Professional Documents
Culture Documents
Internet Technology Assignment 1
Internet Technology Assignment 1
[Emily Ha]
[Student No:747184]
Question 1
Part A
I. Satellite Internet connections are an example of high bandwidth(transmitting at
gigabits/sec to various users) and high latency. It's latency is mainly caused by the
propagation delay due to the vast distance between the Earth's ground station and the
satellite.
II. In contrast, a 56kbps modem calling a computer in the same home will have low
bandwidth and low latency.
Part B
Max. data rate = 2B log2V bits/sec
= 2 x 9600 x log2(32)
= 2 x 9600 x 5
= 96000 bps
Question 2
Part A
Two ways the TCP/IP and OSI are the same:
- Based on the concept of a stack of independent protocols.
- Both models have interchangeable transport and network layers and their operation
is based upon packet-switched technology.
Question 3
Part A
I would choose the coaxial cable over the geostationary satellite link to transmit a phone call
between Melbourne and Sydney. The coaxial cable has high bandwidth, exceptional error
performance and negligible propagation delay over relatively long distances and excellent
security. It's thick inner core gives it good signal attenuation, its outer shield protects it from
Electromagnetic Interference and Radio Frequency Interference(RFI). Furthermore, the
geostationary satellite link would experience a one-half second or longer delay due to the
distance(between the satellite and Earth) the signal has to travel during transmission. Whilst
data transmissions and television, which are services that flow in one direction to many points
are less sensitive to the initial transmission delay, for signals transmitted during a phone call
which requires data to flow in both directions and intended to be transmitted to one
particular point, the delay will impact the quality of the call.
Part B
Transmissions :
Question 4.
For the first scheme, since they are individually acknowledged, if a packet(P) is lost or
corrupted, it is easily detected and will be sent again. In the second scheme, if the file(F) is
lost or corrupted, the entire file will be sent again. A packet is much smaller in size in
comparison to an entire file. Thus, it is much more efficient to utilise the first scheme in
consideration of their error correction technique.
With respect to file transmission overhead, the first scheme has a linear space complexity.
The header size attached to each packet is the same regardless of their message size. The
formula works out to be (F/P)* Acknowledgement size(A). In the second scheme, the
transmission overhead is only one acknowledgement bit and results in a constant space
complexity with respect to the total packets. Also, with the first scheme's message
segmentation, the total mount of header bytes is more than the second scheme. In the first
scheme, the A must be smaller than the second scheme's A. This is determined by the tradeoff
between A and P in respect to the file's size.
Finally, for a large file, it is recommended to use the first scheme because in error correction,
it results in less bandwidth if the file is corrupt or lost. But careful consideration is needed to
find the optimum performance from choosing a balanced P and A.
Physical Layer
Responsible for the transmission and reception of unstructured raw bit stream over a physical
medium. It determines the correct physical medium for
transmission(electrical/optical,mechanical and functional), including the physical volts/db in
a given signal. One of its techniques is to determine whether the encoded bit will be
transmitted as digital or analog signals.
Network Layer
This layer decides which physical the path the data should take based on many factors, such
as conditions and priority. Also, known as routing. It also has control over the operation of the
communication's subnet. It is also responsible for frame fragmentation if the maximum
transmission unit(MTU) is deemed less than the frame size, the translation from logical
addresses to physical addresses and subnet usage accounting.
Transport Layer
An end-to-end layer that ensures data is error-free, no losses, in-order and no duplications
between. It provides message acknowledgement, message segmentation into smaller units
Session Layer
This layer establishes the session between two applications on different machines and
supports their communication over the network, performs security checks, name recognition,
logging. It is also capable of using and terminating a connection.
Presentation Layer
This layer is able to re-format the data into an acceptable form to be received by the
destination's application layer. It is able to do perform character-code translations, data
conversions(bit order, integer-floating point), data compression, and data-encryption.
Application Layer
It provides services to the software on the system which requests network services. Common
functions include resource sharing, remote file access, remote printer access, network
management, electronic messaging, virtual terminals and inter-process communication.
The most significant disadvantage is the data overhead due to the processing of seven
layers(OSI model) causing degraded performance. Data overhead is built up by the multiple
headers attached to the data caused by abstraction barriers between layers. Another
disadvantage may be the complexity in implementing the standards as there are so many
layers and each requires one protocol per layer.
7.
Companies often use the known location of their users for market analysis in order to
streamline targeted advertisements specific for you. This will subject users to many unwanted
marketing strategies and may cause frustration. Sometimes these companies have a legal
obligation to provide your location details to the police for investigation. This is a privacy leak
for the user but nonetheless, compliant with the law. Another negative reason may involve
network companies that provide your data to unknown companies as a form of data gathering.
This exposes you to the risk of malware from third-party companies.Hence most of the
negative reasons are associated with an intrusion of privacy. Positive reasons include being
able to use location tracking compatible applications which provide convenience for a range
of requests. Perhaps if you were stranded or lost one day, these companies would be the first
point of contact to find your location and save your life.
checking if the total is zero(no error), errors may be detected. One example of a checksum is
a group of parity bits.
9. Selective repeat requires more buffer at the receiver. The receiver discards the first bad
frame(out-of-sequence) it receives but stores the subsequent good frames that are out-ofsequence packets in the buffer until the missing packets arrive. Only the oldest
unacknowledged frame will be resent and once that is received, the receiver will transfer all
the frames it has buffered sequentially to the network layer. This creates a window size that
is larger than 1. On the other hand, Go-Back-N only accepts frames which are in sequence and
drops the ones with unexpected sequence numbers(caused by lost frames in transmission). It
sends no acknowledgements for the discarded frames. Hence, the receiver needs a buffer
space of a single frame.