diff options
| author | mo khan <mo@mokhan.ca> | 2025-09-27 11:37:14 -0600 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2025-09-27 11:37:14 -0600 |
| commit | c9779c85ae3bb3114b7ae3522bc1433e65032432 (patch) | |
| tree | 26f964eab82f1e1efd8fc39ce19c8c96f0ba3d4b /assignments | |
| parent | 66f39fb4530a6ca1fb6c00f277d66cddbcfdb29c (diff) | |
chore: move instructions around
Diffstat (limited to 'assignments')
| -rw-r--r-- | assignments/1/instructions.html | 162 | ||||
| -rw-r--r-- | assignments/2/instructions.html | 238 | ||||
| -rw-r--r-- | assignments/3/instructions.html | 149 |
3 files changed, 549 insertions, 0 deletions
diff --git a/assignments/1/instructions.html b/assignments/1/instructions.html new file mode 100644 index 0000000..18cb5db --- /dev/null +++ b/assignments/1/instructions.html @@ -0,0 +1,162 @@ +<!DOCTYPE html> +<html lang="en"> + <head> + <meta charset="utf-8"> + <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> + <title>Assignment 1 - Instructions</title> + </head> + <body> + <div class="container-fluid"> + <div class="row"> + <div class="offset-sm-1 col-sm-10"> + <div class="jumbotron"> + <p>This page includes instructions for Assignment 1 and a link (below the instructions) to submit the assignment for assessment.</p> + </div> + <h2>Assignment 1</h2> + <p><strong>Due:</strong> After completion of Units 1 and 2<br><strong>Weight:</strong> 20% of your final grade</p> + <h3>General Instructions</h3> + <p>This assignment should be done after you have completed your study of Unit 1 and Unit 2. Your assignment must be written in either MS-Word or HTML and it must begin with a cover page containing the course number and title, assignment number, your name and your student ID, as well as the time you spent on the assignment. The file containing the cover page must be named <strong>assignment1.doc</strong> or <strong>assignment1.htm.</strong> If you have more than one file for the assignment, those files and all other files should be accessible through the file containing the cover page, either directly or indirectly through hyperlinks.</p> + <h3>Organization of Your Assignment Files</h3> + <p>You need to create a root directory or folder named <strong>comp347</strong> somewhere on the file system of your computer and keep all your work related to the course under that directory; for this assignment you need to create a subdirectory or subfolder named <strong>assignment1</strong> and put all the necessary files for the assignment under that dedicated subdirectory. When you submit your assignment, you must compress the entire subdirectory of <strong>assignment1</strong> in a file named <strong>assignment1.zip</strong> and send the compressed file for marking.</p> + <p>By default, you must answer each of the questions in your own words with enough details to show your work for your solutions, and <strong>you must not copy from others</strong>! <strong>You will automatically receive a failure grade for this course if you have been found to have copied your answers from external sources.</strong> Please read the university’s <a target="_blank" href="https://www.athabascau.ca/calendar/graduate/additional-information/student-code-of-conduct-and-right-to-appeals.html" rel="noopener">academic misconduct policy</a> carefully before you begin the assignment.</p> + <h3>Part 1: Short Answer Questions (30%)</h3> + <div class="row"> + <div class="col-1"> + <p align="right">1.1</p> + </div> + <div class="col-11"> + <p>(5%) Run Traceroute, TRACERT (on Windows), or another similar utility between a source and a destination in the country in which you reside. Do this at three different times of the day. Summarize your findings at each of the times with respect to the following, and explain your findings:</p> + <ul> + <li>average and standard deviation of the round-trip delays</li> + <li>number of routers in the path</li> + </ul> + <p>If you are not familiar with the utility, read the Microsoft article, “<a target="_blank" href="https://support.microsoft.com/en-us/topic/how-to-use-tracert-to-troubleshoot-tcp-ip-problems-in-windows-e643d72b-2f4f-cdd6-09a0-fd2989c7ca8e" rel="noopener">How to Use TRACERT</a>.”</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.2</p> + </div> + <div class="col-11"> + <p>(5%) What are the five layers in the Internet protocol stack? Develop a table to summarise what each layer does.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.3</p> + </div> + <div class="col-11"> + <p>(5%) What are <em>packet-switched network</em> and <em>circuit-switched network</em>, respectively? Develop a table to summarise their features, pros, and cons.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.4</p> + </div> + <div class="col-11"> + <p>(5%) What are <em>processing delay</em>, <em>queuing delay</em>, <em>transmission delay</em>, and <em>propagation delay</em>, respectively? Where does each delay occur? What is<em> traffic intensity</em>? Why should the traffic intensity be no greater than one (1) when designing a computer network?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.5</p> + </div> + <div class="col-11"> + <p>(5%) What is Web-caching? When may Web-caching be more useful in a university? What problem does the conditional GET in HTTP aim to solve?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.6</p> + </div> + <div class="col-11"> + <p>(5%) Suppose you have a Web-based email account, such as Gmail, and you have just sent a message to a friend, Alice, who accesses her mail from her mail server using IMAP. Assume that both you and Alice are using a smartphone to access emails via Wi-Fi at home. List all the network protocols that may be involved in sending and receiving the email. Discuss in detail how the message went from your smartphone to Alice’s smartphone—that is, how the message went through all the network protocol layers on each of the network devices involved in the communication. Ignore everything between your ISP and Alice’s ISP.</p> + </div> + </div> + <h3>Part 2: Long Answer Questions (70%)</h3> + <p>Solve the following network problems and show your work in detail.</p> + <div class="row"> + <div class="col-1"> + <p align="right">2.1</p> + </div> + <div class="col-11"> + <p>(20%) Consider that you are submitting your assignment in a compressed file from your computer at home to the university server that is hosting your online course. Your large file is segmented into smaller packets before it is sent into the first link. Each packet is 10,000 bits long, including 100 bits of header. Assume the size of the assignment file is 10 MB.</p> + <ol type="a"> + <li>How many packets will the assignment file be segmented into?</li> + <li>How many links can be identified using TRACERT or Traceroute between your computer and the university server? What are they?</li> + <li>What is the speed for each identified link based on your best calculation? Show your work.</li> + <li>Assume you start uploading the assignment at t0. At what time will the last packet be pushed into the first link?</li> + <li>At what time will the last packet arrive at the university server?</li> + </ol> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.2</p> + </div> + <div class="col-11"> + <p>(20%) Consider that you are submitting another assignment from your home computer to the university server, and you have worked out a list of network links between your computer and the university server.</p> + <ol type="a"> + <li>Based on your best estimate and calculation, what is the total distance your assignment data will travel to reach the university server?</li> + <li>Suppose the propagation speed over all the links is the same 2*10^8 meters/sec. What is propagation delay T<sub>prop</sub> from your computer to the university server?</li> + <li>Further assume all the links have the same speed R bps. What is the bandwidth-delay product R*T<sub>prop</sub>?</li> + <li>Now suppose the assignment file is sent continuously as one big file. What is the maximum number of bits that will be in the links at any given time?</li> + <li>Based on the results from <em>c</em> and <em>d</em>, what does the bandwidth-delay product imply?</li> + </ol> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.3</p> + </div> + <div class="col-11"> + <p>(20%) You have learned that a Web cache can be useful in some cases. In this problem, you will investigate how useful a Web cache can be at a home. First, you need to <a target="_blank" href="https://www.apache.org/" rel="noopener">download Apache server</a> and install and run it as a proxy server on a computer on your home network. Then, write a brief report on what you did to make it work and how you are using it on all your devices on your home network.</p> + <p>Assume your family has six members. Each member likes to download short videos from the Internet to watch on their personal devices. All these devices are connected to the Internet through Wi-Fi. Further assume the average object size of each short video is 100 MB and the average request rate from all devices to servers on the Internet is three requests per minute. Five seconds is the average amount of time it takes for the router on the ISP side of your Internet link to forward an HTTP request to a server on the Internet and receive a response.</p> + <ol type="a"> + <li>What is the average time <strong>α</strong> for your home router to receive a video object from your ISP router?</li> + <li>What is the traffic intensity <strong>µ</strong> on the Internet link to your home router if none of the requested videos is cached on the proxy server?</li> + <li>If average access delay <strong>β</strong> is defined as <strong>α/(μ−1), </strong>what is the average access delay your family members will experience when watching the short videos?</li> + <li>If the total average response time is defined as <strong>5+β</strong>, and the miss rate of your proxy server is 0.5, what will be the total average response time?</li> + </ol> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.4</p> + </div> + <div class="col-11"> + <p>(10%) You have learned that a file can be distributed to peers in either client–server mode or peer-to-peer (P2P) mode. Consider distributing a large file of F = 21 GB to N peers. The server has an upload rate of U<sub>s</sub> = 1 Gbps, and each peer has a download rate of Di = 20 Mbps and an upload rate of U. For N = 10, 100, and 1,000 and U = 300 Kbps, 7000 Kbps, and 2 Mbps, develop a table giving the minimum distribution time for each of the combination of N and U for both client–server distribution and P2P distribution. Comment on the features of client–server distribution and P2P distribution and the differences between the two.</p> + </div> + </div> + <div class="card card-graphic"> + <div class="card-body"> + <div class="callout-icon callout-icon-info"></div> + <div class="card-text"> + <h4>Submission Instructions</h4> + <p>Submit your completed assignment to <a href="/d2l/common/dialogs/quickLink/quickLink.d2l?ou=16029&type=dropbox&rcode=e25e8fce5fed4e45a172488d-9" target="_top">Assignment 1</a> for assessment (submission link will be available upon your course contract start date).</p> + <h5>Important</h5> + <ol> + <li> + <p>Once you submit the assignment for grading, your submission is final. To resubmit the assignment, you <strong>must</strong> obtain special permission from your instructor.</p> + </li> + <li> + <p>Please name your file using the following template:<br><code><course shortname>_<assignment#>_<lastname><firstname>_<studentID></code></p> + <p>Examples:</p> + <ul> + <li>COMP101_Assignment1_DoeJane_1234567</li> + <li>COMP101_Assignment1_file1_DoeJane_1234567</li> + <li>COMP101_FinalAssignment_DoeJane_1234567</li> + </ul> + </li> + </ol> + </div> + </div> + </div> + </div> + <div class="col-12"> + <footer></footer> + </div> + </div> + </div> + </body> +</html> diff --git a/assignments/2/instructions.html b/assignments/2/instructions.html new file mode 100644 index 0000000..c2bfb5c --- /dev/null +++ b/assignments/2/instructions.html @@ -0,0 +1,238 @@ +<!DOCTYPE html> +<html lang="en"> + <head> + <meta charset="utf-8"> + <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> + <title>Assignment 2 - Instructions</title> + </head> + <body> + <div class="container-fluid"> + <div class="row"> + <div class="offset-sm-1 col-sm-10"> + <div class="jumbotron"> + <p>This page includes instructions for Assignment 2 and a link (below the instructions) to submit the assignment for assessment.</p> + </div> + <h2>Assignment 2</h2> + <p><strong>Due:</strong> After completion of Units 3, 4, and 5<br><strong>Weight:</strong> 20% of your final grade</p> + <h3>General Instructions</h3> + <p>This assignment should be done after you have completed your study of Unit 3, Unit 4, and Unit 5. Your assignment must be written in either MS-Word or HTML and it must begin with a cover page containing the course number and title, assignment number, your name and your student ID, as well as the time you spent on the assignment. The file containing the cover page must be named <strong>assignment2.doc</strong> or <strong>assigment2.htm.</strong> If you have more than one file for the assignment, those files and all other files should be accessible through the file containing the cover page, either directly or indirectly through hyperlinks.</p> + <h3>Organization of Your Assignment Files</h3> + <p>You need to create a root directory or folder named <strong>comp347</strong> somewhere on the file system of your computer and keep all your work related to the course under that directory; for this assignment you need to create a subdirectory or subfolder named <strong>assignment2</strong> and put all the necessary files for the assignment under that dedicated subdirectory. When you submit your assignment, you must compress the entire subdirectory of <strong>assignment2</strong> in a file named <strong>assignment2.zip</strong> and send the compressed file for marking.</p> + <p>By default, you must answer each of the questions in your own words with enough details to show your work for your solutions, and <strong>you must not copy from others! You will automatically receive a failure grade for this course if you have been found to have copied your answers from external sources.</strong> Please read the university’s <a target="_blank" href="https://www.athabascau.ca/calendar/graduate/additional-information/student-code-of-conduct-and-right-to-appeals.html" rel="noopener">academic misconduct policy</a> carefully before you begin the assignment.</p> + <h3>Part 1: Short Answer Questions (30%)</h3> + <div class="row"> + <div class="col-1"> + <p align="right">1.1</p> + </div> + <div class="col-11"> + <p>(5%) TCP provides a reliable data transfer service on top of IP’s unreliable best‑effort service. Study related sections of the textbook and articles from other sources. In your own words, explain how TCP provides a reliable data transfer service.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.2</p> + </div> + <div class="col-11"> + <p>(5%) While the RDT protocols are essentially stop‑and‑wait protocols, the GBN protocol allows the sender to send multiple packets without waiting for acknowledgement from the receiving parties. How does GBN achieve that?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.3</p> + </div> + <div class="col-11"> + <p>(5%) Invention and adoption of IPv6 is a big advance in computer networking. What problems was IPv6 intended to solve? With the large number of networking devices and applications using IPv4 still in use, how is the transition from IPv4 to IPv6 being resolved?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.4</p> + </div> + <div class="col-11"> + <p>(5%) SNMP is a protocol for network management. It has seven message types. What are the purposes of the SNMP <em>GetRequest</em> and <em>SetRequest</em> messages? Why were UDP datagrams chosen to transport SNMP messages?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.5</p> + </div> + <div class="col-11"> + <p>(5%) In today’s market and its applications, there are many SDN-enabled networking devices. What are the preferrable features that an SDN-enabled networking device usually has?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.6</p> + </div> + <div class="col-11"> + <p>(5%) BGP is a routing protocol used for routing among ISPs. One problem that BGP faces is detecting loops in paths. What are the loops? Why should loops be avoided? How does BGP detect the loops in paths?</p> + </div> + </div> + <h3>Part 2: Long Answer Questions (70%)</h3> + <p>Solve the following network problems and show your work in detail.</p> + <div class="row"> + <div class="col-1"> + <p align="right">2.1</p> + </div> + <div class="col-11"> + <p>(10%) UDP and TCP use 1’s complement for their checksums to detect errors. Suppose you have the following 8‑bit bytes: 11011001, 01010010, 11001010, 10100100 and 01011001.</p> + <ol type="a"> + <li>What is the 1’s complement of the sum of these 8‑bit bytes? Show all the details of your work.</li> + <li>Why do UDP and TCP take the 1’s complement of the sum as their checksum, instead of the just sum of these bytes?</li> + <li>With the 1’s complement scheme, how does the receiver detect errors?</li> + <li>With this checksum scheme, is it possible that any 1‑bit error will go undetected? How about a 2‑bit error? Explain your answer.</li> + </ol> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.2</p> + </div> + <div class="col-11"> + <p>(20%) The following table is used to compute the shortest path from A to all other nodes in a network, according to the link‑state algorithm, which is better known as Dijkstra’s shortest path algorithm.</p> + <div class="table-responsive"> + <table class="table table-hover table-compact"> + <thead> + <tr> + <th scope="col">Step</th> + <th scope="col">N’</th> + <th scope="col">D(v),P(v)</th> + <th scope="col">D(w),P(w)</th> + <th scope="col">D(x),P(x)</th> + <th scope="col">D(y),P(y)</th> + <th scope="col">D(z),P(z)</th> + </tr> + </thead> + <tbody> + <tr> + <td>0</td> + <td>u</td> + <td>2,u</td> + <td>5,u</td> + <td>1,u</td> + <td>∞</td> + <td>∞</td> + </tr> + <tr> + <td>1</td> + <td>ux</td> + <td>2,u</td> + <td>4,x</td> + <td></td> + <td>2,x</td> + <td>∞</td> + </tr> + <tr> + <td>2</td> + <td>uxy</td> + <td>2,u</td> + <td>3,y</td> + <td></td> + <td></td> + <td>4,y</td> + </tr> + <tr> + <td>3</td> + <td>uxyv</td> + <td></td> + <td>3,y</td> + <td></td> + <td></td> + <td>4,y</td> + </tr> + <tr> + <td>4</td> + <td>uxyvw</td> + <td></td> + <td></td> + <td></td> + <td></td> + <td>4,y</td> + </tr> + <tr> + <td>5</td> + <td>uxyvwz</td> + <td></td> + <td></td> + <td></td> + <td></td> + <td></td> + </tr> + </tbody> + </table> + </div> + <ol type="a"> + <li>Interpret the table above in your words: what it is showing and what are each row and each column showing?</li> + <li> + <p>Consider the network shown in the following diagram. With the indicated link costs, use Dijkstra’s shortest path algorithm to compute the shortest path from <em>x</em> to all other network nodes. Show how the algorithm works by computing a table like the one above.</p> + <figure class="figure col-10"><img src="fig-Q2-2.png" alt="" class="figure-img img-fluid" width="100%" height="auto"> + <figcaption class="figure-caption"></figcaption> + </figure> + </li> + </ol> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.3</p> + </div> + <div class="col-11"> + <p>(20%) A router running classless interdomain routing (CIDR) has the following entries in its routing table:</p> + <div class="padding-left-block"> + <p>Address/mask Next hop<br>135.46.56.0/22 Interface 0<br>135.46.60.0/22 Interface 1<br>192.53.40.0/23 Router 2<br>Default Router 3</p> + </div> + <p>How does a CIDR router route the packets it receives? For each of the following IP addresses, explain what the router will do if a packet with that address arrives.</p> + <ol type="a"> + <li>135.46.61.10</li> + <li>135.46.53.16</li> + <li>192.53.40.6</li> + <li>192.53.56.7</li> + </ol> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.4</p> + </div> + <div class="col-11"> + <p>(20%) Consider that only a single TCP connection uses a 1 Gbps link, which does not buffer any data. Suppose that this link is the only congested link between the sending and receiving hosts. Assume that the TCP sender has a huge file to send to the receiver and the receiver’s receive buffer is much larger than the congestion window. Further assume that each TCP segment size is 1,500 bytes; the two-way propagation delay of this connection is 15 msec; and this TCP connection is always in the congestion avoidance phase (ignore slow start).</p> + <ol type="a"> + <li>What is the maximum window size (in segments) that this TCP connection can achieve?</li> + <li>What is the average window size (in segments) and average throughput (in bps) of this TCP connection?</li> + <li>How long would it take for this TCP connection to reach its maximum window again after recovering from a packet loss?</li> + <li>Assume we want the 1 Gbps link to buffer a finite number of segments and always keep the link busy sending data. How would you choose a buffer size? Justify your answer.</li> + </ol> + </div> + </div> + <div class="card card-graphic"> + <div class="card-body"> + <div class="callout-icon callout-icon-info"></div> + <div class="card-text"> + <h4>Submission Instructions</h4> + <p>Submit your completed assignment to <a href="/d2l/common/dialogs/quickLink/quickLink.d2l?ou=16029&type=dropbox&rcode=e25e8fce5fed4e45a172488d-10" target="_top">Assignment 2</a> for assessment (submission link will be available upon your course contract start date).</p> + <h5>Important</h5> + <ol> + <li> + <p>Once you submit the assignment for grading, your submission is final. To resubmit the assignment, you <strong>must</strong> obtain special permission from your instructor.</p> + </li> + <li> + <p>Please name your file using the following template:<br><code><course shortname>_<assignment#>_<lastname><firstname>_<studentID></code></p> + <p>Examples:</p> + <ul> + <li>COMP101_Assignment1_DoeJane_1234567</li> + <li>COMP101_Assignment1_file1_DoeJane_1234567</li> + <li>COMP101_FinalAssignment_DoeJane_1234567</li> + </ul> + </li> + </ol> + </div> + </div> + </div> + </div> + <div class="col-12"> + <footer></footer> + </div> + </div> + </div> + </body> +</html> diff --git a/assignments/3/instructions.html b/assignments/3/instructions.html new file mode 100644 index 0000000..04dfe45 --- /dev/null +++ b/assignments/3/instructions.html @@ -0,0 +1,149 @@ +<!DOCTYPE html> +<html lang="en"> + <head> + <meta charset="utf-8"> + <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> + <title>Assignment 3 - Instructions</title> + </head> + <body> + <div class="container-fluid"> + <div class="row"> + <div class="offset-sm-1 col-sm-10"> + <div class="jumbotron"> + <p>This page includes instructions for Assignment 3 and a link (below the instructions) to submit the assignment for assessment.</p> + </div> + <h2>Assignment 3</h2> + <p><strong>Due:</strong> After completion of Units 6 and 7<br><strong>Weight:</strong> 20% of your final grade</p> + <h3>General Instructions</h3> + <p>This assignment should be done after you have completed your study of Unit 6 and Unit 7. Your assignment must be written in either MS-Word or HTML and it must begin with a cover page containing the course number and title, assignment number, your name and your student ID, as well as the time you spent on the assignment. The file containing the cover page must be named <strong>assignment3.doc</strong> or <strong>assigment3.htm.</strong> If you have more than one file for the assignment, those files and all other files should be accessible through the file containing the cover page, either directly or indirectly through hyperlinks.</p> + <h3>Organization of Your Assignment Files</h3> + <p>You need to create a root directory or folder named <strong>comp347</strong> somewhere on the file system of your computer and keep all your work related to the course under that directory; for this assignment you need to create a subdirectory or subfolder named <strong>assignment3</strong> and put all the necessary files for the assignment under that dedicated subdirectory. When you submit your assignment, you must compress the entire subdirectory of <strong>assignment3</strong> in a file named <strong>assignment3.zip</strong> and send the compressed file for marking.</p> + <p>By default, you must answer each of the questions in your own words with enough details to show your work for your solutions, and <strong>you must not copy from others! You will automatically receive a failure grade for this course if you have been found to have copied your answers from external sources.</strong> Please read the university’s <a target="_blank" href="https://www.athabascau.ca/calendar/graduate/additional-information/student-code-of-conduct-and-right-to-appeals.html" rel="noopener">academic misconduct policy</a> carefully before you begin the assignment.</p> + <h3>Part 1: Short Answer Questions (30%)</h3> + <div class="row"> + <div class="col-1"> + <p align="right">1.1</p> + </div> + <div class="col-11"> + <p>(5%) What is the role of the anchor MSC in GSM networks?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.2</p> + </div> + <div class="col-11"> + <p>(5%) What are the main characteristics of LTE radio access networks? How does LTE network differ from previous generations of cellular networks?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.3</p> + </div> + <div class="col-11"> + <p>(5%) What does CSMA/CD stand for? How does the protocol work? Explain why RTT on an Ethernet LAN is an important parameter for the CSMA/CD protocol to work properly.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.4</p> + </div> + <div class="col-11"> + <p>(5%) What does CSMA/CA stand for? How does the protocol work? How can collisions be avoided in the protocol?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.5</p> + </div> + <div class="col-11"> + <p>(5%) What techniques can be used for error‑detection and error‑correction, respectively, on the data link layer?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">1.6</p> + </div> + <div class="col-11"> + <p>(5%) What wireless (Wi-Fi) network standards are used in today’s industries? What are the characteristics of the link specified in each standard?</p> + </div> + </div> + <h3>Part 2: Long Answer Questions (70%)</h3> + <p>Solve the following network problems and show your work in detail.</p> + <div class="row"> + <div class="col-1"> + <p align="right">2.1</p> + </div> + <div class="col-11"> + <p>(15%) For wireless and cellular networks, the space is a shared medium for all sending and receiving hosts to use. Among the technologies developed to make medium sharing work, a channel partitioning technology called <em>code division multiple access</em> (CDMA) is widely used in today’s wireless and cellular networks. Begin with reading about the simple CDMA protocol given in the textbook, and then study more advanced CDMA schemes from other sources, including the Internet. Finally, choose one CDMA scheme and explain, in your own words, how it works. Describe the advantages that CDMA has over other coding schemes, such as TDM and FDM. Include in your answer the titles and sources of the articles/documents you consulted.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.2</p> + </div> + <div class="col-11"> + <p>(15%) Suppose host A has payload 1011 0110 1010 1011 to send to host B, and A wants to use a two‑dimensional checksum for host B to detect and correct any 1‑bit error that may occur during the transmission. Furthermore, host A wants to minimize the length of the checksum to conserve bandwidth of the communication channel. What would the value of the checksum field be if an even parity scheme is used? Show all your work and prove why the checksum you have worked out is the shortest. Prove that any 1‑bit error can be detected and corrected.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.3</p> + </div> + <div class="col-11"> + <p>(20%) Assume a 1 Gbps Ethernet has two nodes, A and B, connected by a 180 m cable with three repeaters in between, and they each have one frame of 1,024 bits to send to each other. Further assume that the signal propagation speed across the cable is 2*10^8 m/sec;, CSMA/CD uses back‑off intervals of multiples of 512 bits; and each repeater will insert a store‑and‑forward delay equivalent to 20‑bit transmission time. At time t = 0, both A and B attempt to transmit. After the first collision, A draws K = 0 and B draws K = 1 in the exponential backoff protocol after sending the 48 bits jam signal.</p> + <ol type="a"> + <li>What is the one-way propagation delay (including all repeater delays) between A and B in seconds? At what time is A’s packet completely delivered at B?</li> + <li>Now suppose that only A has a packet to send and that the repeaters are replaced with switches. Suppose that each switch has an 8‑bit processing delay in addition to a store‑and‑forward delay. At what time, in seconds, is A’s packet delivered at B?</li> + </ol> + <p>In your calculations for <em>a</em> and <em>b</em>, you must include all the delays that occur according to CSMA/CD, and you must show the details of your work.</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.4</p> + </div> + <div class="col-11"> + <p>(10%) Suppose an 802.11 station on a mobile network is configured to always reserve the channel with the RTS/CTS sequence. At time t = 0, the station wants to transmit 1024 bytes of data. All other stations on the network are idle at that time. At what time will the station complete the transmission? At what time can the station receive the acknowledgement?</p> + </div> + </div> + <div class="row"> + <div class="col-1"> + <p align="right">2.5</p> + </div> + <div class="col-11"> + <p>(10%) Bluetooth is a widely used wireless communication technology. Although it is not covered in detail in this course, you are asked to conduct some research and reading on the Internet about Bluetooth technology and describe and comment on the format of the Bluetooth frame. Focus on its features and limitations. Is there anything in the frame format that inherently limits the number of active nodes in a network to eight active nodes? Explain.</p> + </div> + </div> + <div class="card card-graphic"> + <div class="card-body"> + <div class="callout-icon callout-icon-info"></div> + <div class="card-text"> + <h4>Submission Instructions</h4> + <p>Submit your completed assignment to <a href="/d2l/common/dialogs/quickLink/quickLink.d2l?ou=16029&type=dropbox&rcode=e25e8fce5fed4e45a172488d-11" target="_top">Assignment 3</a> for assessment (submission link will be available upon your course contract start date).</p> + <h5>Important</h5> + <ol> + <li> + <p>Once you submit the assignment for grading, your submission is final. To resubmit the assignment, you <strong>must</strong> obtain special permission from your instructor.</p> + </li> + <li> + <p>Please name your file using the following template:<br><code><course shortname>_<assignment#>_<lastname><firstname>_<studentID></code></p> + <p>Examples:</p> + <ul> + <li>COMP101_Assignment1_DoeJane_1234567</li> + <li>COMP101_Assignment1_file1_DoeJane_1234567</li> + <li>COMP101_FinalAssignment_DoeJane_1234567</li> + </ul> + </li> + </ol> + </div> + </div> + </div> + </div> + <div class="col-12"> + <footer></footer> + </div> + </div> + </div> + </body> +</html> |
