Suppose we represent a graph G having n vertices and m edges with the edge list structure. Why, in this case, does the insertVertex method run in O(1) time while the removeVertex method runs in O(m)...
Suppose S is a sequence of n values, each equal to 0 or 1. How long will it take to sort S with the merge-sort algorithm? What about quick-sort?
If the outermost while loop of our implementation of quickSortInPlace (line 9 of Code Fragment 12.6) were changed to use condition left < right, instead of condition left /** Sort the subarray S[a.b]...
Can we use a splay tree to sort n comparable elements in O(nlogn) time in the worst case? Why or why not?
In the ring topology in Figure 1.7, what happens if one of the stations is unplugged? Figure 1.7 Repeater Repeater Repeater |Repeater Repeater Repeater
We need to have a space-division switch with 1000 inputs and outputs. What is the total number of crosspoints in each of the following cases? a. Using a single crossbar. b. Using a multi-stage switch...
Figure 8.27 shows a switch (router) in a datagram network. Find the output port for packets with the following destination addresses: a. Packet 1: 7176 b. Packet 2: 1233 Output Destination address...
Define spread spectrum and its goal. List the two spread spectrum techniques discussed in this chapter.
Which of the three multiplexing techniques is common for fiber-optic links? Explain the reason.
In the analog hierarchy of Figure 6.9, find the overhead (extra bandwidth for guard band or control) in each hierarchy level (group, supergroup, master group, and jumbo group). Figure 6.9 48 kHz 12...
Find the total number of channels in the corresponding band allocated by FCC. a. AM b. FM
How many bits per baud can we send in each of the following cases if the signal constellation has one of the following number of points? a. 2 b. 4 c. 16 d. 1024
Draw the constellation diagram for the following cases. Find the peak amplitude value for each case and define the type of modulation (ASK, FSK, PSK, or QAM).The numbers in parentheses define the...
What is the number of bits per baud for the following techniques? a. ASK with four different amplitudes b. FSK with eight different frequencies c. PSK with four different phases d. QAM with a...
Calculate the bit rate for the given baud rate and type of modulation. a. 1000 baud, FSK b. 1000 baud, ASK c. 1000 baud, BPSK d. 1000 baud, 16-QAM
What is the total delay (latency) for a frame of size 5 million bits that is being sent on a link with 10 routers each having a queuing time of 2 s and a processing time of 1 s. The length of the...
Repeat Problem P4-3 for the 2B1Q scheme, but use the following data streams. a. 0000000000000000 b. 1111111111111111 c. 0101010101010101 d. 0011001100110011 Problem 4-3 Draw the graph of the NRZ-L...
A signal with 200 milliwatts power passes through 10 devices, each with an average noise of 2 microwatts. What is the SNR? What is the SNRdB?
A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps channel? 1-Mbps channel?
We measure the performance of a telephone line (4 KHz of bandwidth). When the signal is 10 V, the noise is 5 mV. What is the maximum data rate supported by this telephone line?
A signal has passed through three cascaded amplifiers, each with a 4 dB gain. What is the total gain? How much is the signal amplified?
A TV channel has a bandwidth of 6 MHz. If we send a digital signal using one channel, what are the data rates if we use one harmonic, three harmonics, and five harmonics?
What does the Nyquist theorem have to do with communications?
A periodic composite signal with a bandwidth of 2000 Hz is composed of two sine waves. The first one has a frequency of 100 Hz with a maximum amplitude of 20 V; the second one has a maximum amplitude...
What is the bandwidth of a signal that can be decomposed into five sine waves with frequencies at 0, 20, 50, 100, and 200 Hz? All peak amplitudes are the same. Draw the bandwidth.
Given the following periods, calculate the corresponding frequencies. a. 5 s b. 12 s c. 220 ns
In the previous problem, assume Alice cannot find a direct flight from the Los Angeles to the Chicago. If she needs to change flights in Denver, a. Find the end-to-end addresses in this scenario. b....
Figure 9.7 shows a system as either a host or a router. What would be the actual entity (host or router) of system A and B in each of the following cases: Figure 9.7 a. If the link is the first one...
Bit-stuff the following frame payload: 00011111110011111010001111 111110000111
In the traditional Ethernet protocol (Chapter 13), the frames are sent with the CRC. If the frame is corrupted, the receiving node just discards it. Is this an example of a Simple Protocol or the...
Define piggybacking and its benefit.
Compare and contrast HDLC with PPP.
In Example 11.4 (Figure 11.13) how many frames are in transit at the same time? Figure 11.13 Sending node Receiving node Network Network Data-link Data-link Legend Packet Frame 0 Start the timer....
In the previous problem, we found that the probability of a station (in a G-station network) successfully sending a frame in a vulnerable time is P = e 2G for a pure Aloha and P = e G for a slotted...
Stations in an slotted Aloha network send frames of size 1000 bits at the rate of 1 Mbps. What is the vulnerable time for this network?
In a pure Aloha network with G = 1/2, how is the throughput affected in each of the following cases? a. G is increased to 1. b. G is decreased to 1/4.
There are only three active stations in a slotted Aloha network: A, B, and C. Each station generates a frame in a time slot with the corresponding probabilities p A = 0.2, p B = 0.3, and p C = 0.4...
Assume that there are only two stations, A and B, in a bus CSMA/CD network. The distance between the two stations is 2000 m and the propagation speed is 2 10 8 m/s. If station A starts transmitting...
Referring to the CRC-8 polynomial in Table 10.7, answer the following questions: a. Does it detect a single error? Defend your answer. b. Does it detect a burst error of size 6? Defend your answer....
Show how the Fletcher algorithm (Figure 10.18) attaches weights to the data items when calculating the checksum. Figure 10.18 Notes Start L: Left 8-bit checksum R: Right 8-bit checksum R=L= 0 D;:...
In CRC, we have chosen the generator 1100101. What is the probability of detecting a burst error of length a. 5? b. 7? c. 10?
Referring to the CRC-8 in Table 5.4, answer the following questions: a. Does it detect a single error? Defend your answer. b. Does it detect a burst error of size 6? Defend your answer. c. What is...
In CRC, which of the following generators (divisors) guarantees the detection of a single bit error? a. 101 b. 100 c. 1
A category of error detecting (and correcting) code, called the Hamming code, is a code in which d min = 3. This code can detect up to two errors (or correct one single error). In this code, the...
If we want to be able to detect two-bit errors, what should be the minimum Hamming distance?
In a codeword, we add two redundant bits to each 8-bit data word. Find the number of a. valid codewords. b. invalid codewords
In a block code, a dataword is 20 bits and the corresponding codeword is 25 bits. What are the values of k, r, and n according to the definitions in the text? How many redundant bits are added to...
What is the definition of a linear block code?
How does a single-bit error differ from a burst error?
The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
(a) Suppose N packets arrive simultaneously to a link at which no packets are currently being transmitted or queued. Each packet is of length L and the link has transmission rate R. What is the...
Consider an overlay network with N active peers, with each pair of peers haying an active TCP connection. Additionally, suppose that the TCP connection. pass through a total of M routers. How many...
Consider Figure 1.19(b). Now suppose that there are M paths between the server and the client. Nu two paths share any link. Path k (k = 1,...,M) consists of N links with transmission rates R k 1 , R...
Consider a DASH system for which there are W video versions (at N different rates and qualities) and N audio versions (at N different rates and qualities). Suppose we want to allow the player to...
How big is the MAC address space? The IPv4 address space? Tue IP6 address space?
Consider the procedure described in Section 9.3 for estimating average delay d i . Suppose that u = 0.1. Let r 1 t 1 be the most recent sample delay, let r 2 t 2 be the next most recent sample...
Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and R2. As part of a reply attack, Trudy sends a...
In Section 8.6. 1, it is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCP segments. Can Trudy do something similar by...
Names four different types of ICMP messages
True or false: When a BGP router receives an advertised path from its neigh bor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
What is the count to infinity problem in distance vector routing?
Compare and contrast the properties of a centralized and a distributed routing algorithm. Give an example of a routing protocol that takes a centralized and a decentralized approach.
What is ment by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented monolithically, what do we mean?
We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding?
In the discussion of TCP splitting in the sidebar in Section 3.7, it was claimed that the response time with TCP splitting is approximately 4 RTT FE RTT BE + processing time, Justify this claim.
Suppose the three departmental switches in Figure 6. 15 are replaced by hubs. All links are 100 Mbps. Now answer the questions posed in problem P23. Figure 6.15 Data From Problem 23 Consider Figure...
Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other packets anywhere in the router. a. Suppose the two packets are to be...
What are the advantages of fiber optics over copper as a transmission medium? Is there any downside of using fiber optics over copper?
Consider two network entities. A and B. which are connected by a perfect hi-directional channel (i.e., any message sent will he received correctly: the channel will not corrupt, lose, or re-order...
A 100-byte IP packet is transmitted over a local loop using ADSL protocol stack. How many ATM cells will be transmitted? Briefly describe their contents.
What is the length of a contention slot in CSMA/CD for (a) A 2-km twin-lead cable (signal propagation speed is 82% of the signal propagation speed in vacuum)?, (b) A 40-km multi mode fiber optic...
Six stations, A through F, communicate using the MACA protocol. Is it possible for two transmissions to take place simultaneously? Explain your answer.
Suppose that A, B, and C are simultaneously transmitting 0 bits, using a CDMA system with the chip sequences of Fig. 2-28(a). What is the resulting chip sequence? Figure 2-28(a) A = (-1-1 -1 +1 +1-1...
A CDMA receiver gets the following chips: (1 +1 3 +1 1 3 +1 +1). Assuming the chip sequences defined in Fig. 2-28(a), which stations transmitted, and which bits did each one send? Figure 2-28(a) A =...
Give an example to show that the RTS/CTS in the 802.11 protocol is a little different than in the MACA protocol.
Describe two major differences between the ECN method and the RED method of congestion avoidance.
Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) executes LISTEN while the other end (client) executes CONNECT. However,...
One criteria for deciding whether to have a server active all the time or have it start on demand using a process server is how frequently the service provided is used. Can you think of any other...
Write an HTML page that includes a link to the email address username@DomainName. com. What happens when a user clicks this link?
John wants to have an original domain name and uses a randomized program to generate a secondary domain name for him. He wants to register this domain name in the com generic domain. The domain name...
Besides bandwidth and latency, what other parameter is needed to give a good characterization of the quality of service offered by a network used for (i) Digitized voice traffic? (ii) Video traffic?...
Alice is using the public-key authentication protocol of Fig. 8-43 to authenticate communication with Bob. However, when sending message 7, Alice forgot to encrypt R B . Trudy now knows the value of...
Explain the difference between an Internet draft and a proposed standard.
If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of 100,000 bits out of this device?
An analog signal has a bandwidth of 20 KHz. If we sample this signal and send it through a 30 Kbps channel, what is the SNRdB?
We need a three-stage time-space-time switch with N = 100. We use 10 TSIs at the first and third stages and 4 crossbars at the middle stage. a. Draw the configuration diagram. b. Calculate the total...
Repeat Problem 8-12 if we use 6 crossbars at the middle stage. Problem 8-12 We need a three-stage space-division switch with N = 100. We use 10 crossbars at the first and third stages and 4 crossbars...
Check to see if the following set of chips can belong to an orthogonal system. [+1, +1] and [+1, 1]
In the previous problem we tried to find the number of bits to be added to a dataword to correct a single-bit error. If we need to correct more than one bit, the number of redundant bits increases....
Using the following specifications, draw a finite state machine with three states (I, II, and III), five events, and six actions: a. If the machine is in state I, two events can occur. If event 1...
Using the following specifications, draw a finite state machine with three states (I, II, and III), six events, and four actions: a. If the machine is in state I, two events can occur. If event 1...
Show how STS-9s can be multiplexed to create an STS-36. Is there any extra overhead involved in this type of multiplexing?
What is the minimum number of cells resulting from an input packet in the AAL5 layer? What is the maximum number of cells resulting from an input packet?
A program to simulate the calculation of Adler checksum.
Write and test a program to simulate the flow diagram of CSMA/CA in Figure 12.15. Figure 12.15 Flow diagram of CSMA/CA Station has a frame to send K = 0 Legend K: Number of attempts T: Backoff time...
Which is better, a low reuse factor or a high reuse factor? Explain your answer.
What is the maximum number of simultaneous calls in each cell in a GSM, assuming no analog control channels?
What is the maximum number of callers in each cell in an IS-95 system?
What is the size of the address space in each of the following systems? a. A system in which each address is only 16 bits. b. A system in which each address is made of six hexadecimal digits. c. A...
Rewrite the following IP addresses using binary notation: a. 110.11.5.88 b. 12.74.16.18 c. 201.24.44.32