Al says he can prove that all sheep in a flock are the same color: Base case: One sheep. It is clearly the same color as itself. Induction step: A flock of n sheep. Take a sheep, a, out. The...
Describe how to perform a removal from a hash table that uses linear probing to resolve collisions where we do not use a special marker to represent deleted elements. That is, we must rearrange the...
Draw a binary tree T that simultaneously satisfies the following: Each internal node of T stores a single character. A preorder traversal of T yields EXAMFUN. An inorder traversal of T yields...
Suppose you have three nonempty stacks R, S, and T. Describe a sequence of operations that results in S storing all elements originally in T below all of Ss original elements, with both sets of those...
In the art gallery guarding problem we are given a line L that represents a long hallway in an art gallery. We are also given a set X = {x 0 ,x 1 , . . . ,x n1 } of real numbers that specify the...
Match the following to one or more layers of the TCP/IP protocol suite: a. Creating user datagrams b. Responsibility for handling frames between adjacent nodes c. Transforming bits to electromagnetic...
In Figure 2.10, when the IP protocol decapsulates the transport-layer packet, how does it know to which upper layer protocol (UDP or TCP) the packet should be delivered? Figure 2.10 HTTP DNS SNMP ...
Assume we have created a packet-switched internet. Using the TCP/IP protocol suite, we need to transfer a huge file. What are the advantage and disadvantage of sending large packets?
A host communicates with another host using the TCP/IP protocol suite. What is the unit of data sent or received at each of the following layers? a. Application layer b. Network layer c. Data-link...
A router connects three links (networks). How many of each of the following layers can the router be involved with? a. Physical layer b. Data-link layer c. Network layer
Which layers of the TCP/IP protocol suite are involved in a link-layer switch?
Transmission of information in any network involves end-to-end addressing and sometimes local addressing (such as VCI). Table 8.2 shows the types of networks and the addressing mechanism used in each...
How does sky propagation differ from line-of-sight propagation?
Define DSSS and explain how it achieves bandwidth spreading.
Define FHSS and explain how it achieves bandwidth spreading.
Answer the following questions about a T-1 line: a. What is the duration of a frame? b. What is the overhead (number of extra bits per second)?
Distinguish between multilevel TDM, multiple-slot TDM, and pulse-stuffed TDM.
Define carrier signal and explain its role in analog transmission.
We want to transmit 1000 characters with each character encoded as 8 bits. a. Find the number of transmitted bits for synchronous transmission. b. Find the number of transmitted bits for asynchronous...
Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the graphs, guess the bandwidth for this scheme using the...
A periodic composite signal contains frequencies from 10 to 30 KHz, each with an amplitude of 10 V. Draw the frequency spectrum.
Explain why we may need a router in Figure 9.16. Bob Alice R Alice's site Bob's site
Unstuff the following frame payload: 00011111000001111101110100111011111000001111
To formulate the performance of a multiple-access network, we need a mathematical model. When the number of stations in a network is very large, the Poisson distribution, p[x] = (e x )/(x!), is...
One of the useful parameters in a LAN is the number of bits that can fit in one meter of the medium (n b/m ). Find the value of n b/m if the data rate is 100 Mbps and the medium propagation speed is...
Assume we want to send a dataword of two bits using FEC based on the Hamming distance. Show how the following list of datawords/codewords can automatically correct up to a one-bit error in...
There are only two stations, A and B, in a bus 1-persistence CSMA/CD network with T p = 25.6 μs and T fr = 51.2 μs. Station A has a frame to send to station B. The frame...
Alice and Bob are experimenting with CSMA using a W 2 Walsh table (see Figure 12.29). Alice uses the code [+1, +1] and Bob uses the code [+1, 1]. Assume that they simultaneously send a hexadecimal...
In Figure 10.22, assume we have 100 packets. We have created two sets of packets with high and low resolutions. Each high-resolution packet carries on average 700 bits. Each low-resolution packet...
Which of the following CRC generators guarantee the detection of a single bit error? a. x 3 + x + 1 b. x 4 + x 2 c. 1 d. x 2 + 1
An ISBN-13 code, a new version of ISBN-10, is another example of a weighted checksum with 13 digits, in which there are 12 decimal digits defining the book and the last digit is the checksum digit....
Assuming even parity, find the parity bit for each of the following data units. a. 1001011 b. 0001100 c. 1000000 d. 1110111
Compare the procedure described in Section 9.3 for estimating average delay with the procedure in Section 3.5 for estimating round-trip time. What do the procedures have in common? I-low are they...
Multimedia applications can be classified into three categories. Name and describe each category.
Define the following terms in the context of SNMP: managing server, managed device, network management agent and MIB.
In Fig. 4-48, the switch in the legacy end domain on the right is a VLAN-aware switch. Would it be possible to use a legacy switch there? If so, how would that work? If not, why not? Figure 4-48...
Consider the network of Fig. 5-15(a). Imagine that one new line is added, between F and G, but the sink tree of Fig. 5-15(b) remains unchanged. What changes occur to Fig. 5-15(c) Figure 5-15 A A D (...
What are two reasons for using layered protocols? What is one possible disadvantage of using layered protocols?
Which of the following data units is encapsulated in a frame? a. A user datagram b. A datagram c. A segment
We have sampled a low-pass signal with a bandwidth of 200 KHz using 1024 levels of quantization. a. Calculate the bit rate of the digitized signal. b. Calculate the SNRdB for this signal. c....
The horizontal axes in Figures 7.6 and 7.9 represent frequencies. The horizontal axis in Figure 7.16 represents wavelength. Can you explain the reason? If the propagation speed in an optical fiber is...
Assume a packet is made only of four 16-bit words (A7A2) 16 , (CABF) 16 , (903A) 16 , and (A123) 16 . Manually simulate the algorithm in Figure 10.17 to find the checksum. Figure 10.17 Figure 10.17...
Check to see if the following set of chips can belong to an orthogonal system. [+1, +1, +1, +1] , [+1,1,1, +1], [1, +1, +1, 1] , [+1, 1, 1, +1]
How does the Ethernet address 1A:2B:3C:4D:5E:6F appear on the line in binary?
If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the address (unicast, multicast, or broadcast)?
What type of topology is used when customers in an area use DSL modems for data transfer purposes? Explain.
Explain why the MAC protocol is more important in wireless LANs than in wired LANs.
A program to simulate the calculation of Fletcher checksum.
In an 802.11, give the value of the address 4 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
Assume that a frame moves from a wired network using the 802.3 protocol to a wireless network using the 802.11 protocol. Show how the field values in the 802.11 frame are filled with the values of...
Both the IP protocol and the 802.11 project fragment their packets. IP fragments a datagram at the network layer; 802.11 fragments a frame at the datalink layer. Compare and contrast the two...
Although an RTS frame defines the value of time that NAV can be effective for the rest of the session, why does the 802.11 project define that other frames used in the session should redefine the...
What is the maximum number of simultaneous calls in each cell in an IS-136 (D-AMPS) system, assuming no analog control channels?
Find the spanning tree and the logical connection between the switches in Figure 17.14. Figure 17.14 Problem P17-7. Si LAN 1 LAN 2 LAN 3 S3
List the three phases in the virtual-circuit approach to switching.
A large organization with a large block address (12.44.184.0/21) is split into one medium-size company using the block address (12.44.184.0/22) and two small organizations. If the first small company...
An IP fragment has arrived with an offset value of 100. How many bytes of data were originally sent by the source before the data in this fragment?
Which fields of the IPv4 main header may change from router to router?
Create a home agent advertisement message using 1456 as the sequence number and a lifetime of 3 hours. Select your own values for the bits in the code field. Calculate and insert the value for the...
Create the shortest path tree and the forwarding table for node G in Figure 20.8. Figure 20.8 Example of a link-state database A B C DE F G A 0|2 00 B| 20|5 00 C00 D 3 0 3 00 4 00 B 4 3. 0 | 00 5 3...
We say that OSPF is a hierarchical intradomain protocol, but RIP is not. What is the reason behind this statement?
Create the forwarding table for node A in Figure 20.10. Figure 20.10 Least-cost tree Initialization Legend Root node A B Node in the path Node not yet in the path E F Potential path Path Iteration 1...
When does an OSPF router send each of the following messages? a. Hello b. Data description c. Link-state request d. Link-state update e. Link-state acknowledgment
Why is there no need for the IGMP message to travel outside its own network?
Show abbreviations for the following addresses: a. 0000 : FFFF : FFFF : 0000 : 0000 : 0000 : 0000 : 0000 b. 1234 : 2346 : 3456 : 0000 : 0000 : 0000 : 0000 : FFFF c. 0000 : 0001 : 0000 : 0000 : 0000 :...
Answer the following questions related to the FSMs for the Selective-Repeat protocol with m = 7 bits. Assume the window size is 64. (Figure 23.34): a. The sending machine is in the ready state with S...
The following is a dump (contents) of a UDP header in hexadecimal format. 0045DF0000580000 a. What is the source port number? b. What is the destination port number? c. What is the total length of...
Assume a TCP server is expecting to receive byte 2401. It receives a segment with the sequence number 2401 that carries 500 bytes. If the server has no data to send at this moment and has not...
Write a method in Java to find the range of addresses when the beginning and the ending addresses are given.
Write a method in Java to find the size of a block when one address in the block (in CIDR notation) is given.
Write a method in Java to extract the IP address (without the prefix) as a string in dotted-decimal notation from a string representing the CIDR notation (x.y.z.t/n).
Modify, compile, and test the client program in Table 25.17 and the server program in Table 25.16 to simulate a local DNS client and server. The server has a short table made of two columns, domain...
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed....
According to RFC 1939, a POP3 session is in one of the following four states: closed, authorization, transaction, or update. Draw a diagram to show these four states and how POP3 moves between them.
Write concurrent TCP client-server programs to simulate a simplified version of POP. The client sends a request to receive an e-mail in its mailbox; the server responds with the e-mail.
HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation to nonpersistent.
In HTTP, draw a figure to show the application of cookies in a scenario in which the server uses cookies for advertisement. Use only three sites.
You want to create all InetAddress objects associated with the computer you are working with. Write statements in Java in order to do so.
In a construction company, a new system has been in place for a few months and now there is a list of possible changes/updates that need to be done. For each of the changes/updates, specify what type...
Based on the following query: SELECT P_CODE, SUM(LINE_UNITS) FROM LINE GROUP BY P_CODE HAVING SUM(LINE_UNITS) > (SELECT MAX(LINE_UNITS) FROM LINE); What is the likely data sparsity of the LINE_UNITS...
Bsed on the following query: SELECT EMP_LNAME, EMP_FNAME, EMP_AREACODE, EMP_SEX FROM EMPLOYEE WHERE EMP_SEX = F AND EMP_AREACODE = 615 ORDER BY EMP_LNAME, EMP_FNAME; What is the likely data sparsity...
If management needed to determine which book category generated the most sales in April 2009, which tables and fields would they consult to derive this information? Figure 1-5: ORDERS Order#...
The normalization process was shown for just the BOOKS table. The other tables in the Just Lee Books database are shown after normalization. Because the database needs to contain data for each...
List the customer number for each customer in the CUSTOMERS table, along with the city and state in which the customer lives.
Create a list containing the publishers name, the person usually contacted, and the publishers telephone number. Rename the contact column Contact Person in the displayed results.
Determine which categories are represented in the current book inventory. List each category only once.
List the customer number from the ORDERS table for each customer who has placed an order with the bookstore. List each customer number only once.
Create a list of each book title stored in the BOOKS table and the category in which each book belongs. Reverse the sequence of the columns so that the category of each book is listed first.
Create a new table containing the category code and description for the categories of books sold by JustLee Books. The table should be called CATEGORY, and the columns should be CatCode and CatDesc....
Create a new table containing these four columns: Emp#, Lastname, Firstname, and Job_class. The table name should be EMPLOYEES. The Job_class column should be able to store character strings up to a...
In the following exercises, you will use the data in the TAL Distributors database shown in Figure 2-1. (If you use a computer to complete these exercises, use a copy of the TAL Distributors database...
Which of the following is used to grant all object privileges for an object to a specified user? a. ALL b. PUBLIC c. ANY d. OBJECT
Which of the following is an object privilege? a. DELETE ANY b. INSERT ANY c. UPDATE ANY d. REFERENCES
Revoke the privilege to delete rows in the ORDERS and ORDERITEMS tables from the CUSTOMERREP role.
Remove the CUSTOMERREP role from the account created in Assignment 1.
What is meant by a local site? by a remote site?
Use a search pattern to find any book title with A for the second letter and N for the fourth letter. List each books ISBN and title. Sort the list by title in descending order.
List the title and publish date of any computer book published in 2005. Perform the task of searching for the publish date by using three different methods: a) A range operator, b) A logical...
Explain the difference between an inner join and an outer join.
Which of the following operators is not allowed in an outer join? a. AND b. = c. OR d. >