Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:



Similar documents
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani. Student Identification number

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

CS335 Sample Questions for Exam #2

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Based on Computer Networking, 4 th Edition by Kurose and Ross

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

BGP: Border Gateway Protocol

IP addressing and forwarding Network layer

Chapter 10 Link-State Routing Protocols

Interconnecting Cisco Networking Devices Part 2

The Internet. Internet Technologies and Applications

OSPF Routing Protocol

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Managing (VoIP) Applications DYSWIS

: Interconnecting Cisco Networking Devices Part 2 v1.1

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Route Discovery Protocols

Exterior Gateway Protocols (BGP)

Internet Control Message Protocol (ICMP)

LAN TCP/IP and DHCP Setup

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Border Gateway Protocol (BGP)

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

RIP: Routing Information Protocol

Introduction to LAN/WAN. Network Layer

Exam 1 Review Questions

Transport and Network Layer

RIP: Routing Information Protocol

Network layer: Overview. Network layer functions IP Routing and forwarding

Routing Protocols (RIP, OSPF, BGP)

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

M2M Series Routers. Port Forwarding / DMZ Setup

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Computer Networks. Main Functions

Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing

Scalable Linux Clusters with LVS

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

10CS64: COMPUTER NETWORKS - II

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Course Contents CCNP (CISco certified network professional)

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

8.2 The Internet Protocol

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

MPLS Part II - Recovery

6.263 Data Communication Networks

CS Computer Networks 1: Routing Algorithms

Troubleshooting Bundles and Load Balancing

GregSowell.com. Mikrotik Routing

Availability Digest. Redundant Load Balancing for High Availability July 2013

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

How To Understand Bg

IP Traffic Engineering over OMP technique

Using the Border Gateway Protocol for Interdomain Routing

Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN Sanjay Khanna Foundry Networks

NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1)

DG Forwarding Algorithm

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

configure WAN load balancing

AS/400e. TCP/IP routing and workload balancing

Multi-Homing Security Gateway

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

NAT and Firewall Traversal with STUN / TURN / ICE

7750 SR OS System Management Guide

Table of Contents. Introduction

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Configuring IP Addressing and Services

Introduction to TCP/IP

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Router and Routing Basics

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Barracuda Link Balancer

Avaya ExpertNet Lite Assessment Tool

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Chapter 4 Network Layer

Final for ECE374 05/06/13 Solution!!

Ethernet (LAN switching)

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Networking. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt

Understanding Route Redistribution & Filtering

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Layer 3 Routing User s Manual

Transcription:

Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and a pocket calculator Please write in a clear language and use a READABLE writing; it is important to MOTIVATE THE ANSWERS YOU GIVE. Please only use the blank spaces at the bottom of every question At the end of your exam, please return THESE sheets and those possibly received by the teacher to write a draft copy of your answers. The latter WILL NOT be considered during the process of correction. Students copying or consulting course material will be expelled from the exam. Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below: NET NET NET NET Destination Mask Next hop 193.100.5.7 255.255.255.255-193.100.5.0 255.255.255.0-150.100.8.0 255.255.255.0 193.100.5.3 150.200.1.0 255.255.255.0 193.100.5.2 150.200.235.0 255.255.255.0 193.100.5.2 Fill in the table below, proposing, on the basis of the routing table above, a possible and consistent assignment of network addresses to subnets and, when possible, to router interfaces (explicitely indicating which interfaces have which address)

(question 1 continued) Net Address Mask Router Address Net A Router 1 Net B Router 2 Net C Router 3 Net D How can addresses be aggregated, so as to compress routing table at H? Destination Mask Next hop

Question 2. [7 points] Consider the graph in the picture, on which links are assumed to be bidirectional and with the same weight in both directions. assuming V1 as root, complete the table below applying Dijkstra s algorithm. In the generic k-th iteration of the algorithm, for equal values of L(k) select the node with smaller label. Draw the minimum cost spanning tree routed at V1 thus computed. Give an example of an IGP protocol that uses Dijkstra s algorithm to compute the optimal routing. Step T L(2) Path L(3) Path L(4) Path L(5) Path L(6) Path 1 1 1 1-2 --- --- --- 4 1-6 2 3 4 5 6 (question 2 continued)

Question 3. [7 points] Consider the following network scenario; A, B, C, D are 4 routers that execute the RIP protocol. Consider only the routes computed by the routers towards the destination network. x Dest. network Assuming an initial equilibrium, assume link BD faults and consider the counting to infinity anomaly among routers A,B and C. Express, as a function of x, a necessary condition for the anomaly to occur. Assuming the necessary condition above holds, provide a sufficient condition for the anomaly to occur. (question 3 continued)

\ Question 4. [2 points] Consider the OSPF protocol. List the 5 types of packets used by the protocol; for each type, provide a synthetic description of the associated performed functionality (max. 2 lines) Which packet type is used in the Discovering Neighbors procedure? Which protocol is used to carry OSPF packets? How is reliability achieved? Use OSPF terminology in your answers (question 4 continued)

Question 5. [2 points] Considering the BGP protocol, briefly outline the protocol s UPDATE message. Specifically, describe the purpose of this message type and the information carried by it.

(question 5 continued) Question 6. [2 points] With reference to QoS in IP networks: Define the concept of flow Briefly describe the per-flow QoS and aggregate traffic QoS approaches, emphasizing their pros and cons.

Question 7. [3 points] Consider a scenario in which IP private addressing is used and Internet access occurs over an IP router implementing port mapping based NAT. Let H be a host in the private network that wishes to offer an UDP-based Web service (in practice, an Internet reachable UDP server). We shall henceforth call SERVICE this service. Assume a [SERVICE_PUBLISHING_PROTOCOL] protocol is available, whose purpose is to spread over the Internet the IP address and UDP port over which SERVICE is reachable. On the basis of this information, synthetically outline the sequence of actions that host H should execute to publish SERVICE and keep it reachable over the Internet. Assume the NAT service is full-cone and is known to H. The NAT router s IP address is public and unknown to H. The router s NAT mapping table is empty (no active binding). Furthermore, a remote STUN server is available and H can act as a STUN client. No Virtual server service can be used. I herewith authorize, in compliance with law number 675 of 31/12/96, the teacher to publish the results of my exam on the Web. Readable signature