Question

a) Assume that we are using datagram switching (i.e. we are not using virtual circuits). Is...

a) Assume that we are using datagram switching (i.e. we are not using virtual circuits). Is it possible to guarantee bandwidth to each source-destination pair? Are there disadvantages of doing this using datagram switching?
b) What is the big-O complexity of processing the header of a packet if we are using virtual circuits? Briefly explain why.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) Is it possible to guarantee bandwidth to each source-destination pair? - Yes, it is possible to guarantee b/w to each source-destination pair as it is connectionless service. There is no need of reservation of resources as there is no dedicated path for a connection session. But because it is connectionless, we will need bandwidth of the network to transfer data packets from source to destination, so bandwidth needs to be guaranteed.

Are there disadvantages of doing this using datagram switching? - Yes, Since the datagrams consist of the full destination address, they generate more overhead and thus lead to wastage of the bandwidth. This in turn makes using datagram approach quite costly.

b) What is the big-O complexity of processing the header of a packet if we are using virtual circuits? Briefly explain why.

ANS - O(1) = it makes sense to consider adding fields to packet headers to speed up the packet processing, so Source Hashing, which is a technique for adding an index field to protocol identifiers at all layers to reduce lookup costs and protocol processing. Source hash indices are similar to Virtual Circuit Identifiers (VCIs) in that they reduce lookup times from O(log(n)) to O(1), where n is the number of flows. So by applying Source Hashing in Virtual Circuits the packet headers can now be processed in O(1) only, which is comparatively fast wrt O(log N).

Please let me know in case of any clarifications required. Thanks!

Add a comment
Know the answer?
Add Answer to:
a) Assume that we are using datagram switching (i.e. we are not using virtual circuits). Is...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • a) Why can we have the packet header in virtual circuit switching to be much smaller...

    a) Why can we have the packet header in virtual circuit switching to be much smaller than the typical header in datagram switching? b) Assume that we are using datagram switching (i.e. we are not using virtual circuits). Is it possible to guarantee bandwidth to each source-destination pair? Are there disadvantages of doing this using datagram switching? c) What is the big-O complexity of processing the header of a packet if we are using virtual circuits? Briefly explain why. d)...

  • Final Cxa am CSIT 340 Computer Networks, fall 2018 received at the receiver b) Assume that we send a packet transmission delay? What's the total deluy et with 100 Mega bytes from one nade to...

    Final Cxa am CSIT 340 Computer Networks, fall 2018 received at the receiver b) Assume that we send a packet transmission delay? What's the total deluy et with 100 Mega bytes from one nade to the other. What's the isnoring queueing delay and nodal processing delay)? rors B. Wwhat's the meaning for (c) Calculate the Propagation value? e the Propugation Delay and Bandwidth product, Le, da te ale be forwarded to the link interfaces using the prefix entries tching" to...

  • At this stage, you should be a Wireshark expert. Thus, we are not going to spell...

    At this stage, you should be a Wireshark expert. Thus, we are not going to spell out the steps as explicitly as in earlier labs. In particular, we are not going to provide example screenshots for all the steps. 1.   Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets (Note that DNS is using UDP for communications. You can use nslookup commands in Lab 4 to generate DNS...

  • In this question, we will think about how to answer shortest path problems where we have more than just a single sourc...

    In this question, we will think about how to answer shortest path problems where we have more than just a single source and destination. Answer each of the following in English (not code or pseudocode). Each subpart requires at most a few sentences to answer. Answers significantly longer than required will not receive full credit You are in charge of routing ambulances to emergency calls. You have k ambulances in your fleet that are parked at different locations, and you...

  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • VideoDev Ltd is a video and production development company which works for clients across Australia and...

    VideoDev Ltd is a video and production development company which works for clients across Australia and New Zealand. The company is considering moving some of its computer infrastructure into the Cloud. The VideoDev Board is contemplating this move as a way to increase the company’s flexibility and responsiveness, as well as to achieve some savings on the cost of maintaining their ICT infrastructure. VideoDev has engaged you as a consultant to advise them on the use of Cloud Computing in...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is...

    Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...

  • PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers...

    PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...

  • 5. Resonance provides the basis for a large portion of organic chemistry and helps us identify...

    5. Resonance provides the basis for a large portion of organic chemistry and helps us identify sites of high and low electron density. We will see that the electron source (nucleophile) is attracted to the site of electron sinks or deficiency (electrophile). For the following, draw the curved arrow that shows the movement of electrons that takes you from one resonance structure to the other. Remember to always start your arrow at the source of electrons (r-bond or lone pair)....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT