Sei sulla pagina 1di 4

What is the difference between a host and an end system? List the types of end systems.

Is a web server an end system?: Hosts and end systems are the same thing - Connected Computing Devices. End systems include pc's, servers, wireless saptops, cellphones. They run application programs.And Yes. What is the transmission rate of Ethernet LANs? For a given transmission rate, can each user on the LAN continuously transmit at that rate?: 100Mbps, 1Gbps, 10Gbps, No, that is all the speed we have, must share it. What advantage does a circuit switched network have over a packet switched network? What advantages does TDM have over FDM in a circuit switched network?: Circuit switching has the advantage of having a dedicated circuit without sharing (guaranteed performance). Packet-Switching uses TDM or FMD. TDM has the advantage of being capable to use all the bandwith (multiplexing). Why is it said that packet switching employs statistical multiplexing? Contrast statistical multiplexing with the multiplexing that takes place in TDM.: TDM or time-division multiplexing is divided into frames of fixed duration. FDM divides the frequencies depending on the amount of users. Statistical is when packets don't have a fixd pattern. Bandwith shared on demand (fdm) Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and receiving host are R1 and R2, respectively. Assuming that the switch uses store and forward packet switching, what is the total end to end delay to send a packet length of L? Ignore queuing, propagation delay, and processing delay.: L/R1 + L/R2 Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end to end delay.

Which of these delays are constant and which are variable?: .Variable delays from end - end: processing delay, Queuing delay Constant Delays: Propagation delay (medium, length), Transmission delay Suppose host A wants to send a large file to Host B. The path from Host A to Host B has 3 links, of rates R1 = 500kbps, R2 = 2mbps, and R3 = 1mbps.-Assuming no other traffic in the network, what is the throughput for the file transfer?-Suppose the file is 4 million bytes. Dividing the file size by the through put, roughly how long will it take to transfer the file to Host B-Repeat a and b but now with R2 reduced to 100kbps.: .500Kbps bottleneck. L = 4 x 10 ^ 8 / R = 500 x 10 ^ 3 = 320 / 5 = 64 seconds Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file. When one of these packets arrives to a packet switch, what info in the packet does the switch use to determine the link onto which the packet is forwarded? Why is packet switching in the internet analogous to driving from one city to another and asking for directions along the way?: .Slice it up, Depends on the layer in which the server is working on, We determine where to send the package next determining on the server. List 5 tasks that a layer can perform. Is it possible that one or more of these tasks could be performed by two or more layers?: Error Control: Segmentation: Re-assembly:Multi-Plexing: FlowControl: What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of these layers?: 1. Application: Contains many protocols such as HTTP, SMPT, and FTP. This layer can create an application-layer protocol. (refer to this packet info as a message at this layer)2.

Transport: Transports application layer messages between app endpoints. TCP and UDP. Segment is a transport layer packet. 3. Network: Responsible for moving network layer packets known as datagrams from one host to another. It provides the service of delivery. Contains Ip protocol.4. Link: Relied on by the network layer to move packets from one node to the next. Link layer packets are called frames.5. Physical: Moves individual bits within the from from one node to the next. Varies from the medium. Describe how a botnet can be created, and how it can be used for a DDoS attack.: . .: 1.Browser - HTTP, FireFTP - FTP, Thunderbird - SMPT, IMAP, POP3 .: You Vs the Infastructure .: Server is on and listening .: There is still a tracker..after Its still putting client and server together. .: Ip and Port = Socket ( + protocol) .: UDP you don't have the wrapper over head. (tcp does handshake stuff and extra bytes) .: TCP has reliable speed. .: App layer: developer. .: Some based on popularity. Local*. .: Download delete deletes the email off the server when u download it. Download and keep leaves the message on the server to access form different end points. .: Download delete deletes the email off the server when u download it. Download and keep leaves the message on the server to access form different end points. .: Video transfer and Audio transfer .: File distribution, Instant messaging, gaming, New Review: false 14: false 14: true 14: false 14: true 14: false 14: false 15: a: 20 bytesB: 90

16: 17: 18: 13:

look TCP is fair. R/2 False, 1/2 congestion window a:seldom data - Nack if fewer erros, uses sequence numbers. Hard to recover from lost packet.B: Frequent data- nacks would be good with some losses. Ack good with alot of data loss 19: write down 21: Twice the number space than the maximum window size 22.: a: trueb: truec: trued: true 23: A: More control w/ udp with application ("here it is send" no complications) 25: write

Potrebbero piacerti anche