It's UWAweek 17 (1st semester, week 8)

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

Displaying 7 tagged articles
Showing 7 of 260 articles.
Currently 3 other people reading this forum.


 UWA week 15 (1st semester, week 6) ↓
SVG not supported 5:37am Tue 9th Apr, Christopher M.

ANONYMOUS wrote In practice the situation is blurred because the PL and DLL are combined in a Media Access Control (MAC) Layer, such as a single Ethernet interface card. If taken too literally - that the PL is just the wire itself, the scene where e...


SVG not supported 5:20am Tue 9th Apr, Christopher M.

ANONYMOUS wrote Discarding DATA will result in it, eventually, being re-transmitted, but not for the longest (anticipated) time. During the period of time, we hope that the congestion will 'die' down while the sender waits for the ACK (which will now...


SVG not supported 10:36pm Mon 8th Apr, ANONYMOUS

Lecture 2 states " RX Monitors (only detects) transmission errors" as a responsibility of the physical layer. How does the physical layer detect errors? Are detection techniques such as hamming, parity, crc etc not a function of the DLL? Could I als...


SVG not supported 12:21pm Mon 8th Apr, ANONYMOUS

When choosing the best candidates for removal via load shedding, why is it that we discard DATA instead of ACKs, as per the lecture notes? Wouldn't it be easier to retransmit just a single bit for an ACK or is it to do with the idea that the ACK is ne...


SVG not supported 11:55am Mon 8th Apr, Christopher M.

ANONYMOUS wrote Hello, yes, you are correct. I have corrected the last sentence on each of page 20 and page 21. (There seems to have been some poor cut-and-paste going on there - I wonder for how many years it went un-noticed...?) Thanks.


 UWA week 14 (1st semester, non-teaching week) ↓
SVG not supported 4:06pm Sun 7th Apr, ANONYMOUS

I think the statement is pointing out that even though an application (a node) is generating bursty traffic. Because this traffic is being fed into the leaky bucket algorithm, it doesn't saturate the network as the leaky bucket only permits a specifi...


SVG not supported 12:00pm Sat 6th Apr, ANONYMOUS

Hi, i am hoping to get some clarification on this statement from pg. 20 of Wk. 5 lecture "The leaky bucket algorithm enables an application to generate bursty traffic (high volume, for a short period) without saturating the network". I would've though...

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  5:07AM Sep 06 2023
Privacy policy