Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.



Similar documents
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CSMA/CA. Information Networks p. 1

Level 2 Routing: LAN Bridges and Switches

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Final for ECE374 05/06/13 Solution!!

Transport Layer Protocols

Written examination in Computer Networks

Wiereless LAN

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

DG Forwarding Algorithm

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Life of a Packet CS 640,

Routing in packet-switching networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

Dynamic Source Routing in Ad Hoc Wireless Networks

Ethernet. Ethernet. Network Devices

Networking Test 4 Study Guide

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wireless LAN Concepts

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CS268 Exam Solutions. 1) End-to-End (20 pts)

1 Introduction to mobile telecommunications

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

First Midterm for ECE374 03/09/12 Solution!!

CS335 Sample Questions for Exam #2

The IP Transmission Process. V1.4: Geoff Bennett

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

10CS64: COMPUTER NETWORKS - II

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Internet Control Protocols Reading: Chapter 3

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Computer Networks III

ECSE-6600: Internet Protocols Exam 2

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Introduction to Ethernet

OSI Reference Model: An Overview

Network Security. Mobin Javed. October 5, 2011

Visualizations and Correlations in Troubleshooting

Introduction to LAN/WAN. Network Layer (part II)

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

1 / 13 2 / 8 3 / 8 4 / 9 6 / 7 7 / 9 8 / / Total /100

Computer Network and Communication

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Ethernet, VLAN, Ethernet Carrier Grade

... neither PCF nor CA used in practice

Real-Time (Paradigms) (51)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

- Hubs vs. Switches vs. Routers -

IP - The Internet Protocol

Route Discovery Protocols

The Wireless Network Road Trip

THE UNIVERSITY OF AUCKLAND

Local-Area Network -LAN

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Network Layer: Network Layer and IP Protocol

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

CSCI 362 Computer and Network Security

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Ethernet (LAN switching)

Lecture 12: Link-state Routing"

Technical Support Information Belkin internal use only

28 Networks and Communication Protocols

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Lecture Computer Networks

Communication Systems Internetworking (Bridges & Co)

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Introduction to IP v6

Per-Flow Queuing Allot's Approach to Bandwidth Management

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

QoS issues in Voice over IP

Protocols and Architecture. Protocol Architecture.

Assignment 6: Internetworking Due October 17/18, 2012

Network Protocol Configuration

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

CSE 123b Communications Software


EKSAMEN / EXAM TTM

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Transport and Network Layer

Transcription:

UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet of paper. Problems take long to read but can be answered concisely. 1, Fundamentals, 20 points total, 2 points each: Give short 1 line answers for each question. If you are asked to give a reason for something, give the most important reason you can think of. Rings: The physical topology of IBM and FDDI Rings is a star-shaped ring to improve reliability. However, it increases wiring cost over a physical ring. Explain why. Hierarchical Addressing: Why medium size organizations are given multiple consecutive Class C addresses. Why multiple and why are they consecutive. Bridges versus Routers: Why its a good idea for bridges to be able to process packets at LAN rates while it is OK for routers to process packets at much slower rates. Route Computation: One reason why link state routing is preferable to distance vector style routing. Link State Routing: Why link state routing depends on a primitive flooding protocol to send LSPs through the network instead of using the existing routing table to send LSPs. Peering: Why ISPs peer with each other though no money is exchanged. DNS: Why is the Domain Name Service a good idea? BGP: Why BGP uses a path vector instead of a distance vector protocol Fragmentation: Why the Packet ID field in the IP header is mostly useless today. Transport: Why the sequence number space for a reliable data link on a point to point link need only be twice the window size, while transport sequence number spaces must be much larger than twice the window size. TCP Congestion Control and RED: Why routers implementing RED can drop a perfectly good packet even if there is space in the router buffers to store the packet. 1

2. Bridging and Pruned Multicast, 10 points: In class, we learnt about IP multicasting and how the multicast trees were pruned so that copies of multicast packets were not sent to LANs in which no station was listening to that multicast. We want to offer a similar pruned multicast service for Extended LANs by modifying bridges and endnodes slightly. The figure shows two stations X and Y. Assume that initially only X is in group G (G is a multicast data link address). Then when X sends a multicast packet to G bridge B1 should (ideally) not forward the packet. Later, assume that Y also joins group G. All bridges should learn this fact. Now when X sends a packet to G, bridge B1 should forward the packet on the upper LAN, bridge B2 should pick up the packet and forward it to Y s LAN, and bridge B3 should not forward the packet. B1 B2 B3 X Y Thus bridges need to learn all the directions through which a multicast address like G is reachable. To allow bridges to learn, we modify the endnodes that participate in a group G to periodically send a multicast packet to some All Bridges Address. However, the endnodes put G as the source address in such a packet. How would you modify the bridge learning algorithm to learn about multicast addresses like G based on the periodic updates sent by the endnodes participating in the group? Explain what each bridge learns in the above example. Assume that initially only X sends updates and show what each bridge learns. Then show what happens when Y joins the group and begins sending updates. Suppose that Y crashes and stops sending updates. X continues to send updates. Explain how bridges timeout information asssociated with multicast addresses. Not all stations participate in this protocol. What should a bridge do when it gets a multicast address that it has no learnt information about? 2

3. Mobile Stations and Radio LANs, 15 points: In this exam we will consider some of the issues concerning mobility at the Data Link, Routing, and Transport Layers. Lets start with the Data Link. Assume that mobile nodes (e.g., laptops, PDAs) communicate with fixed base stations using a radio. The radio has a fixed circular range d. A station A can communicate with station B as long as: B is within the range of A Nobody else besides A is transmitting in the range of B. (If somebody else does B will detect a collision.) A B C distance d distance d One approach to this mobile LAN is to use CSMA/CD as in Ethernet. Unfortunately, this is not efficient. Consider the 3 mobile stations in the figure. Suppose A is transmitting to B, and C decides to transmit to some other station. C may sense the channel and not hear anything because it is out of the range of A. So C begins to transmit and causes a collision at B (which receives) two signals. This is called the hidden terminal problem. Suppose, on the other hand, that B is transmitting to A and C wants to transmit. Then C will indeed hear B and defer transmission although it could have safely transmitted to anyone else except B. This is called the exposed terminal problem. An alternate approach called MACA works as follows. When C wants to transmit it transmits a small control packet called RTS to its intended receiver. The RTS contains the length X of the data packet C wants to send. If the receiver gets the RTS, it sends another control packet back to C called a CTS, which also contains the length X of the data packet. If C gets a CTS, C transmits data. If C does not hear a CTS, C times out. Any station D that hears a RTS waits long enough (for the RTS and the corresponding CTS to be sent back) before D attempts to transmsit. If station D hears a CTS, D waits long enough (for the CTS to finish and the corresponding data to be sent) before D attempts to transmsit. Notice that in the RTS case, D only waits for the CTS to finish and not the data; however, in the CTS case, D waits for the data to be sent as well. Why do the hidden terminal and exposed terminal problems not occur in the Ethernet? How does MACA avoid the hidden terminal example described above? Explain briefly the sequence of events when C wants to transmit. How does MACA avoid the exposed terminal example described above? Explain briefly the sequence of events when C wants to transmit. Suggest a reasonable retransmission strategy for a station that times out without receiving a CTS? (Your strategy should ensure that repeated collisions between stations will eventually sort themselves out.) 3

4. Mobility and Routing, 15 points: We now consider the problem of routing to a mobile station that has moved. In the figure below, assume that mobile station M is homed on the LAN that contains R3 and X. M has an IP address that contains the net number corresponding to its home LAN. Sometime later, M moves to the LAN that contains R2. Stations S and X may still send packets to M at the old address, even after M has moved. We want to explore how to modify IP routing so that these packets can be delivered to M at its new location. S R1 R2 IP Network M moves R3 M X Lets assume that M (before or after moving) tells its home router R3 of the net number of its new LAN. We assume that M does not get a new host ID at its new LAN because it would take too long to have one assigned. Assume that M has a unique Data Link ID (e.g., Ethernet address) D M that it carries to the new LAN. Assume X wants to speak to M. Since it thinks its on the same LAN as M, X may send an ARP for M. What should router R3 do in response? Suppose that R3 has a packet destined for M that was sent by either S or X. How does R3 send the packet to M? Assume that the packet for M gets to R2. How does R2 deliver the packet to M (remember that R2 cannot do an ARP because M does not have a host ID on this new LAN. However, you can add info to the packet that can help R2.) The indirect route can result in sending a large number of extra packets when speaking to M. Can you suggest some way of eventually avoiding the indirect route? When M eventually moves back to its home LAN, how do you ensure that eventually everyone sends packets to M s home LAN. 4

5, Mobility and Transport, 15 points: The mobile station M in the previous question may take a long time to move, but may be in the middle of a transport connection with S. Suppose the time to move can vary from a few seconds to a few hours depending on where M is going to move. Assume that a lot of data has been transferred in the transport connection already, and M does not want to waste this work by tearing down the connection (and then restarting the connection after M moves.) Hugh Hopeful suggests that M just use the regular flow control mechanisms in the transport protocol to stop S from sending data while M is moving. What mechanism is High referring to? Peter Protocol points out that Hugh s mechanism will not work if the move time is significantly greater than the network round trip delay. Why? Peter Protocol therefore suggests that M send a FREEZE message to S before M moves. The FREEZE message contains a conservative bound on the time for the move, and must be acked before M moves. What should S do on receiving a FREEZE message? After a few bugs, Peter Protocol realizes that the FREEZE messages have to be numbered with a sequence number. Can you suggest why? 5