ECE/CSC 570 Section 001. Final test. December 11, 2006

Similar documents
ECSE 414 Fall 2014 Final Exam Solutions

FINAL May 21, minutes

CSE 1 23: Computer Networks

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS164 Final Exam Winter 2013

COMP 361 Computer Communications Networks. Spring Semester Final Examination Solution Key

CS244a: An Introduction to Computer Networks

===================================================================== Exercises =====================================================================

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Data Communications. Automatic Repeat Request Medium Access Control

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Networks Homework # 2

Random Assignment Protocols

CMPE150 Midterm Solutions

ECE 653: Computer Networks Mid Term Exam all

Sirindhorn International Institute of Technology Thammasat University

1. (10 points): For each of the following, choose exactly one best answer.

CSCI 466 Midterm Networks Fall 2011

Data Communication Networks Final

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

Tutorial 2 : Networking

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Computer Networks (Fall 2011) Homework 2

Medium Access Control Sublayer

DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz III. December 18, 2012

CS244a: An Introduction to Computer Networks

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Computer Science 461 Midterm Exam March 14, :00-10:50am

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

ECE 428 Internet Protocols (Network Layer: Layer 3)

CPE 548 Exam #1 (50 pts) February 17, 2016

EECS 122: Introduction to Communication Networks Final Exam Solutions

Communication and Networks. Problems

Virtual University of Pakistan. Describe the Hidden Node and Exposed Node problems in Standard? VUSR. [Larry L. Peterson]

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III

Multiple Access Links and Protocols

EE 122: Ethernet and

MCS-377 Intra-term Exam 1 Serial #:

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III

CSE 123: Computer Networks

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CSCI 466 Midterm Networks Fall 2011

Local Area Networks and the Network Protocol Stack

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

Sirindhorn International Institute of Technology Thammasat University

Your Name: Your student ID number:

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

CS244a: An Introduction to Computer Networks

II. Principles of Computer Communications Network and Transport Layer

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

COSC 6377 Mid-Term #2 Fall 2000

Expected Time: 90 min PART-A Max Marks: 42

Code No: RR Set No. 1

ECE 333: Introduction to Communication Networks Fall 2002

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

Chapter 4. The Medium Access Control Sublayer

There are 10 questions in total. Please write your SID on each page.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

UNIVERSITY QUESTIONS

Information Network Systems The network layer. Stephan Sigg

Review problems (for no credit): Transport and Network Layer

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

THE UNIVERSITY OF NEW SOUTH WALES

Data Communication & Networks Final Exam (Fall 2008) Page 1 / 13. Course Instructors: Engr. Waleed Ejaz. Marks Obtained Marks

Data Link Control Protocols

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

ECE 333: Introduction to Communication Networks Fall 2001

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Problem 7. Problem 8. Problem 9

Written exam for EE2T21 (Part B) Data Communications Networking

6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

Tutorial 2 Solutions

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

CS/ECE 4457 FALL Name: Computing ID: WARM UP. Question 1: What type of transmission mode is depicted in the photo below:

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

MAC. Fall Data Communications II 1

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm

Midterm Exam II CMPSCI 453: Computer Networks Fall 2010 Prof. Jim Kurose

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

Lesson 2-3: The IEEE x MAC Layer

CSE 473 Introduction to Computer Networks. Exam 1. Your name here: 10/3/2012

Transcription:

ECE/CSC 570 Section 001 Final test December 11, 2006 Questions 1 10 each carry 2 marks. Answer only by placing a check mark to indicate whether the statement is true of false in the appropriate box, and leaving the other box blank. Questions 11 20 each carry 5 marks. Answer in the space provided; provide reasonable explanations where called for, but make your answer brief. Questions 21 and 22 each carry 20 marks. Answer in the space provided, providing adequate intermediate steps or reasoning you have to use. Maximum score assigned will be 100 scores higher than this will be saturated to 100. This is a three hour test. First Name: Last Name: Student ID (9-digit): Pledge of Honor: I pledge on my honor that I have answered the questions in this test purely on my own individual ability, and have neither given help to nor received help from another person taking the test. Signature:

1. Layers in a networking stack may introduce headers and trailers, and may also change the bits of the payload. TRUE FALSE 2. A connection-oriented end-to-end service can only be implemented if the underlying network is a circuit-switched network. 3. The address 152.273.15.1 may be a valid IP address. 4. Ethernet, slotted ALOHA, and IEEE 802.3 do not all refer to exactly the same networking protocol. 5. A stronger Error Control Coding scheme always requires a longer ECC (more bits) than any weaker scheme requires. 6. Re-transmission of lost packets is a major function of the networking layer. 7. Virtual-circuit oriented networks have to utilize the same concept of store and forward as IP networks. 8. If all wireless links are symmetric (A can hear B implies B can hear A) in a wireless ad-hoc network, then the hidden station problem cannot occur. 9. The Internet Protocol (IP) is a forwarding protocol, not a routing protocol. 10. In real networks, propagation delays can always be ignored when compared to transmission delays.

11. A block-oriented Error Control Code operates as follows. The blocks are composed of 4 bits u 0, u 1, u 2, u 3. Three ECC bits are appended: r 0 = u 0 u 1 u 2 u 3, r 1 = u 0 u 1, and r 2 = u 0 u 2. State (with reasoning) what the minimum distance between valid codewords is for this code, and write down two codewords that have this minimum distance. 12. A datagram was fragmented multiple times during its journey from source to destination into an unknown number of total fragments. Four fragments were received by the destination. The offset and size fields of the IP header of the fragments were (75,400), (125, 600), (0,600) and (250,200). The fourth of these fragments also had the MF flag set to 0. (a) Is it possible for the destination to know how many other fragments may be expected for this datagram, and if so what is this number? (b) Is it possible for the destination to know the size of user data in the original fragment, and if so, what is the size? 13. In 802.11, what is the logic for keeping the IFS spacing to be used for ACKs shorter than the IFS delay to be used for direct access to the medium? 14. Describe briefly how the use of virtual circuits in a virtual circuit switched network reduce the forwarding overhead. 15. A corporate network purchases the Class B address space 152.1. It needs to use subnetting to distinguish between its 60 internal networks, each of which has 120 hosts. What are the different subnet masks it can use? Answer by writing down the actual masks, in /length notation.

16. Consider the rigorous analysis of idealized slotted ALOHA. A Markov model for a system with five stations is shown below, with the usual representation of the number of backlogged nodes as the state. 0 1 2 3 4 5 Argue whether any two of all the state transitions shown may have exactly the same probability. Assume that the probabilities of a new arrival q a and retransmission by a backlogged station q r are different. 17. When a collision occurs in an ALOHA like protocol, each station which had attempted to transmit retries after a backing off a random amount of time. Assume that the backoff time is deterministic rather than random. What is the problem that arises? 18. Consider a land wireless connection with a each-way propagation delay of 10 microseconds between the sending and receiving stations and a transmission delay of a frame of 1 microsecond. The transmission time for an acknowledgment is negligible. What is the minimum window size of Go Back N that would (over a period of time during which no errors happen to occur) result in an efficiency of 100%? 19. A large number of consecutive IP addresses are available starting at 198.16.0.0. When IP addresses are requests, they are always assigned at the earliest (lowest) possible open block. Suppose that four organizations, A, B, C and D, request 4000, 2000, 1000 and 8000 addresses respectively, and in that order. Would the blocks assigned to each organization have changed if the order of requests had been (a) A, C, B, D? (b) A, D, B, C?

20. Dijkstra s algorithm is being used to find the shortest path from node A to every other node in a network with 10 nodes, labeled A to J. At an intermediate step in the execution, it is found that the current best estimates of distance to the other nodes is as follows. The shaded boxes indicate that the nodes A, D, E and G are already in the confirmed set. To A To B To C To D To E To F To G To H To I To J 0 6 4 8 12 2 17 11 (a) What is the next node to be picked? Assuming this node has links to nodes C, E, I and J, which have link costs 4, 1, 9 and 10 respectively, which distances will be updated in the above table? (b) Is it possible to say whether the situation as shown above can ever occur in correct operation of Dijkstra s algorithm on a real network topology? 21. Consider a Selective Repeat ARQ system with W=5. Assume that the sender sends the first frame (sequence numbered 1) at time 0. The transmission time for all frames is the same and is equal to τ, ρ is the propagation delay for either frames or ACKs, and ρ = 4τ. The transmission time is effectively zero for ACKs. The sender uses a timeout of 10τ starting from the end of the frame transmission. (For purposes of avoiding simultaneity, it may be assumed that the timeout is marginally more than 10τ, not less.) Only ACKs are used, not NAKs. (a) Draw a timing diagram for this system, assuming that frame #2 is lost the first time it is transmitted, and frame #5 is lost both the first and the second time it is transmitted. No other frames and no ACKs are lost over the period of interest. Draw the diagram from time 0 to the time that frame #7 is correctly received and accepted at the receiver. (Use facing page.) (b) Show the contents of the sender s and receiver s buffer at every point of time when they change over the period of interest, indicating the time of change and the new contents.

22. The network shown below uses DV algorithm for routing. Assume that all the routers are booted up simultaneously, and at time 0 exchange the first round of distance vectors, in which every router advertises 0 distance to itself and to all others. As a consequence of this exchange, the routers also discover their neighbors and correctly measure the link costs as shown. Assume that from there on, every round of DV exchange proceeds exactly simultaneously (only the information from the previous round can be used, not from the current round). Show the DVs transmitted by each router in each round, until the DV algorithm converges. 2 C 4 3 D 3 F A 1 1 4 1 1 B 3 E 4 G