Computer Networks Summer 2013

Similar documents
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

RARP: Reverse Address Resolution Protocol

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

Lecture Computer Networks

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Introduction to IP v6

8.2 The Internet Protocol

Networking Test 4 Study Guide

CS335 Sample Questions for Exam #2

Answers to Sample Questions on Network Layer

Internet Protocol Address

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

IP Addressing. IP Addresses. Introductory material.

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Internetworking. Problem: There is more than one network (heterogeneity & scale)

PART IV. Network Layer

The Internet. Internet Technologies and Applications

Network layer: Overview. Network layer functions IP Routing and forwarding

IP Addressing Introductory material.

Exam 1 Review Questions

Technical Support Information Belkin internal use only

Transport and Network Layer

Internet Addresses (You should read Chapter 4 in Forouzan)

1. How many unique network IDs are there in class A addresses? # of unique hosts?

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Lecture 8. IP Fundamentals

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises a, b, c and d

Instructor Notes for Lab 3

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Chapter 19 Network Layer: Logical Addressing 19.1

Savera Tanwir. Internet Protocol

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

2. IP Networks, IP Hosts and IP Ports

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Internet Protocol Version 6 (IPv6)

IP Subnetting and Addressing

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Ethernet. Ethernet. Network Devices

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Internetworking and Internet-1. Global Addresses

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Subnetting. Subnetting

Internet Packets. Forwarding Datagrams

Written examination in Computer Networks

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

CCNA Tutorial Series SUBNETTING

Internet Protocols. Addressing & Services. Updated:

IP Addressing A Simplified Tutorial

Future Internet Technologies

(Refer Slide Time: 02:17)

IP - The Internet Protocol

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

04 Internet Protocol (IP)

Internetworking and IP Address

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

Cisco Data Centre: Introducing Cisco Data Center Networking

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

How To Make A Network Address Prefix Smaller

Internet Protocols Fall Outline

Internet Protocols Fall Lectures 7-8 Andreas Terzis

ANZA Formación en Tecnologías Avanzadas

Network Layer: Network Layer and IP Protocol

Layer 3 Routing User s Manual

Subnet + CIDR. Internet Networking recitation #1. 11: , Internet Networking,

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Computer Networks. Main Functions

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Chapter 4 Network Layer

Source net: Destination net: Subnet mask: Subnet mask: Router Hub

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Packet Tracer 3 Lab VLSM 2 Solution

DG Forwarding Algorithm

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

101 Application Delivery Fundamentals

- IPv4 Addressing and Subnetting -

Module 4, Assignment 3-2

VXLAN: Scaling Data Center Capacity. White Paper

3201 Computer Networks 2014/2015 Handout: Subnetting Question

Subnetting,Supernetting, VLSM & CIDR

Internet Control Protocols Reading: Chapter 3

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

What is VLAN Routing?

Routing in packet-switching networks

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Transcription:

Computer Networks Summer 2013 Homework 3 Due Date: 6/23/2011 Problem 1 1. Suppose a TCP message that contains 2048 bytes of data and 20 bytes of TCP header is passed to IP for delivery across two networks of the Internet (i.e., from the source host to a router to the destination host). The first network uses 14-byte headers and has an MTU of 1024 bytes. The second uses 8-byte headers with an MTU of 512 bytes 1. Each network s MTU gives the size of the largest IP datagram that can be carried in a link-layer frame. Give the sizes and offsets of the sequence of fragments delivered to the network layer at the destination host. Assume all IP headers are 20 bytes. Consider the first network. Packets have room for 1024 14 20 = 990 bytes of IP-level data; because 990 is not a multiple of 8 each fragment can contain at most 8 990/8 = 984 bytes. We need to transfer 2048 + 20 = 2068 bytes of such data. This would be fragmented into fragments of size 984, 984, and 100. Over the second network, the 100-byte packet would be unfragmented but the 984-data-byte packet would be fragmented as follows. The network plus IP headers total 28 bytes, leaving 512 28 = 484 bytes for IP-level data. Again rounding down to the nearest multiple of 8, each fragment could contain 480 bytes of IP-level data. 984 bytes of such data would become fragments with data sizes 480, 480, and 24. 2. Suppose hosts A and B have been assigned the same IP address on the same Ethernet, on which ARP is used. B starts up after A. What will happen to A s existing connections? After B broadcasts any ARP query, all stations that had been sending to A s physical address will switch to sending to B s. A will see a sudden halt to all arriving traffic. (To guard against this, A might monitor for ARP broadcasts supposedly coming from itself; station A might even immediately follow such 1 By the way, this is a hypothetical situation, since this MTU value is an illegally small MTU for IP.

broadcasts with its own ARP broadcast in order to return its traffic to itself. It is not clear, however, how often this is done.) 3. Assume that a station can send an ARP to query the network on startup for its own IP address. Explain how self-arp, might help with this problem. If B uses self-arp on startup, it will receive a reply indicating that its IP address is already in use, which is a clear indication that B should not continue on the network until the issue is resolved.

Problem 2 1. The IP header checksum only verifies the integrity of IP header. Discuss the pros and cons of doing the checksum on the header part versus on the entire packet. Error checking in the header is more important because the packet is routed according to the header information. In addition, the delivery of the data at the destination to the higher layers also requires the header information. Thus error checking of the header protects against miss-delivery of the information. Restricting the error checking to the header also simplifies the implementation in the nodes, requires less checksum bits, and prevents unnecessary packet discard. Some higher layers can tolerate some data errors, and higher layers also have the option of performing retransmission. 2. Identify the address class of the following IP addresses: 200.58.20.165; 128.167.23.20; 16.196.128.50; 50.156.10.10; 250.10.24.96. An IP address has a fixed length of 32 bits, where the most significant bits identify the particular class. Therefore, to identify the address class we need to convert the dotted-decimal notation back into its binary counterpart, and compare the binary notation to the class prefixes. The first few bits (shown in red) of the address can be used to determine the class. 200.58.20.165 11001000.00111010.00010100.10100101 Class C 128.167.23.20 10000000.10100111.00010111.00010100 Class B 16.196.128.50 00010000.11000100.10000000.00110010 Class A 150.156.10.10 10010110.10011100.00001010.00001010 Class B 250.10.24.96 11111010.00001010.00011000.01100000 Class E 3. What are all the possible subnet masks for the Class C address space? List all the subnet masks in dotted-decimal notation, and determine the number of hosts per subnet supported for each subnet mask.

255.255.255.128 supports 126 hosts (not including the broadcast address) 255.255.255.192 supports 62 hosts 255.255.255.224 supports 30 hosts 255.255.255.240 supports 14 hosts 255.255.255.248 supports 7 hosts 255.255.255.252 supports 3 hosts 255.255.255.254 and 255.255.255.255 are not practically usable.

Problem 3 A university has 150 LANs with 100 hosts in each LAN. Suppose the university has one Class B address. 1. Design an appropriate subnet addressing scheme that allows for flexibility. Show the subnet mask. A Class B address has 14 bits for the network ID and 16 bits for the host ID. To design an appropriate subnet addressing scheme we need to decide how many bits to allocate to the host ID versus the subnet ID. We can choose either 8 bits or 7 bits to identify the hosts. If we allocate 8 bits for to identify the host, as shown below, then there are sufficient subnet-id bits to cover up to 2 8 =256 LANs and enough host-id bits to cover up to 256 hosts for each LAN. The subnet mask in this case is 255.255.255.0 1 0 Network ID Subnet ID Host ID 0 1 15 16 23 24 31 If we allocate 7 bits for to identify the host, as shown below, then there are sufficient subnet-id bits to cover up to 2 9 =512 LANs and enough host-id bits to cover up to 128 hosts for each LAN. The choice between 7 or 8 bits to represent the hosts depends on which is likely to grow more, the number of subnets or the number of hosts in a LAN. Alternatively a variable-length prefix scheme using 7-bit host addresses, and grouping these form larger subnets provides greater flexibility in accommodating future changes. 2. Design an appropriate CIDR addressing scheme. CIDR addressing scheme involves devising a prefix length that indicates the length of the network mask. In this case, 8 bits are required to identify each LAN (since 127 < 150 < 255) and 7 bits are required to identify each host in each LAN (since 63 < 100 < 127). Therefore a CIDR address would use a 25-bit prefix, and thus have an address of the form address/25. 3. Perform CIDR aggregation on the following /24 IP addresses: 128.56.24.0/24; 128.56.25.0./24; 128.56.26.0/24; 128.56.27.0/24. 128.56.24.0/ 22 = 10000000.00111000.00011000.00000000 128.56.25.0/ 22 = 10000000.00111000.00011001.00000000 128.56.26.0/ 22 = 10000000.00111000.00011010.00000000 128.56.27.0/ 22 = 10000000.00111000.00011011.00000000

Mask = 11111111.11111111.11111100.00000000 The resulting prefix is 128.56.24.0/22.

Problem 4 1. Assume that there are N routers in the network and that every router has m neighbors. Estimate the amount of memory required to store the information used by the distance-vector routing. Each node needs the distance to each neighbor and the distance from each neighbor to all destinations which is m(n 1) entries. Assuming E bytes for each entry the amount of memory is m(n 1)E. 2. Assume that there are N routers in the network and that every router has m neighbors. Estimate the amount of memory required to store the information by the link-state algorithm. Each node needs the information for all links across the network. Each node is connected to m links and there are N nodes in the network. Therefore the total number of links in the network is (1/2)Nm entries. Assuming E bytes per entry the amount of memory is (1/2)mNE. 3. Suppose a network uses distance-vector routing. Explain what happens if the router sends a distance vector with all zeros? A distance vector with all zeros means that the node has distance zero to all other nodes. This will prompt all neighbors to route all their packets through the given router. Eventually all packets in the network will be routed to this router, resulting in what can be characterized as a black hole. 4. Suppose a network uses link-state routing. Explain what happens if the router fails to claim a link that is attached to it. The link will be eventually omitted from the routing tables and as a result will not be utilized. This will result in some routing decisions that are not the shortest (optimal) paths. Loss of connectivity is also possible. Moreover, a routing loop may occur due to confusion among routers as to which links they are attached to. 5. Suppose a network uses link-state routing. Explain what happens if the router claims to have a link that does not exist. If a router claims to have a link that does not exist, it reports false topology information to other routers within the network. If this non-existing link belongs to a shortest path, all the packets that are sent via this path will be lost. This will affect the network performance severely.