CSE 123: Computer Networks

Similar documents
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Transport Layer Protocols

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Exam 1 Review Questions

CSMA/CA. Information Networks p. 1

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

First Midterm for ECE374 03/09/12 Solution!!

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

MBP_MSTR: Modbus Plus Master 12

CSE 123: Computer Networks

First Midterm for ECE374 03/24/11 Solution!!

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Stop And Wait. ACK received; transmit frame 2 CS 455 3

GATE CS Topic wise Questions Computer Network

Computer Networks UDP and TCP

Final for ECE374 05/06/13 Solution!!

Mobile Computing/ Mobile Networks

11/22/

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Access Control: Firewalls (1)

Wiereless LAN

IP - The Internet Protocol

CS268 Exam Solutions. 1) End-to-End (20 pts)

2 TCP-like Design. Answer

Candidates should attempt FOUR questions. All questions carry 25 marks.

Based on Computer Networking, 4 th Edition by Kurose and Ross

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Communication Systems Internetworking (Bridges & Co)

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

IP Subnetting and Addressing

Computer Networks. Chapter 5 Transport Protocols

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

High Performance VPN Solutions Over Satellite Networks

ENTTEC Pixie Driver API Specification

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

WAN Data Link Protocols

Ethernet. Ethernet. Network Devices

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

Data Link Layer. Flow Control. Flow Control

Latency on a Switched Ethernet Network

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Per-Flow Queuing Allot's Approach to Bandwidth Management

Internet Architecture and Philosophy

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Written examination in Computer Networks

AFDX networks. Computers and Real-Time Group, University of Cantabria

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Ethernet, VLAN, Ethernet Carrier Grade

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Answer FIVE Questions only. Each carries 20 marks.

High-Level Data Link Control

Chapter 6 Congestion Control and Resource Allocation

TCP in Wireless Mobile Networks

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

TCP over Wireless Networks

- Hubs vs. Switches vs. Routers -

Figure 1: cellular system architecture

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Exercises TCP/IP Networking. Solution. With Solutions

(Refer Slide Time: 02:17)

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Network Layer: Network Layer and IP Protocol

IEEE Technical Tutorial. Introduction. IEEE Architecture

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Computer Networks - CS132/EECS148 - Spring

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Data Communication Networks and Converged Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

First Midterm for ECE374 02/25/15 Solution!!

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Random Access Protocols

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

EKSAMEN / EXAM TTM

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

UNIVERSIDAD FRANCISCO DE PAULA SANTANDER DOMINIOS DE COLISION, SEGMENTACION Y VLAN. Academia Local. Ing. José Martín Calixto Cely

Transcription:

CSE 123: Computer Networks Homework 2 Out: 4/20, Due: 4/27 Instructions 1. Turn in a physical copy at the beginning of the class on 4/27 2. Ensure the HW cover page has the following information clearly written a. Name b. UCSD email c. PID Problems 1. High Frequency Trading Companies like Goldman Sachs put a high value on using very low latency network switches to engage in high frequency trading because even an extra delay of a few milliseconds in their switches can lose them tons of money. Calculate the latency (from first bit sent to last bit received) for the following: a. 30 Mbps Ethernet with a single store and forward switch in the path and a packet size of 6,000 bits. Assume that each link introduces a propagation delay of 50 µs and that the switch begins retransmitting immediately after it has finished receiving the packet. b. Same as (a) but with three switches. c. Same as (a), but assume the switch implements cut through switching; it is able to begin retransmitting the packet after the first 300 bits have been received. What is the time savings of using cut through switching? 2. Sliding Window Protocol Draw a timeline diagram for the sliding window algorithm with SWS = RWS = 3 frames, for the following two situations. Use a timeout interval of about 2 RTT. Assume fast retransmission with selective retransmission is implemented and that packets with sequence numbers 1 6 will be sent. For fast retransmission, if more than 1 duplicate ACK is received, only retransmit on the first duplicate ACK. a. Frame 4 is lost on the first transmission. b. Frames 3 and 6 are lost on their first transmissions.

3. Sharing the Ethernet Consider the following scenario. Suppose there are some hosts A, B, and C on a LAN using the Ethernet protocol. A and B make their first carrier sense while C is transmitting. The initial transmission attempts are in the order A, B. Successful transmissions are in the order B, A. There are 2 total collisions that occur. This example can be depicted as in the diagram following. The light blue boxes with a letter in them means that the host with that letter is successfully transmitting on the channel. The red boxes indicate that a collision has occurred. Now consider a slightly more complicated problem. Suppose there are hosts A, B, and C that all make their first carrier sense, as part of an attempt to transmit, while a fourth station D is transmitting. Draw a timeline (like above) showing one possible sequence of transmissions, attempts, collisions, and exponential backoff choices. Your timeline should also meet the following criteria: (i) initial transmission attempts should be in the order C, A, B (ii) successful transmissions should be in the order A, B, C (iii) there should be at least four collisions.

4. Ip Checksum and Endianness a. The following IPv4 header, show in hex below, is received for an IP packet at its destination. Refer to the IPv4 header diagram below. 4500 05c8 1c46 25c8 4017 c311 aca8 0101 aca8 0102 Ipv4 Header b. What is the header checksum? (You can find it by mapping the hex values to the IPv4 header diagram) c. Using the Internet checksum algorithm, determine if there were any errors in the transmission (show work). d. What would this packet which is network byte order look like when stored in the memory of a big endian system? (Assume that the packet is stored in an array of (32 bit) integers in memory.) e. How about in the memory of a little endian system? (Again assume that the packet is stored in an array of integers in memory)

5. Spanning Tree Question Given the extended LAN shown below, indicate which ports are not selected by the spanning tree algorithm.

6. Learning Bridges Use the diagram below to answer the following questions. Assume the circles are bridges and the rectangles are LANs with only one host defined by their letter. All bridges have empty tables at the beginning and the events below occur in the order presented. a. E sends a packet to F, who receives the packet? b. C sends a packet to E, who receives the packet? c. D sends a packet to C, who receives the packet? d. E sends another packet to F, who receives the packet? e. G sends a packet to C, who receives the packet? f. F sends a packet to D, who receives the packet?