4
+
+135.46.61.10 135.46.53.16 192.53.40.6 192.53.56.7
+
+(20%) Consider that only a single TCP connection uses a 1 Gbps link,
+which does not bu�er any data. Suppose that this link is the only
+congested link between the sending and receiving hosts. Assume that the
+TCP sender has a huge �le to send to the receiver and the receiver's
+receive bu�er is much larger than the congestion window. Further assume
+that each TCP segment size is 1,500 bytes; the two-way propagation delay
+of this connection is 15 msec; and this TCP connection is always in the
+congestion avoidance phase (ignore slow start).
+
+5/19/25, 17:56
+
+ Assignment 2 - Instructions
+
+3 of 3
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+a. What is the maximum window size (in segments) that this TCP
+ connection can achieve?
+b. What is the average window size (in segments) and average throughput
+ (in bps) of this TCP connection?
+c. How long would it take for this TCP connection to reach its maximum
+ window again after recovering from a packet loss?
+d. Assume we want the 1 Gbps link to bu�er a �nite number of segments
+ and always keep the link busy sending data. How would you choose a
+ bu�er size? Justify your answer.
+
+Submit your completed assignment to Assignment 2 for assessment
+(submission link will be available upon your course contract start
+date).
+
+1. Once you submit the assignment for grading, your submission is �nal.
+ To resubmit the assignment, you obtain special permission from your
+ instructor.
+2. Please name your �le using the following template:
+ `<course shortname>`{=html}*\<assignment#\>*`<lastname>`{=html}`<firstname>`{=html}\_`<studentID>`{=html}
+
+Examples:
+
+• • •
+
+COMP101_Assignment1_DoeJane_1234567
+COMP101_Assignment1\_�le1_DoeJane_1234567
+COMP101_FinalAssignment_DoeJane_1234567
+
+Copyright @ Athabasca University All Rights Reserved
+
+5/19/25, 17:56
+
+
diff --git a/assignments/3.md b/assignments/3.md
new file mode 100644
index 0000000..5317e4e
--- /dev/null
+++ b/assignments/3.md
@@ -0,0 +1,152 @@
+Assignment 3 - Instructions
+
+1 of 2
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+After completion of Units 6 and 7 20% of your �nal grade
+
+This assignment should be done after you have completed your study of
+Unit 6 and Unit 7. Your assignment must be written in either MS-Word or
+HTML and it must begin with a cover page containing the course number
+and title, assignment number, your name and your student ID, as well as
+the time you spent on the assignment. The �le containing the cover page
+must be named or If you have more than one �le for the assignment, those
+�les and all other �les should be accessible through the �le containing
+the cover page, either directly or indirectly through hyperlinks.
+
+You need to create a root directory or folder named somewhere on the �le
+system of your computer and keep all your work related to the course
+under that directory; for this assignment you need to create a
+subdirectory or subfolder named and put all the necessary �les for the
+assignment under that dedicated subdirectory. When you submit your
+assignment, you must compress the entire subdirectory of in a �le named
+and send the compressed �le for marking. By default, you must answer
+each of the questions in your own words with enough details to show your
+work for your solutions, and Please read the university's academic
+misconduct policy  carefully before you begin the assignment.
+
+1.1
+
+(5%) What is the role of the anchor MSC in GSM networks?
+
+1.2
+
+(5%) What are the main characteristics of LTE radio access networks? How
+does LTE network di�er from previous generations of cellular networks?
+
+1.3
+
+(5%) What does CSMA/CD stand for? How does the protocol work? Explain
+why RTT on an Ethernet LAN is an important parameter for the CSMA/CD
+protocol to work properly.
+
+1.4
+
+(5%) What does CSMA/CA stand for? How does the protocol work? How can
+collisions be avoided in the protocol?
+
+1.5
+
+(5%) What techniques can be used for error-detection and
+error-correction, respectively, on the data link layer?
+
+1.6
+
+(5%) What wireless (Wi-Fi) network standards are used in today's
+industries? What are the characteristics of the link speci�ed in each
+standard?
+
+Solve the following network problems and show your work in detail. 2.1
+
+(15%) For wireless and cellular networks, the space is a shared medium
+for all sending and receiving hosts to use. Among the technologies
+developed to make medium sharing work, a channel partitioning technology
+called code division multiple access (CDMA) is widely used in today's
+wireless and cellular networks. Begin with reading about the simple CDMA
+protocol given in the textbook, and then study more advanced CDMA
+schemes from other sources, including the Internet. Finally, choose one
+CDMA scheme and explain, in your own words, how it works. Describe the
+advantages that CDMA has over other coding schemes, such as TDM and FDM.
+Include in your answer the titles and sources of the articles/documents
+you consulted.
+
+2.2
+
+(15%) Suppose host A has payload 1011 0110 1010 1011 to send to host B,
+and A wants to use a two-dimensional checksum for host B to detect and
+correct any 1-bit error that may occur during the transmission.
+Furthermore, host A wants to minimize the length of the checksum to
+conserve 5/19/25, 17:57
+
+ Assignment 3 - Instructions
+
+2 of 2
+
+https://learning.athabascau.ca//content/enforced/16029-co_COMP347_R9/Content/03...
+
+bandwidth of the communication channel. What would the value of the
+checksum �eld be if an even parity scheme is used? Show all your work
+and prove why the checksum you have worked out is the shortest. Prove
+that any 1-bit error can be detected and corrected. 2.3
+
+(20%) Assume a 1 Gbps Ethernet has two nodes, A and B, connected by a
+180 m cable with three repeaters in between, and they each have one
+frame of 1,024 bits to send to each other. Further assume that the
+signal propagation speed across the cable is 2\*10\^8 m/sec;, CSMA/CD
+uses back-o� intervals of multiples of 512 bits; and each repeater will
+insert a store-and-forward delay equivalent to 20-bit transmission time.
+At time t = 0, both A and B attempt to transmit. After the �rst
+collision, A draws K = 0 and B draws K = 1 in the exponential backo�
+protocol after sending the 48 bits jam signal. a. What is the one-way
+propagation delay (including all repeater delays) between A and B in
+seconds? At what time is A's packet completely delivered at B? b. Now
+suppose that only A has a packet to send and that the repeaters are
+replaced with switches. Suppose that each switch has an 8-bit processing
+delay in addition to a store-and-forward delay. At what time, in
+seconds, is A's packet delivered at B? In your calculations for a and b,
+you must include all the delays that occur according to CSMA/CD, and you
+must show the details of your work.
+
+2.4
+
+(10%) Suppose an 802.11 station on a mobile network is con�gured to
+always reserve the channel with the RTS/CTS sequence. At time t = 0, the
+station wants to transmit 1024 bytes of data. All other stations on the
+network are idle at that time. At what time will the station complete
+the transmission? At what time can the station receive the
+acknowledgement?
+
+2.5
+
+(10%) Bluetooth is a widely used wireless communication technology.
+Although it is not covered in detail in this course, you are asked to
+conduct some research and reading on the Internet about Bluetooth
+technology and describe and comment on the format of the Bluetooth
+frame. Focus on its features and limitations. Is there anything in the
+frame format that inherently limits the number of active nodes in a
+network to eight active nodes? Explain.
+
+Submit your completed assignment to Assignment 3 for assessment
+(submission link will be available upon your course contract start
+date).
+
+1. Once you submit the assignment for grading, your submission is �nal.
+ To resubmit the assignment, you obtain special permission from your
+ instructor.
+2. Please name your �le using the following template:
+ `<course shortname>`{=html}*\<assignment#\>*`<lastname>`{=html}`<firstname>`{=html}\_`<studentID>`{=html}
+
+Examples:
+
+• • •
+
+COMP101_Assignment1_DoeJane_1234567
+COMP101_Assignment1\_�le1_DoeJane_1234567
+COMP101_FinalAssignment_DoeJane_1234567
+
+Copyright @ Athabasca University All Rights Reserved
+
+5/19/25, 17:57
+
+