CP5610 tutorial 5 (from textbook chapter 7)
48. Consider the head-of-line priority system in Figure 7.42. Explain the impact on the delay and loss performance of the low-priority traffic under the following conditions: (a) The high-priority traffic consis
CP5610 tutorial 12 (from textbook chapter 11)
3. In authentication using secret key, consider the case where the transmitter is the intruder. (a) What happens if the transmitter initiates the challenge? (b) How secure is the system if the receiver changes
CP5610 tutorial 11 (from textbook chapter 10)
5. Suppose RSVP is used to set up a virtual private network to interconnect n users across an Internet. Discuss the appropriateness of the three RSVP reservation styles for this application.
7. What informatio
CP5610 tutorial 10 (from textbook chapter 10)
1. Can all traffic in an IntServ router be of guaranteed service type? Explain.
5. Suppose RSVP is used to set up a virtual private network to interconnect n users across an Internet. Discuss the appropriatene
CP5610 tutorial 9 (from textbook chapter 4,6)
6.42. Use IEEE 802.3 and IEEE 802.11 to discuss three differences between wired and wireless LANs.
6.44. Consider the distributed coordination function in IEEE 802.11. Suppose that all packet transmissions are
CP5610 tutorial 8 (from textbook chapter 8)
34. Consider the three-way handshake in TCP connection setup (a) Suppose that an old SYN segment from station A arrives at station B, requesting a TCP connection. Explain how the three-way handshake procedure en
CP5610 tutorial 7 (from textbook chapter 8)
1. The IP header checksum only verifies the integrity of IP header. Discuss the pros and cons of doing the checksum on the header part versus on the entire packet.
16. Discuss the difficulties with using actual
CP5610 tutorial 6 (from textbook chapter 7)
53. Suppose that in a packet-by-packet weighted fair-queueing system, a packet with finish tag F enters service at time t. Is it possible for a packet to arrive at the system after time t and have a finish tag l
CP5610 tutorial 4 (from textbook chapter 6)
6.3. Compare the two-channel approach (Figure 6.4) with the single-channel approach (Figure 6.5) in terms of the types of MAC protocols they can support.
6.8. Consider four stations that are all attached to two
CP5610 tutorial 3 (from textbook chapter 5)
5.12 In Stop-and-Wait ARQ why should the receiver always send an acknowledgment message each time it receives a frame with the wrong sequence number?
5.13 Discuss the factors that should be considered in decidin
CP5610 tutorial 2 (from textbook chapter 3)
3.56 Suppose a transmission channel operates at 3 Mbps and that it has a bit error rate of 10-3. Bit errors occur at random and independent of each other. Suppose that the following code is used. To transmit a 1
CP5610 tutorial 1 (from textbook chapter 2)
2.1. Explain how the notion of layering and internetworking make the rapid growth of applications such as the World Wide Web possible.
2.2. (a) What universal set of communication services is provided by TCP/IP?