CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Similar documents
CSCI 466 Midterm Networks Fall 2011

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

CS164 Final Exam Winter 2013

CSCI 466 Midterm Networks Fall 2011

Why dynamic route? (1)

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

EE 122 Fall st Midterm. Professor: Lai Stoica

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

What is the difference between unicast and multicast? (P# 114)

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CSCI Spring Final Exam Solution

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Interface The exit interface a packet will take when destined for a specific network.

ECE 653: Computer Networks Mid Term Exam all

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Question Points Score total 100

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

Department of Computer and IT Engineering University of Kurdistan. Computer Networks II Border Gateway protocol (BGP) By: Dr. Alireza Abdollahpouri

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

15-441: Computer Networks Spring 2017 Homework 3

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Network Layer:

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Networking: Network layer

6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Switching and Forwarding Reading: Chapter 3 1/30/14 1

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Topics for This Week

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

CS 3516: Computer Networks

FINAL May 21, minutes

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

Expected Time: 90 min PART-A Max Marks: 42

EE-311 Data Communication & Networks

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1

Student ID: CS457: Computer Networking Date: 3/20/2007 Name:

Written examination in Computer Networks

Computer Science 461 Final Exam May 22, :30-3:30pm

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

EE122 Midterm Exam UC Berkeley, Spring 1999

Networks Fall This exam consists of 10 problems on the following 13 pages.

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Duke University CompSci 356 Midterm Spring 2016

CS 640: Introduction to Computer Networks

Faculty of Science Final Examination. Computer Science B Basics of Computer Networks

CSCI Computer Networks

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: Fall 2003

Applied Networks & Security

Outline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits

Vorlesung Kommunikationsnetze

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

EXAM TCP/IP NETWORKING Duration: 3 hours

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

Communication Networks

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science

Top-Down Network Design

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

CSc 450/550 Computer Networks Internet Routing

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

15-441: Computer Networks Spring 2010 Homework #2

Introduction to IP Routing. Geoff Huston

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

The Transmission Control Protocol (TCP)

ECE/CSC 570 Section 001. Final test. December 11, 2006

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

===================================================================== Exercises =====================================================================

SYED AMMAL ENGINEERING COLLEGE

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Carnegie Mellon Computer Science Department Spring 2016 Midterm Exam

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Test2: Solutions. Silvia Giordano ICA, EPFL. t2-1

Transcription:

CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end, why would you want to use UDP? Give an application that might be better off using UDP. [4 pts] b. Why is packet switching preferred over circuit switching on the Internet? [4 pts] c. Give an example of when you might want to use the following service models in IP: [4 pts] (a) Anycast (b) Broadcast (c) Multicast (d) Unicast

2. Link Layer / Ethernet - [12 pts] a. If the maximum delay between two nodes on a shared medium Ethernet is d, what is the minimum transmission time for any frame? Why is this important? [4 pts] b. Ethernet uses Manchester encoding to send its frames. Recall that Manchester encoding encodes a 1 as a transition from 1 to 0, and a 0 as a transition from 0 to 1. What feature of this encoding makes it easier to detect collisions in Ethernet? Explain. [4 pts] c. Ethernet uses exponential backoff as a distributed mechanism to deal with collisions in the shared medium. What is the Capture Effect? Give an example of how it can happen between two nodes A and B connected to the same shared-medium Ethernet. [4 pts] d. On a shared-medium Ethernet it is easy for an attacker to sniff packets, i.e., to receive packets destined to other nodes. This is considerably harder on a switched Ethernet, but still possible. Using your knowledge of how a learning Ethernet bridge works, given an attacker connected to one port of such a bridge, how can the attacker use the fact that there is only a limited number of entries in the bridge cache to sniff packets destined to a specific MAC address? (The victim must not notice the attack, and thus the attacker cannot simply use the same MAC address as the victim.) [bonus 7pts] 2

3. Routing - [15 pts] The fundamental reason for which loops form in a Distance Vector protocol is that a A node decides to use a neighbor B as the next hop for a destination based on routing information that was, at some point, propagated by A itself. a. Give an example (draw a simple topology, break a link, and show a sequence of updates) using standard Distance Vector that shows this is the case. [4 pts] b. In an attempt to remove loops from the Distance Vector protocol, a guy named Charles proposed the following change to DV. In addition to the cost to reach a destination, he added a sequence number to the update. Sequence numbers are per destination, and are only incremented by the destinations themselves. They are copied in advertisements if the node forwarding the information is not the destination. For example, node A advertises A:(A, 0, 32) to say that it can reach node A (itself), with cost 0, and this is its update number 32. Node B, directly connected to A, can accept this and install in its routing table the entry B:(A, A, 1, 32), meaning it can reach A, through A, at cost 1, based on A s update number 32. When receiving an update for a destination, a node will: (a) update the routing information if the sequence number is newer, or (b) update the routing information if the sequence number is the same as it currently has, but the metric is better than it currently has. Did Charles succeed in avoiding loops with this addition? Argue why loops can or cannot form towards a destination when nodes choose routes based on both rules (a) and (b) above. [7 pts] 3

c. Give one advantage that Link State has over Distance Vector, and one disadvantage. [4 pts] 4. BGP - [15 pts] The Border Gateway Protocol that we studied is a path vector protocol among run by Autonomous Systems (ASs) on the Internet for inter-domain routing. a. Give two advantages of using path vector routing as the routing algorithm underlying BGP. [4 pts] b. What are the components in a BGP path? What are the destinations in BGP tables? [4 pts] c. In 2008, Pakistan was able to prevent about two thirds of the Internet from reaching a slice of YouTube s addresses, by hijacking part of YouTube s prefix. What does this mean? Explain how preference for more specific routes makes this easier. [7 pts] 4

5. IP on Ethernet - [12 pts] You fire up Wireshark and you see the following Ethernet frames interpreted to you: Time Origin Destination Interpreted Contents 191.5 00:0e:0c:05:86:f7 00:00:00:00:00:00 Who has 128.148.34.7? Tell 128.148.34.6 191.6 00:0c:76:b2:84:08 00:03:0c:05:86:f7 128.148.34.7 is at 00:0c:76:b2:84:08 a. What protocol is this?[4 pts] b. What is it used for?[4 pts] c. 00:00:00:00:00:00 is the Ethernet local broadcast address. Why is the first packet sent to a broadcast address, but the second isn t?[4 pts] 6. Traceroute - [8 pts] traceroute is a popular tool for listing hops in the path between two IP hosts. It works between an origin and a destination, and will work for paths of up to 30 hops in length. a. How does traceroute work? Be specific, talk about the packet(s) the origin sends and the packet(s) that it receives. If it sends multiple packets, what varies between successive packets? [4 pts] b. Does the sequence of hops returned by traceroute represent true paths taken by packets? If not, give two reasons for which it might not be the case. [4 pts] 5

7. Congestion Control - [26 pts] Son and Osmar are frustrated with the Slow Start algorithm used in TCP, saying that it takes too long to fully utilize the bandwidth of a path, and that for short files the link utilization is not good. a. Let us help them substantiate this complaint by examining this on a simple scenario. Suppose you have two nodes, A and B, connected by a dedicated link with bandwidth of 2 23 bits per second ( 1MBps), and that it takes 125ms (2 3 s) for a packet of 1024 bytes to reach the other node and for an ACK to come back. (Hint: use powers of two for the calculations.) (a) What is the window size, in packets, for a sliding window protocol to fully utilize the link? [5 pts] (b) If A is sending data to B and uses TCP s Slow Start algorithm, in how many round trip times does A grow the window to the ideal window size for this link, which you found in (a)? How many total packets will A have sent by the end of this last round trip time? [5 pts] 6

(c) What is the throughput (in bytes per second) if you have to send a file that has the size of the number of packets you computed in part (b) using Slow Start? What then is the link utilization (throughput / bandwidth)? (It is fine if you leave the answers in terms of powers of two.) [5 pts] b. QuickStart: Really unhappy with this situation, Son and Osmar decide to implement an alternative algorithm to Slow Start, QuickStart. The idea is to quickly find the window size that leads to full utilization. Here s what QuickStart does: when starting, the sender sends packets as fast as the link will let them, until it receives the first acknowledgment. It then sets the number of packets sent up to that point as the window size, and proceed normally from there. (a) In the same scenario as in the previous part (single dedicated link), does Quick Start work, assuming the first packet and its acknowledgment are not lost? Explain. [4 pts] (b) Son and Osmar then decide to test the approach on a real network (paths with multiple links, potentially multiple simultaneous flows), with the hope of writing a new RFC for TCP and gaining worldwide fame. Unfortunately, the approach does not work. Give one example scenario in which Quick Start would grossly overestimate the window size. [7 pts] 7