2.1. Using the layer models in Figure2.12, describe the ordering and delivery of a pizza,indicating the interactions at each level.
2.2 The French and Chinese prime ministers need to come to an agreement by telephone, but neither speaks the other’s language. Further, neither has on hand a translator that can translate to the language of the other. However,both prime ministers have English translators on their staffs. Draw a diagram similar to Figure 2.12 to depict the situation, and describe the interaction and each level. b. Now suppose that the Chinese prime minister’s translator can translate only into Japanese and that the French prime minister has a German translator available. A translator between German and Japanese is available in Germany. Draw a new diagram that reflects this arrangement and describe the hypothetical phone conversation
2.3 List the major disadvantages with the layered approach to protocols.
2.4 Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley.The red army can defeat either of the blue armies separately but will fail to defeat both blue armies if they attack simultaneously.The blue armies communicate via an unreliable communications system (a foot soldier).The commander with one of the blue armies would like to attack at noon. His problem is this: If he sends a message to the other blue army, ordering the attack, he cannot be sure it will get through. He could ask for acknowledgment, but that might not get through. Is there a protocol that the two blue armies can use to avoid defeat?
2.5 A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over a shared medium. Examples are a bus-topology local area network, such as Ethernet, and a wireless radio network.Discuss the need or lack of need for a network layer (OSI layer 3) in a broadcast network.
2.6 In Figure 2.2, exactly one protocol data unit (PDU) in layer N is encapsulated in a PDU at layer (N – 1). It is also possible to break one N-level PDU into multiple(N – 1)-level PDUs (segmentation) or to group multiple N-level PDUs into one(N – 1)-level PDU (blocking). a. In the case of segmentation,is it necessary that each (N – 1)-level segment contain a copy of the N-level header? b. In the case of blocking, is it necessary that each N-level PDU retain its own header, or can the data be consolidated into a single N-level PDU with a single N-level header?
2.7 A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer,which appends another 160 bits of header.This is then transmitted through two networks, each of which uses a 24-bit packet header.The destination network has a maximum packet size of 800 bits. How many bits, including headers, are delivered to the network layer protocol at the destination?
2.8 Why is UDP needed? Why can’t a user program directly access IP?
2.9 IP,TCP, and UDP all discard a packet that arrives with a checksum error and do not attempt to notify the source.Why?
2.10 Why does the TCP header have a header length field while the UDP header does not?
2.13 A user on a UNIX host wants to transfer a 4000-byte text file to a Microsoft Windowshost.In order to do this,he transfers the file by means of TFTP,using the net ascii transfer mode. Even though the transfer was reported as being performed successfully, the Windows host reports the resulting file size is 4050 bytes,rather than the original 4000 bytes.Does this difference in the file sizes imply an error in the data transfer? Why or why not?
2.15 In order to be able retransmit lost packets, TFTP must keep a copy of the data it sends. How many packets of data must TFTP keep at a time to implement this retransmission mechanism?