Академический Документы
Профессиональный Документы
Культура Документы
Homework Solutions
Class 7
12.9 a. We provide a table for node 1 of network a; the figure is easily
generated.
M L(2 Pat L(3 Path L(4 Path L(5 Pat L(6 Path
) h ) ) ) h )
1 {1} 1 1-2 ∞ — 4 1-4 ∞ — ∞ —
2 {1,2} 1 1-2 4 1-2-3 4 1-4 2 1-2- ∞ —
5
3 {1,2,5} 1 1-2 3 1-2-5- 3 1-2-5- 2 1-2- 6 1-2-5-6
3 4 5
4 {1,2,5,3} 1 1-2 3 1-2-5- 3 1-2-5- 2 1-2- 5 1-2-5-
3 4 5 3-6
5 {1,2,5,3,4 1 1-2 3 1-2-5- 3 1-2-5- 2 1-2- 5 1-2-5-
} 3 4 5 3-6
6 {1,2,5,3,4, 1 1-2 3 1-2-5- 3 1-2-5- 2 1-2- 5 1-2-5-
6} 3 4 5 3-6
12.10
h Lh(2 Path Lh(3 Path Lh(4 Path Lh(5 Pat Lh(6) Path
) ) ) ) h
0 ∞ — ∞ — ∞ — ∞ — ∞ —
1 1 1-2 ∞ — 4 1-4 ∞ — ∞ —
2 1 1-2 4 1-2-3 4 1-4 2 1-2- ∞ —
5
3 1 1-2 3 1-2-5- 3 1-2-5- 2 1-2- 6 1-2-3-6
3 4 5
4 1 1-2 3 1-2-5- 3 1-2-5- 2 1-2- 5 1-2-5-
3 4 5 3-6
Class 8
Questions
13.4 Backward: Notifies the source that congestion avoidance
procedures should be initiated where applicable for traffic in the
opposite direction of the received notification. It indicates that the
packets that the user transmits on this logical connection may
encounter congested resources. Forward: Notifies the user that
congestion avoidance procedures should be initiated where applicable
for traffic in the same direction as the received notification. It indicates
that this packet, on this logical connection, has encountered congested
resources.
13.7 (1) Control of peak cell rate and the associated cell delay
variation (CDV).
(2) Control of sustainable cell rate and the associated burst tolerance
Problems
13.2 Yes, but ATM does not include such sliding-window mechanisms.
In some cases, a higher-level protocol above ATM will provide such
mechanisms, but not in all cases.
ta(2) > T – τ
δ >T–τ
τ >T–δ
ta(3) > 2T – τ
2δ > 2T – τ
τ > 2(T – δ )
τS τS
MBS = 1 + =1+
TS − T TS − T
The line of reasoning is the same as for part (a) of this problem.
In this case, we assume that cells can arrive at a maximum of
an interarrival time of T. Therefore, an MBS of 2 means that two
cells can arrive at a spacing of T; an MBS of 3 means that 3
cells can arrive with successive spacings of T, and so on. Here
is an example that shows the relationship among the relevant
parameters. In this example, MBS = 4, TS = 5δ , T = 2δ , and
τ S
= 9δ .
MBS
ta(i)
Time
τS
X + LCT
(TAT)
T TS
c. Suppose that τ S = (MBS – 1)(TS – T) exactly. Then,
τ (MBS − 1)(TS − T )
1+ S = 1+ = 1 + (MBS − 1) = MBS
T S − T T S − T
τS
then the value is a number greater than the integer
TS − T
(MBS – 1) and less than the integer MBS. Therefore:
τ
1+ S = 1+ (MBS − 1) = MBS
T S − T
Class 9
Questions
22.5 In a sliding-window scheme, acknowledgment and flow control
are bound together. An acknowledgment results in a fixed additional
credit being granted.
22.8 Data stream push: Ordinarily, TCP decides when sufficient data
have accumulated to form a segment for transmission. The TCP user
can require TCP to transmit all outstanding data up to and including
that labeled with a push flag. On the receiving end, TCP will deliver
these data to the user in the same manner. A user might request this if
it has come to a logical break in the data. Urgent data signaling:
This provides a means of informing the destination TCP user that
significant or "urgent" data is in the upcoming data stream. It is up to
the destination user to determine appropriate action.
Problems
Class 10
10.4 The argument ignores the overhead of the initial circuit setup
and the circuit teardown.
Class 11
7.3 Let L be the number of bits in a frame.
••• 0 1 2 3 4 5 6 7 0 •••
b.
••• 0 1 2 3 4 5 6 7 0 •••
c.
••• 0 1 2 3 4 5 6 7 0 •••
1024 bits
t1 = 6 bps = 1.024 m sec
10
7.20 The selective-reject approach would burden the server with the
task of managing and maintaining large amounts of information about
what has and has not been successfully transmitted to the clients; the
go-back-N approach would be less of a burden on the server.
Questions
24.1 With lossless compression, no information is lost and the
decompressed data are identical to the original uncompressed data.
The efficiency of lossless compression is limited to the entropy, or
redundancy, of the data source. In other words, compression is limited
to the process of eliminating some or all of the redundancy in a bit
stream, so that no information is lost. With lossy compression, the
decompressed data may be an acceptable approximation (according to
some fidelity criterion) to the original uncompressed data.
24.2 User location: Users can move to other locations and access
their telephony or other application features from remote locations.
User availability: Determination of the willingness of the called party
to engage in communications. User capabilities: Determination of
the media and media parameters to be used. Session setup: Setup
up point-to-point and multiparty calls, with agreed session parameters.
Session management: Including transfer and termination of
sessions, modifying session parameters, and invoking services.
Problems
24.2 60 Mbits
24.3 RTP uses periodic status reporting among all group participants.
When the
number of participants becomes large, the period of the reporting is
scaled up to
reduce the overall bandwidth consumption of control messages. Since
the period
of reporting may be large (on the order of tens of seconds), it may
convey coarse
grain information about the network congestion. Hence this
information cannot
be used to relief network congestion, which needs finer grained
feedback. This
information, however, can be used as a means for session-level (as
opposed to
packet level) flow control, where a source may adjust its transmission
rate, and
receivers may adjust their playback points according to the coarse
grained
information.
Class 12
Questions