CS 455/655: Introduction to Computer Networks Fall 2013 Sample Final Examination

Similar documents
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS335 Sample Questions for Exam #2

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Answers to Sample Questions on Network Layer

Written examination in Computer Networks

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Route Discovery Protocols

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

IST 220 Exam 3 Notes Prepared by Dan Veltri

IP Addressing. IP Addresses. Introductory material.

Future Internet Technologies

IP - The Internet Protocol

Exam 1 Review Questions

IP Addressing Introductory material.

Final for ECE374 05/06/13 Solution!!

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

PART IV. Network Layer

Router and Routing Basics

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Transport and Network Layer

Based on Computer Networking, 4 th Edition by Kurose and Ross

Chapter 4. Distance Vector Routing Protocols

Network layer: Overview. Network layer functions IP Routing and forwarding

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Instructor Notes for Lab 3

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Inter-domain Routing. Outline. Border Gateway Protocol

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Routing Protocols (RIP, OSPF, BGP)

CS268 Exam Solutions. 1) End-to-End (20 pts)

Based on Computer Networking, 4 th Edition by Kurose and Ross

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

CCNA Tutorial Series SUBNETTING


04 Internet Protocol (IP)

Chapter 4 Network Layer

RARP: Reverse Address Resolution Protocol

1. How many unique network IDs are there in class A addresses? # of unique hosts?

Internetworking and Internet-1. Global Addresses

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Level 2 Routing: LAN Bridges and Switches

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

BGP overview BGP operations BGP messages BGP decision algorithm BGP states

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Packets. Forwarding Datagrams

Internet Control Message Protocol (ICMP)

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Internet Protocols Fall Lectures 7-8 Andreas Terzis

(Refer Slide Time: 02:17)

- Hubs vs. Switches vs. Routers -

IP Routing Configuring RIP, OSPF, BGP, and PBR

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

TCP/IP Basis. OSI Model

Data Communication Networks and Converged Networks

IP address format: Dotted decimal notation:

IP Subnetting and Addressing

Networking Test 4 Study Guide

DG Forwarding Algorithm

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?

We Are HERE! Subne\ng

EKSAMEN / EXAM TTM

CIDR: Classless Interdomain Routing

Routing with OSPF. Introduction

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Internet Protocols. Addressing & Services. Updated:

Lecture 18: Border Gateway Protocol"

TCP/IP Network Essentials. Linux System Administration and IP Services

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Technical Support Information Belkin internal use only

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

The Internet. Internet Technologies and Applications

Interconnecting Cisco Networking Devices Part 2

CS Computer Networks 1: Routing Algorithms

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Transcription:

CS 455/655: Introduction to Computer Networks Fall 2013 Sample Final Examination NAME: MATTA This exam is closed books and closed notes. Please write clearly and neatly. Be precise in your answers; do not just re-iterate what you know about the topic. Clearly state any assumptions you make. All questions are weighted equally. Answer all 5 questions. Problem 1 (IP addressing): Subnet B: 12 hosts Subnet A: 15 hosts Subnet C: 45 hosts R1 To public Internet via ISP Consider the network shown above, consisting of a single router, R1, with three subnets A, B and C, with 15, 12, and 45 hosts, respectively, on these subnets. Assign an address range to the hosts in subnets A, B, and C so that only a single aggregated address needs to be advertised by R1 to the public Internet, and that the size of the advertised aggregated address range is minimized. In a sentence or two, explain how you arrived at your answer. (Feel free to use variable names in addresses if the precise bit values are not important.) We need 15+12+45 = 72 addresses, i.e. we need to 2 7 addresses or 7 bits. So we have a common prefix length of 32-7=25 bits. Aggregated CIDR address: X.Y.Z.0/25 Subnet A CIDR address: We need 2 4 addresses, or 4 bits. CIDR address: X.Y.Z.0/28 Subnet B CIDR address: We need 2 4 addresses, or 4 bits. CIDR address: X.Y.Z.16/28 Subnet C CIDR address: We need 2 6 addresses, or 6 bits. CIDR address: X.Y.Z.64/26 Note that other solutions are possible. 1

Problem 2 (Distance-vector routing): E A B Consider the simple network shown above, in which A and B periodically exchange distance-vector routing information. Assume routers do not implement split horizon. All links have cost 1. After reaching convergence, suppose the A E link fails. (a) Give a sequence of routing table updates that leads to a routing loop between A and B, for a at E. Before A advertises unreachability, node B advertises its distance of 2 to A, which A adopts. (b) Estimate the probability of the scenario in (a), assuming A and B send out routing updates at random times, each at the same average rate. Probability that B advertises before A = 0.5. (c) Estimate the probability of a loop forming if node A broadcasts an updated routing report after 1 second of discovering the A E failure, and B regularly broadcasts every 60 seconds. Probability that B advertises within 1 second = 1/60. Now, consider the following extended topology, and again suppose after reaching convergence, the A E link fails. Even if routers implement split horizon (without poison reverse), a routing loop between B and C, for a at E, can form consider the following scenario: node A advertises a non-reachability update to B and C; before this non-reachability update arrives at B and C, B and C had already exchanged their distances, but these routing messages arrive at B and C after the non-reachability message from node A had arrived. C E A B (d) Describe how the situation in this extended scenario will evolve. Then, describe how the situation would evolve if routers use split horizon with poison reverse. Without Poison Reverse, a loop forms between B and C. With Poison Reverse, B and C advertise unreachability to each other and the loop breaks. 2

Problem 3 (BGP routing): (a) Suppose P,, and R are network service providers, with respective CIDR address allocations C1.0.0.0/8, C2.0.0.0/8, and C3.0.0.0/8 (using hexadecimal dotted notation with mask). Each provider s customers initially receive address allocations that are a subset of the provider s address space. P has the following customers: PA, with allocation C1.A3.0.0/16, and PB, with allocation C1.B0.0.0/12. has the following customers: A, with allocation C2.0A.10.0/20, and B, with allocation C2.0B.0.0/16. Assume there are no other providers or customers, and that each provider connects to both of the others. Suppose customer PA switches to provider and customer B switches to provider R, resulting in the AS topology shown below. Use the CIDR longest match rule to give the routing table for P (only as representative) that allow PA and B to switch without renumbering (i.e., keeping their initial address allocations). CIDR address next-hop (AS name) PB PA B A C2.0.0.0/8 C3.0.0.0/8 C1.A3.0.0/16 C2.0B.0.0/16 C1.B0.0.0/12 R // toward PA R // toward B PB P R (b) Suppose customer PA is multi-homed, in that it has two Internet connections from the two providers, P and, as shown in figure below. (PA is taking its address assignment from P.) has a CIDR longest match routing entry for PA. Which inbound (incoming) traffic to PA might flow on the PA connection, considering only traffic from domains P,, and H? Consider the two cases where does and does not advertise PA to the world using BGP. Recall shorter AS paths are preferred. does not advertise PA to the world: PA Only traffic from. P advertises PA to the world: Traffic from and H. X Y H 3

Problem 4 (Indirection and encapsulation): A à B TCP TCP header + Consider the IP gram carrying a TCP segment, shown above. Consider a situation where we want to route this gram through an intermediate router C by encapsulating it within another gram. (a) Draw the gram as it travels to C and then as it travels out of C toward the final B make sure to show the contents of the fields: source,,, and (payload). To router C From C, To B Aà C IP-in-IP original gram Aà B TCP TCP segment (b) Describe how the gram is processed at router C from when it arrives at C and until it comes out of C on its way toward the final B. At router C, IP demultiplexes the gram to the decapsulation software, which removes the header and forwards the original gram to the final. 4

Problem 5 (CSMA/CD ): (a) In CSMA/CD, after the fourth collision, what is the probability that the node chooses K = 3? What does the result K = 3 correspond to in terms of delay in microseconds on a 10 Mbps Ethernet? After the 4 th collision, K is chosen uniformly from 0,, 15. The probability that K=3 is then 1/16. K=3 corresponds to a delay of 512*3 bit times = (512*3)/10M= 153.6 µsec. (b) Suppose nodes A and B are on the same 10 Mbps Ethernet segment, and the propagation delay between the two nodes is 225 bit times. Suppose at time t = 0, B starts to transmit a frame. Suppose A also transmits at some t = x, but before completing its transmission it receives bits from B (hence, a collision occurs at A). Assuming node A follows the CSMA/CD, what is the maximum value of x? x = 224 bit times /10M = 22.4 µsec. (c) Consider two nodes A and B on the same Ethernet segment, and suppose the propagation delay between the two nodes is 225 bit times. Suppose at time t = 0, both nodes A and B begin to transmit a frame. At what time do they detect the collision? Assuming both nodes transmit a 48-bit jam signal after detecting a collision 1, at what time (in bit times) do nodes A and B sense an idle channel? How many seconds is this for a 10 Mbps Ethernet? 225 bit times = 22.5 µsec. (225 + 48) + 225 = 498 bit times = 49.8 µsec. 1 Note that once an adapter detects a collision, it stops transmitting its frame but continues to transmit a 48- bit jam signal to ensure that collision is detected by other adapters. 5