Calculate the total time required to transfer a 1000-kB file in the following cases, assuming an RTT of 100 ms, a packet size of 1 kB data, and an initial 2 RTT of handshaking before data are sent....
One technique for limiting fault current is to place reactance in series with the generators. Such reactance can be modeled in PowerWorld Simulator by increasing the value of the generator's positive...
For the following C statement, what is the corresponding MIPS assembly code? Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3, and $s4, respectively. Assume...
Consider two different implementations of the same instruction set architecture. Th e instructions can be divided into four classes according to their CPI (class A, B, C, and D). P1 with a clock rate...
For the MIPS assembly instructions in Exercise 2.4, rewrite the assembly code to minimize the number if MIPS instructions (if possible) needed to carry out the same function. Exercise 2.4 For the...
Translate the following MIPS code to C. Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3, and $s4, respectively. Assume that the base address of the arrays A...
Assume 185 and 122 are unsigned 8-bit decimal integers. Calculate 185 122. Is there overflow, underflow, or neither?
What decimal number does the bit pattern 00C000000 represent if it is a floating point number? Use the IEEE 754 standard.
Using the IEEE 754 floating point format, write down the bit pattern that would represent -1/4. Can you represent -1/4 exactly?
Calculate the sum of 2.6125 10 1 and 4.150390625 10 -1 by hand, assuming A and B are stored in the 16-bit half precision described in Exercise 3.27. Assume 1 guard, 1 round bit, and 1 sticky bit,...
Describe an algorithm for concatenating two singly linked lists L and M, into a single list L that contains all the nodes of L followed by all the nodes of M.
Give a recursive algorithmto compute the product of two positive integers, m and n, using only addition and subtraction.
Explain how to modify the recursive binary search algorithm so that it returns the index of the target in the sequence or 1 (if the target is not found).
Given an unsorted array, A, of integers and an integer k, describe a recursive algorithm for rearranging the elements in A so that all elements less than or equal to k come before any elements larger...
Al says he can prove that all sheep in a flock are the same color: Base case: One sheep. It is clearly the same color as itself. Induction step: A flock of n sheep. Take a sheep, a, out. The...
Chip multiprocessors (CMPs) have multiple cores and their caches on a single chip. CMP on-chip L2 cache design has interesting trade-off s. Th e following table shows the miss rates and hit latencies...
Describe how to perform a removal from a hash table that uses linear probing to resolve collisions where we do not use a special marker to represent deleted elements. That is, we must rearrange the...
Draw a binary tree T that simultaneously satisfies the following: Each internal node of T stores a single character. A preorder traversal of T yields EXAMFUN. An inorder traversal of T yields...
Suppose you have three nonempty stacks R, S, and T. Describe a sequence of operations that results in S storing all elements originally in T below all of Ss original elements, with both sets of those...
In the art gallery guarding problem we are given a line L that represents a long hallway in an art gallery. We are also given a set X = {x 0 ,x 1 , . . . ,x n1 } of real numbers that specify the...
Match the following to one or more layers of the TCP/IP protocol suite: a. Creating user datagrams b. Responsibility for handling frames between adjacent nodes c. Transforming bits to electromagnetic...
Assume we have created a packet-switched internet. Using the TCP/IP protocol suite, we need to transfer a huge file. What are the advantage and disadvantage of sending large packets?
A host communicates with another host using the TCP/IP protocol suite. What is the unit of data sent or received at each of the following layers? a. Application layer b. Network layer c. Data-link...
In Figure 2.10, when the IP protocol decapsulates the transport-layer packet, how does it know to which upper layer protocol (UDP or TCP) the packet should be delivered? Figure 2.10 HTTP DNS SNMP ...
A router connects three links (networks). How many of each of the following layers can the router be involved with? a. Physical layer b. Data-link layer c. Network layer
Which layers of the TCP/IP protocol suite are involved in a link-layer switch?
How does sky propagation differ from line-of-sight propagation?
Transmission of information in any network involves end-to-end addressing and sometimes local addressing (such as VCI). Table 8.2 shows the types of networks and the addressing mechanism used in each...
Define DSSS and explain how it achieves bandwidth spreading.
Define FHSS and explain how it achieves bandwidth spreading.
Answer the following questions about a T-1 line: a. What is the duration of a frame? b. What is the overhead (number of extra bits per second)?
Distinguish between multilevel TDM, multiple-slot TDM, and pulse-stuffed TDM.
Define carrier signal and explain its role in analog transmission.
We want to transmit 1000 characters with each character encoded as 8 bits. a. Find the number of transmitted bits for synchronous transmission. b. Find the number of transmitted bits for asynchronous...
Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the graphs, guess the bandwidth for this scheme using the...
A periodic composite signal contains frequencies from 10 to 30 KHz, each with an amplitude of 10 V. Draw the frequency spectrum.
Explain why we may need a router in Figure 9.16. Bob Alice R Alice's site Bob's site
Unstuff the following frame payload: 00011111000001111101110100111011111000001111
To formulate the performance of a multiple-access network, we need a mathematical model. When the number of stations in a network is very large, the Poisson distribution, p[x] = (e x )/(x!), is...
One of the useful parameters in a LAN is the number of bits that can fit in one meter of the medium (n b/m ). Find the value of n b/m if the data rate is 100 Mbps and the medium propagation speed is...
There are only two stations, A and B, in a bus 1-persistence CSMA/CD network with T p = 25.6 μs and T fr = 51.2 μs. Station A has a frame to send to station B. The frame...
Alice and Bob are experimenting with CSMA using a W 2 Walsh table (see Figure 12.29). Alice uses the code [+1, +1] and Bob uses the code [+1, 1]. Assume that they simultaneously send a hexadecimal...
In Figure 10.22, assume we have 100 packets. We have created two sets of packets with high and low resolutions. Each high-resolution packet carries on average 700 bits. Each low-resolution packet...
Assume we want to send a dataword of two bits using FEC based on the Hamming distance. Show how the following list of datawords/codewords can automatically correct up to a one-bit error in...
An ISBN-13 code, a new version of ISBN-10, is another example of a weighted checksum with 13 digits, in which there are 12 decimal digits defining the book and the last digit is the checksum digit....
Which of the following CRC generators guarantee the detection of a single bit error? a. x 3 + x + 1 b. x 4 + x 2 c. 1 d. x 2 + 1
Assuming even parity, find the parity bit for each of the following data units. a. 1001011 b. 0001100 c. 1000000 d. 1110111
Compare the procedure described in Section 9.3 for estimating average delay with the procedure in Section 3.5 for estimating round-trip time. What do the procedures have in common? I-low are they...
Multimedia applications can be classified into three categories. Name and describe each category.
Define the following terms in the context of SNMP: managing server, managed device, network management agent and MIB.
In Fig. 4-48, the switch in the legacy end domain on the right is a VLAN-aware switch. Would it be possible to use a legacy switch there? If so, how would that work? If not, why not? Figure 4-48...
Consider the network of Fig. 5-15(a). Imagine that one new line is added, between F and G, but the sink tree of Fig. 5-15(b) remains unchanged. What changes occur to Fig. 5-15(c) Figure 5-15 A A D (...
What are two reasons for using layered protocols? What is one possible disadvantage of using layered protocols?
In the Internet File Server example (Figure 6-6), can the connect( ) system call on the client fail for any reason other than listen queue being full on the server? Assume that the network is...
Which of the following data units is encapsulated in a frame? a. A user datagram b. A datagram c. A segment
The horizontal axes in Figures 7.6 and 7.9 represent frequencies. The horizontal axis in Figure 7.16 represents wavelength. Can you explain the reason? If the propagation speed in an optical fiber is...
We have sampled a low-pass signal with a bandwidth of 200 KHz using 1024 levels of quantization. a. Calculate the bit rate of the digitized signal. b. Calculate the SNRdB for this signal. c....
Check to see if the following set of chips can belong to an orthogonal system. [+1, +1, +1, +1] , [+1,1,1, +1], [1, +1, +1, 1] , [+1, 1, 1, +1]
How does the Ethernet address 1A:2B:3C:4D:5E:6F appear on the line in binary?
If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the address (unicast, multicast, or broadcast)?
Assume a packet is made only of four 16-bit words (A7A2) 16 , (CABF) 16 , (903A) 16 , and (A123) 16 . Manually simulate the algorithm in Figure 10.17 to find the checksum. Figure 10.17 Figure 10.17...
What type of topology is used when customers in an area use DSL modems for data transfer purposes? Explain.
Explain why the MAC protocol is more important in wireless LANs than in wired LANs.
A program to simulate the calculation of Fletcher checksum.
In an 802.11, give the value of the address 4 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
Assume that a frame moves from a wired network using the 802.3 protocol to a wireless network using the 802.11 protocol. Show how the field values in the 802.11 frame are filled with the values of...
Both the IP protocol and the 802.11 project fragment their packets. IP fragments a datagram at the network layer; 802.11 fragments a frame at the datalink layer. Compare and contrast the two...
Although an RTS frame defines the value of time that NAV can be effective for the rest of the session, why does the 802.11 project define that other frames used in the session should redefine the...
What is the maximum number of simultaneous calls in each cell in an IS-136 (D-AMPS) system, assuming no analog control channels?
Find the spanning tree and the logical connection between the switches in Figure 17.14. Figure 17.14 Problem P17-7. Si LAN 1 LAN 2 LAN 3 S3
List the three phases in the virtual-circuit approach to switching.
A large organization with a large block address (12.44.184.0/21) is split into one medium-size company using the block address (12.44.184.0/22) and two small organizations. If the first small company...
An IP fragment has arrived with an offset value of 100. How many bytes of data were originally sent by the source before the data in this fragment?
Which fields of the IPv4 main header may change from router to router?
Create a home agent advertisement message using 1456 as the sequence number and a lifetime of 3 hours. Select your own values for the bits in the code field. Calculate and insert the value for the...
We say that OSPF is a hierarchical intradomain protocol, but RIP is not. What is the reason behind this statement?
Create the shortest path tree and the forwarding table for node G in Figure 20.8. Figure 20.8 Example of a link-state database A B C DE F G A 0|2 00 B| 20|5 00 C00 D 3 0 3 00 4 00 B 4 3. 0 | 00 5 3...
Create the forwarding table for node A in Figure 20.10. Figure 20.10 Least-cost tree Initialization Legend Root node A B Node in the path Node not yet in the path E F Potential path Path Iteration 1...
When does an OSPF router send each of the following messages? a. Hello b. Data description c. Link-state request d. Link-state update e. Link-state acknowledgment
Why is there no need for the IGMP message to travel outside its own network?
Show abbreviations for the following addresses: a. 0000 : FFFF : FFFF : 0000 : 0000 : 0000 : 0000 : 0000 b. 1234 : 2346 : 3456 : 0000 : 0000 : 0000 : 0000 : FFFF c. 0000 : 0001 : 0000 : 0000 : 0000 :...
The following is a dump (contents) of a UDP header in hexadecimal format. 0045DF0000580000 a. What is the source port number? b. What is the destination port number? c. What is the total length of...
Assume a TCP server is expecting to receive byte 2401. It receives a segment with the sequence number 2401 that carries 500 bytes. If the server has no data to send at this moment and has not...
Write a method in Java to find the range of addresses when the beginning and the ending addresses are given.
Write a method in Java to find the size of a block when one address in the block (in CIDR notation) is given.
Write a method in Java to extract the IP address (without the prefix) as a string in dotted-decimal notation from a string representing the CIDR notation (x.y.z.t/n).
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed....
According to RFC 1939, a POP3 session is in one of the following four states: closed, authorization, transaction, or update. Draw a diagram to show these four states and how POP3 moves between them.
Write concurrent TCP client-server programs to simulate a simplified version of POP. The client sends a request to receive an e-mail in its mailbox; the server responds with the e-mail.
HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation to nonpersistent.
In HTTP, draw a figure to show the application of cookies in a scenario in which the server uses cookies for advertisement. Use only three sites.
You want to create all InetAddress objects associated with the computer you are working with. Write statements in Java in order to do so.
Using the tables in Figure Q3.13, create the table that results from MACHINE DIFFERENCE BOOTH. Figure Q3.13: Database name: Ch03_VendingCo Table name: MACHINE MACHINE_PRODUCT MACHINE_PRICE Table...
Based on the following query: SELECT P_CODE, SUM(LINE_UNITS) FROM LINE GROUP BY P_CODE HAVING SUM(LINE_UNITS) > (SELECT MAX(LINE_UNITS) FROM LINE); What is the likely data sparsity of the LINE_UNITS...
In a construction company, a new system has been in place for a few months and now there is a list of possible changes/updates that need to be done. For each of the changes/updates, specify what type...
Bsed on the following query: SELECT EMP_LNAME, EMP_FNAME, EMP_AREACODE, EMP_SEX FROM EMPLOYEE WHERE EMP_SEX = F AND EMP_AREACODE = 615 ORDER BY EMP_LNAME, EMP_FNAME; What is the likely data sparsity...
If management needed to determine which book category generated the most sales in April 2009, which tables and fields would they consult to derive this information? Figure 1-5: ORDERS Order#...
List the customer number for each customer in the CUSTOMERS table, along with the city and state in which the customer lives.
Create a list containing the publishers name, the person usually contacted, and the publishers telephone number. Rename the contact column Contact Person in the displayed results.
Determine which categories are represented in the current book inventory. List each category only once.