EKSAMEN / EXAM TTM

Similar documents
EKSAMEN / EXAM TTM

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

First Midterm for ECE374 03/09/12 Solution!!

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Transport Layer Protocols

Final for ECE374 05/06/13 Solution!!

CS268 Exam Solutions. 1) End-to-End (20 pts)

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Networking Test 4 Study Guide

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

Data Link Layer. Flow Control. Flow Control

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Lecture 28: Internet Protocols

Wide Area Network Latencies for a DIS/HLA Exercise

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

First Midterm for ECE374 02/25/15 Solution!!

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Computer Networks. Chapter 5 Transport Protocols

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

Computer Networks and the Internet

Question: 3 When using Application Intelligence, Server Time may be defined as.

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Exam 1 Review Questions

WAN Data Link Protocols

Internet Packets. Forwarding Datagrams

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

First Midterm for ECE374 03/24/11 Solution!!

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Written examination in Computer Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

The TCP/IP Reference Model

Internet Protocol version 4 Part I

Visualizations and Correlations in Troubleshooting


CS335 Sample Questions for Exam #2

TCP in Wireless Mobile Networks

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Requirements of Voice in an IP Internetwork

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Internet Concepts. What is a Network?

Internet structure: network of networks

Introduction to Metropolitan Area Networks and Wide Area Networks

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

Protocols and Architecture. Protocol Architecture.

Computer Networks - CS132/EECS148 - Spring

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

Objectives of Lecture. Network Architecture. Protocols. Contents

LESSON Networking Fundamentals. Understand TCP/IP

Ethernet. Ethernet. Network Devices

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Advanced Computer Networks Project 2: File Transfer Application

RARP: Reverse Address Resolution Protocol

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

PART III. OPS-based wide area networks

Solutions to the Sample Questions on Introduction

1 Introduction to mobile telecommunications

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Chapter1: Exercises. Silvia Giordano ICA, EPFL. Project e-1

High Speed Internet Access Using Satellite-Based DVB Networks

Access Control: Firewalls (1)

Transport and Network Layer

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

Expert Reference Series of White Papers. Basics of IP Address Subnetting

CMPT 165: The Internet, Part 3

Chapter 10 Troubleshooting

Introduction, Rate and Latency

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Solving complex performance problems in TCP/IP and SNA environments.

IP - The Internet Protocol

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Computer Networks & Security 2014/2015

Architecture and Performance of the Internet

The OSI and TCP/IP Models. Lesson 2

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

What is Network Latency and Why Does It Matter?

Computer Networks. Data Link Layer

Data Networks Summer 2007 Homework #3

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

WHITE PAPER. IP-based Networks: Axis White Paper, Copyright 2002, Axis Communications

Transcription:

1.1 1.1.1...... 1.1.6...... 1.1.2...... 1.1.3..... 1.1.4...... 1.1.5..... 1.1.7...... 1.1.8..... 1.1.9...... 1.1.10... 1.2 1.2.1...... 1.2.2...... 1.2.3..... 1.2.4...... 1.2.5..... 1.2.6...... 1.2.7...... 1.2.8..... 1.2.9...... 1.2.10... 1.3 1.3.1...... 1.3.2...... 1.3.3..... 1.3.4...... 1.3.5..... 1.3.6...... 1.3.7...... 1.3.8..... 1.3.9...... 1.3.10... 1.4 1.4.1...... 1.4.2...... 1.4.3..... 1.4.4...... 1.4.5..... 1.4.6...... 1.4.7...... 1.4.8..... 1.4.9...... 1.4.10... 1.5 1.5.1...... 1.5.2...... 1.5.3..... 1.5.4...... 1.5.5..... 1.5.6...... 1.5.7...... 1.5.8..... 1.5.9...... 1.5.10... Kontroller: Kandidatnr. på alle sider Samme kandidatnr. over alt Eksamensvaktens signature / Invigilator's signature 1/7

2. 2.1 In connection-oriented service, a connection is set up before information data transfer. All information data are transmitted along the same connection path to reach the destination. After the transmission, the connection is released. 2.2 In connectionless service, no connection is set up before the information data are transmitted. In addition, data are transferred as units, each with an address. Each unit is routed independently to the destination. 2.3 The principal difference is that the connection-oriented service needs to set up a connection before transmission and release it after transmission, while the connectionless service needs not. 2/7

3. 3.1 The first end system requires L/R 1 to transmit the packet onto the first link; the packet propagates over the first link in d 1 /s 1 ; the packet switch adds a processing delay of d proc ; after receiving the entire packet, the packet switch requires L/R 2 to transmit the packet onto the second link; the packet propagates over the second link in d 2 /s 2. Adding these five delays gives d end-end = L/R 1 + L/R 2 + d 1 /s 1 + d 2 /s 2 + d proc With the values given in the question, we have: L/R1 = (1000*8) / (1Mbps) = 8ms L/R2 = (1000*8) / (1Mbps) = 8ms d1/s1 = (6000km)/( 2.5 10 8 m/s) = 24 ms d2/s2 = (3000km)/( 2.5 10 8 m/s) = 12 ms d proc = 2ms So, the end-to-end delay is 8+8+24+12+2 = 54ms 3.2 The queuing delay is 0 for the first transmitted packet, L/R for the second transmitted packet, and generally, (n-1)l/r for the n th transmitted packet. Thus, the average delay for the N packets is (L/R + 2L/R +... + (N-1)L/R)/N = L/RN(1 + 2 +... + (N-1)) = LN(N-1)/(2RN) = (N-1)L/(2R) Note that here we used the well-known fact that 1 + 2 +... + N = N(N+1)/2 Plugging N=100, L=1000 bytes and R=1 Mbps into the above form, we get: 99 * (1000*8) / (2 * 1Mbps) = 396ms 3/7

4. 4.1 Flow control is the receiver controls the data flow (sending rate) from the sender. 4.2 Flow control is commonly used in Transport Layer and Data Link Layer. It may also be used in Application Layer. The reason of having flow control in these layers is that, due to limited processing capacity, limited storage space and/or other reasons, the receiver may not be able to handle the incoming data as they arrive and will lose them, if the sender sends the data too fast. This scenario can happen in Transport Layer, Data Link Layer and Application Layer. 4.3 In stop-and-wait flow control, the sender sends one packet and then waits for an acknowledgment from the receiver before proceeding to send the next packet. In particular, after sending a packet, the sender keeps waiting and checking if there is an acknowledgement for this packet. If a pre-defined timeout time has passed for the waiting, the sender re-sends the packet. If the acknowledgement is received, the sender sends the next packet. At the receiver side, it sends back to the sender an acknowledgement for the packet it receives correctly 4.4 One problem/disadvantage is that the stop-and-wait flow control is inefficient in utilizing the communication channel between the sender and the receiver: The following equation shows the channel utilization of stop-and-wait flow control: U = (X/C)/[(X/C)+2τ] Where U denotes the maximum channel utilization: X packet size; C the channel capacity; τ one way propagation delay. This equation implies that, if the propagation cannot be ignored, the stopand-wait flow control can never fully utilize the channel capacity. Another problem is that duplicate packets may be sent and received. If packets are not associated with some sequence number, the receiver side will not notice such duplication, and this will cause problem. 4.5 Under stop-and-wait flow control, it takes at least one round-trip time to send one data packet. This round trip time, in this question, is at least twice the one way propagation delay. In other words, at most one packet (of size 1500 bytes) is sent every 200ms. So, the maximum achievable rate is 1500*8bits/200ms=60kbps. 4/7

5. 5.1 The router will forward the packet according to the following: 5.1.1 to Interface 1 5.1.2 to Interface 0 5.1.3 to Interface 0 5.1.4 to Router 1 5.1.5 to Router 2 5.2 (Any of the following two options is correct.) For Subnet 1, two practical options are: 192.53.40.0/25 or 192.53.40.128/25. If Subnet 1 takes192.53.40.0/25, Subnets 2 and 3 can take 192.53.40.128/26 and 192.53.40.192/26. If Subnet 2 takes192.53.40.128/25, Subnets 2 and 3 can take192.53.40.0/26 and192.53.40.64/26. 5/7

6. 6.1 In the Internet, textual domain names are used. However, the Internet protocol is based on numerical IP addresses. Hence, DNS is needed to map textual domain names and e- mail destinations/addresses to numerical IP-addresses. WWW and E-mail are two sample Internet applications that use DNS. 6.2 DNS is generally unchanged over short time. So, operations can be repeated without harm. When a process makes a DNS request, it typically starts a timer. If the timer expires, it just makes the request again. So, no harm is done. 6.3 Normally, each zone has a primary DNS name server and one or several secondary DNS name servers. Secondary name servers are used to increase the reliability of the system in cases where some name server(s) are down. 6/7

KOMMENTARER COMMENTS Adjustment has been made in the final grading, corresponding to questions explained below: Q.1.5.7: In the assignment and a previous exam, the answer to this True/False question is contradicting. 7/7