Homework Assignment #3 Due Oct 3:50 PM

Similar documents
Quiz 7 May 14, 2015 Computer Engineering 80N

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Principles behind data link layer services:

Homework 3 Discussion

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Lecture 20: Link Layer

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECSE 414 Fall 2014 Final Exam Solutions

UNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012

CSC 4900 Computer Networks: Link Layer (2)

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Connecting to the Network

CSE 123: Computer Networks

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

CS 3516: Advanced Computer Networks

cs/ee 143 Communication Networks

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

The Addressing of Data Link Layer

CSCI Computer Networks Fall 2016

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

Network Architecture. TOC Architecture

Internet Protocol Addressing and Routing. Redes TCP/IP

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 458 Internet Engineering Spring First Exam

CS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Link Layer and LANs. CMPS 4750/6750: Computer Networks

IPv4. Christian Grothoff.

Homework #4. Due: December 2, 4PM. CWND (#pkts)

Carnegie Mellon Computer Science Department Spring 2005 Final

Dynamic Source Routing in Ad Hoc Wireless Networks

Switching & ARP Week 3

CSCI Computer Networks Spring 2017

CSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9

Network Architecture

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Medium Access Protocols

The Link Layer II: Ethernet

Communication Networks

CSE 123: Computer Networks

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

Link layer: introduction

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Address Management in IP Networks

Chapter 5 Data Link Layer

EE Spring 1997 Midterm #1-15 % of course grade March 12, 1997 (closed book)

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Computer Networks. Wenzhong Li. Nanjing University

Chapter 16 Networking

Chapter 9. Ethernet. Part II

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 158A: Lecture 13. Fall 2015

IP Multicast: Does It Really Work? Wayne M. Pecena, CPBE, CBNE

ECE 4450:427/527 - Computer Networks Spring 2017

CIS 632 / EEC 687 Mobile Computing

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

COMP/ELEC 429/556 Fall 2017 Homework #1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Principles behind data link layer services:

Principles behind data link layer services:

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

===================================================================== Exercises =====================================================================

Test2: Solutions. Silvia Giordano ICA, EPFL. t2-1

CS 640 Lecture 4: 09/11/2014

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

EE122 Midterm Exam UC Berkeley, Spring 1999

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 2

Addressing and Switching in the Link Layer

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

Lesson 9 OpenFlow. Objectives :

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

Computer Networks Principles LAN - Ethernet

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Transcription:

Homework Assignment #3 Due Oct 27 @ 3:50 PM EE122: Introduction to Communication Networks (Fall 2008) Department of Electrical Engineering and Computer Sciences College of Engineering University of California, Berkeley Submission: Mail your solutions to dzats@eecs.berkeley.edu 1. Nodes A, B, and C are connected together using a non-switched Ethernet medium as shown below. Assume that (i) A, B, and C all transmit at 100Mbps, (ii) a wire propagation speed of 2*10 8 m/s, (iii) no channel coding (i.e. no Manchester encoding, etc.). a. Nodes A and C start transmitting to B at the same time. The distance from A to B as well as the distance from B to C is 1024 meters. How large must the frame be for this collision to be detected? 2*1024m*(1/(2*10 8 m/s))*(100*10 6 b/s) = 1024 bits So, the frame must be at least 1025 bits long. b. What will occur at the link layer if we transmit a packet smaller than that calculated in (a)? How will this affect the application layer? The packet will fail the CRC check at B and be dropped. No linklayer retransmission will occur. What effects the application layer will see will depend on the transport protocol being used. If TCP is being used, the application will notice a performance hit, if UDP is being used, the application will notice missing data. c. What is the approximate efficiency of the local area network described above? Efficiency = 1/(1+5d prop /d trans ) d prop = 2*1024m*(1/(2*10 8 m/s)) = 10.24µs d trans = 1526B/(100*10 6 b/s *1B/8b) = 0.12msec Efficiency = 1/(1+5(10.24*10-6 )/(0.12*10-3 )) = 0.7 d. If the distance from A to B as well as the distance from B to C is now 10 meters, what will be the values for (a) and (c)? Why is this significant? 2*10m*(1/(2*10 8 m/s))*(100*10 6 b/s) = 10 bits. So the frame will have to be at least 11 bits long. d prop = 2*10m*(1/(2*10 8 m/s)) = 0.1µs

Efficiency = 1/(1+5(0.1*10-6 )/(0.12*10-3 )) = 0.996 This shows why the standards impose limits on the length of wires used in Ethernet. 2. Now assume that nodes A, B, C, and D are connected through switch X as shown below: a. A malicious user takes over node A to snoop packets generated in this network. Describe specifically which packets the user will be able to see if he sets the network interface to promiscuous mode. Which packets will the user be unable to see? Why? The user will be able to see all packets that originate from or are sent to nodes A and B. He will be unable to see the packets sent between C and D because the switch will not forward those packets. b. Now the malicious user in A has a new ability: he can change his source MAC address to any value he wishes. How would he use this new ability to starve node C of the packets destined for it? Would C still get some packets? If so, from whom and why? What could C do to thwart Aʼs attempts? He would set his MAC address to Cʼs MAC address. He would then send a packet with that address to any of the nodes in the network. This would cause the switch to believe that C is on the other side and forward Cʼs packets to A. C would still see packets from D because of the nature of the broadcast medium. C could thwart Aʼs attempts by sending packets to any node. The switch would then re-learn the correct location of C. However, C will not be fully immune from A because A could keep sending packets from Cʼs MAC address, thereby causing the switch to re-learn the wrong location of C. c. Say there is no longer a malicious user and that node C is actually a laptop that moves on the other side of the switch to join A and B. One of two things must occur before D will be able to communicate with C. What are they? Either C must send a packet that will allow the switch to learn that C is on the other side or the entry in the switch for the location of C must expire.

3. Assume the following configuration where C is connected to A and B through router X: a. B has a packet to send to A. What is the process of sending the message if all of the ARP caches are empty? For every message sent or received, specify the source and destination MAC addresses. For every ARP message, also specify the information it must include. For every IP message, also specify its source and destination IP addresses. 1. B sends an ARP request with dest MAC = FF:FF:FF:FF:FF:FF, src MAC = C3:D4:67:B3:A4:C2. The request includes IP address 137.62.31.2 2. A sends an ARP reply with dest MAC = C3:D4:67:B3:A4:C2, src MAC = A7:62:19:BF:C3:A2. This reply includes the IP address of A. 3. B sends the IP message with src MAC = C3:D4:67:B3:A4:C2, dest MAC = A7:62:19:BF:C3:A2. This message includes Bʼs IP address as the source address and Aʼs IP address as the destination address. b. Repeat (a) when B has a packet to send to C. 1. B sends an ARP request with dest MAC = FF:FF:FF:FF:FF:FF, src MAC = C3:D4:67:B3:A4:C2. The request includes IP address 137.62.31.1 2. The router sends an ARP reply with dest MAC = C3:D4:67:B3:A4:C2, src MAC = C7:D4:A6:78:A1:61. This reply includes the IP address of the router. 3. B sends the IP message with src MAC = C3:D4:67:B3:A4:C2, dest MAC = C7:D4:A6:78:A1:61. This message includes Bʼs IP address as the source address and Cʼs IP address as the destination address. 4. The router sends an ARP request with dest MAC = FF:FF:FF:FF:FF:FF, src MAC = AF:76:9D:73:60:BC, This request includes IP address 128.32.64.2 5. C sends an ARP reply with dest MAC= AF:76:9D:73:60:BC,

src MAC = FE:64:7A:4B:81:A7. This reply contains the IP address of C. 6. The router sends the IP message with src MAC = AF:76:9D:73:60:BC, dest MAC = FE:64:7A:4B:81:A7. This message includes Bʼs IP address as the source address and Cʼs IP address as the destination address. c. What is the point of the ARP cache? To minimize having to send so many messages for every IP message we have to send. 4. Assume node A is connecting to a network with a DHCP server and is not manually configured: a. What value is the IP source address field set to in the DHCP discovery message the client will send? Why? It is set to 0.0.0.0 because the client does not have an IP address yet. b. Why must all of the DHCP messages be broadcast? The messages from the client are broadcast because it does not know the address of the DHCP server. The messages to the client must be broadcast because the client is not allowed to use an IP address until the configuration process is complete. c. Say node A is a laptop that was connected to another wireless network and was downloading a file. If this laptop connects to this network, will the TCP connection be broken? Why? Assume that the DHCP messages are instantaneous. Yes, because the location in the network of A and hence its IP address has changed. The server will keep trying to send to the old location and will not comprehend the new packets from A as coming from that connection. 5. Given the following network topology, fill in the table showing the stepby-step operation of the link-state algorithm. 6. Assume the following network topology:

a. Show how the Distance Vector algorithm would operate in this case by filling in the following tables: Initialization of node A: Initialization of node B: Initialization of node C: All of the nodes will send their distance vectors to their neighbors. Resulting state of node A: Resulting state of node B:

Resulting state of node C: Only nodes A and C will send their distance vectors to their neighbors. Final state of node A: Final state of node B: Final state of node C: b. The link from B to C changes its value to 5. Would Poison reverse be valuable here? Why or why not? No, because this change in value does not cause a loop. c. Now assume that the value of the link from A to B is actually 1. How would this change your answer for (b)? Poison reverse would be valuable here because when the change in value occurs, A tries to route through B to get to C, while B tries to route through A to get to C.