Problem Set 8 Due: Start of Class, November 16

Similar documents
Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

b. Suppose the two packets are to be forwarded to two different output ports. Is it

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

CS 3516: Advanced Computer Networks

COM-208: Computer Networks - Homework 6

CSE3214 Computer Network Protocols and Applications

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

CSCI Computer Networks Fall 2016

CS 3516: Computer Networks

CSCI Topics: Internet Programming Fall 2008

Problem Set 7 Due: Start of Class, November 2

CS 3516: Computer Networks

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Homework 4. Problems: 3, 10.a, 13, 16, 18, 19, 27a, 28, 35. Question: 3

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

Network Layer, Link Layer, and Network Security Summary

Network Layer/IP Protocols

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

Networking: Network layer

Inter-Autonomous-System Routing: Border Gateway Protocol

Lecture 8. Network Layer (cont d) Network Layer 1-1

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Inter-Autonomous-System Routing: Border Gateway Protocol

Chapter 4: Network Layer

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Problem Set 9 Due: Start of class, December 4

Inter-AS routing and BGP. Network Layer 4-1

ECE 461 Internetworking Fall Quiz 1

Chapter IV: Network Layer

Chapter 4 Network Layer: The Data Plane

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Chapter 4: Network Layer. Lecture 12 Internet Routing Protocols. Chapter goals: understand principles behind network layer services:

DATA COMMUNICATOIN NETWORKING

CSC 401 Data and Computer Communications Networks

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Lecture 16: Network Layer Overview, Internet Protocol

Network Layer: Control/data plane, addressing, routers

Review is pretty much complete! Please help formatting review (indenting). - Jorden

CSC 401 Data and Computer Communications Networks

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

Network Layer: outline

Chapter 4 Network Layer

Inter-Domain Routing: BGP

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

Lecture 19: Network Layer Routing in the Internet

Chapter 4 Network Layer: The Data Plane

Module 3 Network Layer CS755! 3-1!

HW3 and Quiz. P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) TCP), 20 mins

The Network Layer and Routers

HY 335 Φροντιστήριο 8 ο

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Chapter 4: outline. Network Layer 4-1

OSI Network Layer. Chapter 5

IPv4. Christian Grothoff.

UNIT III THE NETWORK LAYER

The Network Layer Forwarding Tables and Switching Fabric

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Homework 3 assignment for ECE671 Posted: 03/01/18 Due: 03/08/18

cs144 Midterm Review Fall 2010

Review. Some slides are in courtesy of J. Kurose and K. Ross

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

Master Course Computer Networks IN2097

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CSCE 463/612 Networks and Distributed Processing Spring 2018

Assignment 2 CISC 650 Computer Networks Fall 2016 Due Date: 10/9/ :59PM ET Total Points: 100

Chapter 4: Network Layer

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Computer Networking Introduction

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

internet technologies and standards

Position of IP and other network-layer protocols in TCP/IP protocol suite

COMP211 Chapter 4 Network Layer: The Data Plane

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

The Internet Protocol (IP)

ETSF10 Internet Protocols Routing on the Internet

CMSC 332 Computer Networks Network Layer

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Network layer overview

===================================================================== Exercises =====================================================================

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 2

ECE 428 Internet Protocols (Network Layer: Layer 3)

Chapter 4: network layer

Chapter 4 Network Layer

Chapter 4 Network Layer: The Data Plane

Network Layer. Chapter 5 Section 5.1, 5.3, 5.5, 5.6. CS 360 Spring 2012 Pacific University

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Why dynamic route? (1)

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Question Points Score total 100

Internetworking Protocols and Software (COMP416)

Transcription:

CS242 Computer Networks Handout # 16 Randy Shull November 9, 2017 Wellesley College Problem Set 8 Due: Start of Class, November 16 Reading: Kurose & Ross, Sections 4.1-4.4 Problem 1 [10]: Short answer in a couple of sentences. Answer each of the following questions a [2]: Routing/Forwarding That is the difference between routing and forwarding? b [2]: Routers Do routers have IP addresses? If so, how many? c [2]: IP Addresses What is the 32-bit binary equivalent of the IP address 223.1.3.27? d [2]: Interfaces Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP segment sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination? e [2]: Packet Headers Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP datagram. What percentage of each datagram will be overhead, and what percentage will be application data? Problem 2 [4]: Switching Fabric In Section 4.2, we noted that there can be no input queuing if the switching fabric is n times faster than the input line rates, assuming n in put lines all have the same line rate. Explain why this should be so. 1

Problem 3 [6]: Forwarding Tables Consider the datagram network using 32-bit host addresses. Suppose a router has four links, number 0 3, and packets are to be forwarded to the link interfaces as follows: Destination Address Range Link Interface 11100000 00000000 000000000 00000000 11100000 11111111 11111111 11111111 0 11100001 00000000 00000000 00000000 11100001 00000000 11111111 11111111 1 11100001 00000001 00000000 00000000 11100001 11111111 11111111 11111111 2 otherwise 3 a [3]: Longest-Prefix Matching Provide a forwarding table that has four entries, uses longest-prefix matching, and forwards packets to the correct link interfaces. b [3]: Link Interfaces Describe how your forwarding table determines the appropriate link interface for datagrams with destination address: 11001000 10010001 01010001 01010101 11100001 00000000 11000011 00111100 11100001 10000000 00010001 01110111 Problem 4 [6]: Subnetworks Consider the topology shown in Figure 4.20 of the text (equivalent figure 4.17 from 6th edition reproduced below). Denote the three subnets with host (starting clockwise at 12:00) as Networks A, B, and C. Denote the subnets without hosts as Networks D, E, and F. 2

a [3]: Networks Addresses Assign network address to each of these six subnets, with the following constraints: All addresses must be allocated from 214.97.254/23; Subnet A should have enough addresses to support 250 interfaces; Subnet B should have enough addresses to support 120 interfaces; and subnet C should have enough address to support 120 interfaces. Of course, subnets D, E, and F should each be able to support two interfaces. For each subnet, the assignment should take the form a.b.c.d/x - e.f.g.h/y. b [3]: Forwarding Tables Using your answer to part (a), provide the forwarding tables (using longest prefix matching) for each of the three routers. Problem 5 [4]: Fragmentation Consider sending a 3000-byte datagram into a link that has an MTU of 500 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are their characteristics? Problem 6 [6]: Dijksta s shortest-path algorithm Consider the following network. With the indicated link costs, use Dijkstas shortest-path 3

algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3 in the text. Problem 7 [6]: Distance vector algorithm Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance vector algorithm and show the distance table entries at node z. Problem 8 [3]: BGP Describe how loops in paths can be detected in BGP. Problem 9 [14]: Intra-AS versus inter AS-routing Consider the network shown below. Suppose AS3 and AS2 are running OSPF for their intra-as routing protocol. Suppose AS1 and AS4 are running RIP for their 4

intra-as routine protocol. Suppose ebgp and ibgp are used for the inter- AS routing protocol. Initially suppose there are no physical link between AS2 and AS4. a [2] Router 3c learns about prefix x from which routing protocol: OSPF, b [2] Router 3a learns about prefix x from which routing protocol: OSPF, c [2] Router 1c learns about prefix x from which routing protocol: OSPF, d [2] Router 1d learns about prefix x from which routing protocol: OSPF, e [2] Once router 1d learns about x it will put an entry (x, I) in its forwarding table. Will I be equal to I 1 or I 2 for this entry? Explain why in one sentence. f [2] Now suppose that there is a physical link between AS2 and AS4, shown by the dotted line. Suppose router 1d learns that x is accessible via AS2 as well as via AS3. Will I be set to I 1 or I 2? Explain why in one sentence. g [2] Now suppose that there is another AS called AS5, which lies on the path between AS2 and AS4 (not shown in the diagram). Suppose router 1d learns that x is accessible via AS2 AS5 AS4 as well as via AS3 AS4. Will I be set to I 1 or I 2? Explain why in one sentence. 5