CHAPTER 10

Case Study Question (1-3), page 313

1). What lessons do you draw from the repeated false starts of the CIBER team?

CIBER would have more server than one another, and more front, best test,

More to search information on CIBER.

 2). How could the process have been managed better?

If CIBER can hiring more employee to watch equipment and watch very close

Attention all job that they did, it will avoid all mistaken that they had before,

and more to prepare document, procedure for new employee so that they won't

make any mistake when they work on project.

3). Comment on the final configuration. Can you suggest radically different

configurations ? If so, compare with the actual.

They can go to token ring, but switched ethernet with a 100BASE-T backbone

might do the trick provided that the software. They uses 3 tiers between servers

and terminal ithernet fast responed time, and they also have back up servers like

ethernet explores, TCP/IP, etc.

CHAPTER 11

Case Study Question (1-5), pages 340

1). Why would frequency or time-division multiplexing have been inefficient for the

Hawaiian application?

Because most communications between the campuses had one end at the central

computer. Using land lines to communicate among the islands was clearly not feasible,

dedicated point-to-point leased radio facilities were too expensive, and given the

bursty nature of the computer communications, sharing channels using frequency-

or time-division multiplexing was effiggivirny, especially considering that the

eventual plan was to support hundreds of terminals. 

2). Suppose that instead of a few remote stations, there were thousands. Would polling

be a feasible option?

For a small number of locations, the transmitter at Oahu could sequentially and continually ask

(poll) each station if it had something to send.

3). Suppose that instead of there being obstacles between the remote stations, so that the

remote stations could not communicate with one another, all the stations could hear

each other's communication. How would you improve the Aloha protocol?

(Hint: Review the discussion CSMA/CD in chapter 9).

The stations would may high probability the colliding stations waited different, usually random t

times, so that two colliding stations would not wait the same amount of time and collide again

upon retransmitting.  One could not assume that the remote stations could hear each other's

communication, so the success of communication could only be determined by Menehune.

 4). Shortly after Abramson invented the Aloha protocol, Larry Roberts of ARPA pointed

out that the chance of collision could be reduced if the system were synchronized in

time slots that were a little longer than the maximum packet transmission time. That

is, no transmission could start except at the beginning of a slot. Give a qualitative

explanation of why this might be so. This variation is called slotted Aloha and the

original scheme is called pure Aloha.

 Abramson and his colleagues then had the idea of using Oahu as a base station for radio

Broadcast communication to the other six campuses using two radio channels, that is, with a

separate channel into Oahu and another channel out.

5). The Aloha scheme is simple and elegant; unfortunately, it does not make good use of

the channel. In the idealized case of random packet transmission from an infinite

number of stations, the maximum utilization is about one-sixth of the total capacity of

the channel. (Larry Robert's scheme doubled the utilization, but it was still small.)

Can you think of a way to gain the flexibility of Aloha random access while still using

the channel efficiently? (If you can't review the section on channel access in this chapter.)

the channel  supported a data a rate of 9600bps in a bandwidth of 100kHz. The problem

of access to the channel had to be dealt with.

 CHAPTER 12

Exercise 2, page 371

2). A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP

layer, which appends another 160 bits of header. This is then transmitted through two

networks, each of which uses a 24-bit packet header. The destination network has a

maximum packet size of 800 bits. How many bits, including headers, are delivered to

the network layer protocol at the destination?

3 packets are needed

776 + 24 = 800

776 + 24 = 800

268 + 24 = 292

1892 bits or 1820 + (3 * 24) = 1892 bits

 

1820 = 1500 + 160 + 160

data header header