CS 5565 Final Exam. Name (printed)

Similar documents
CS 5565 Spring CS 5565 Midterm

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Computer Networks. Routing Algorithms

CS 458 Internet Engineering Spring First Exam

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing

Top-Down Network Design

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

EEC-684/584 Computer Networks

CS 3516: Computer Networks

Lecture 14: DHCP and NAT

Examination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC. Date: 20 May :00 19:00 SOLUTIONS

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

1 Connectionless Routing

Homework 3 Discussion

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECSE 414 Fall 2014 Final Exam Solutions

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Lecture 12: Aggregation. CSE 123: Computer Networks Alex C. Snoeren

CS 640: Introduction to Computer Networks

CS557 Spring 2013 Midterm Exam

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CSCI-1680 Network Layer:

Lecture 12: Addressing. CSE 123: Computer Networks Alex C. Snoeren

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Switching & ARP Week 3

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks

CSCI Spring Final Exam Solution

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

ECE 158A: Lecture 7. Fall 2015

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

EXAM TCP/IP NETWORKING Duration: 3 hours

CS 5565 Sample Final Exam Spring 2005

CCNA Exploration Network Fundamentals

Study Guide. Module Two

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

CCNA 1 Chapter 9 v5.0 Exam Answers 2013

Communication Networks

Bridge Mode. Course #2222

CSE 123: Computer Networks Fall Quarter, 2017 MIDTERM EXAM

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

Written examination in TDTS06 Computer Networks at 8 12

Computer Science 461 Midterm Exam March 14, :00-10:50am

CSCE 463/612 Networks and Distributed Processing Spring 2018

Internetworking Part 2

Computer Networks. Routing

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Networking Potpourri: Plug-n-Play, Next Gen

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

CS 344/444 Computer Network Fundamentals Midterm Exam Spring /07/2007

Intra-domain Routing

Introduction to TCP/IP

cs144 Midterm Review Fall 2010

CSCI 466 Midterm Networks Fall 2011

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer

Contents. Configuring urpf 1

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

MTA_98-366_Vindicator930

Sirindhorn International Institute of Technology Thammasat University

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

Chapter 5. The Network Layer. CEN Chapter 5 1

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles

Claim desired outcome

TDC 363 Introduction to LANs

CS 457 Networking and the Internet. Addressing. Topics 9/15/16. Fall 2016 Indrajit Ray

EXAM TCP/IP NETWORKING Duration: 3 hours

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

CNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

Written examination in Computer Networks

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

Examsheets Questions and Answers

Distance vector and RIP

Layering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

DHCP Configuration. Page 1 of 14

IP Addresses. IP Addresses

The Interconnection Structure of. The Internet. EECC694 - Shaaban

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

TSIN02 - Internetworking

Question 7: What are Asynchronous links?

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

IP Routing & Bridging

CS244a: An Introduction to Computer Networks

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

NET323 D: NETWORKS PROTOCOLS

Routing in the Internet

Internet Addresses Reading: Chapter 4. 2/11/14 CS125-myaddressing

ECE 435 Network Engineering Lecture 11

CISCO Certified Network Associate (CCNAX)

Transcription:

CS 5565 This is a closed-book, closed-internet, closed-cellphone and closed-computer exam. However, you may refer to your 2 sheets of prepared notes. Your exam should have 11 pages with 6 questions totaling 100 points. You have 120 minutes. Please write your answers in the space provided on the exam paper. If you unstaple your exam, please put your initials on all pages. You may use the back of pages if necessary, but please indicate if you do so we know where to look for your solution. You may ask us for additional pages of scratch paper. You must submit all sheets you use with your exam. However, we will not grade what you scribble on your scratch paper unless you indicate you want us to do so. Answers will be graded on correctness and clarity. You will lose points if your solution is more complicated than necessary. Name (printed) I accept the letter and the spirit of the Virginia Tech graduate honor code I have not given or received aid on this exam. (signed) # Problem Points Score 1 Error Correction and Detection 12 2 Understanding IP Addressing 24 3 Accountable Internet Protocol 20 4 Routing Algorithms 20 5 Link Layer 12 6 Optimizing RPC 12 Total 100 1/11

1 Error Correction and Detection (12 pts) a) (8 pts) Hamming Codes Consider the following (7,3) code 1, which maps 3 data bits to 8 code words A-H, listed below. The right half of the table lists the Hamming distance for each pair of code words. A B C D E F G H A 0000000 : 0 4 4 4 4 4 4 4 A B 0001111 : 4 0 4 4 4 4 4 4 B C 0110011 : 4 4 0 4 4 4 4 4 C D 0111100 : 4 4 4 0 4 4 4 4 D E 1010101 : 4 4 4 4 0 4 4 4 E F 1011010 : 4 4 4 4 4 0 4 4 F G 1100110 : 4 4 4 4 4 4 0 4 G H 1101001 : 4 4 4 4 4 4 4 0 H A B C D E F G H i. (4 pts) How many bit errors can this code detect? (4 pts) How many bit errors can this code correct? b) (4 pts) Layering and Error Detection Currently, error detection is commonly performed at the link-layer (via CRC-32) and the transport layer (via TCP/UDP Internet checksum). Is this redundant? Discuss the consequences of removing this feature from either layer! i. (2 pts) If error detection were implemented at layer 2 only: (2 pts) If error detection were implemented at layer 4 only: 1 Created with Richard Tarvo s Hamming Code tool at http://www.ee.unb.ca/cgibin/tervo/hamming.pl?x=+generate+&l=7&d=4&t=000 2/11

2 Understanding IP Addressing (24 pts) a) (3 pts) On Gateways and Netmasks You re being asked to set up a machine for your research lab, which uses static IP addresses. The network administrator gives you the following information: IP Address: 128.173.237.141 Default Gateway: 128.173.236.1 Netmask: 255.255.255.0 Can this information be correct? Justify your answer! b) (3 pts) Static DHCP Your network admin tells you that they are using static DHCP, in which your laptop will be provided with the same IP address every time it sends out a DHCP Discover request. What information will the network administrator need from you? c) (4 pts) Prefixes vs. Subnets Explain the difference between a prefix and subnet! 3/11

d) (6 pts) On Subnets You are being brought in as a consultant to debug the configuration of a company s network. The network consists of three IP routers connected by two PPP links to a border router connecting to the company s ISP. Each IP router serves a LAN of 60 and 120 machines, respectively. The current configuration is shown below; the rectangles on the right denote information that is distributed via DHCP in each LAN. Internet 24.4.5.5 R1 24.4.5.2 PPP Link 2 24.4.5.3 R2 Ethernet LAN 1 60 Machines Subnet address: 24.4.6.128/26 Default gateway: 24.4.5.3 PPP Link 1 24.4.6.1 24.4.5.6 24.4.6.1 R3 Ethernet LAN 2 120 Machines Subnet address: 24.4.6.0/26 Default gateway: 24.4.6.1 Identify 3 mistakes in this setup! i. (2 pts) Mistake 1: (2 pts) Mistake 2: i (2 pts) Mistake 3: 4/11

e) (4 pts) IPv6 Suppose you ported your project 2 to be compatible with IPv6. Discuss which changes you would have to make! f) (4 pts) IPv6 Adoption IPv6 adoption is lagging because IPv6 is said to have a chicken-and-egg problem. Explain what this problem is! 5/11

3 Accountable Internet Protocol (20 pts) a) (2x3 pts) Lack of Accountability The paper by Anderson et al laments a lack of accountability at the current network layer. Name two attacks that can arise from this shortcoming! b) (4 pts) Preventing Spoofing If the Internet used AIP, what would happen if a malicious host attempted to disguise as another host by using that hosts s EID address? c) (6 pts) Routing Scalability AIP has been criticized because CIDR-like aggregation cannot be used. i. (2 pts) Explain why not: (2 pts) Explain what potential negative impact results from this: i (2 pts) Can the use of multiple AD: prefixes ameliorate the problem? 6/11

d) (4 pts) Forwarding Performance Would AIP, as proposed, work well with the hybrid hardware/software approach proposed by Casado et al in the Rethinking Packet Forwarding Hardware? Justify your answer! scratch space 7/11

4 Routing Algorithms (20 pts) a) (6 pts) Count To Infinity The poisoned reverse technique can reduce the count to infinity problem, but not eliminate it in all cases. Give a concrete topology, and a concrete link cost changes, for which count to infinity would occur even if poisoned reverse is being used! b) (4 pts) Route Oscillations i. (2 pts) What are route oscillations and how can they arise? (2 pts) In lecture, we had discussed oscillations in the context of link-state algorithms. Can oscillation also occur when a distance vector algorithm is used? Justify your answer! 8/11

c) (4 pts) Trade-offs In project 2B, you needed to decide on suitable time intervals in which to a) check for cost changes and b) poll your neighbors to identify whether a link is up or not. For each of these two parameters, describe the trade-off involved in choosing an appropriate value. i. (2 pts) The trade-off involving the Link Cost Change Polling Interval: (2 pts) The trade-off involving Neighbor Polling Interval: d) (6 pts) Broadcasting Reverse path forwarding is a multicast or broadcast forwarding algorithm that forwards packets if and only if they arrived on the interface that leads to the shortest path to the source. i. (3 pts) If a network has V vertices and E edges, how many packets are being sent for each packet being broadcast? (3 pts) By contrast, how many packets would be sent if a spanning tree based algorithm were used? 9/11

5 Link Layer (12 pts) a) (8 pts) Self-configuration Most layer 2 switches deployed today include firmware that allows users to patch them together in an arbitrary topology, even one including redundant links. A spanning-tree algorithm sets forwarding policies that prevent loops. However, the resulting forwarding may not be optimal. An alternative would be to implement a traditional link-state or distance vector routing algorithm in each switch s firmware. Discuss the merits of this idea! Assume that no changes to the Ethernet frame format, and no changes to the NIC controllers in end hosts are allowed! b) (4 pts) Switch Poisoning What is switch poisoning, and how might an attacker benefit from it? 10/11

6 Optimizing RPC (12 pts) RPC, including the simple implementation you created in project 2A, suffers from the same performance limitations as other stop-and-wait protocols. As we discussed in lecture, sliding window protocols provide better performance because they use pipelining. In this problem, discuss how to adapt your RPC implementation to allow for pipelining. (8 pts) Can you accomplish this goal without changing the semantics of the program that is using your RPC middleware layer? If so, what changes, if any, would be required to your language binding? State your assumptions if necessary! (4 pts) Provide a concrete example from project 2B in which your approach would result in performance improvements! 11/11