Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani. Student Identification number



Similar documents
Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

CS335 Sample Questions for Exam #2

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Chapter 10 Link-State Routing Protocols

Route Discovery Protocols

Link-State Routing Protocols

O /27 [110/129] via , 00:00:05, Serial0/0/1

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Routing Protocols (RIP, OSPF, BGP)

Based on Computer Networking, 4 th Edition by Kurose and Ross

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

IP Multicasting. Applications with multiple receivers

OSPF Routing Protocol

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Introduction to TCP/IP

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

For internal circulation of BSNLonly

VLSM and CIDR Malin Bornhager Halmstad University

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Routing with OSPF. Introduction

Course Contents CCNP (CISco certified network professional)

Using OSPF in an MPLS VPN Environment

Table of Contents. Cisco How Does Load Balancing Work?

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Transport and Network Layer

IP Routing Configuring RIP, OSPF, BGP, and PBR

Router and Routing Basics

Answers to Sample Questions on Network Layer

Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Computer Networks. Main Functions

Exterior Gateway Protocols (BGP)

RIP: Routing Information Protocol

BGP: Border Gateway Protocol

Masterkurs Rechnernetze IN2097

IP addressing and forwarding Network layer

GregSowell.com. Mikrotik Routing

RIP: Routing Information Protocol

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz

10CS64: COMPUTER NETWORKS - II

Project Report on Traffic Engineering and QoS with MPLS and its applications

The Internet. Internet Technologies and Applications

Introduction to LAN/WAN. Network Layer (part II)

Chapter 4 Network Layer

Section #6: Addressing

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

Border Gateway Protocol (BGP)

Variable length subnetting

ISOM3380 Advanced Network Management. Spring Course Description

On the effect of forwarding table size on SDN network utilization

Network layer: Overview. Network layer functions IP Routing and forwarding

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

Internetworking and Internet-1. Global Addresses

Configuring a Gateway of Last Resort Using IP Commands

Chapter 4. Distance Vector Routing Protocols

Textbook Required: Cisco Networking Academy Program CCNP: Building Scalable Internetworks v5.0 Lab Manual.

Administrative Distance

Layer 3 Routing User s Manual

8.2 The Internet Protocol

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Inter-domain Routing. Outline. Border Gateway Protocol

OSPF Configuring Multi-Area OSPF

How To Understand Bg

Internet Control Message Protocol (ICMP)

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Ethernet (LAN switching)

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

BGP. 1. Internet Routing

Border Gateway Protocol BGP4 (2)

Routing in packet-switching networks

causeddroppingofthetos-basedroutingrequirementfromtheospfspecication.

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

VXLAN: Scaling Data Center Capacity. White Paper

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]

Interconnecting Cisco Networking Devices Part 2

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

IP Routing Configuring Static Routes

IT 3202 Internet Working (New)

IP Traffic Engineering over OMP technique

Multi-Homing Security Gateway

Transcription:

Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and a pocket calculator Please write in a clear language and use a READABLE writing; it is important to MOTIVATE THE ANSWERS YOU GIVE. Please only use the blank spaces at the bottom of every question At the end of your exam, please return THESE sheets and those possibly received by the teacher to write a draft copy of your answers. The latter WILL NOT be considered during the process of correction. Students copying or consulting course material will be expelled from the exam. Question 1. Consider the IP network in the pictore and answer the 3 questions below, motivating your answer. Rete A R 1 R 2 R 4 Rete C R 3 Rete D Rete B Rete G Rete E Rete F R 5 a. Write the routing table at router R 2 Destination Next hop

(question 1 continued) a. Assume 2 contiguous C blocks are available for the whole network, starting at 200.100.10.0; using n x to denote the number of hosts in subnet x assign, starting from the above given initial address, addresses to A,B,C,D,E,F,G, using subnetting so as to optimize address space usage and so as to satisfy the following constraints: n A =n B =60, n C = n D =10, n E =n F =30, n G =100. Subnet Address Mask a. Describe how, using CIDR notation, you can represent the whole network and the number of bits analyzed by a generic external router in order to route to the network under consideration.

Question 2. Consider the network given below and answer ther following 2 questions motivating your answers. a. Assume RIP is used as an IGP protocol; assuming the metric used is the one given in the picture, write down R1 s routing table. R1 Destination Net A Net B Net C Net D Net E Net F Distance Next hop a. Assuming router R4 faults, write down the Distance Vector sent by R2 in its next RIP message; to which routers is this message sent? R2 Destination Net A Net B Net C Net D Net E Net F Distance

(question 2 continued)

Question 3. Consider a network scenario in which IP private addressing is used and Internet accesss occurs over an IP router implementing port mapping based NAT. Assuming the following information: Host address is 192.168.0.5; An application [APP] executing on the host uses UDP and local port 7000. The terminal ignores the implemented NAT type; The following 2 STUN servers are available: 212.216.112.100:3478 212.216.212.200:3478 answer the following questions, motivating your answers. a. How can the host check whether the implemented NAT type is symmetric? a. Assuming a full cone NAT, describe how the STUN protocol can be used to find the mapping of the local IP address and UDP port used by APP.

(question 3 continued) Question 4. Consider a graph in which 2 nodes x and y have shortest path distance K and assume Bellman-Ford algorithm is used to determine the shortest path spanning tree rooted at x. Is it possible to claim that the estimated shortest path between x and y at step K is surely the shortest path between the two nodes? Motivate your answer.

Question 5. Considering the OSPF protocol, describe the 4 LSA types [Link State Advertisements]. In particular, using OSPF terminology, specify for every type: In particolare, utilizzando terminologia OSPF, si specifichi per ciascuna tipologia: Which routers exchanige the LSA The kind of carried information [topological update or preprocessed routing information] The diffusion technique used [flooding or point-to-point]

Question 6. Describe the path vector routing technique used in BGP, emphasizing its different with respect to link state routing and distance vector routing techniques.

Question 7. Consider an MPLS and a traditional IP network architecture. a. Discuss the protocol overhead determined by MPLS with respect to the IP network. b. Describe the advantages of MPLS in termos of the efficiency of packet forwarding with respect to the IP network. Il Sottoscritto, ai sensi della legge 675 del 31/12/96, autorizza il Docente a pubblicare sul web i risultati della prova d esame. In fede Firma leggibile