Sie sind auf Seite 1von 4

CC3502 Computer Networks

Multiplexing and IP address Tutorial Solutions 1. Why is it that the start and stop bits can be eliminated when character interleaving is used in synchronous TDM? The Start and Stop bits can be eliminated since all the data is placed in a frame. Removing the Start and Stop bits improves the efficiency of the transmission. 2. Explain in terms of data link control and physical layer concepts how error and flow control are accomplished in synchronous time-division multiplexing. Flow Control It should be clear that, as far as the multiplexer and demultiplexer are concerned, flow control is not needed. The data rate on the multiplexed line is fixed, and the multiplexer and demultiplexer are designed to operate at that rate. But suppose that one of the individual output lines attaches to a device that is temporarily unable to accept data. Should the transmission of TDM frames cease? Clearly not, because the remaining output lines are expecting to receive data at predetermined times. The solution is for the saturated output device to cause the flow of data from the corresponding input device to cease. Thus, for a while, the channel in question will carry empty slots, but the frames as a whole will maintain the same transmission rate. Error control is ignored since it would not be efficient to have to retransmit the whole frame due to an error in one channel. The devices using the other channels do not want a retransmission nor would they know that a retransmission has been requested by some other device on another channel. Flow control and error control can be provided on a per-channel basis by using a data link control protocol such as HDLC on a per-channel basis. 3. A character-interleaved time-division multiplexer is used to combine the data streams of a number of 110-bps asynchronous terminals for data transmission over a 2400-bps digital line. Each terminal sends asynchronous characters consisting of 7 data bits, 1 parity bit, 1 start bit, and 2 stop bits. Assume that one synchronization character is sent every 19 data characters and, in addition, at least 3 percent of the line capacity is reserved for pulse stuffing to accommodate speed variations from the various terminals. a. Determine the number of bits per character. b. Determine the number of terminals that can be accommodated by the multiplexer. c. Sketch a possible framing pattern for the multiplexer. The total Aysnc frame is 7+1+1+2=11 Bits. The input data rate is 110/11 =10 Data words/sec. Transmitted data is 80 data bits/sec including Parity 2400 Bps at eight bits per character is 300 character per second. Less one sync per 19 data character means the character rate is 300*19/20=285 character per second. Allowance for bit stuffing is 3%. Therefore effective through put of data characters is 285*97/100= 276.45 characters per second. Round it to 276. Each terminal required 10 character per second.

CC3502 Computer Networks


The number of terminals is 276/10=27 Terminals FRM Term1-19 FRM Term20-38

4. Ten 9600-bps lines are to be multiplexed using TDM. Ignoring overhead bits, what is the total capacity required for synchronous TDM? Assuming that we wish to limit average line utilization of 0.8, and assuming that each line is busy 50 percent of the time, what is the capacity required for statistical TDM? Ten lines at 9600 bps is 96,000 bps. It each line is busy 59% of the time the total throughput is 9600*10/2=48,000 bps. If we assume a utilization of 80% then the required capacity is 48000/.8=60,000bps 5. Why does HTTP use TCP and DNS use UPD? UPD is User Datagram Protocol. It usually contains the whole packet, is connection less and is not fragmented. This means that a session is not required since all the data can be contained in one packet. Domain Name Servers provide the IP address for a given Application address so all this information can be contained in a UDP packet and just transmitted without a session being invoked. The packet is unreliable but the DNS request can be issued again if the response is not received. HTTP is Hyper Text Transfer Protocool. It is used to transmit web pages that contain many packets of data. Transport Control Protocol is used since ordered and reliable delivery is required for each of the packets to assemble the web page correctly on the client. 6.What is a subnet mask and how it is used? If the subnet mask is 255.255.254.000 which IP addresses are on the same LAN? 192.37.7.34 192.37.6.56 192.37.1.56 192.37.7.84 193.37.1.53 192.37.1.24 A subnet mask is four bytes of information. It is used to identify IP addresses that are on the same part of the LAN without going through a Gateway. If the subnet mask is applied and the remaining IP addresses are the same, the IP address is on the same subnet. Therefore only address with 192.37 will be on the same subnet The addresses which are the same after masking are 192.37.7.34->193.37.6.0

CC3502 Computer Networks


192.37.6.56->193.37.6.0 192.37.7.84->193.37.6.0

There is one other possible different sub net 192.37.1.56->192.37.0.00 192.37.1.24->192.37.0.00 7. How does TCP/IP perform address resolution for the data link layer address? TCP/IP sender determines address resolution by broadcasting an Address Resolution Protocol packet to all devices on the LAN using the broadcast address. All interfaces look at the packet to see if it contains their IP address. If it does, the matching interface sends back its Datalink layer address. The sender then store the data link layer address in an address table for future use.

The client computer in building A (128.192.98.130) wants to retrieve a Web page from the www1.anyorg.com Web server but does not know its addresses. The Web browser realizes that it does not know the IP address after searching its IP address table and not finding a matching entry. Therefore, it issues a DNS request to the name server (128.192.254.5). The DNS request is passed to the transport layer (TCP), which attaches a TCP packet (or a UDP packet, depending on the configuration) and hands the message to the network layer. Using its subnet mask, the network layer (IP) will recognize that the DNS server is outside of its subnet. It will attach an IP packet and set the data link layer address to its gateway's address.

CC3502 Computer Networks


The gateway will process the message and recognize that the 128.192.254.5 IP address is on the Backbone. It will transmit the packet using the DNS server's Ethernet address. The name server will process the DNS request and send the matching IP address back to the client via the 128.198.98.x subnet gateway. The IP address for the desired computers makes its way back to the application layer software, which stores it in its IP table. It then issues the HTTP request using the IP address for the web server (128.192.98.53) and passes it to the transport layer, which in turn passes it to the network layer. The network layer uses its subnet mask and recognizes that this computer is on its subnet. However, it does not know the Web server's Ethernet address. Therefore, it broadcasts an ARP request to all computers on its subnet, requesting that the computer whose IP address is 128.192.98.53 to respond with its Ethernet address. This request is processed by all computers on the subnet, but only the Web server responds with an ARP packet giving its Ethernet address. The network layer software on the client stores this address in its data link layer address table and sends the original Web request to the Web server using its Ethernet address.

Das könnte Ihnen auch gefallen