--~ a.v-rle..x.. ~'-'-

Similar documents
CS/ECE 4457 FALL Name: Computing ID: WARM UP. Question 1: What type of transmission mode is depicted in the photo below:

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

b. Suppose the two packets are to be forwarded to two different output ports. Is it

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Lecture 16: Network Layer Overview, Internet Protocol

Department of Computer Science and Engineering. CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

Lecture 3. The Network Layer (cont d) Network Layer 1-1

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

TSIN02 - Internetworking

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

CS 3516: Computer Networks

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

cs144 Midterm Review Fall 2010

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Lecture 8. Network Layer (cont d) Network Layer 1-1

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

Internet Protocol (IP)

Chapter Motivation For Internetworking

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

PART III. Data Link Layer MGH T MGH C I 204

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

The Link Layer and LANs: Ethernet and Swiches

Introduction to Internetworking

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

Internet Protocols (chapter 18)

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 4450:427/527 - Computer Networks Spring 2017

End-to-End Communication

UNIT-II 1. Discuss the issues in the data link layer. Answer:

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

Internetworking Part 2

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

EE-311 Data Communication & Networks

Link layer: introduction

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

Layer 2 functionality bridging and switching

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

IP Addressing and Subnetting

Network Layer (Routing)

Network layer: Overview. Network Layer Functions

Position of IP and other network-layer protocols in TCP/IP protocol suite

COMP 361 Computer Communications Networks. Spring Semester Final Examination Solution Key

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos

Introduction to Networks and the Internet

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

ECE4110 Internetwork Programming. Introduction and Overview

CSE 422 Jeopardy. Sockets TCP/UDP IP Routing Link $100 $200 $300 $400. Sockets - $100

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Networking: Network Layer

Linux System Administration

Chapter 4 Network Layer. Network Layer 4-1

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

CS 3640: Introduction to Networks and Their Applications

Computer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols. Assignments INTERNET CONTROL MESSAGE PROTOCOL

Telecommunication Protocols Laboratory Course. Lecture 3

ET4254 Communications and Networking 1

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Chapter 19 Network Layer: Logical Addressing

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

CSCI Networking Name:

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

ECE 461 Internetworking Fall Quiz 1

Network Layer, Link Layer, and Network Security Summary

Communication Systems DHCP

NETWORK LAYER DATA PLANE

LAN Overview (part 2) Interconnecting LANs - Hubs

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

Lecture 11: Networks & Networking

cs/ee 143 Communication Networks

CS 640: Introduction to Computer Networks

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

CS 4453 Computer Networks Winter

Chapter 4 Network Layer: The Data Plane

Review is pretty much complete! Please help formatting review (indenting). - Jorden

Network Layer: Router Architecture, IP Addressing

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

What is Network Layer?

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

ECE 461 Internetworking Fall Quiz 1

COSC 6377 Mid-Term #2 Fall 2000

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

ECE 428 Internet Protocols (Network Layer: Layer 3)

SEN366 (SEN374) (Introduction to) Computer Networks

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

Transcription:

CS/ECE 4457 FALL 2018 Name: :s og..v fuf\ Computing ID: WARM UP Question 1: What type of transmission mode is depicted in the photo below: S l V'V\~ \ex.. ~'-'- a.v-rle..x.. --~ 4) None of the above LINK LAYER Error Detection: Questions 2: Two Dimensional : The figure below shows an example of two dimensional bit parity. Does the message contain errors? If the message contains errors, draw the correct version of the message..!. l.! Q - ~ ~.:!:..:!:. Q '.!.! Q j.! Q.!.! ~ Q Q.!.! Q Questions3:CheckSums: r l O I 0 \ l I I \ o 0 ' \ \ 0 ~~~e.. z..em ~o.c:j.d.ec{ 0 OLA... C.c...U O...~~v..VY\..e.. 1"e-.o..\- QV\.':J O""\ e... 1.od- Jo t- ~hx fe.cl Given the two 16 bit numbers:... 1010 &J.001 Calculate the check sum for the bits. (Show your work below)..... l 0 \ 0 o.,~sw~~...... \ C O \ 1..,,eJI~ I ------- f~~- \ 0 0 \ \ -7o\\0C C~"k.,, s v..yv\.

Question 4: Cyclic Redundancy Checks:..\-t... ')~... t>: I\.~ ~c:-h.~ Sender R_e..,celver n CRC (n+1)bits Divisor Reminder Data CRC The figure above provides a quick refresher on how Cyclic Redundancy Checks work. Part a) The receiver and sender agree to use the generating function 1001. The receiver receives the packet 101110011. Which part of the packet represents the CRC bits? '--' bl\ J 12."'\.e..r~k"'j ~ c...h:c~ \";) 4 ls '-t -'!. ::- ~ (_ -t-e...- \c..$\- Part b). Perform the modulo-2 division to determine if the packet is corrupted. Please show your work. \ oo\ 'f7 7 ; ~, o \ \ \ OO\" 1 0 \ \ l 0 ~ \ l ~ \ \ '\ ~ \ oo\o\ \ ~\,o\c>\ '\ ob'"' ~'\),\\ 0 oo 0 ~ 0 \\v\ \ ~ o \ oo \, oo\ v ~ In the lecture we looked at three broad strategies for sharing the communication medium. List one MAC protocol for each category and briefly describe it's disadvantage: \ Category Channel partitioning MAC protocol Disadvantage fj ~...t. \a..('~«- ~~ ~ -l'""""""l... fv-r -~ \\.\flc "'\o<a---~

Random ac cess U.Y\-slo~ ~\o~ ' c.o~\\5~ C:~Y\ (..SM~ oc.ca..>/', Taking turn s lo~ ~l~j\c. pol~ o) Ma..~tc..r I Sc..\Jve... ~\. \.,... \"'.. Link. Layer A ddressing: Questions 6 (MAC address and ARP) Machine A is sending a packet to machine B. What are the values for the source and destination MAC addresses for packet th at is placed on the link indicated by the arrow. Source MA C address Destination MAC address A 111.111.1 74-29-9 111.111.111.112 CC-4 9-DE-00-AB-70 t I i 222.222.222.220 1A-23-F9-CD-06-98 111.111.111.110 E6-E9-00-17-88-48 Question 7 ( ARP and MAC) Fill in the AR P tables for Machine A in the previous figure: 1 \ 2 \ IP -ADDRESS MAC ADDRESS

NETWORKING LAVER: Question 8 Forwarding TCAM (ternary content addressable memories) are great because they provide single cycle lookups. Draw the forwarding table that is implemented by the following TCAM : search lines ma re h l in e.~ match address I.'iC:lrchdata=O I I 0 I \o \~x. 00 0 \ \ 0 I'<o\ 0 \ \.,...,... \0 \ oc \ \ \\ Given the forwarding table that you have drawn above, what port would a packet with header 10100 get forwarded on? (Note: if the packet arrives at the router and nothing matches in its forwarding table, it will simply drop that packet)

Question 9 Network Address Translation Given the following scenario, fill in the NAT table Suppose that the host with IP address 10. 0. 1. 12 sends an IP datagram destined to host 128. 119.170. 181. The source port is 3317, and the destination port is 80. Assume that the host at 128.119.170.181 sends a response back. NAT translation table WAN side addr LAN side addr l ~ 6.1z..t... \'\1. 1.o6' ''' \o.o. \. \ i. 1 I!~ \1 0.0.1.16 10.0.1.23 Subnets/Cidar notation: Question 10 Given the following subnet mask. Which of the following IPs are on the same subnet: 1199~909 9QQ/Q111 0001~0 00000000 c.----......_. 200.23.16.0/23 \:; IP ADDRESS BINARY 200.23.16.1 \ lco \ooo 000\0\\l '2...001000.9 200.23.17.1 200.23.18.1 ' -,,.,,,,. I Doolooo\ o oo \ oo\o,/ t ' I 200.23.22.5 v ~ 0 th:~\o\\i) On The subnet v ~ 1'. '!---

Router Design: The figure below shows a general view of a router. The second part of the figure shows queues at the input and output ports of the IP router. The router gets to decide how packets are scheduled. lookup, data link forwarding line processing termination (protocol, 11111111 queueing.. -dj;ns decapsulation) Fo. tic switch fabric PART A List 3 scheduling algorithms that can be used to decide which packets get to enter the switching fabric. ~IFO r o \.Jo..o/\.~ v-o 'a ~ t". woe.a~\,..,\- ('""'- ov- 1. ~ ~~ PARTB How does the scheduling algorithm that you select affect fairness in the network? (How does this relate to the netneutrality debate. ) -twz.- s~l"~~ ('~~ J~\- f Y'\.Of\. ~ \,:::> ":>...>l \-c..l.v1.~ ~ kbv-l '-,, 6'.:) o...llow-iv---~ (J~ "1 '""'~ ~~ "'e:>f e.c,.\.c:...,, l f>"; i5 G l \... ~~~ sc.-~\ ~ ' \:"""-~5 \'&-<>fl~ fo..- q,c_c./ll I sr.-j...

Router Design: We are lucky enough to have one of the earliest versions of t he crossbar swit ches, on the 5th floor of Rice. What is the advantage of t he cross bar swit ch over memory based switches and bus based switches. (You can ref er t o the picture below for reference.) m./2av\or~ bc..<oe~ 'Eou.l\.\-~ ~ f~ ~ v'\'l--e...tv\.ov ~ -t~ ~ to lo-e. c..or 1. e.ej..- l r..-\.:>w 4-.r. 'Bv..s b~ c:...:ic..~ 04 al\ouj "'-:S\~~l-c... ~cd o~ fi>{"~ -\""D be,._ov\.~~ ~~ C\... ~ Memory Cross.bar A x A [jilij] D D -+ B B -+ D 0!iliill - D 0 lfilill - c z c -+ DO@@!!!@OD- -od@!d- Bus A c -+ O DC.!J @ill:jdo - z + + x~ v z ~ D D 0 0! i Key: o D ~ Input port!!!!i D o Output port Routing Algorithms: Question II

In lecture we looked at two routing protocols, the Distance Vector routing protocol and the Link State routing protocol. Show the steps the Distance Vector Algorithm takes until it converges. Please represent the state of each node in the form of a matrix..c;. """"-\ 5c.~ o~ - - "\/ ;.. 0 \ ' \ \ \ /~ ~ \ 0 ~------ \ I l-~1..:..---- 0 0 l.. ~ \ 0 \ ~ \ \,) s"'-ov~\ 'f"~~> (_ B - 0 \ l 0 \ \ I f I \ j ~;~ ~ ~ ------ / \I I I \ I/ \ 0 ';'?' """ 0 \ 0 l '2- \ '-;:) \ '1...- \ 0 \ "l. l 0 \

In lecture we discussed the link state and Distance vector algorithms. Complete the table with a pro and con of each class of algorithm: Distance Vector Link State Question 12. IPV6 Pro Y\stvl~. """ I <j<' e,.c:o..\-.fo(' ""-~ovl-v W\ ~ a. C.e.."'-'t-.o..\ ~9 N C...oV\.\uoUe...- - Con <~ ""e.mj~ ~v~\s. sl~ IP-..._ I ~..Ji-. c. '-c...""4 ~ - ~ ~.. l- v)""-cl-c ~p...:>ool"t...,. IA.~ h::. o.a.'( J..G\.kc.l l po\~o~ ~e../~(il ~ p.-d?\eo""' As we begin to upgrade routers from IPV4 to IPV6 we will have paths in our network that contain both IPV6 and IPV4 routers. Given the network below, briefly describe how we solve the problem between what happens between IPV6 routers B and E. physical view: B c D E F.:x: 1Pv6 1Pv4 1Pv4 1Pv6 1Pv6 Question 13. The figure below shows a side by side comparison between the IPV6 and IPV4 packets. Notice that IPV6 does have a fragmentation flag or offset. These flags were removed due to security concerns associated with fragmentation. Since the fragmentation flag was removed how are packets fragmented to allow for Links with Network Interface Cards that only accommodate MTU 1500.

1Pv6Header 1'111111 LAllglll v.nlon 'll'lfllc a.. Flowlllbtl :-...,...UllQlb.:r Hop,.':'!'.'-4~~=~ \.:~ ye,s fof\s\'b\-c... fyel4~~~~ f~ Legend Field' name kept from IPv-4 to IPv6 Field not kept in 1Pv6 Name and posltlon changed In 1Pv6 New flold in 1Pv6 Problem 14 ICMP packets can be used for network level communication. The figure below shows some packets associated with a trace route probe. Label the error packets returned at each step of the process. \"TL- Broadcast/Multicast. Problem 15: In lecture we saw that one way to reduce packet duplication for broadcast protocols is to construct a minimum spanning tree and only forwarding packets along that tree. Draw the minimum spanning tree for the figure below. (Feel free to draw on top of the figure) (_ a..?'j~ ~ ~ rs ~t--- e) ~\. hp\~

Autonomous Systems Problem 16: The figure above shows an internetwork of four autonomous systems interconnected via inter-domain links. All nodes shown in the internetwork are IP routers. Link costs of some links are shown in the figure (see AS4 and AS3). For all other links, assume a link cost of I. Recall that intra-as topologies are not shared with other ASs. Only address reachability information is shared in an inter-as routing protocol. Let's assume fairness that Lowest AS path length has precedence over hot potato routing in the path-selection process. a. If a host connected to router 4b sends an IP packet to a host connected to router 4c, what is the next-hop router to which router 4b sends the packet? l+1==-r

b. If a host connected to router 3d sends an IP packet to a host connected to router 4b, what is the next-hop router to which router 3d sends the packet? ~O\. c. Consider the forwarding table at router..lh. Assume that there is an IP subnet 128.143.8.0/24 connected to router 3d. What is the next-hop router corresponding to this IP subnet in the forwarding table ofrouter I b? - 1 c. ) e"'y'\~c..\'\~..:;>'seo.mc. i&ts l-e~~~(i.) 'Sc:> L-\.of-rol-o..h:> d. What does the forwarding table at router 4a show as the next-hop router to reach an IP subnet connected to a port on router 2c? Problem 17: Design Problem Electromagnetic waves do not propagate very well underwater this is why submarines use sonar instead of radar. A group of researchers are interested in constructing an aquatic network that allows them get to access "realtime" data from tags connected to the animals that they are studying. Propose a layered design for the network: (Discuss the design of your Networking, Link, physical layer) CD \::,.~ ~\.~ ~ <) \S c...c, c; I~ ~.J.- - c.-olj.~ L~'n-D \\ ~ b) ~