DIN 2012 Tutorial. physical links between primary and secondary stations: Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL).

Similar documents
Transport Layer Protocols

Networking Test 4 Study Guide

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Final for ECE374 05/06/13 Solution!!

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Ethernet. Ethernet. Network Devices

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

IP - The Internet Protocol

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II IETF Integrated Services (IntServ)

Internet Quality of Service

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS

How To Provide Qos Based Routing In The Internet

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

iseries Quality of service

02-QOS-ADVANCED-DIFFSRV

Protocols and Architecture. Protocol Architecture.

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Mathatma Gandhi University

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Integrated Service (IntServ) versus Differentiated Service (Diffserv)

Requirements of Voice in an IP Internetwork

Lecture Computer Networks

Improving Quality of Service

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

- Hubs vs. Switches vs. Routers -

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

RARP: Reverse Address Resolution Protocol

Written examination in Computer Networks

Transport and Network Layer

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

The OSI Model and the TCP/IP Protocol Suite

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Encapsulating Voice in IP Packets

ERserver. iseries. Quality of service

Fiber Channel Over Ethernet (FCoE)

Per-Flow Queuing Allot's Approach to Bandwidth Management

VoIP network planning guide

Based on Computer Networking, 4 th Edition by Kurose and Ross

Overview of Computer Networks

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

The OSI and TCP/IP Models. Lesson 2

First Midterm for ECE374 03/09/12 Solution!!

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Quality of Service (QoS)) in IP networks

Chapter 1 Reading Organizer

Protocol Data Units and Encapsulation

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Introduction to IP v6

Definition. A Historical Example

Network Simulation Traffic, Paths and Impairment

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Computer Networks. Chapter 5 Transport Protocols

Data Communication Networks and Converged Networks

Distributed Systems 3. Network Quality of Service (QoS)

Technical Support Information Belkin internal use only

Network Layer: Network Layer and IP Protocol

Communication Systems Internetworking (Bridges & Co)

Computer Networks CS321

Technology Overview. Class of Service Overview. Published: Copyright 2014, Juniper Networks, Inc.

Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches

PART III. OPS-based wide area networks

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Configuring QoS in a Wireless Environment

Voice over IP: RTP/RTCP The transport layer

UPPER LAYER SWITCHING

Networked AV Systems Pretest

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

CS268 Exam Solutions. 1) End-to-End (20 pts)

CPS221 Lecture: Layered Network Architecture

18: Enhanced Quality of Service

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

hp ProLiant network adapter teaming

technology standards and protocol for ip telephony solutions

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Data Communication and Computer Network

WAN Technology. Heng Sovannarith

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Question: 3 When using Application Intelligence, Server Time may be defined as.

CS335 Sample Questions for Exam #2

Transcription:

DIN 2012 Tutorial (Q1a) In the IEEE 802.15 standard (Bluetooth), describe the following two types of : physical links between primary and secondary stations: (i) (ii) Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL). Synchronous Connection-oriented (SCO) link: Used when latency is more important than error free data delivery. Here the physical link is created between the primary and a secondary by reserving time slots at regular intervals. Data rate of 64Kbps for each link. Asynchronous Connectionless Link (ACL): Used when error free is more important than latency in data delivery. Here retransmission of corrupted frames is allowed. Secondary return ACL frames only if previous slot is addressed to it. Maximum data rate is 721 Kbps (Q1b) If an Ethernet destination address is 45:48:1B:2E:08:AB, (i) What type of address is this (unicast, multicast or broadcast)? (ii) Can the above Ethernet address be used as a source address? Explain. (i) The first byte in binary is 01000101. The least significant bit is 1. This means that the pattern defines an Ethernet multicast address. (ii) An Ethernet multicast address can be a destination address, but not a source address. If used as source address, the receiver will assume that there is an error, and discards the packet. (Q1c) Figure below shows five LANs interconnected with two bridges B1 and B2. Initially the forwarding tables of both B1 and B2 are empty. Construct the routing tables for B1 and B2 following sequence of events: 1. Host D sends a frame to F 2. Host A to E 3. Host E to D 4. Host F to A

A C D F LAN1 LAN3 LAN5 B1 B2 Port 1 Port 2 Port 1 Port 2 Port 3 Port 3 LAN2 LAN4 B E Step 1: D sends frames to F: Both bridges B 1 and B2 will flood the frame on all the other ports. B1 s forwarding table: D 2 B2 s forwarding table: D 1 Step 2: A sends frames to E: Both bridges B 1 and B2 will flood the frame on all the other ports. B1 s forwarding table: D 2 A 1 B2 s forwarding table: D 1 A 1 Step 3: E sends frames to D. When bridge B2 receives the frame from port 3, it already knows that D is attached to port 1 so it will explicitly forward the frame to that port. B1 receives the frame on port 2 and it just drops the frames.

B1 s forwarding table: B2 s forwarding table: D 2 A 1 E 2 D 1 A 1 E 3 Step 4: F sends frames to A. When bridge B2 receives the frame from port 2, it already knows that A is attached to port 1 so it will explicitly forward the frame to that port. B1 receives the frame on port 2 and will explicitly forward it to port 1. B1 s forwarding table: B2 s forwarding table: D 2 A 1 E 2 F 2 D 1 A 1 E 3 F 2

(Q1d) ALOHA and Slotted ALOHA are random access methods for accessing shared media (channel) used in wired and wireless LANs. Assume 100 stations share a 1 Mbps channel. If frames are 1000 bits long and each station sends 10 frames per second, find the throughput in ALOHA and Slotted ALOHA networks. Assume Frame Transmission time = Tfr, G = load, ns = number of stations and nfs = number of frame per second. (1) We can first calculate Tfr and G, and then the throughput. Tfr = (1000 bits) / 1 Mbps = 1 ms G = ns nfs Tfr = 100 10 1 ms = 1 For pure ALOHA Throughput S = G e 2G 13.53 percent This means that each station can successfully send only 1.35 frames per second. 2) We can first calculate Tfr and G (same as in 1), and then the throughput. G = ns nfs Tfr = 100 10 1 ms = 1 Tfr = (1000 bits) / 1 Mbps = 1 ms For slotted ALOHA Throughput S = G e G 36.7 percent This means that each station can successfully send only 3.67 frames per second.

(Q2a) The following is a dump from a UDP header in hexadecimal format: (i) What is the source port number? (ii) What is the destination port number? 13 31 00 35 00 2C E2 17 (iii) What is the length of the UDP datagram? (iv) What is the total length of user data? (v) Is the packet directed from a client to a server or vice versa? All numerical answers should be in decimals. (i) Source port number 4913 (1331 in hexadecimal) (ii) Destination port number 53 (0035 in hexadecimal). (iii) Datagram length 44 bytes (2C in hexadecimal) (iv) Data length 36 bytes (44 8 byte header) (v) Well known port numbers on servers are assigned low numbers. Here the destination port number was 53. So the UDP packet is directed from a client to a server (DNS service) (Q2b) The TCP congestion control policy uses receiver and congestion windows, the slow start algorithm and the threshold parameter. Assuming a maximum TCP segment size of 1 Kbyte, a TCP receiver window of 18 Kbyte and a congestion window set to 30 Kbyte when a timeout occurs, calculate the following, showing your working: (i) The new threshold parameter; (ii) How big the congestion window will be if the next 9 sets of transmissions are all successful. (i) Threshold parameter is set to half the current congestion window i.e. Threshold = 15K (ii) Congestion window will be set to one segment size and doubles with each successfully transmitted burst. After 4 bursts the congestion window = 8K. For transmission 5, congestion window will equal 15K (because it cannot exceed the threshold limit). For transmission 6, 7, 8 the congestion window increases by one segment (18 K bytes). For transmission 9, congestion window is 19K bytes. BUT

please note that the transmission window is the smallest of the receiver and congestion windows. So sender transmission window is 18 Kbytes (not 19 Kbytes). (Q2c) In the Internet email application, non-ascii characters are encoded using either base64 or quoted-printable methods. Calculate the following: (i) A non-ascii message of 1000 bytes is encoded using base64 method. What is the ratio of redundant bytes to the total message length? (ii) A message of 1000 bytes is encoded using quoted-printable method. The message consists of 90% ASCII and 10% non ASCII characters. What is the ratio of redundant bytes to the total message length? (iii) Compare the encoding efficiency in (i) and (ii). (i) 1000 (8 /24) = 333.3 334 blocks of 24 bits. Each block becomes 32 bits. There are 334 (32 / 8) = 1336 bytes in the encoded message. The ratio of redundant bytes to the entire message length is 336/1336. (ii) In quoted-printable method, each non-ascii is substituted by 3 bytes. 900 + (100 3) = 1200 bytes in the encoded message. There are 200 redundant bytes. The ratio of redundant bytes to the entire message length is 200/1200 = 1/6. (iii) The efficiency (i) = 1000/1336 = 75%. The efficiency in (ii) = 1000/1200 = 83%. (Q2d) In TELNET application (binary mode), a client sends the following sequence of bits: 11010011 00000000 11111111 (i) Show the actual sequence of bits that is sent by TELNET application. (ii) Show the TELNET negotiation for binary mode between the client and server. (iii) Calculate the minimum number of bits sent at TCP level (transport layer) to accomplish this task.

(i) The TELNET bits sequence is: 11010011 00000000 11111111 11111111 (4 bytes) The byte 11111111 is duplicated because it is the same as IAC (Interpret the next character as control); it must be repeated to be interpreted as data. (ii) The TELNET uses the Network Virtual Terminal (NVT) control character and negotiation options as follows: Client to Server: IAC DO BINARY (3 bytes) Server to Client: IAC WILL BINARY (3 bytes) (iii) TCP number of bits: If each transmission is encapsulated in a single TCP segment with 20 bytes of header, there will be 3 segments of 23, 23, and 24 bytes for the total of 70 bytes or 560 bits.

(Q3a) The Diffie-Hellman key exchange protocol allows a sender and recipient to exchange a shared secret key, which can be used subsequently to encrypt messages between them: (i) Explain the Diffie-Hellman key exchange protocol. (ii) The sender chooses a secret key = 7, and transmits the message (23, 3, 2) to the recipient. The recipient replies with message (18). What is the shared secret key? Show your working. (i) Diffie-Hellman key exchange protocol allows senders and recipients such as Alice and Bob to exchange a shared secret-key as follows: Alice and Bob have to agree on two large prime numbers: n and g where (n - 1) / 2 is a prime as well. These numbers can be public, so either of them can pick n and g and tell the other openly. Now Alice picks a large prime number (say 512-bits) x and keep it secret. Similarly, Bob picks a large prime number y. Alice initiates the key exchange protocol by sending message M1: M1 = (n, g, g x mod n) Bob responds by sending message M2: M2 = (g y mod n) Now Alice can calculate the shared secret-key K: k = (g y mod n) x mod n = g yx (mod n) = g xy (mod n) Also Bob can calculate the same secret-key k: k = (g x mod n) y mod n = g xy (mod n) The main weakness of Diffie-Hellman protocol is that neither Alice nor Bob can authenticate the origin of messages M2 and M1 respectively. One solution is to add Alice s digital signature to message M1 and Bob s digital signature to M2. (ii) Sender selects x=7. The sender can calculate the shared key (k) is g xy mod n: k = (g y mod n) x mod n, where (g y mod n) = 18, x = 7 and n = 23 Therefore k = 18 7 mod 23 = 6 (Alice). Assuming we know that Bob s y = 9, then k = 2 9 mod 23 = 6!!! (Q3b) Logical Key Hierarchy (LKH) is used for scalable rekeying in secure multicast. Figure 5.A shows a secure multicast group of 16 members:

(i) Illustrate the rekeying required when member 13 joins this group. O Group key M N Key hierarchy I J K L A B C D E F G H Group members 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Figure (ii) If the multicast group consists of 1024 (=2 10 ) members, how many rekey messages are needed to remove a single member, in case of (1) flat key and (2) LKH systems. (i) A new group key O can be delivered to member 13 as follows: 1. Group key O is encrypted with key N; 2. Key N key is encrypted key L; 3. Key L key is encrypted key G; 4. Key G key is encrypted with member13 unique key; All the above messages can be sent in one transmission from the group controller to member 13.

O Group key M N Key hierarchy I J K L A B C D E F G H Group members 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 (ii) Let us assume N = 1024 In case of flat key system: N 1 = 1024-1 = 1023 messages are needed. In case of LKH, 2log 2 N 1 = 2log 2 2 10 1 = 19 messages. Thus LKH scales better for large groups. (Q3c) The Integrated Services (Int-Serv) model uses the Resource Reservation Protocol (RSVP) as a signalling mechanism for end-to-end QoS reservations. (i) Describe the Path and Resv messages in RSVP. (ii) The Figure below shows the QoS reservation for multicasting from source S1 to receiver stations Rc1, Rc2 and Rc3. Explain the reservations mergers in routers R1, R2 and R3. Figure

(i) Path message: travels from sender and reaches all receivers (downstream) in a unicast or multicast path. On the way, Path message stores the necessary QoS information in the routers. Resv message: After a receiver receives the Path message, it send Resv message. It travels toward the sender (upstream) and makes reservation on the routers that support RSVP. (ii) Rc3 requests 2 Mbps bandwidth while Rc2 requests 1 Mbps. Router R3 merges the two requests and reserves 2 Mbps (highest of the two). Same situation is true for R2, so R2 reserves 3 Mbps and R1 reserves 3 Mbps as well. The reason for differences in Rc1, Rc2 and Rc3 reservation is that different receivers could handle different grades of QoS (even from the same source) because of the multi-layer encoding of that video. (Q3c) Figure below shows the packet differentiation model in Differentiated Services. What are the packet classifier and traffic conditioner? Explain all functional entities (boxes) in this diagram

Packet classifier could be located in access router or ingress edge router. It classifies packets into different service classes based on the contents of the DS field and other fields in the IP headers of the packets, and then forwards them to a traffic conditioner for further processing. Two types of classifiers have been defined: BA (Behavior Aggregate) Classifier and MF (Multi- Field) Classifier. The BA classifier sorts packets based on the DSCP only. The MF classifier, however, categorizes packets based on DS field and other IP header fields, such as source address, destination address, protocol ID, source port, and destination port. Traffic conditioner executes control functions to assure that packets are compliant with contracted traffic profile. It measures the traffic load and marks/ remarks packets to be in-profile or out-of-profile. It may also delay or drop packets to enforce traffic characteristics to conform to the contracted profile. A traffic conditioner comprises meter, marker, dropper, and shaper. Marker sets the DS field of a packet to a particular codepoint, adding the marked packet to a particular DS behavior aggregate. The marker may be configured to mark all packets that are steered to it to a single or a set of codepoints. Meter measures the temporal properties of the stream of packets selected by a classifier against a traffic profile specified in contract. A meter passes state information to other conditioning functions to trigger a particular action for each packet. Shaper delays some or all of the packets in a traffic stream in order to bring the stream into compliance with a traffic profile. A shaper usually has a finite-size buffer, and packets may be discarded if there is not sufficient buffer space to hold the delayed packets. Dropper discards some or all of the packets in a traffic stream in order to bring the stream into compliance with a traffic profile. This process is known as policing the stream.