Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages



Similar documents
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Final for ECE374 05/06/13 Solution!!

First Midterm for ECE374 03/09/12 Solution!!

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Transport and Network Layer

The OSI and TCP/IP Models. Lesson 2

Networking Test 4 Study Guide

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Lecture 28: Internet Protocols

Transport Layer Protocols

WAN Data Link Protocols

Ethernet. Ethernet. Network Devices

Overview of Computer Networks

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

CS335 Sample Questions for Exam #2

Answers to Sample Questions on Network Layer

Protocols and Architecture. Protocol Architecture.

Computer Networks CS321

Technical Support Information Belkin internal use only

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

IT Data Communication and Networks (Optional)

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Exam 1 Review Questions

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Computer Networks - CS132/EECS148 - Spring

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

IP address format: Dotted decimal notation:

Network layer: Overview. Network layer functions IP Routing and forwarding

Network Models and Protocols

Computer Networks Homework 1

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Computer Networks and the Internet

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Network Layer: Network Layer and IP Protocol

Internet Concepts. What is a Network?

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Written examination in Computer Networks

Introduction to Metropolitan Area Networks and Wide Area Networks

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

CS101 Lecture 19: Internetworking. What You ll Learn Today

BASIC ANALYSIS OF TCP/IP NETWORKS

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

IT4405 Computer Networks (Compulsory)

CPS221 Lecture: Layered Network Architecture

IP Subnetting and Addressing

COMPUTER NETWORK TECHNOLOGY (300)

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

Computer Networks & Security 2014/2015

PART-A Questions. 9. What are the two parts of message inside the envelope?

IP addressing and forwarding Network layer

UPPER LAYER SWITCHING

(Refer Slide Time: 02:17)

PART IV. Network Layer

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Objectives of Lecture. Network Architecture. Protocols. Contents

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

How To Understand The Internet Of S (Netware)

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Architecture and Performance of the Internet

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

TCP/IP Basis. OSI Model

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

The OSI Model and the TCP/IP Protocol Suite

Introduction to TCP/IP

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Data Link Layer Overview

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Internet Control Protocols Reading: Chapter 3

Based on Computer Networking, 4 th Edition by Kurose and Ross

CS268 Exam Solutions. 1) End-to-End (20 pts)

Protocol Data Units and Encapsulation

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Classful IP Addressing (cont.)

Introduction to Computer Networks

Module 2 Overview of Computer Networks

What communication protocols are used to discover Tesira servers on a network?

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Mathatma Gandhi University

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Internetworking and IP Address

EKSAMEN / EXAM TTM

8.2 The Internet Protocol

Communications and Computer Networks

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Nortel Technology Standards and Protocol for IP Telephony Solutions

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Transcription:

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Contact during the exam: English (original) Name: Yuming Jiang Tlf.: 92643817 The exam rooms will be visited in the time period between 16:00 and 17:00. Exam in course: "TTM4100 COMMUNICATION SERVICES AND NETWORKS" 20 May 2009 15:00 19:00 Grading results 12 June 2009 (This is the date for sending the results from the Department of Telematics to the Student and Academic Division of NTNU) Remedies: D: No printed or handwritten remedies allowed. Determined, simple calculator allowed. Rules: 1/8

The problem set consists of two parts: Part I, the problem specifications pages (numbered pages 1 to 8), define the rules to follow and the questions to be answered. Part II, the answer pages (numbered pages 1 to 14), include Written text fields and the answer alternatives for choice-type questions. The rules must be followed when answering the questions. Part II also includes 3 pages where you may give comments related to formal issues about Part I or Part II, or the exam in general. These pages may also be used for Written text answers. The sensors will read and decide how to use the comments. The answer pages (Part II) shall be delivered as your answer. Two copies of Part II are handed out. Only one copy shall be delivered as your answer. The student number should be written on all answer pages (Part II) with digits. Follow the rules below to avoid wrong interpretations. Use blue or black ballpoint-pen, not a pencil. Check the boxes as clear as you can, like this: If you check the wrong box, fill it completely, like this: Then check the correct box. Other correction methods e.g. use of eraser, correcting fluid, etc., are not permitted Do not write outside the box fields or the student number fields. 2/8

Score The maximum score for the exam is 100 points. A sub-problem has a defined maximum score of X points. A sub-problem may be defined by using various types of box fields. In this exam we mainly have two different types of box fields: Written text. A sub - problem shall be answered by written text. In that case the answer shall be written in the supplied marked box in the answer page. The answer can give from 0 to max X points. True or False: Check one box per statement, or do not check. If True and False both are checked for a statement, it counts as an incorrect mark. If the sub-problem has M statements and the maximum score for this subproblem is X points, then the resulting score is calculated as follows: X Points = dif * -----, where dif is the difference between the number of M correct marks and the number of discounts points and where discount points are found from the Table below. number of discount points incorrect marks 1 0 2 1,5 i >= 3 i Formally we have: dif =Max{(number of correct marks discount points), 0}, This mapping between incorrect marks and discount points allows you to guess wrong once without being punished. Note that the True or False problem does not give incorrect marks if you do not check any of the two boxes for a given statement. 3/8

1. True or False questions. (50 points) 1.1 Application Layer (10 points) 1.1.1 A Layer offering a connection-oriented service must use a connection-oriented protocol. 1.1.2 When a data packet moves from the upper layer to the lower layers, headers are added. 1.1.3 With non-persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. 1.1.4 For a P2P file-sharing application, there is no notion of client and server sides of a communication session. 1.1.5 A machine with a single DNS name can have multiple IP addresses. 1.1.6 E-mail does not use DNS. 1.1.7 POP3 servers do not carry state information across POP3 sessions. 1.1.8 Only SMTP can be used between a user mail agent and an Internet mail server. 1.1.9 A user requests a Web page that consists of some text and two images. For this page, the client will send one request message and receive three response messages. 1.1.10 Two distinct Web pages (for example, www.item.ntnu.no/index.html and www.idi.ntnu.no/index.html) can be sent over the same persistent connection. 1.2 Transport Layer (10 points) 1.2.1 Transport layer protocol data units are processed by both routers and end hosts. 1.2.2 All transport layer protocols must perform flow control. 1.2.3 In a Go-Back-N protocol, the sender is generally allowed to transmit multiple packets without waiting for an acknowledgment. 1.2.4 TCP provides message stream transport service. 1.2.5 When TCP is used, the TCP port number at the receiver side must be the same as the sender side. 1.2.6 UDP is not a reliable protocol. 1.2.7 Suppose Host A is sending a large file to Host B over a TCP connection. If the sequence number for a segment of this connection is n, then the sequence number for the subsequent segment will necessarily be n+1. 1.2.8 Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; the second has sequence number 110. Then, there are 20 bytes is in the first segment. 1.2.9 Suppose Host A sends one segment with sequence number 38 and 4 bytes of data over a TCP connection to Host B. In this same segment the acknowledgment number is necessarily 42. 1.2.10 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789. Then, both of these segments will be directed to the same socket at Host C. 4/8

1.3 Network Layer (10 points) 1.3.1 The Network Layer is responsible for providing reliable end-to-end transmission. 1.3.2 The service provided by the Internet Network Layer is connectionless. 1.3.3 The 32-bit binary equivalent of the IP address 223.1.3.27 is 11011111 00000001 00000011 00011011 1.3.4 IP guarantees that the packets will arrive in the right sequence. 1.3.5 The forwarding process of a router is responsible for transferring a packet from an incoming link to an outgoing link. 1.3.6 In a packet-switched network, routers must remember what connection each packet belongs to. 1.3.7 Each interface of a router in the Internet should have one IP address. 1.3.8 In the Internet, a node may receive multiple copies of the same packet. 1.3.9 With DHCP, a host may be assigned an IP address that is different each time the host is connected to the network. 1.3.10 NAT (Network Address Translation) is used to translate hostnames into IP addresses. 1.4 Link Layer and LANs (10 points) 1.4.1 Link layer also needs to provide flow control. 1.4.2 Error control based on even parity means that a parity bit is added so that the number of 1 s is even. 1.4.3 CRC (Cyclic Redundancy Check) detects all errors. 1.4.4 In CRC (Cyclic Redundancy Check), the generator polynomials used by the sender and the receiver need not be the same. 1.4.5 Dividing the binary value 10011100 by 1001 using modulo-2 without carries gives a remainder of 101. 1.4.6 Bridges use IP addresses to route frames to their destinations. 1.4.7 Hubs use the frame destination address to route frames to their destination. 1.4.8 The slotted ALOHA protocol is more efficient than the pure ALOHA. 1.4.9 Ethernet provides connectionless service to the network layer. 1.4.10 If all the links in the Internet were to provide reliable delivery service, then the TCP reliable delivery service would be redundant. 5/8

1.5 Wireless Networks, Multimedia Networking and Miscellaneous (10 points) 1.5.1 Ethernet and 802.11 use the same frame structure. 1.5.2 Hosts associated with a base station are often referred to as operating in infrastructure mode, where traditional network services, such as address assignment and routing, are provided by the network to which a host is connected via the base station. 1.5.3 Before an 802.11 station transmits a data frame, it must first send an RTS (Request to Send) frame and receive a corresponding CTS (Clear to Send) frame. 1.5.4 It is possible for a CDN (Content Distribution Network) to provide worse performance to a host requesting a multimedia object than if the host has requested the object directly from the distant origin server. 1.5.5 Circuit switching gives higher variation in the end-to-end transfer time than packet switching. 1.5.6 In a packet switching network, assume that all packets have the same length and the queuing delay is ignored. Then, for the connection-oriented service, the connection setup time is always longer than the propagation time of a packet from the sender to the receiver. 1.5.7 In order to maintain registration, SIP (Session Initiation Protocol) clients must periodically send REGISTER messages. 1.5.8 If stored video is streamed directly from a Web server to a media player, the application is using TCP as the underlying transport protocol. 1.5.9 FTP runs on top of UDP. 1.5.10 RTSP (Real-Time Streaming Protocol) does not restrict how streamed media is transported. 6/8

2. Explain connection-oriented service and connectionless service: (10 points) 2.1.Explain connection-oriented service. 2.2.Explain connectionless service. 2.3.What is the principal difference between connection-oriented service and connectionless service? 3. In a packet-switched network, when a packet travels through the network, the packet suffers from several types of delays. (10 points) 3.1.Consider a packet of length L which begins at end system A, travels over one link to a packet switch, and travels from the packet switch over a second link to a destination end system. Let di, si and Ri denote the length, propagation speed, and the transmission rate of link i, for i = 1,2. The packet switch delays each packet by dproc. Suppose now the packet length is 1000 bytes, the propagation speed on both links is s1 = s2 =2.5 10 8 m/s, the transmission rates of both links is R1 = R2 =1 Mbps, the packet switch processing delay is dproc =2 msec, the length of the first link is 6000 km, and the length of the last link is 3000 km. Assuming no queuing delays, what is the total end-to-end delay for the packet? 3.2.Suppose N=100 packets arrive simultaneously to a link at which no packets are currently being transmitted or queued. Each packet is of length L=1000 bytes and the link has transmission rate R=1 Mbps. What is the average queuing delay for these packets? 4. Flow control is needed in communication networks. (10 points) 4.1 What is flow control? 4.2 Which Layer (or Layers) may implement flow control? Explain why. 4.3 Explain stop-and-wait flow control. 4.4 Discuss two disadvantages or problems of stop-and-wait flow control. 4.5 Assume the propagation delay between the sender and receiver is 100ms, and the maximum packet size is 1500 bytes. What is the maximum data rate that can be achieved by stop-and-wait flow control? 7/8

5. Consider a datagram network using 32-bit addresses. (10 points) 5.1.Suppose a router in the network has the following (classless inter-domain routing) entries in its routing table: Address/mask Next hop 135.46.0.0/22 Interface 0 135.46.128.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with the following address arrives? 5.1.1 135.46.129.10 5.1.2 135.46.0.14 5.1.3 135.46.48.2 5.1.4 192.53.40.7 5.1.5 192.53.56.7 5.2.Suppose in the network there is a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 192.53.40/24. Also suppose that Subnet 1 is required to support up to 125 interfaces, and Subnet 2 and Subnet 3 are each required to support up to 60 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints 6. DNS (Domain Name System) is used in the Internet. (10 points) 6.1.Explain why DNS is needed for the Internet, and give two Internet applications that use DNS. 6.2.Internet DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem? Why? 6.3.The Internet DNS name space is divided into zones. Normally how many DNS servers are used for a zone? Why? 8/8