CS 5565 Sample Final Exam Spring 2005

Size: px
Start display at page:

Download "CS 5565 Sample Final Exam Spring 2005"

Transcription

1 CS 5565 Sample Final Exam Spring Delay and Bandwidth (12 pts) a) Types of Delay (4pts) ecall the different types of delays that can occur in a network. Give an example of each of the following scenarios. A brief sentence suffices. i. Propagation delay is the dominating delay Propagation delay can dominate for fast, but geographically distant links, such as high-speed satellite links. i. Transmission delay is the dominating delay Transmission delay can dominate for slow links, such as serial lines over short distances. ii. Processing delay is the dominating delay Processing delay can dominate if the forwarding machine has a slow CPU or bus or is operating under load. iii. Queuing delay is the dominating delay Queuing delay dominates if there is congestion. b) Circuit vs Packet Switched Networks (8pts) Compare the delay, from first bit transmitted to last bit received, in sending an x- bit message over a k-hop path in a circuit-switched network and in a (lightly loaded) packet-switched network. The call setup time is s sec, the propagation delay is d sec per hop, the packet size is p bits, and the transmission rate of all links is b bps. For the packet-switched network, assume that the processing and queuing delays at each hop are zero and ignore any packet header overhead. i. (5 pts) Under what conditions does the circuit-switched network have a lower delay? The delay of the circuit-switched network is s + k*d + x/b. The delay of the packet-switched network is propagation delay + transmission delay for entire message + delay incurred in retransmitting the last bit (k-1) times: k*d + x/b + (k- 1)*p/b where we assume as in homework 1 for simplicity that x is divisible by p. Therefore, the circuit-switched network has a lower delay if s < (k-1)*p/b. Informally, the call setup delay must be less than the transmission delays stemming from repeated forwarding in the store-and-forward operations. Notice 1/12

2 that it does not depend on x, since all intermediate routers can forward packets in parallel. ii. (3 pts) Consider what the circuit-switched network must do during call setup: a call setup message must be sent along the k-hop path so that the nodes along the path can allocate resources for the circuit. In addition, a call connected message must be returned so that the sender knows that the circuit has been established. Considering this requirement, how can a circuit-switched network satisfy the conditions derived in i)? If you assume that the call setup packet has length p and is sent over the same links, then you would have s = 2*(k*d + p /b). Therefore, we must have p << p. Another alternative is to use a separate, faster signaling network with a larger bandwidth b. 2 Congestion Control & Fairness (12 pts) a) AIAD (3 pts) In their landmark 1989 paper, Chiu and Jain proved that additive increase, multiplicative decrease (AIMD) is the only congestion control mechanism that leads to fair allocation if two transport layer connections share a single bottleneck link of capacity. For their argument, they used the phase plot we discussed in lecture: Full bandwidth utilization line Connection 2 throughput Equal bandwidth share Connection 1 throughput Use the same argument to show that an AIAD (additive increase, additive decrease) scheme does not converge to a fair division of bandwidth. AIAD (additive increase, additive decrease) scheme does not converge to a fair division of bandwidth, because the point (x1, x2) that describes the relative throughput of connections 1 and 2 will oscillate along a line that is parallel to the equal bandwidth line, as shown below: 2/12

3 Connection 2 throughput starting point Connection 1 throughput Oscillates along this line (amplitude depends on INC/DEC amounts) b) Network-assisted congestion control (9 pts) Now assume that the two sources will not have to rely on packet losses as congestion signals, but that the router with the shared bottleneck link monitors traffic and helps the sources manage congestion. It does so by sending commands to tell those sources whether to inject more or less data into the network. In the absence of commands from the router, it is assumed that sources keep sending at their current rate. Each source starts sending data at arbitrary rate. The router uses the following algorithm: If the link is not fully utilized (quadrants 3, 4 below) an INCEASE command is sent to both sources. Otherwise, a DECEASE command is sent to the source (or sources) with the highest throughput. Both INCEASE and DECEASE commands result in additive increases or decreases. i. (6 pts) Add arrows in the diagram below to show how the relative throughput of connection 1 and 2 moves as a result of the congestion control commands sent by the router in each of the four quadrants. As an example, I filled in the arrow for quadrant 4. Given Solution 3/12

4 Connection 2 throughput Connection 2 throughput Connection 1 throughput Connection 1 throughput ii. (3 pts) Does this network-assisted algorithm converge towards a fair allocation of bandwidth? Explain why it does or does not. It does converge since the changes in each quadrant will lead towards the equal bandwidth/full utilization crossing point. 3 IP Addressing & Ethernet (14 pts) a) IP Addressing (10pts) You just got hired as a network engineer in your department. You are in charge of providing Internet connectivity to two labs (each with one LAN) connected by three routers, as shown below. Internet 1 PPP Link 2 2 Ethernet LAN 1 60 Machines Subnet address: Default gateway: PPP Link 1 3 Ethernet LAN Machines Subnet address: Default gateway: 4/12

5 Lab 1 has 60 machines, lab 2 has 120 machines. Each lab has a router, which is connected via a PPP connection to router 1. 1 provides connectivity to the Internet through the campus ISP. The campus network administrator assigned the following subnet to you: /24. i. Assign IP addresses to your network. Assign IP addresses to each of the six interfaces of 1, 2, and 3 (fill in the callouts above!) You do not need to assign an address to the outgoing interface connecting you to the ISP. ii. In addition, you are responsible for configuring the hosts connected to both LANs. Assume you are using DHCP for this purpose. In the boxes above, fill in the subnet address and the default gateway that a DHCP server would have to communicate to machines on either LAN. Use the x.x.x.x/l form for the subnet address. In summary, you must assign 8 IP addresses (x.x.x.x) and two subnet addresses (x.x.x.x/l). A possible assignment is shown below: Internet PPP Link / Ethernet LAN 1 60 Machines Subnet address: /26 Default gateway: PPP Link / Ethernet LAN Machines Subnet address: /25 Default gateway: You have to subdivide the 256 addresses into 4 subnets that can accommodate 120, 60, 2, and 2 interfaces. The PPP Links need their own subnets. The LAN1 subnet must be /25 or /25, each choice leaves two choices for the LAN2 subnet. After assigning LAN1 and LAN2, you have 64 addresses left, you need two ranges of at least size 4 for each link. (ecall that the pair of interfaces at each end of a link is a subnet as well, see lecture slide.) As discussed in lecture, the addresses with a host part of all zero bits ( this host ) 5/12

6 or all ones (subnet broadcast) are reserved and cannot be used for interfaces. The default gateway in either LAN must be the address of the router interface facing the LAN. b) Ethernet (4 pts) After your success as a departmental network engineer, you were hired as chief network engineer for the entire state, which runs a network with thousands of hosts and dozens of sites. You recall the minor brain twisting it took in part a) to split your IP address space to assign IP and subnetwork addresses to each interface and LAN. A state contractor suggests to do away with IP routing altogether and to use self-learning Ethernet switches instead, which cost only a fraction of fully-fledged IP routers. Ethernet runs over fiber for long-haul connections, so length restrictions are not an issue. In addition, they suggest the use of switched Ethernet throughout to avoid any problems with collisions and back-off related idle time stemming from Ethernet s CSMA/CD algorithm. Give two important reasons for why you decide against their proposal. Acceptable reasons are: AP requests would be broadcast to all hosts in the entire state. Switches, because of their limited switching table size, could not learn the ports associated with all hosts, leading to frequent switching table misses and hence broadcasts. Switches only form a spanning tree, which does not allow for optimal routing or distribution of load over multiple links. CSMA/CD and length restrictions are non-reasons, as pointed out in the narrative of the problem. 4 Error Correction and Detection (12 pts) a) CC (6 pts) Suppose you receive the following message of 8 bits, which include a 3-bit CC checksum: The CC generator polynomial used for this message is x 3 +1 (which has a bit pattern of 1001.) Was this message correctly received (as far as you can tell from the CC)? Show your work for full credit. The CC checksum is correct, as shown below: /12

7 b) Forward Error Correction (6 pts) Consider the following code used to transmit bits over a rather noisy channel. The message is split into a sequence of pairs of bits. For each pair of bits, a codeword of five bits is sent according to the following table: If bits in question are Then send these five bits i. (4 pts) How many bit errors can this code correct per codeword? Say why. This code can correct up to one bit error, because the minimum Hamming distance between each pair of codewords is 3: three bits must be flipped to distort one codeword into another. If only one bit is flipped, it is still possible to identify the original codeword and correct the bit. For instance, if is sent and either 10000, 01000, 00100, 00010, or is received, the original codeword (00000) can still be correctly identified. If two bits are flipped, this code would be closer to a different codeword, hence it cannot correct two bit errors. For instance, if is sent, but is received, the result is closer to than and the sent 00 would be mistaken for 01. Alternatively, the code could be used to detect, but not correct, 2-bit errors of course, you can only use the code for one or the other. ii. (2 pts) Can this code detect 3-bit errors? Say why. This code cannot detect 3-bit errors because, for instance, if 00 is sent as 00000, but the last three bits are flipped, the arriving bit pattern would be mistaken as an error-free transmission of outing Algorithms (32 pts) a) Distance Vector Convergence (8pts) Suppose a static network in which all links have cost 1. Suppose that (unlike in project 2B!) each node initially knows its directly connected neighbors. Suppose routing advertisements are exchanged in globally synchronized iterations. In each iteration: all nodes send their entire current distance vector estimate to each of their connected neighbors and 7/12

8 apply the Bellman-Ford equation to compute their new distance vector estimates from the advertisements received. If the estimate has changed, a node sends out a new estimate to each of its neighbors in the next iteration. A node is said to have converged after k iterations if it sent its distance vector and performed Bellman-Ford k times and afterwards its estimate matches the true minimum cost to all destinations. A network is said to have converged if all its nodes have converged. i. (2 pts) What is the best-case topology, in terms of number of iterations, for a network of k nodes? How many iterations does it take until the algorithm converges for that topology? The best case would be any graph with a diameter of 1, such as a fullyconnected graph in which there is direct link between each pair of nodes. In that case, the topology would have converged after 0 iterations (if you count iterations as described in the problem!) Since the problem didn t assume a connected graph (it should have) an empty graph is an acceptable answer as well. ii. (6 pts) What is the worst-case topology, in terms of numbers of iterations, for a network of k nodes? How many iterations does it take until the algorithm converges for that topology? Show the distance vector table of the node or nodes that converged last. The worst case is a string of k nodes, in which case it would take k-2 iterations to converge (4 pts). The last nodes to converge would be the ones at the end of the string (1 pts). Their final distance vector tables are (0, 1, 2, 3, k-1) and (k-1, k-2, 2, 1, 0) respectively (1 pts). b) Load Balancing (4 pts) It is often desirable to utilize multiple paths to a destination by distributing traffic equally along paths with identical costs. Suppose such load balancing had been a requirement for one of the parts in project 2B. Which of the two algorithms you implemented would you have adapted, and why? A link-state algorithm typically lends itself better to equal-cost multipath routing, because each node has complete information about the entire topology of the network and can therefore compute multiple routes with the same cost. This is done by extending Dijkstra s algorithm to keep track of multiple equal-cost paths. A distance vector algorithm, on the other hand, hides the number of equal-cost routes through a given neighbor. c) Path Vector outing in BGP (4 pts) We talked in lecture about how knowledge of the path to a particular destination helps BGP avoid routing loops. Considering the purposes for which BGP is used, give another significant reason for why BGP uses a path vector approach. 8/12

9 Aside from loop freeness, the knowledge of AS-PATH vectors is necessary to implement such policies as: don t send packets through a particular AS, for instance in order to ensure that packets you sent do not pass through some other company s network, or policies such as send packets along the shortest path. d) Link State outing (16 pts) Consider the static topology below. u 5 v y w 1 x 3 i. (3 pts) Assume that sequence-number controlled flooding is used to distribute link state advertisements. Assume that (unlike in project 2B) a node initially knows it neighbors and that each individual link state advertisement (LSA) contains the entire adjacency list for that node. The topology is static, so each node broadcasts its LSA only once. How many LSA messages are sent during the broadcasts until all nodes have learned the topology? The originator sends its LSA message to all neighbors. All other nodes forward each LSA once (the first time it arrives) along all outgoing links, except the link it came in on. The number of messages exchanged is N * (1 + Sum over all nodes (Degree(N i ) 1)) 5 * (1 + (3-1) + (2-1) + (3-1) + (4-1) + (2-1)) = 5 * ( ) = 50. ii. (3 pts) Consider node u. Show the adjacency matrix u has learned after every node s LSA has been broadcast. u v w x u v w x y 9/12

10 y The adjacency matrix u has learned is simply the adjacency matrix of the graph: iii. u v w x y u v w x y (6 pts) Show how Dijkstra s algorithm computes u s least cost routes by filling in the table below. Step N D(v), p(v) D(w), p(w) D(x), p(x) D(y), p(y) Note: the table may have more rows than there are steps. Step N D(v), p(v) D(w), p(w) D(x), p(x) D(y), p(y) 0 u 5, u 1, u 4, u 1 uw 5, u 2, w 2 uwx 3, x 5, x 3 uwxv 4, v 4 uwxvy Final 3, x 1, u 2, w 4, v iv. (4 pts) Now assume the topology from part iii is used for broadcasting based on reverse path forwarding. Suppose that u wants to broadcast a message. If one hop time is the time it takes for a message to travel one link, regardless of cost, how many hop times will it take for u s message to reach nodes v, w, x, and y? # of hop times from u to v w x y 10/12

11 In broadcasting based on reverse path forwarding, a node forwards a received broadcast packet if and only if it comes in on the link that is on the shortest path from that node to the source of the packet. Initially, u sends the message to v, w, and x, so it will take 1 hop time for the broadcast message to arrive at these nodes. Only w will forward the message, however, because as far as v and x are concerned the message did not arrive on the link that marks their shortest path to u. In the next step, w is going to forward the message to x. Now x will forward the message to u, v, and y, so it arrives at y after 3 hop times. # of hop times from u to 6 Short Questions (18 pts) v w x y a) Short Writes (4 pts) In project 2A, you needed to worry about short reads when using a TCP connection. Can there be short writes also? If yes, how could they occur? If not, what must be done to avoid them? Both yes and no are possible answers, but both require explanation. Yes, short writes can occur because the current amount of space left in the TCP send buffer might be too small to accommodate the entire request. No, short writes do not occur because the OS blocks the caller until space becomes available, then resumes it and repeats this process until the entire request is stored in the buffer. In practice, the first behavior is provided to sockets in nonblocking mode, whereas the second behavior is provided to sockets in blocking mode, which fortunately is the default. b) Media Access Protocols (4 pts) In what kind of a scenario might you deploy a random access protocol in connection with a channel partitioning protocol to mediate access to a shared link? A channel partitioning protocol splits the link between multiple sources, but it is often not known what sources want to share the link at a given point in time. In such situations, sources can use a random access protocol for a small, shared portion of the partitioned channel to issue requests for a partition of the rest of the channel. An example of this technique are requests for minislots via slotted ALOHA in hybrid cable-fiber (HFC) networks. 11/12

12 c) HTTP Cookies (4 pts) Google recently introduced the beta version of their web accelerator, which is a set of servers that prefetches pages a user is likely to look at in the near future. The servers can be reached with lower latency than the server hosting the file, saving the user time. Privacy advocates immediately complained that Google s servers store a user s cookies in the process of prefetching pages. Explain why Google s servers must store a user s cookies for this type of prefetching to work! HTTP cookies are sent as part of a HTTP request message and cause the server to customize the content they return based on the cookies presented. Without storing them, the google web accelerator couldn t send HTTP requests on behalf of the user using the web accelerator and therefore could not prefetch any pages for that user. A common mistake was to assume that the web accelerator would somehow use or look at the cookies to determine a user s preferences. d) Paper: Toward A Wafer-Thin Control Plane (6 pts) This question refers to: J. exford, A. Greenberg, G. Hjalmtysson, D. Maltz, A. Myers, G. Xie, J. Zhan, H. Zhang. Network-Wide Decision Making: Toward A Wafer-Thin Control Plane, HotNets-III, Could the approach to a thin control plane that is advocated in this paper be used as a next-generation inter-as routing protocol? Say why or why not. The approach advocated by exford et al relies on central decision making, something that is fundamentally incompatible with policy-dominated inter-as routing policies that must preserve the boundaries between different administrative domains. It also would not scale to the entire Internet, which would be required for it to be used as an inter-as protocol. Their approach is intended to provide the next-generation intra-as routing protocol, or more precisely, to eliminate routing intra-as protocols as we know them. 12/12

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 40 Data and Computer Communications Networks Network Layer NAT, Routing, Link State, Distance Vector Prof. Lina Battestilli Fall 07 Chapter 4 Outline Network Layer: Data Plane 4. Overview of Network

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13 CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network

More information

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013 CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam Carnegie Mellon Computer Science Department. 15-744 Spring 2015 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 7 pages (numbered at the bottom). Make sure you have all of them. Please write your

More information

From Routing to Traffic Engineering

From Routing to Traffic Engineering 1 From Routing to Traffic Engineering Robert Soulé Advanced Networking Fall 2016 2 In the beginning B Goal: pair-wise connectivity (get packets from A to B) Approach: configure static rules in routers

More information

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Chapter 4: Network Layer, partb

Chapter 4: Network Layer, partb Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

Computer Science 461 Midterm Exam March 14, :00-10:50am

Computer Science 461 Midterm Exam March 14, :00-10:50am NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor

More information

COM-208: Computer Networks - Homework 6

COM-208: Computer Networks - Homework 6 COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Assignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points.

Assignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points. Assignment #1 Csci4211 Spring 2017 Due on Feb. 13th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Describe the special properties of the following transmission

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS

ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS Time: 75 min (strictly enforced) Points: 50 YOUR NAME (1 pt): Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190 Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information

More information

CS644 Advanced Networks

CS644 Advanced Networks Outline CS644 Advanced Networks Lecture 9 Intra Domain Routing Andreas Terzis Spring 2004 1 So far we have talked about E2E mechanisms Routing is the other big component of the network Largest distributed

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

Review problems (for no credit): Transport and Network Layer

Review problems (for no credit): Transport and Network Layer Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 11 October 2018 Midterm on Tues Announcements 1 HW#4 Review maine.edu created? What is a

More information

Link-State Routing OSPF

Link-State Routing OSPF CE Computer Networks Link-State Routing OSPF Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer. Network Layer 4-1 Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing

More information

Routing. Advanced Computer Networks: Routing 1

Routing. Advanced Computer Networks: Routing 1 Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s

More information

Internet protocol stack

Internet protocol stack Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

CMPE 150: Introduction to Computer Networks

CMPE 150: Introduction to Computer Networks CMPE 150: Introduction to Computer Networks Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 18 Project Deliverables: Project demo. Code (documented). Demo schedule: Judith: Monday 03.18

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

ETSF05/ETSF10 Internet Protocols Routing on the Internet

ETSF05/ETSF10 Internet Protocols Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100 NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

SC250 Computer Networking I. Review Exercises. Prof. Matthias Grossglauser. School of Computer and Communication Sciences EPFL.

SC250 Computer Networking I. Review Exercises. Prof. Matthias Grossglauser. School of Computer and Communication Sciences EPFL. SC250 Computer Networking I Review Exercises Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Reliable transport: rdt3.0 ACK packets receiver->sender

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Internet Architecture and Experimentation

Internet Architecture and Experimentation Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 October 2017 Announcements Back from Memsys. Related things: fast memories for network

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 20 Pu+ng ALL the Pieces Together Spring 2018 Rachit Agarwal What is a computer network? A set of network elements connected together, that implement

More information

CS 5565 Final Exam. Name (printed)

CS 5565 Final Exam. Name (printed) CS 5565 This is a closed-book, closed-internet, closed-cellphone and closed-computer exam. However, you may refer to your 2 sheets of prepared notes. Your exam should have 11 pages with 6 questions totaling

More information

Routing Protocols. Autonomous System (AS)

Routing Protocols. Autonomous System (AS) Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?

More information

Question Points Score total 100

Question Points Score total 100 CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 8 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement after

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Lecture 20: Link Layer

Lecture 20: Link Layer Lecture 20: Link Layer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross, All Rights

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

University of Southern California EE450: Introduction to Computer Networks

University of Southern California EE450: Introduction to Computer Networks University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal

More information

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Administrivia Homework: #2 due today #3 out today, due in two weeks (same date as midterm) No lecture next week Reading Week Midterm in two weeks 60

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks. Computer Networks Prof: Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Local Internetworking Good day. Today we will be talking about

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

There are 10 questions in total. Please write your SID on each page.

There are 10 questions in total. Please write your SID on each page. Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write

More information

CSC 4900 Computer Networks: Routing Algorithms

CSC 4900 Computer Networks: Routing Algorithms CSC 4900 Computer Networks: Routing Algorithms Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Solution of Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) They forward packets

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information