Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2

Size: px
Start display at page:

Download "Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2"

Transcription

1 Carnegie Mellon Computer Science Department Spring 2005 Midterm Name: Andrew ID: INSTRUCTIONS: There are 15 pages (numbered at the bottom). Make sure you have all of them. Please write your name on this cover and at the top of each page in this booklet except the last. If you find a question ambiguous, be sure to write down any assumptions you make. It is better to partially answer a question than to not attempt it at all. Be clear and concise. Limit your answers to the space provided. Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2

2 A Multiple Choice 1. Which of the following are true about persistent HTTP connections? Circle all that are correct. A. Persistent HTTP allows a server to track the client s requests through a persistent session. B. Only one connection must be opened for a page with no embedded objects served by other servers. C. Persistent HTTP shows the greatest performance advantage over nonpersistent with large objects. D. When the server has finished sending data for all objects referenced by the initially requested page, the server closes the connection. Solution: 5 pts The only correct answer is (B). -2 pts(a) is false HTTP is still stateless. -3 pts(c) is false persistent HTTP helps best when requesting many small objects. -2 pts(d) is false. The client can close the connection then, or the server can do so after a timeout, but the server doesn t know what else the client wants. 2. Charles, an ex-441 student, is given the task of building a new network link technology. Unfortunately, many of his beta-testers complain that their packets get corrupted when using his technology! He tracks the problem down to time synchronization problems between the sender and receiver on the link. Perhaps you can help Charles solve his problems by telling him a little about different encoding methods: For each of these sub-parts, identify whether the encoding can have problems with: A. Long strings of 0s B. Long strings of 1s C. Both long strings of 1s or long strings of 0s D. None of the above (a) Manchester encoding can have problems with: Solution: 2 pts(d) - None of the above. Manchester encoding encodes a 0 as a low-tohigh transition and a 1 as a high to low transition, so you always have lots of transitions. Unfortunately, it does reduce the effective data rate to half. (b) NRZ encoding can have problems with: Solution: 2 pts(c) - both! NRZ encoding only sychronizes on 0-1 and 1-0 transitions. If packets don t have enough of these, the sender/receiver will get out of sync. (c) NRZI encoding can have problems with: Solution: 2 ptsa long string of 0s. NRZI encodes a 1 as a transition, and a 0 as remaining the same. Page 2

3 (d) Draw the digital waveform corresponding to the Manchester encoded version of this sequence of 0s and 1s. We ve given you the NRZ version as a reference NRZ Manchester Solution: Manchester Grading: 2 pts; 1 point deducted for simple mistakes - e.g. inverted waveform 3. Which of the following statements are true about framing and media access: A. Byte-stuffing is useful when packet lengths must remain the same. B. Clock-based framing depends on multiple observations of a special bit pattern. C. 4B/5B encoding uses a scrambling function to reduce the odds of a long string of 1s or 0s. D. Ethernet uses CSMA/CD to ensure fair media access for multiple parties on a LAN. E. FDDI uses a token-ring based scheme with multiple tokens. Solution: Total: 5 pts (B)(2 pts), (D)(2 pts), and (E)(1 pt) are correct answers. (A) (-3 pts) Byte stuffing will increase the size of packets. (E) (-2 pts) 4B/5B eliminate the chance of a long string of 1s or 0s by encoding to a larger size. 4. Which of the following is true about different unicast routing protocols: A. BGP prevents routing loops common in distance vector protocols by having routers inform their neighbors about the path used for each of their routing table entries. B. The use of split-horizon and poison-reverse in a distance-vector protocol like RIP always prevents the count-to-infinity problem when a network partition occurs. Page 3

4 C. Link-state protocols do not suffer from the count-to-infinity problem. D. BGP always uses the shortest path (in terms of router hops) between two nodes. Solution: Total: 5 pts (A)(3 pts) and (C)(2 pts ) are correct answers (B)(-3 pts) Split horizon and poison reverse fix single hop loops, but multiple hop loops can still remain. (E)(-2 pts) BGP uses the shortest number of AS path hops, not router hops. Page 4

5 5. In the network depicted below, circle all of the paths that packets may take under valley free routing between a pair of clients. ISP A ISP Y ISP Z ISP X Legend Peer Customer Peer Provider Client / Stub network A. Client ISP Z ISP X ISP A Client B. Client ISP X ISP Y ISP A ISP Z Client C. Client ISP Y ISP X Client D. Client ISP Z ISP A ISP Y Client E. Client ISP Z ISP X ISP Y Client Solution: Total: 6 pts (C)(3 pts) and (D)(3 pts) are correct paths. 3 pts deducted for each incorrect answer Page 5

6 B Short Answer 6. Maggie decides to start a small company. She asks her ISP, Acme Networks, to give her enough addresses for 1500 hosts. ACME allocates a subblock from the * address range that they own and tells Maggie to use the following addresses: * * * * * * (a) Maggie has heard that the size of the Internet routing table has grown to huge proportions, and that to be a good citizen, she should announce the fewest number of routes possible to exactly cover her IP addresses. Under CIDR, what is the smallest set of network numbers that the rest of the world would use to describe Maggie s networks (please use address & prefix format)? Solution: 5 pts /22 and /23 (b) Maggie has a second ISP that she uses, RoadRunner Networks. She announces some of her network addresses to both Acme and RoadRunner. (Maggie hadn t talked to you yet these announcements do not correspond to the answers you provided to the previous question). As a result, some router far away in the network produces a forwarding table with the following entries: Destination Next Hop 192.1/ / / / Which next hop should the router use for a packet destined to ? Solution: 3 pts Using longest prefix match, it should use Page 6

7 7. Frank Fandango runs a 10Mbit/s Ethernet between the CMU campus and the homes of his friends. All of these hosts are in a single broadcast domain. Fortunately, they are located just within the maximum distance of an Ethernet. The total size of an Ethernet can be about 2.5 kilometers, and an Ethernet has a minimum packet size of 512 bits. Frank upgrades his network to 100Mbit/s Ethernet, and notices that when only one person sends at a time, or when he sends very large packets, his network works. But when many people send small packets, things don t work at all. (a) Help Frank out. Compute the threshold of how big packets must be in order for things to work: Solution: 4 pts The ethernet is 10 times faster, and Frank s users were at the boundary. Therefore, the packets must be 10 times larger 5120 bits. (b) One solution that Frank came up with is to raise the minimum packet size to the answer from part (a). Suppose that Frank cannot modify the minimum packet size, move the endpoints, lay new cable, or change the software or configuration on the endpoints. You may add new devices to the network. How could Frank change the topology to fix his problems anyway? Solution: 4 pts full credit Add a bridge or switch to separate the network into multiple collision domains. 1pt partial credit: Add a router. Adding a router would require that he change the IP address / gateway configuration on the hosts. Page 7

8 C Routers and Bridges A small company has the network topology shown below. In this topology: Three Ethernet segments (L1, L2, L3) are interconnected with a transparent bridge B and router R. Nodes E, F, I, and J are endsystems. Endsystems do not forward packets. L1 E B L2 F I R L3 J 8. In this problem, use the following notation: the MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If a node has multiple IP or MAC addresses, use the index of the segment to differentiate between them. For example, host F has two different IP addresses, F[1] and F[3], since it is on two LANs. The first line in the table provides an example entry for a packet from E to F on link L1. Suppose host E opens a connection to the Web server J. In the following table, give the MAC and IP source and destination addresses of the SYN packet of the TCP connection as it is observed traveling on links L1, L2, and L3 (i.e. fill in the next 3 lines). Location MAC Source MAC Dest IP Source IP Dest E to F on link L1 e f[1] E F[1] E to J on L1 E to J on L2 E to J on L3 Solution: The correct answer table looks like this: Location MAC Source MAC Dest IP Source IP Dest E to F on link L1 e f[1] E F[1] E to J on L1 e r(2) E J E to J on L2 e r(2) E J E to J on L3 r(3) j E J Grading: max 6pts, 1 pt was deducted for each incorrect table cell 9. The administrator has allocated class C addresses to each of the routed IP subnets. All the networking parameters of the different nodes in the system are statically configured. At some point, the company wants to move server J from link L3 to link L1. What changes are needed to the configuration of J? Solution: IP address needs to be modified, since the machine is moved to a different subnet. Its default gateway needs to be set to R2 (2pts) Page 8

9 What changes are needed to the configuration of R? (Don t worry about DNS for any of these questions). Solution: No changes are needed. (2pts) What other nodes need to be updated? Solution: No other nodes need be updated. (2pts) (Over) Page 9

10 10. At a later time endsystem E is moved to link L2. What nodes must have their configuration changed and how?: Solution: (3pts) None. Because of high network utilization in L3, the administrator reduces network load in L3 by segmenting it. 11. What kind of device should be used if the administrator wishes to minimize his work? Give a reason for your answer. Solution: (3pts) For segmenting, a router or an (intelligent) bridge can be used. Since work (and cost) should be minimal, a bridge should be used 12. What kind of device should be used if a significant portion of the network traffic is broadcast traffic? Give a reason for your answer. Solution: (3pts) A router, since a bridge cannot filter broadcast traffic Many people misunderstood that the broadcast traffic needed to reach all destinations. We meant to specify that the broadcast traffic was like ARP or IP multicast not like some other broadcast protocol. Everyone was given credit for this question Page 10

11 D Domain Name Service Harry Bovik is working on a Web site that has multiple replicated servers located throughout the Internet. He plans on using DNS to help direct clients to their nearest server, and comes up with the following hierarchical scheme. Harry has divided his server replicas into three groups (east, west, and central) based on their physical location. A typical query occurs as follows: When a client makes a query for the root.com name server is contacted first. It returns the name server (NS) record for ns1.hb.com (along with a corresponding A record). The TTL of this record is set to 1 day. The ns1.hb.com name server is then queried for the address. It examines the source of the name query and returns an NS record for one of {east-ns, central-ns, west-ns}.distributed.hb.com (along with a corresponding A record). The choice of which name server is based on where ns1 thinks the query came from. Finally, one of {east-ns, central-ns, west-ns}.distributed.hb.com is contacted and it returns an address (A) record for the most lightly loaded web server in its region. The following questions are based on this design. 13. Harry s name server software has only two choices for TTL settings for A and NS records - 1 day and 1 minute. What are reasonable TTLs for the following records? Briefly explain your choice. (a) NS record for {east-ns, central-ns, west-ns}.distributed.hb.com: Solution: 1 day the mapping should remain constant for a long time. (2pts) (b) A record for {east-ns, central-ns, west-ns}.distributed.hb.com: Solution: 1 day the mapping should remain constant for a long time. (2pts) (c) A record returned for the actual Web server: Solution: 1 minute the mapping changes frequently since it depends on the current Web server loads.(2pts) Over Page 11

12 Harry s Web site is especially popular among CMU students. The CMU network administrators estimate that there is one access from CMU every 6 minutes. Each access results in the application resolving the name Assume the following: No other queries are made from CMU All CMU clients use the same local name server Web browsers do not do any caching on their own. 14. How many accesses will be made to the following name servers each HOUR on average to resolve these queries? Use your answers to the previous question, and explain your calculation. (a) ROOT: Solution: 1/24 the mapping needs to be refreshed once per day, so there are 1/24 requests per hour. (3pts) (b) ns1.hb.com: Solution: 1/24 the mapping needs to be refreshed once per day, so there are 1/24 requests per hour. (3pts) (c) one of {east-ns, central-ns, west-ns}.distributed.hb.com: Solution: 10 The time between two requests is 6 minutes. Since the mapping expires after 1 minute, it needs to be refreshed for each request. (3 pts) Page 12

13 E Link Probing 15. Ulysses dreams up a cute new idea for a networking tool. In traceroute, a source sends packets with increasing TTL towards a destination. Traceroute reports the distance and round-trip time (RTT) to each router on the path to the destination. How could Ulysses modify traceroute to report the latency (propagation delay + transmission delay) of a particular link in the network (i.e., not the latency of the entire route to that distance)? You may assume that all network routes are symmetric, and that there are no queuing or processing delays. Solution: To measure the latency of a link at distance k from a source, Ulysses could first use traceroute to determine the endpoints of the link (by sending packets with TTL s of k and k+1), and measure the round-trip time in each case. Assuming routes are symmetric and there are no queuing or processing delays, the difference in times is twice the propagation delay + transmission delay. Here we ll assume that Ulysses is satisfied with knowing this quantity for some specific packet size, as the transmission delay is a function of packet size. (6pts) 16. Ulysses also decides to improve the ping tool as well. He notices that ping can be used to send packets of different sizes. He uses the ping tools on the first hop router for his computer. He notices that the router has a ping time of 10ms for small packets (64byte) and 12 ms for large packets (1500bytes). What is the propagation delay and transmission rate of this network link? (You may again assume that there are no processing or queuing delays.) Solution: Assuming that Ulyssess computer is connected directly to the first-hop router, and that the router responds by sending back an ICMP packet of the same size that it receives (and the speed of the link to the router is the same in both directions), we see that the one-way times across the link are 5ms and 6ms. Let r be the transmission rate of the link in bits/second and d the propagation delay in seconds. We have two equations and two unknowns: d + 512/r = d /r = Subtracting one from the other yields: 11488/r = 1x10 3, or r = 11,488,000 bits/sec. d = / = (6pts) 17. Ulysses is on a roll! He combines his two tools and has traceroute send small and large packets (small - 64 byte and large byte). How could he use the output to measure the bandwidth of a specific link along the path? (Again, assume all routes are symmetric.) Solution: Ulysses has basically reinvented a network tool called pathchar. Using the answer to problem 15, Ulysses can measure the transmission delay + propagation delay for small and large packets across any link along the path. Then using the answer from problem 16, he can calculate the transmission rate (bandwidth) of the link. (6pts) Page 13

14 (this page deliberately left blank) Page 14

15 The End Have a Great Break! F 2 Free Points for Tearing Off Page: Anonymous Feeback List one thing you liked about the class and would like to see more of or see continued (any topic - lectures, homework, projects, bboards, topics covered or not covered, etc., etc.): List one thing you would like to have changed or have improved about the class: Page 15

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80 Carnegie Mellon Computer Science Department. 15-441 Spring 2010 Midterm Name: Andrew ID: INSTRUCTIONS: There are 10 pages (numbered at the bottom). Make sure you have all of them. Please write your name

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam Carnegie Mellon Computer Science Department. 15-744 Spring 2015 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 7 pages (numbered at the bottom). Make sure you have all of them. Please write your

More information

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Administrivia Homework: #2 due today #3 out today, due in two weeks (same date as midterm) No lecture next week Reading Week Midterm in two weeks 60

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

CS 640: Introduction to Computer Networks

CS 640: Introduction to Computer Networks CS 640: Introduction to Computer Networks Midterm I 10/19/2006 Allotted time: 11:00AM to 12:30 PM (90 minutes) Name: Answers in bold italic font UW -ID Number: 1. There are 6 questions in this mid-term.

More information

15-441: Computer Networks Homework 1

15-441: Computer Networks Homework 1 15-441: Computer Networks Homework 1 Assigned: September 12, 2006 Due: September 21, 2006 1. Consider sending a file of size F = M * L bits over a path of Q links. Each link transmits at R bits/s. The

More information

15-441: Computer Networks Spring 2017 Homework 3

15-441: Computer Networks Spring 2017 Homework 3 15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page

More information

Carnegie Mellon Computer Science Department Spring 2016 Midterm Exam

Carnegie Mellon Computer Science Department Spring 2016 Midterm Exam Carnegie Mellon Computer Science Department. 15-744 Spring 2016 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 13 pages (numbered at the bottom). Make sure you have all of them. Please write your

More information

Homework 3 Discussion

Homework 3 Discussion Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local

More information

15-441: Computer Networks Spring 2010 Homework #2

15-441: Computer Networks Spring 2010 Homework #2 15-441: Computer Networks Spring 2010 Homework #2 Due: Feb 23 rd 2010, in class Lead TA: Rui Meireles (firstname@cmu.edu) Ethernet 1. Five prisoners are locked up in adjacent cells in a prison. They would

More information

Carnegie Mellon Computer Science Department Spring 2005 Final

Carnegie Mellon Computer Science Department Spring 2005 Final Carnegie Mellon Computer Science Department. 15-441 Spring 2005 Final Name: Andrew ID: INSTRUCTIONS: There are 16 pages (numbered at the bottom). Make sure you have all of them. Please write your name

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100 CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013 Final Examination: 14:00-18:00, Friday, November 1, 2013 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed notes,

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2016 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

TDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014

TDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014 (TEN1) Final Examination: 14:00-18:00, Thursday, August 20, 2014 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100 NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Email Address ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Name (Print) Prof. John A. Copeland Practice for April 11, 2006 Tel.: 404-894-5177 E-Mail: copeland@ece.gatech.edu RULES.

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 2 Solutions Total points = 50 Problems 1. The Domain Name System (DNS) [6 points] In the figure below, the first two steps are shown in the process of the local DNS

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

EECS 122: Introduction to Communication Networks Final Exam Solutions

EECS 122: Introduction to Communication Networks Final Exam Solutions EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Midterm Exam CSCE 232: Computer Networks Fall Instructions: Midterm Exam CSCE 232: Computer Networks Fall 2007 Last Name: First Name: Student ID: Instructions: 1. This is a close-book and close-notes exam. 2. There are seven questions in total. The number of points

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING FINAL EXAMINATION: April 25, 2017 DURATION: 2V2 hrs. ECE361 - Computer Networks Exam Type: B Calculator Type: 2 (non-programmable calculators)

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

PLEASE WRITE NEATLY I need to be able to read your answers! (seemingly encrypted solutions can not be decrypted!)

PLEASE WRITE NEATLY I need to be able to read your answers! (seemingly encrypted solutions can not be decrypted!) FINAL Exam: Off campus students (same exam as for on campus students) CMPSCI 453/591 ST550A: Computer Networks Spring 2002 Prof. Jim Kurose Instructions: Put your name and student number on the exam books

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

SYED AMMAL ENGINEERING COLLEGE

SYED AMMAL ENGINEERING COLLEGE QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing

More information

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences CS168 MIDTERM EXAMINATION Monday, 20 October 2014 INSTRUCTIONS READ THEM NOW! This

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

Housekeeping. Fall /5 CptS/EE 555 1

Housekeeping. Fall /5 CptS/EE 555 1 Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section

More information

Duke University CompSci 356 Midterm Spring 2016

Duke University CompSci 356 Midterm Spring 2016 Duke University CompSci 356 Midterm Spring 2016 Name (Print):, (Family name) (Given name) Student ID Number: Date of Exam: Feb 25, 2016 Time Period: 11:45am-1pm Number of Exam Pages: 15 (including this

More information

Homework 2: IP Due: 11:59 PM, Oct 20, 2016

Homework 2: IP Due: 11:59 PM, Oct 20, 2016 C68 Computer Networks Fonseca Contents Homework : IP Due: :59 PM, Oct 0, 06 IP Forwarding Spanning Tree BGP IP Forwarding Consider this diagram and answer the following questions: H H 00... 00... 00...

More information

CSE 123a Computer Networking

CSE 123a Computer Networking CSE 123a Computer Networking Fall 2005 Final Review Stefan Savage When/when/who? Tuesday 3:00-6:00 in this room I need to be giving a talk in Toronto so the final will be proctored by the TAs Fall, 2005

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

CSCI Spring Final Exam Solution

CSCI Spring Final Exam Solution CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and

More information

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key COMP 361 Computer Communications Networks all Semester 2003 inal Examination: Solution key Date: Dec 15, 2003, ime 8:30am - 11:30am, venue Rm 3007 Name: Student ID: Email: Instructions: 1. his examination

More information

CSE 123: Computer Networks Fall Quarter, 2013 MIDTERM EXAM

CSE 123: Computer Networks Fall Quarter, 2013 MIDTERM EXAM CSE 123: Computer Networks Fall Quarter, 2013 MIDTERM EXAM Instructor: Alex C. Snoeren Name Student ID Question Score Points 1 21 2 30 3 40 4 9 Total 100 100 This exam is closed book. You are allowed one

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

A Background: Ethernet

A Background: Ethernet Carnegie Mellon Computer Science Department. 15-744 Fall 2009 Problem Set 1 This problem set has ten questions. Answer them as clearly and concisely as possible. You may discuss ideas with others in the

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction

More information

CS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 7 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Network control plane Routing Link state routing (OSPF) Distance vector routing (RIP) BGP ICMP Midterm/Project 2

More information

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2017 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course

More information

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking. Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

ECE 435 Network Engineering Lecture 12

ECE 435 Network Engineering Lecture 12 ECE 435 Network Engineering Lecture 12 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 17 October 2016 Announcements HW#5 will be posted soon 1 1. OSI Layers Midterm Review (a)

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Lecture 10: Addressing

Lecture 10: Addressing Lecture 10: Addressing CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY Lecture 10 Overview ICMP The other network-layer protocol IP Addresses Class-based addressing Subnetting Classless addressing

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2018 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

FINAL Wednesday, 30 th July 2008

FINAL Wednesday, 30 th July 2008 Data Communication & Networks Summer 2008 Semester FINAL Wednesday, 30 th July 2008 Total Time: 120 Minutes Total Marks: 80 Roll Number Name Section Signature: Signature of Invigilator Course Instructors:

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Problem Max. Points Act. Points Grader

Problem Max. Points Act. Points Grader Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2007-12-12 Dr. Jürgen Schönwälder Duration: 90 minutes Final Examination The Jacobs University s Code of Academic Integrity applies

More information

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out BVRIT HYDERABAD College of Engineering for Women Department of Information Technology Hand Out Subject Name: Prepared by: Computer Networks Dipali Pattanayak,Assistant Professor, IT Year and Sem, Department:

More information

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122 Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:

More information

Chapter 19 Network Layer: Logical Addressing

Chapter 19 Network Layer: Logical Addressing Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Q&A Session Rüdiger Birkner Tobias Bühler https://comm-net.ethz.ch/ ETH Zürich August 6 2018 Old exam from 2016 3 hours instead of 2.5 Topics which we did not discuss

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety

More information