Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2
|
|
- Crystal Morton
- 5 years ago
- Views:
Transcription
1 Carnegie Mellon Computer Science Department Spring 2005 Midterm Name: Andrew ID: INSTRUCTIONS: There are 15 pages (numbered at the bottom). Make sure you have all of them. Please write your name on this cover and at the top of each page in this booklet except the last. If you find a question ambiguous, be sure to write down any assumptions you make. It is better to partially answer a question than to not attempt it at all. Be clear and concise. Limit your answers to the space provided. Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2
2 A Multiple Choice 1. Which of the following are true about persistent HTTP connections? Circle all that are correct. A. Persistent HTTP allows a server to track the client s requests through a persistent session. B. Only one connection must be opened for a page with no embedded objects served by other servers. C. Persistent HTTP shows the greatest performance advantage over nonpersistent with large objects. D. When the server has finished sending data for all objects referenced by the initially requested page, the server closes the connection. Solution: 5 pts The only correct answer is (B). -2 pts(a) is false HTTP is still stateless. -3 pts(c) is false persistent HTTP helps best when requesting many small objects. -2 pts(d) is false. The client can close the connection then, or the server can do so after a timeout, but the server doesn t know what else the client wants. 2. Charles, an ex-441 student, is given the task of building a new network link technology. Unfortunately, many of his beta-testers complain that their packets get corrupted when using his technology! He tracks the problem down to time synchronization problems between the sender and receiver on the link. Perhaps you can help Charles solve his problems by telling him a little about different encoding methods: For each of these sub-parts, identify whether the encoding can have problems with: A. Long strings of 0s B. Long strings of 1s C. Both long strings of 1s or long strings of 0s D. None of the above (a) Manchester encoding can have problems with: Solution: 2 pts(d) - None of the above. Manchester encoding encodes a 0 as a low-tohigh transition and a 1 as a high to low transition, so you always have lots of transitions. Unfortunately, it does reduce the effective data rate to half. (b) NRZ encoding can have problems with: Solution: 2 pts(c) - both! NRZ encoding only sychronizes on 0-1 and 1-0 transitions. If packets don t have enough of these, the sender/receiver will get out of sync. (c) NRZI encoding can have problems with: Solution: 2 ptsa long string of 0s. NRZI encodes a 1 as a transition, and a 0 as remaining the same. Page 2
3 (d) Draw the digital waveform corresponding to the Manchester encoded version of this sequence of 0s and 1s. We ve given you the NRZ version as a reference NRZ Manchester Solution: Manchester Grading: 2 pts; 1 point deducted for simple mistakes - e.g. inverted waveform 3. Which of the following statements are true about framing and media access: A. Byte-stuffing is useful when packet lengths must remain the same. B. Clock-based framing depends on multiple observations of a special bit pattern. C. 4B/5B encoding uses a scrambling function to reduce the odds of a long string of 1s or 0s. D. Ethernet uses CSMA/CD to ensure fair media access for multiple parties on a LAN. E. FDDI uses a token-ring based scheme with multiple tokens. Solution: Total: 5 pts (B)(2 pts), (D)(2 pts), and (E)(1 pt) are correct answers. (A) (-3 pts) Byte stuffing will increase the size of packets. (E) (-2 pts) 4B/5B eliminate the chance of a long string of 1s or 0s by encoding to a larger size. 4. Which of the following is true about different unicast routing protocols: A. BGP prevents routing loops common in distance vector protocols by having routers inform their neighbors about the path used for each of their routing table entries. B. The use of split-horizon and poison-reverse in a distance-vector protocol like RIP always prevents the count-to-infinity problem when a network partition occurs. Page 3
4 C. Link-state protocols do not suffer from the count-to-infinity problem. D. BGP always uses the shortest path (in terms of router hops) between two nodes. Solution: Total: 5 pts (A)(3 pts) and (C)(2 pts ) are correct answers (B)(-3 pts) Split horizon and poison reverse fix single hop loops, but multiple hop loops can still remain. (E)(-2 pts) BGP uses the shortest number of AS path hops, not router hops. Page 4
5 5. In the network depicted below, circle all of the paths that packets may take under valley free routing between a pair of clients. ISP A ISP Y ISP Z ISP X Legend Peer Customer Peer Provider Client / Stub network A. Client ISP Z ISP X ISP A Client B. Client ISP X ISP Y ISP A ISP Z Client C. Client ISP Y ISP X Client D. Client ISP Z ISP A ISP Y Client E. Client ISP Z ISP X ISP Y Client Solution: Total: 6 pts (C)(3 pts) and (D)(3 pts) are correct paths. 3 pts deducted for each incorrect answer Page 5
6 B Short Answer 6. Maggie decides to start a small company. She asks her ISP, Acme Networks, to give her enough addresses for 1500 hosts. ACME allocates a subblock from the * address range that they own and tells Maggie to use the following addresses: * * * * * * (a) Maggie has heard that the size of the Internet routing table has grown to huge proportions, and that to be a good citizen, she should announce the fewest number of routes possible to exactly cover her IP addresses. Under CIDR, what is the smallest set of network numbers that the rest of the world would use to describe Maggie s networks (please use address & prefix format)? Solution: 5 pts /22 and /23 (b) Maggie has a second ISP that she uses, RoadRunner Networks. She announces some of her network addresses to both Acme and RoadRunner. (Maggie hadn t talked to you yet these announcements do not correspond to the answers you provided to the previous question). As a result, some router far away in the network produces a forwarding table with the following entries: Destination Next Hop 192.1/ / / / Which next hop should the router use for a packet destined to ? Solution: 3 pts Using longest prefix match, it should use Page 6
7 7. Frank Fandango runs a 10Mbit/s Ethernet between the CMU campus and the homes of his friends. All of these hosts are in a single broadcast domain. Fortunately, they are located just within the maximum distance of an Ethernet. The total size of an Ethernet can be about 2.5 kilometers, and an Ethernet has a minimum packet size of 512 bits. Frank upgrades his network to 100Mbit/s Ethernet, and notices that when only one person sends at a time, or when he sends very large packets, his network works. But when many people send small packets, things don t work at all. (a) Help Frank out. Compute the threshold of how big packets must be in order for things to work: Solution: 4 pts The ethernet is 10 times faster, and Frank s users were at the boundary. Therefore, the packets must be 10 times larger 5120 bits. (b) One solution that Frank came up with is to raise the minimum packet size to the answer from part (a). Suppose that Frank cannot modify the minimum packet size, move the endpoints, lay new cable, or change the software or configuration on the endpoints. You may add new devices to the network. How could Frank change the topology to fix his problems anyway? Solution: 4 pts full credit Add a bridge or switch to separate the network into multiple collision domains. 1pt partial credit: Add a router. Adding a router would require that he change the IP address / gateway configuration on the hosts. Page 7
8 C Routers and Bridges A small company has the network topology shown below. In this topology: Three Ethernet segments (L1, L2, L3) are interconnected with a transparent bridge B and router R. Nodes E, F, I, and J are endsystems. Endsystems do not forward packets. L1 E B L2 F I R L3 J 8. In this problem, use the following notation: the MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If a node has multiple IP or MAC addresses, use the index of the segment to differentiate between them. For example, host F has two different IP addresses, F[1] and F[3], since it is on two LANs. The first line in the table provides an example entry for a packet from E to F on link L1. Suppose host E opens a connection to the Web server J. In the following table, give the MAC and IP source and destination addresses of the SYN packet of the TCP connection as it is observed traveling on links L1, L2, and L3 (i.e. fill in the next 3 lines). Location MAC Source MAC Dest IP Source IP Dest E to F on link L1 e f[1] E F[1] E to J on L1 E to J on L2 E to J on L3 Solution: The correct answer table looks like this: Location MAC Source MAC Dest IP Source IP Dest E to F on link L1 e f[1] E F[1] E to J on L1 e r(2) E J E to J on L2 e r(2) E J E to J on L3 r(3) j E J Grading: max 6pts, 1 pt was deducted for each incorrect table cell 9. The administrator has allocated class C addresses to each of the routed IP subnets. All the networking parameters of the different nodes in the system are statically configured. At some point, the company wants to move server J from link L3 to link L1. What changes are needed to the configuration of J? Solution: IP address needs to be modified, since the machine is moved to a different subnet. Its default gateway needs to be set to R2 (2pts) Page 8
9 What changes are needed to the configuration of R? (Don t worry about DNS for any of these questions). Solution: No changes are needed. (2pts) What other nodes need to be updated? Solution: No other nodes need be updated. (2pts) (Over) Page 9
10 10. At a later time endsystem E is moved to link L2. What nodes must have their configuration changed and how?: Solution: (3pts) None. Because of high network utilization in L3, the administrator reduces network load in L3 by segmenting it. 11. What kind of device should be used if the administrator wishes to minimize his work? Give a reason for your answer. Solution: (3pts) For segmenting, a router or an (intelligent) bridge can be used. Since work (and cost) should be minimal, a bridge should be used 12. What kind of device should be used if a significant portion of the network traffic is broadcast traffic? Give a reason for your answer. Solution: (3pts) A router, since a bridge cannot filter broadcast traffic Many people misunderstood that the broadcast traffic needed to reach all destinations. We meant to specify that the broadcast traffic was like ARP or IP multicast not like some other broadcast protocol. Everyone was given credit for this question Page 10
11 D Domain Name Service Harry Bovik is working on a Web site that has multiple replicated servers located throughout the Internet. He plans on using DNS to help direct clients to their nearest server, and comes up with the following hierarchical scheme. Harry has divided his server replicas into three groups (east, west, and central) based on their physical location. A typical query occurs as follows: When a client makes a query for the root.com name server is contacted first. It returns the name server (NS) record for ns1.hb.com (along with a corresponding A record). The TTL of this record is set to 1 day. The ns1.hb.com name server is then queried for the address. It examines the source of the name query and returns an NS record for one of {east-ns, central-ns, west-ns}.distributed.hb.com (along with a corresponding A record). The choice of which name server is based on where ns1 thinks the query came from. Finally, one of {east-ns, central-ns, west-ns}.distributed.hb.com is contacted and it returns an address (A) record for the most lightly loaded web server in its region. The following questions are based on this design. 13. Harry s name server software has only two choices for TTL settings for A and NS records - 1 day and 1 minute. What are reasonable TTLs for the following records? Briefly explain your choice. (a) NS record for {east-ns, central-ns, west-ns}.distributed.hb.com: Solution: 1 day the mapping should remain constant for a long time. (2pts) (b) A record for {east-ns, central-ns, west-ns}.distributed.hb.com: Solution: 1 day the mapping should remain constant for a long time. (2pts) (c) A record returned for the actual Web server: Solution: 1 minute the mapping changes frequently since it depends on the current Web server loads.(2pts) Over Page 11
12 Harry s Web site is especially popular among CMU students. The CMU network administrators estimate that there is one access from CMU every 6 minutes. Each access results in the application resolving the name Assume the following: No other queries are made from CMU All CMU clients use the same local name server Web browsers do not do any caching on their own. 14. How many accesses will be made to the following name servers each HOUR on average to resolve these queries? Use your answers to the previous question, and explain your calculation. (a) ROOT: Solution: 1/24 the mapping needs to be refreshed once per day, so there are 1/24 requests per hour. (3pts) (b) ns1.hb.com: Solution: 1/24 the mapping needs to be refreshed once per day, so there are 1/24 requests per hour. (3pts) (c) one of {east-ns, central-ns, west-ns}.distributed.hb.com: Solution: 10 The time between two requests is 6 minutes. Since the mapping expires after 1 minute, it needs to be refreshed for each request. (3 pts) Page 12
13 E Link Probing 15. Ulysses dreams up a cute new idea for a networking tool. In traceroute, a source sends packets with increasing TTL towards a destination. Traceroute reports the distance and round-trip time (RTT) to each router on the path to the destination. How could Ulysses modify traceroute to report the latency (propagation delay + transmission delay) of a particular link in the network (i.e., not the latency of the entire route to that distance)? You may assume that all network routes are symmetric, and that there are no queuing or processing delays. Solution: To measure the latency of a link at distance k from a source, Ulysses could first use traceroute to determine the endpoints of the link (by sending packets with TTL s of k and k+1), and measure the round-trip time in each case. Assuming routes are symmetric and there are no queuing or processing delays, the difference in times is twice the propagation delay + transmission delay. Here we ll assume that Ulysses is satisfied with knowing this quantity for some specific packet size, as the transmission delay is a function of packet size. (6pts) 16. Ulysses also decides to improve the ping tool as well. He notices that ping can be used to send packets of different sizes. He uses the ping tools on the first hop router for his computer. He notices that the router has a ping time of 10ms for small packets (64byte) and 12 ms for large packets (1500bytes). What is the propagation delay and transmission rate of this network link? (You may again assume that there are no processing or queuing delays.) Solution: Assuming that Ulyssess computer is connected directly to the first-hop router, and that the router responds by sending back an ICMP packet of the same size that it receives (and the speed of the link to the router is the same in both directions), we see that the one-way times across the link are 5ms and 6ms. Let r be the transmission rate of the link in bits/second and d the propagation delay in seconds. We have two equations and two unknowns: d + 512/r = d /r = Subtracting one from the other yields: 11488/r = 1x10 3, or r = 11,488,000 bits/sec. d = / = (6pts) 17. Ulysses is on a roll! He combines his two tools and has traceroute send small and large packets (small - 64 byte and large byte). How could he use the output to measure the bandwidth of a specific link along the path? (Again, assume all routes are symmetric.) Solution: Ulysses has basically reinvented a network tool called pathchar. Using the answer to problem 15, Ulysses can measure the transmission delay + propagation delay for small and large packets across any link along the path. Then using the answer from problem 16, he can calculate the transmission rate (bandwidth) of the link. (6pts) Page 13
14 (this page deliberately left blank) Page 14
15 The End Have a Great Break! F 2 Free Points for Tearing Off Page: Anonymous Feeback List one thing you liked about the class and would like to see more of or see continued (any topic - lectures, homework, projects, bboards, topics covered or not covered, etc., etc.): List one thing you would like to have changed or have improved about the class: Page 15
A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80
Carnegie Mellon Computer Science Department. 15-441 Spring 2010 Midterm Name: Andrew ID: INSTRUCTIONS: There are 10 pages (numbered at the bottom). Make sure you have all of them. Please write your name
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationCarnegie Mellon Computer Science Department Spring 2015 Midterm Exam
Carnegie Mellon Computer Science Department. 15-744 Spring 2015 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 7 pages (numbered at the bottom). Make sure you have all of them. Please write your
More informationCSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics
CSC458 Lecture 6 Inter-domain Routing IP Addressing Administrivia Homework: #2 due today #3 out today, due in two weeks (same date as midterm) No lecture next week Reading Week Midterm in two weeks 60
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationCS 640: Introduction to Computer Networks
CS 640: Introduction to Computer Networks Midterm I 10/19/2006 Allotted time: 11:00AM to 12:30 PM (90 minutes) Name: Answers in bold italic font UW -ID Number: 1. There are 6 questions in this mid-term.
More information15-441: Computer Networks Homework 1
15-441: Computer Networks Homework 1 Assigned: September 12, 2006 Due: September 21, 2006 1. Consider sending a file of size F = M * L bits over a path of Q links. Each link transmits at R bits/s. The
More information15-441: Computer Networks Spring 2017 Homework 3
15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page
More informationCarnegie Mellon Computer Science Department Spring 2016 Midterm Exam
Carnegie Mellon Computer Science Department. 15-744 Spring 2016 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 13 pages (numbered at the bottom). Make sure you have all of them. Please write your
More informationHomework 3 Discussion
Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local
More information15-441: Computer Networks Spring 2010 Homework #2
15-441: Computer Networks Spring 2010 Homework #2 Due: Feb 23 rd 2010, in class Lead TA: Rui Meireles (firstname@cmu.edu) Ethernet 1. Five prisoners are locked up in adjacent cells in a prison. They would
More informationCarnegie Mellon Computer Science Department Spring 2005 Final
Carnegie Mellon Computer Science Department. 15-441 Spring 2005 Final Name: Andrew ID: INSTRUCTIONS: There are 16 pages (numbered at the bottom). Make sure you have all of them. Please write your name
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes
CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationCSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100
CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,
More informationEXAM TCP/IP NETWORKING Duration: 3 hours With Solutions
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you
More informationTDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013
Final Examination: 14:00-18:00, Friday, November 1, 2013 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed notes,
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More informationEXAM TCP/IP NETWORKING Duration: 3 hours With Solutions
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2016 INSTRUCTIONS 1. Write your solution into this document and return it to us (you
More informationFINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions
First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationFinal Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou
Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationCS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.
CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch
More informationTDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014
(TEN1) Final Examination: 14:00-18:00, Thursday, August 20, 2014 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationEXAM TCP/IP NETWORKING Duration: 3 hours
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes
CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006
Email Address ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Name (Print) Prof. John A. Copeland Practice for April 11, 2006 Tel.: 404-894-5177 E-Mail: copeland@ece.gatech.edu RULES.
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Homework 2 Solutions Total points = 50 Problems 1. The Domain Name System (DNS) [6 points] In the figure below, the first two steps are shown in the process of the local DNS
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT
CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationLecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1
Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationUniversity of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.
University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationMidterm Exam CSCE 232: Computer Networks Fall Instructions:
Midterm Exam CSCE 232: Computer Networks Fall 2007 Last Name: First Name: Student ID: Instructions: 1. This is a close-book and close-notes exam. 2. There are seven questions in total. The number of points
More informationCOMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class
Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING FINAL EXAMINATION: April 25, 2017 DURATION: 2V2 hrs. ECE361 - Computer Networks Exam Type: B Calculator Type: 2 (non-programmable calculators)
More informationHands-On Network Security: Practical Tools & Methods
Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationPLEASE WRITE NEATLY I need to be able to read your answers! (seemingly encrypted solutions can not be decrypted!)
FINAL Exam: Off campus students (same exam as for on campus students) CMPSCI 453/591 ST550A: Computer Networks Spring 2002 Prof. Jim Kurose Instructions: Put your name and student number on the exam books
More informationRouting Unicast routing protocols
Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type
More informationSYED AMMAL ENGINEERING COLLEGE
QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing
More informationUniversity of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences
University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences CS168 MIDTERM EXAMINATION Monday, 20 October 2014 INSTRUCTIONS READ THEM NOW! This
More informationCS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online
1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationDuke University CompSci 356 Midterm Spring 2016
Duke University CompSci 356 Midterm Spring 2016 Name (Print):, (Family name) (Given name) Student ID Number: Date of Exam: Feb 25, 2016 Time Period: 11:45am-1pm Number of Exam Pages: 15 (including this
More informationHomework 2: IP Due: 11:59 PM, Oct 20, 2016
C68 Computer Networks Fonseca Contents Homework : IP Due: :59 PM, Oct 0, 06 IP Forwarding Spanning Tree BGP IP Forwarding Consider this diagram and answer the following questions: H H 00... 00... 00...
More informationCSE 123a Computer Networking
CSE 123a Computer Networking Fall 2005 Final Review Stefan Savage When/when/who? Tuesday 3:00-6:00 in this room I need to be giving a talk in Toronto so the final will be proctored by the TAs Fall, 2005
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationCOMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key
COMP 361 Computer Communications Networks all Semester 2003 inal Examination: Solution key Date: Dec 15, 2003, ime 8:30am - 11:30am, venue Rm 3007 Name: Student ID: Email: Instructions: 1. his examination
More informationCSE 123: Computer Networks Fall Quarter, 2013 MIDTERM EXAM
CSE 123: Computer Networks Fall Quarter, 2013 MIDTERM EXAM Instructor: Alex C. Snoeren Name Student ID Question Score Points 1 21 2 30 3 40 4 9 Total 100 100 This exam is closed book. You are allowed one
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance
More informationA Background: Ethernet
Carnegie Mellon Computer Science Department. 15-744 Fall 2009 Problem Set 1 This problem set has ten questions. Answer them as clearly and concisely as possible. You may discuss ideas with others in the
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction
More informationCS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 7 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Network control plane Routing Link state routing (OSPF) Distance vector routing (RIP) BGP ICMP Midterm/Project 2
More informationSchool of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks
School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,
More informationEXAM TCP/IP NETWORKING Duration: 3 hours
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2017 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to
More informationEECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.
EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationBasic Idea. Routing. Example. Routing by the Network
Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationComputer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.
Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course
More information2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.
Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44
More informationNetwork Layer: Routing
Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:
More informationECE 435 Network Engineering Lecture 12
ECE 435 Network Engineering Lecture 12 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 17 October 2016 Announcements HW#5 will be posted soon 1 1. OSI Layers Midterm Review (a)
More informationRouting by the Network
Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationOverview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load
Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationLecture 10: Addressing
Lecture 10: Addressing CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY Lecture 10 Overview ICMP The other network-layer protocol IP Addresses Class-based addressing Subnetting Classless addressing
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationEXAM TCP/IP NETWORKING Duration: 3 hours With Solutions
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2018 INSTRUCTIONS 1. Write your solution into this document and return it to us (you
More informationLink layer: introduction
Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,
More informationFINAL Wednesday, 30 th July 2008
Data Communication & Networks Summer 2008 Semester FINAL Wednesday, 30 th July 2008 Total Time: 120 Minutes Total Marks: 80 Roll Number Name Section Signature: Signature of Invigilator Course Instructors:
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationProblem Max. Points Act. Points Grader
Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2007-12-12 Dr. Jürgen Schönwälder Duration: 90 minutes Final Examination The Jacobs University s Code of Academic Integrity applies
More informationBVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out
BVRIT HYDERABAD College of Engineering for Women Department of Information Technology Hand Out Subject Name: Prepared by: Computer Networks Dipali Pattanayak,Assistant Professor, IT Year and Sem, Department:
More informationMidterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122
Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationChapter 19 Network Layer: Logical Addressing
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationRouting. Jens A Andersson Communication Systems
Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationCommunication Networks
Communication Networks Spring 2018 Q&A Session Rüdiger Birkner Tobias Bühler https://comm-net.ethz.ch/ ETH Zürich August 6 2018 Old exam from 2016 3 hours instead of 2.5 Topics which we did not discuss
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationCS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay
Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety
More information