Telecom Networks Test 3 Solution

$24.99 $18.99

There are 5 questions. Marks allocated to each part are indicated in square brackets. This exam is open book. You are permitted to consult any resources | textbook, web, notes. 3. Capacity Requirements. But do not discuss the questions and solutions with your classmates. Do not ask anyone else to helpConsideryousolveantheMPEGproblemsvideo. stream that is shaped…

5/5 – (2 votes)

You’ll get a: zip file solution

 

Categorys:

Description

5/5 – (2 votes)

There are 5 questions. Marks allocated to each part are indicated in square brackets.

This exam is open book. You are permitted to consult any resources | textbook, web, notes.

3. Capacity Requirements.

But do not discuss the questions and solutions with your classmates. Do not ask anyone else to

helpConsideryousolveantheMPEGproblemsvideo. stream that is shaped by a token bucket with rate r = 0.15 M bps (Mbps = Megabits per second), and burst size b = 15, 000 bits. The output of the token

Questionbucketfeeds1[20intomarks]buered link with capacity C = 300 kbps.

relative to an arbitrary starting time. If the receiver’s clock is synchronized with the sender’s, when will the receiver play these packets out (relative to the same arbitrary start time). [2 marks]

  1. The receiver changes to an adaptive playout mechanism. There is a silence period, and then a sequences of packets is received with timestamps 40.05, 40.07, 40.09. Prior to this burst, the average measured delay was 50 ms and the average deviation was 5ms. The measured delay for the rst packet in this burst is 60ms. Suppose the VoIP receiver does one update of the adaptive playout parameters before playing out the sequence. It uses EWMAs with constants = 0:1 and = 0:1 . When calculating the playout time, the average delay deviation is multiplied by K = 5. At what times are the three packets played out? [4 marks]

Question 4 [8 marks]

The iSLIP scheduling algorithm is a modi cation of PIM to avoid the randomness and improve fairness. It involves the following three steps:

    • Router Design

Request: Each input sends a request to every output for which it has a queued cell.

  1. Consider GranttheiSLIP:If ancrossbaroutputschedulingrceives algorithmnyrequests,. it chooses the one that appears next in a xed,

round-robin schedule starting from the highest priority element. The output noti es each

(a) For a router with N ports, what is the maximum number of iterations iSLIP could take to complete?

input whether or not its request was granted. The pointer gi to the highest priority element of the round-robin schedule is incremented (modulo N) to one location beyond the granted input.

Accept: If an input receives a grant, it accepts the one that appears next in a xed, round-robin schedule starting from the highest priority element. The pointer ai to the highest priority

element of the round-robin schedule is incremented (modulo N) to one location beyond the

(b) Place packets in the virtual output queues (VOQs) below such that during the next time slot the accepted output.

iSLIP algorithm takes 2 iterations to complete and each output is given a packet to transmit.

Assume that input 1 is the next input in both output 1’s and output 2’s round robin schedule.

Question 5 [12 marks]

Your enterprise network is required to support 96 hosts and 3 servers (labelled D, E, F).

You have been allocated the subnetwork 222.222.221.0/24. You have 3 open ow switches available to con gure, labelled A, B, and C.

You are required to group the hosts into three groups X, Y, and Z of equal size.

Server D is a public-facing webserver that should be open to all internal users and available for secure connection requests from external users. Your network should be con gured so that only appropriate, secure connections are permitted.

Server E should be accessible to user groups X and Y, but not Z. Server F should be accessible to user groups X and Z, but not Y.

Aside from the connections to the public server, no external parties should be able to com-municate to internal hosts or servers. But all internal clients should be able to connect with external web servers.

Only switch A should be connected to the public Internet. This should implement a NAT so that all emerging tra c has source address 222.222.221.17 (and all tra c to your network should be sent to this address).

Show how you could con gure the switches using generalized forwarding ow tables to ac-complish the con guration. Draw a diagram of your network providing clear labels of ports, IP addresses, server and client allocations. Provide the ow table for each switch.

6

Telecom Networks Test 3 Solution
$24.99 $18.99