Computer networking tanenbaum solution pdf




















Tanenbaum takes a structured approach to explaining how networks work from the inside out.. Tanenbaum computer networks 4th edition. The new item in the fourth edition is the rapid growth of wireless networking in many forms. Uses of Computer Networks. Structured Computer Organization, 4th edition Andrew S. Tanenbaum has an S. Edition: 5th Edition. Computer Networks Book by Andrew S. Tanenbaum pdf download. Computer Networks by.

Other bestselling titles by Andrew S. Tanenbaum Andrew, J. Everyday low prices and free delivery on eligible orders. Free delivery on qualified orders. Main menu. There was a problem previewing this document. Includes bibliographical references and index.

This page intentionally left blank. Tanenbaum Structured Computer Organization, 5th edition This widely read classic, now in its fifth edition, provides the ideal introduction to Computer Networks, 4th edition This best seller, currently in its fourth edition, provides the ideal introduction to.

This bestseller reflects the latest networking technologies with a special emphasis on wireless networking, including Users who have contributed to AbeBooks. For exam- ple, suppose a process writes bytes to a connection and then a little later writes another bytes. The receiver then does a read for bytes. With a byte stream, the message boundaries do not count and the receiver will get the full bytes as a single unit.

The fact that there were originally two distinct messages is lost. Negotiation has to do with getting both sides to agree on some parameters or values to be used during the communication. Maximum packet size is one example, but there are many others. Frames encapsulate packets. When a packet arrives at the data link layer, the entire thing, header, data, and all, is used as the data field of a frame.

The entire packet is put in an envelope the frame , so to speak assuming it fits. With n layers and h bytes added per layer, the total number of header bytes per message is hn, so the space wasted on headers is hn.

Both models are based on layered protocols. Both have a network, transport, and application layer. In both models, the transport service can provide a reliable end-to-end byte stream. On the other hand, they differ in several ways.

The two nodes in the upper-right corner can be disconnected from the rest by three bombs knocking out the three nodes to which they are connected. The system can withstand the loss of any two nodes. Doubling every 18 months means a factor of four gain in 3 years. In 9 years, the gain is then 43 or 64, leading to 6. The average person in the developed world may have dozens of Internet hosts by then.

If the network tends to lose packets, it is better to acknowledge each one separately, so the lost packets can be retransmitted. On the other hand, if the network is highly reliable, sending one acknowledgement at the end of the entire transfer saves bandwidth in the normal case but requires the entire file to be retransmitted if even a single packet is lost.

Small, fixed-length cells can be routed through switches quickly, and com- pletely in hardware. Small, fixed-size cells also make it easier to build hardware that handles many cells in parallel. Also, they do not block transmission lines for very long, making it easier to provide quality-of-service guarantees.

At 10 Mbps, it takes 0. Thus, the bit lasts 0. Thus, a bit is 20 meters long here. This is 18,, bits. Think about the hidden terminal problem. Imagine a wireless network of five stations, A through E, such that each one is in range of only its immediate neighbors. Then A can talk to B at the same time D is talking to E. Wireless networks have potential parallelism, and in this way differ from Ethernet.

One disadvantage is security. Every random delivery man who happens to be in the building can listen in on the network. Another disadvantage is reliabil- ity. Wireless networks make lots of errors. A third potential problem is bat- tery life, since most wireless devices tend to be mobile.

One advantage is that if everyone uses the standard, everyone can talk to everyone. Another advantage is that widespread use of any standard will give it economies of scale, as with VLSI chips. A disadvantage is that the political compromises necessary to achieve standardization frequently lead to poor standards. Another disadvantage is that once a standard has been widely adopted, it is difficult to change,, even if new and better techniques or methods are discovered.

Also, by the time it has been accepted, it may be obsolete. There are many examples, of course. A noiseless channel can carry an arbitrarily large amount of information, no matter how often it is sampled. Just send a lot of data per sample.

If each sample is 16 bits, the channel can send kbps. If each sample is bits, the channel can send 8. Four-level signals provide 2 bits per sample, for a total data rate of 24 Mbps. Since log2 is about 6. The Nyquist limit is 6 kbps.

The bottleneck is therefore the Nyquist limit, giving a maximum channel capacity of 6 kbps. A passive star has no electronics. The light from one fiber illuminates a number of others. An active repeater converts the optical signal to an electri- cal one for further processing.

For simplicity, let us assume 1 bps per Hz. From Eq. The range of wavelengths used is very short. The Nyquist theorem is a property of mathematics and has nothing to do with technology.

Thus, the Nyquist theorem is true for all media. In the text it was stated that the bandwidths i. The fact that the bands are approxi- mately equal is an accidental property of the kind of silicon used.

Thus, the band covered is 60 MHz to 30 GHz. At 1 GHz, the waves are 30 cm long. If one wave travels 15 cm more than the other, they will arrive out of phase. The fact that the link is 50 km long is irrelevant. If the beam is off by 1 mm at the end, it misses the detector. This amounts to a triangle with base m and height 0. The angle is one whose tangent is thus 0.

This angle is about 0. This means there is a transit every seconds. Thus, there will be a handoff about every 8 minutes and 11 seconds. It takes 24 hours to go from directly overhead to maximum excursion and then back. Thus, the number of end offices was limited to , This limit is not a problem.

With a digit telephone number, there could be numbers, although many of the area codes are illegal, such as However, a much tighter limit is given by the number of end offices. There are 22, end offices, each with a maximum of 10, lines. This gives a maximum of million telephones. There is simply no place to connect more of them. This could never be achieved in practice because some end offices are not full.

An end office in a small town in Wyoming may not have 10, customers near it, so those lines are wasted. Each telephone makes 0. This volume is about 15, cm3. With a specific gravity of 9. The phone company thus owns 1. At 3 dollars each, the copper is worth about 4. Like a single railroad track, it is half duplex. Oil can flow in either direction, but not both ways at once. Traditionally, bits have been sent over the line without any error correcting scheme in the physical layer.

The presence of a CPU in each modem makes it possible to include an error correcting code in layer 1 to greatly reduce the effective error rate seen by layer 2.

The error handling by the modems can be done totally transparently to layer 2. Many modems now have built in error correction. There are four legal values per baud, so the bit rate is twice the baud rate. At baud, the data rate is bps. The phase shift is always 0, but two amplitudes are used, so this is straight amplitude modulation. If all the points are equidistant from the origin, they all have the same ampli- tude, so amplitude modulation is not being used.

Frequency modulation is never used in constellation diagrams, so the encoding is pure phase shift key- ing. Two, one for upstream and one for downstream. The modulation scheme itself just uses amplitude and phase. The frequency is not modulated. There are channels in all, minus 6 for POTS and 2 for control, leaving for data.

The total bandwidth is then 4. A 5-KB Web page has 40, bits. The download time over a 36 Mbps chan- nel is 1. If the queueing delay is also 1.

At 56 kbps it is msec. There are ten Hz signals. We need nine guard bands to avoid any interference. According to the Nyquist theorem, this is the sampling frequency needed to capture all the information in a 4 kHz channel, such as a telephone channel. Actually the nominal bandwidth is somewhat less, but the cutoff is not sharp. With dibit encoding, two bits are sent per sample.

With T1, 7 bits are sent per period. The respective data rates are 16 kbps and 56 kbps. Ten frames. A coder accepts an arbitrary analog signal and generates a digital signal from it. A demodulator accepts a modulated sine wave only and generates a digital signal. In order to track the signal, 8 steps must fit into the quarter wave, or 32 samples per full wave. At OC-1 speed, say, 50 Mbps, for simplicity, a bit lasts for 20 nsec. This means it takes only 20 seconds for the clock to drift off by one bit.

Consequently, the clocks must be continuously synchronized to keep them from getting too far apart. Certainly every 10 sec, preferably much more often. Of the 90 columns, 86 are available for user data in OC It can be used to accommodate DS It can be used to accommodate DS-2 service. Message switching sends data units that can be arbitrarily long.

Packet switching has a maximum packet size. Any message longer than that is split up into multiple packets. This leaves an SPE of columns. One SPE column is taken up by path overhead, leaving columns for user data.

Since each column holds 9 bytes of 8 bits, an OCc frame holds 75, user data bits. Each cell has six neighbors. In other words, only 3 unique cells are needed. Consequently, each cell can have frequencies. First, initial deployment simply placed cells in regions where there was high density of human or vehicle population. Once they were there, the operator often did not want to go to the trouble of moving them. Second, antennas are typically placed on tall buildings or mountains.

Depending on the exact loca- tion of such structures, the area covered by a cell may be irregular due to obs- tacles near the transmitter. Third, some communities or property owners do not allow building a tower at a location where the center of a cell falls. In such cases, directional antennas are placed at a location not at the cell center. If we take the area of San Francisco, 1. Of course, it is impossible to tile the plane with circles and San Francisco is decidedly three-dimensional , but with 20, microcells we could probably do the job.

Frequencies cannot be reused in adjacent cells, so when a user moves from one cell to another, a new frequency must be allocated for the call. It is not caused directly by the need for backward compatibility. Thus, the quality loss was an intentional trade-off to put more users per cell and thus get away with bigger cells. D-AMPS uses channels in each direction with three users sharing a sin- gle channel.

GSM uses channels with eight users sharing a single channel. This allows GSM to support up to users simultaneously. Both systems use about the same amount of spectrum 25 MHz in each direction. The result is obtained by negating each of A, B, and C and then adding the three chip sequences. Alternatively the three can be added and then negated.

To make the sum 0, there must be as many matches as mismatches. Thus, two chip sequences are orthogonal if exactly half of the corresponding elements match and exactly half do not match. Ignoring speech compression, a digital PCM telephone needs 64 kbps. If we divide 10 Gbps by 64 kbps we get , houses per cable. Current systems have hundreds of houses per cable. It is both. Each of the channels is assigned its own frequency band FDM , and on each channel the two logical streams are intermixed by TDM.

This example is the same as the AM radio example given in the text, but nei- ther is a fantastic example of TDM because the alternation is irregular. A 2-Mbps downstream bandwidth guarantee to each house implies at most 50 houses per coaxial cable. Thus, the cable company will need to split up the existing cable into coaxial cables and connect each of them directly to a fiber node. The upstream bandwidth is 37 MHz. Downstream we have MHz.

Using QAM, this is Mbps. Even if the downstream channel works at 27 Mbps, the user interface is nearly always Mbps Ethernet. There is no way to get bits to the computer any faster than Mbps under these circumstances.

If the connection between the PC and cable modem is fast Ethernet, then the full 27 Mbps may be available. Usually, cable operators specify 10 Mbps Ethernet because they do not want one user sucking up the entire bandwidth. Since each frame has a chance of 0. Call this value p. The solution is a b c 3. If you could always count on an endless stream of frames, one flag byte might be enough.

But what if a frame ends with a flag byte and there are no new frames for 15 minutes. How will the receiver know that the next byte is actu- ally the start of a new frame and not just noise on the line? The protocol is much simpler with starting and ending flag bytes. The output is It is possible. Suppose that the original text contains the bit sequence as data. After bit stuffing, this sequence will be rendered as If the second 0 is lost due to a transmission error, what is received is , which the receiver sees as end of frame.

It then looks just before the end of the frame for the checksum and verifies it. If the check- sum is 16 bits, there is 1 chance in that it will accidentally be correct, leading to an incorrect frame being accepted. The longer the checksum, the lower the probability of an error getting through undetected, but the probabil- ity is never zero. If the propagation delay is very long, as in the case of a space probe on or near Mars or Venus, forward error correction is indicated. It is also appropri- ate, in a military situation in which the receiver does not want to disclose his location by transmitting.

If the error rate is low enough that an error- correcting code is good enough, it may also be simpler. Finally, real-time systems cannot tolerate waiting for retransmissions.

Making one change to any valid character cannot generate another valid char- acter due to the nature of parity bits. Making two changes to even bits or two changes to odd bits will give another valid character, so the distance is 2. Parity bits are needed at positions 1, 2, 4, 8, and 16, so messages that do not extend beyond bit 31 including the parity bits fit. Thus, five parity bits are sufficient. The bit pattern transmitted is The encoded value is If we number the bits from left to right starting at bit 1, in this example, bit 2 a parity bit is incorrect.

The bit value transmitted after Hamming encoding was 0xA4F. The original 8-bit data value was 0xAF. A single error will cause both the horizontal and vertical parity checks to be wrong. Two errors will also be easily detected. If they are in different rows, the row parity will catch them. If they are in the same row, the column parity will catch them. Three errors might slip by undetected, for example, if some bit is inverted along with its row and column parity bits.

Even the corner bit will not catch this. Describe an error pattern as a matrix of n rows by k columns. Each of the correct bits is a 0, and each of the incorrect bits is a 1. With four errors per block, each block will have exactly four 1s. How many such blocks are there? Undetected errors only occur when the four 1 bits are at the vertices of a rectangle. Suppose that the bit closest to the origin the lower-left vertex is at p, q. Then the total number of rectangles can be found by summing this formula for all possible p and q.

The frame is The generator is The message after appending three zeros is The remainder on dividing by is So, the actual bit string transmitted is The received bit stream with an error in the third bit from the left is Dividing this by produces a remainder , which is different from zero.

Thus, the receiver detects the error and can ask for a retransmission. The CRC is computed during transmission and appended to the output stream as soon as the last bit goes out onto the wire. If the CRC were in the header, it would be necessary to make a pass over the frame to compute the CRC before transmitting. This would require each byte to be handled twice—once for checksumming and once for transmitting. Using the trailer cuts the work in half.

For frame sizes above bits, stop-and-wait is reasonably efficient. To operate efficiently, the sequence space actually, the send window size must be large enough to allow the transmitter to keep transmitting until the first acknowledgement has been received.

The propagation time is 18 ms. At T1 speed, which is 1. Therefore, the first frame fully arrives The acknowledgement takes another 18 msec to get back, plus a small negligible time for the acknowledgement to arrive fully. In all, this time is The transmitter must have enough window space to keep going for A frame takes 0. Seven-bit sequence numbers are needed. It can happen. Suppose that the sender transmits a frame and a garbled acknowledgement comes back quickly.

The main loop will be executed a second time and a frame will be sent while the timer is still running. Let the window size be W. The protocol would be incorrect. Suppose that 3-bit sequence numbers are in use. Consider the following scenario: A just sent frame 7. B gets the frame and sends a piggybacked ACK. A gets the ACK and sends frames 0—6, all of which get lost. B times out and retransmits its current frame, with the ACK 7. Look at the situation at A when the frame with r.

The modified between would return true, causing A to think the lost frames were being acknowledged. It might lead to deadlock. Suppose that a batch of frames arrived correctly and were accepted.

Then the receiver would advance its window. Now suppose that all the acknowledgements were lost. The sender would eventually time out and send the first frame again. The receiver would send a NAK. Suppose that this were lost. From that point on, the sender would keep timing out and sending a frame that had already been accepted, but the receiver would just ignore it. Setting the auxiliary timer results in a correct acknowledgement being sent back eventually instead, which resynchronizes.

It would lead to deadlock because this is the only place that incoming acknowledgements are processed. Without this code, the sender would keep timing out and never make any progress. It would defeat the purpose of having NAKs, so we would have to fall back to timeouts. Although the performance would degrade, the correctness would not be affected. The NAKs are not essential. Consider the following scenario. A sends 0 to B.

A times out and repeats 0, but now B expects 1, so it sends a NAK. If A merely re-sent r. The maximum receive window size is 1. Suppose that it were 2. Ini- tially, the sender transmits frames 0—6.

All are received and acknowledged, but the acknowledgement is lost. The receiver is now prepared to accept 7 and 0. When the retransmission of 0 arrives at the receiver, it will be buf- fered and 6 acknowledged. When 7 comes in, 7 and 0 will be passed to the host, leading to a protocol failure. Suppose A sent B a frame that arrived correctly, but there was no reverse traffic.

After a while A would time out and retransmit. B would notice that the sequence number was incorrect, since the sequence number is below FrameExpected.

Consequently, it would send a NAK, which carries an acknowledgement number. Each frame would be sent exactly two times. This implementation fails. The even sequence numbers use buffer 0 and the odd ones use buffer 1. This mapping means that frames 4 and 0 both use the same buffer. Suppose that frames 0—3 are received and acknowledged. If 4 is lost and 0 arrives, it will be put in buffer 0 and arrived [0] set to true. The loop in the code for FrameArrival will be exe- cuted once, and an out-of-order message delivered to the host.

This protocol requires MaxSeq to be odd to work properly. However, other implementa- tions of sliding window protocols do not all have this property Thus, the cycle is msec. With a kbps channel and 8-bit sequence numbers, the pipe is always full.

The number of retransmissions per frame is about 0. The total overhead is The data rate here is bits in msec or about bps. With a window size of 7 frames, transmission time is msec for the full window, at which time the sender has to stop. At msec, the first ACK arrives and the cycle can start again. The data rate is 47, In other words, if the window size is greater than msec worth of transmission, it can run at full speed.

For a window size of 10 or greater, this condition is met, so for any window size of 10 or greater e. This corresponds to four frames, or bits on the cable. Each machine has two key variables: next3frame3to3send and frame3expected, each of which can take on the values 0 or 1.

Thus, each machine can be in one of four possible states. A message on the channel con- tains the sequence number of the frame being sent and the sequence number of the frame being ACKed. Thus, four types of messages exist. The channel may contain 0 or 1 message in either direction.

So, the number of states the channel can be in is 1 with zero messages on it, 8 with one message on it, and 16 with two messages on it one message in each direction. The firing sequence is 10, 6, 2, 8. It corresponds to acceptance of an even frame, loss of the acknowledgement, timeout by the sender, and regeneration of the acknowledgement by the receiver.

B and E are critical sections that may not be active simultaneously, i. Place C represents a semaphore that can be seized by either A or D but not by both together. With a software implementation, working entirely with bytes is much simpler than working with individual bits.

While students are not expected to have a background in computer networks or advanced mathematics, a general background in computer systems and programming is assumed.

Since the publication of the first edition 12 years ago, our book has been adopted for use at many hundreds of colleges and universities, translated into 14 languages, and used by over one hundred thousand students and practitioners worldwide.

This bestseller reflects the latest networking technologies with a special emphasis on wireless networking, including. His tongue circled the nipples again and again until she begged him to take her. As he entered the small garden his mouth fell open in wonder. She was shivering with shock, snowcapped Olympus and Ossa towering above all, pulling her gown up as he did.

Can you but imagine what she might have accomplished if that force had been used for good! It is an extremely uncomfortable way to ride. Tanenbaum, Prentice Hall 2. We as allow hundreds of the books collections from outdated to the new updated book more or less the world. So, you may. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Tanenbaum and David J. The article covers-.

Special features of book; Analysis of. Tanenbaum Tanenbaum; David J. Solution manual to Computer Networks, 4th Ed. Tanenbaum Download computer networks tanenbaum 5th edition solutions manual online free shared files from DownloadJoy and other world's most popular shared hosts. Welcome to Scribd! This bestseller reflects the latest networking technologies with a special emphasis on wireless networking, including His tongue circled the nipples again and again until she begged him to take her.



0コメント

  • 1000 / 1000