Chapter 9 1. How does the source of your software code affect the overall security of the system? Justify your position for a general system. 2. What protections can you….
User information flows are transferred over an end-to-end connection in a packet switched network.
The connection is routed from the source access node via one intermediate node to the destination access node across two back-to-back physical circuits inside the network, in addition to being transmitted across the interfaces between the user and the access node on the source and destination side. Assume that all physical circuits operate at the same transmission speed and have the same bit error rate p. Also assume that the circuits connecting the access nodes to the intermediate nodes have a propagation delay of t seconds and the two local access circuits have a propagation delay of a/4 seconds. Assume no queuing anywhere.
a) In terms of t, a, p and frame size determine the throughput using frame relay transmission.
b) In terms of t, a, p and frame size determine the end-to-end delay, where delay is measured as the time between the first transmission of a frame and the correct reception of the frame at the destination.
c) What is the optimum frame size for frame relay transmission in terms of throughput and delay?