New York University Computer Science Department Courant Institute of Mathematical Sciences

Similar documents
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

What is VLAN Routing?

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

RARP: Reverse Address Resolution Protocol

Internet Packets. Forwarding Datagrams

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

LAN Switching and VLANs

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Chapter 1 Reading Organizer

UPPER LAYER SWITCHING

Final for ECE374 05/06/13 Solution!!

The IP Transmission Process. V1.4: Geoff Bennett

Teldat Router. ARP Proxy

Internet Control Protocols Reading: Chapter 3

New York University Computer Science Department Courant Institute of Mathematical Sciences

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

IT 3202 Internet Working (New)

Nortel Technology Standards and Protocol for IP Telephony Solutions

Ethernet. Ethernet. Network Devices

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Candidates should attempt FOUR questions. All questions carry 25 marks.

Transport and Network Layer

Network congestion control using NetFlow

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Introduction to Network Security Lab 1 - Wireshark

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Exhibit n.2: The layers of a hierarchical network

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Networking Test 4 Study Guide

Introduction to IPv6 and Benefits of IPv6

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

VXLAN: Scaling Data Center Capacity. White Paper

Packet Tracer 3 Lab VLSM 2 Solution

Internet Protocol Address

SSVP SIP School VoIP Professional Certification

How To Understand and Configure Your Network for IntraVUE

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

IP - The Internet Protocol

Instructor Notes for Lab 3

Ethernet (LAN switching)

Lecture Computer Networks

- IPv4 Addressing and Subnetting -

CMPT 165: The Internet, Part 3

NetFlow Subinterface Support

What communication protocols are used to discover Tesira servers on a network?

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Lab - Using IOS CLI with Switch MAC Address Tables

Can PowerConnect Switches Be Used in IP Multicast Networks?

IP Multicasting. Applications with multiple receivers

04 Internet Protocol (IP)

20. Switched Local Area Networks

11/22/

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

PART IV. Network Layer

Network Layer: Network Layer and IP Protocol

Internet Protocols Fall Outline

IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

Quality of Service. PAN-OS Administrator s Guide. Version 6.0

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

The Wireless Network Road Trip

Protocol Data Units and Encapsulation

Latency on a Switched Ethernet Network

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

The OSI and TCP/IP Models. Lesson 2

Written examination in Computer Networks

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Data Communication and Computer Network

Networking 4 Voice and Video over IP (VVoIP)

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

- Hubs vs. Switches vs. Routers -

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

ProSAFE 8-Port and 16-Port Gigabit Click Switch

Based on Computer Networking, 4 th Edition by Kurose and Ross

WAN Data Link Protocols

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

Three Key Design Considerations of IP Video Surveillance Systems

Network layer: Overview. Network layer functions IP Routing and forwarding

Exam 1 Review Questions

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Network and Host Addresses , Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

Transcription:

ew York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & etworks Course umber: g22.2662-00 Instructor: Jean-Claude Franchitti Session: 4 Assignment #4 Solutions Question (Problem 8) a) E ( p( ( ( 2 p( )( (( p( )) 2 E' ( 0 p* b) E( ( ) lim ( ) ( ) ( ) lim ( ) e Thus lim E( e

Question 2 (Problem 9) E ( p( 2( ) ( ( 2( 2) 2( 3) p2( )( (( p2( )) 2( 3) 0 p* 2 E ( 2 ( 2 lim E( 2 e 2e 2( ) ) Question 3 (Problem 4) a), b) See figure below. Ans: a,b. Assigning the MAC addresses and IP addresses to all the interfaces. Subnet : A: IP: 92.68..00 MAC: 00-00-00-00-00-00 B : IP : 92.68..003 MAC: ----- For Left Router Subnet Interface : IP: 92.68..002 MAC: 22-22-22-22-22-22 Subnet 2 Interface: IP: 92.68.2.002 MAC: 33-33-33-33-33-33 Subnet 2: C: IP: 92.68.2.00 MAC : 44-44-44-44-44-44 D: IP: 92.68.2.004 MAC : 66-66-66-66-66-66 For Right Router Subnet 2 Interface : IP : 92.68.2.003 MAC: 55-55-55-55-55-55 Subnet 3 Interface: IP: 92.68.3.002 MAC: 88-88-88-88-88-88 Subnet 3: E : IP: 92.68.3.00 MAC : 77-77-77-77-77-77 F : IP: 92.68.3.003 MAC: 99-99-99-99-99-99

c). Forwarding table in E determines that the datagram should be routed to interface 92.68.3.002. 2. The adapter in E creates and Ethernet packet with Ethernet destination address 88-88-88-88-88-88. 3. Router 2 receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 98.62.2.002. 4. Router 2 then sends the Ethernet packet with the destination address of 33-33-33-33-33-33 and source address of 55-55-55-55-55-55 via its interface with IP address of 98.62.2.003. 5. The process continues until the packet has reached Host B. d) ARP in E must now determine the MAC address of 98.62.3.002. Host E sends out an ARP query packet within a broadcast Ethernet frame. Router 2 receives the query packet and sends to Host E an ARP response packet. This ARP response packet is carried by an Ethernet frame with Ethernet destination address 77-77-77-77-77-77. Question 4 (Problem 5) a). o. E can check the subnet prefix of Host F s IP address, and then learn that F is on the same LA. Thus, E will not send the packet to the default router R. Ethernet frame from E to F: Source IP = E s IP address Destination IP = F s IP address Source MAC = E s MAC address Destination MAC = F s MAC address b). o, because they are not on the same LA. E can find this out by checking B s IP address. Ethernet frame from E to R: Source IP = E s IP address Destination IP = B s IP address Source MAC = E s MAC address Destination MAC = The MAC address of R s interface connecting to Subnet 3. c). Switch S will broadcast the Ethernet frame via both its interfaces as the received ARP frame s destination address is a broadcast address. And it learns that A resides on Subnet which is connected

to S at the interface connecting to Subnet. And, S will update its forwarding table to include an entry for Host A. Yes, router R also receives this ARP request message, but R won t forward the message to Subnet 3. B won t send ARP query message asking for A s MAC address, as this address can be obtained from A s query message. Once switch S receives B s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LA segment). For L, 500, the delay is For L 50, store-and-forward delay sec. 500 8 40 sec 9.4 sec 6 6220 d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for L 500 is too large for real-time voice applications. Question 5 (Problem 27) Ans. a. Detemining the packetization delay in terms of L. Because it is encoded voice and voice is of low bandwidth it has a large packetization. Packetization delay = 8*L / 28,000 = L/6000 milliseconds. b. Determining the packetization delay for L = 500 bytes and L = 50 bytes. Packetization delay for L = 500 bytes = 8*500 /28000 = 0.09375 milliseconds 5 Packetization delay for L = 50 bytes = 8*50 /28000 = 0.00325 milliseconds

a. Given R = 622 Mbps for L = 500 bytes and L = 50 bytes. Calculating the store and forward delay with a header of 5 bytes. Store and forward delay for L = 50 bytes = (50+5)*8/622,000,000 = 0.707*0^-6 = 7.07*0^-7 Store and forward delay for L = 500 bytes = (500+5)*8/622,000,000 = 9.35*0^-6 b. Advantages: When the packetization delay is combines with store and forward delay the total delay exceeds the human threshold of 00 milliseconds. And also the packetization delay clearly increases with the cell size, therefore its clearly evident that smaller cell size is more advantageous because it has a shorter creation time. Question 6 (Problem 33) Ans. a. The email application will have to use the fourth rack for about 0./00 of the time i.e; 0.00 % The video application will also have to use the fourth rack for 0.00 % of time. b. Assuming email and video usage are independent the fraction of time both the applications need their fourth rack is : 0.00*0.00 = *0^-6 % of time = 0.0000 c. Each rack consists of its own switch and that is connected to the tier to tier switch. The first switch is connected to st Tier-to-tier switch and next switch is connected to second tier-to-tier switch and the last switch is connected to the last tier-to-tier switch. In this way the topology can be used so that only seven racks are collectively assigned to two applications (assuming the topology can support all the traffic).