Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Similar documents
Problem Set 8 Due: Start of Class, November 16

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

Network Layer PREPARED BY AHMED ABDEL-RAOUF

b. Suppose the two packets are to be forwarded to two different output ports. Is it

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Networking: Network layer

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Homework 4. Problems: 3, 10.a, 13, 16, 18, 19, 27a, 28, 35. Question: 3

COM-208: Computer Networks - Homework 6

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-AS routing and BGP. Network Layer 4-1

Lecture 8. Network Layer (cont d) Network Layer 1-1

UNIT III THE NETWORK LAYER

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Inter-Autonomous-System Routing: Border Gateway Protocol

Chapter 4: Network Layer

EEC-484/584 Computer Networks

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

Chapter IV: Network Layer

Network Layer: Control/data plane, addressing, routers

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

Review is pretty much complete! Please help formatting review (indenting). - Jorden

Chapter 4: Network Layer, partb

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

Computer Networking Introduction

Network Layer/IP Protocols

ECE 428 Internet Protocols (Network Layer: Layer 3)

Chapter 4: outline. Network Layer 4-1

Chapter 4: Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

CSCI Topics: Internet Programming Fall 2008

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

CSE3214 Computer Network Protocols and Applications

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

===================================================================== Exercises =====================================================================

EEC-684/584 Computer Networks

Chapter 4: Network Layer. Lecture 12 Internet Routing Protocols. Chapter goals: understand principles behind network layer services:

Inter-Domain Routing: BGP

II. Principles of Computer Communications Network and Transport Layer

HY 335 Φροντιστήριο 8 ο

Chapter 4: network layer

The Network Layer and Routers

CSC 401 Data and Computer Communications Networks

Network Layer: outline

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

cs144 Midterm Review Fall 2010

OSI Network Layer. Chapter 5

The Interconnection Structure of. The Internet. EECC694 - Shaaban

CMSC 332 Computer Networks Network Layer

Internet Routing Protocols Part II

CS 3516: Advanced Computer Networks

CSCE 463/612 Networks and Distributed Processing Spring 2018

CS4/MSc Computer Networking. Lecture 4 The network layer: Forwarding, Routing, IP and Internet routing protocols

CSc 450/550 Computer Networks Internet Routing

Homework 3 Discussion

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

CS4/MSc Computer Networking. Lectures 6-8 The network layer: Forwarding, Routing, IP and Internet routing protocols

Chapter 4 Network Layer

CS/ECE 4457 FALL Name: Computing ID: WARM UP. Question 1: What type of transmission mode is depicted in the photo below:

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Lecture 16: Network Layer Overview, Internet Protocol

CSCI Computer Networks Fall 2016

Topics for This Week

Routing in the Internet

ECE 461 Internetworking Fall Quiz 1

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer. Chapter goals:

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Router Architecture Overview

EECS 3214: Computer Networks Protocols and Applications

EE-311 Data Communication & Networks

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Internetworking Part 2

IPv6: An Introduction

CSC 4900 Computer Networks: Routing Protocols

Network layer. Key Network-Layer Functions. Network service model. Interplay between routing and forwarding. CSE 4213: Computer Networks II

Chapter 4: Network Layer

Course 6. Internetworking Routing 1/33

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Introduction to IP Routing. Geoff Huston

Chapter 4 Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

DATA COMMUNICATOIN NETWORKING

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Chapter 4 Network Layer

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

TDTS06: computer Networks

Internet protocol stack

Routing Protocols --- Exterior Gateway Protocol

internet technologies and standards

Transcription:

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

R1. Let s review some of the terminology used in this textbook. Recall that the name of a transport-layer packet is segment and that the name of a linklayer packet is frame. What is the name of a network-layer packet? Recall that both routers and link-layer switches are called packet switches. What is the fundamental difference between a router and link-layer switch? Recall that we use the term routers for both datagram networks and VC networks.

Answer: A network-layer packet is a datagram. A router forwards a packet based on the packet s IP (layer 3) address. A link-layer switch forwards a packet based on the packet s MAC (layer 2) address.

R2. What is the difference between routing and forwarding?

Answer: Forwarding is about moving a packet from a router s input link to the appropriate output link. Routing is about determining the end-to-routes between sources and destinations.

R3. What are the two most important network-layer functions in a datagram network? What are the three most important network-layer functions in a virtual-circuit network?

Answer: Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

R7. Three types of switching fabrics are discussed in section 4.3. List and briefly describe each type.

Answer: Switching via memory; switching via a bus; switching via an interconnection network

R10. Describe how packets loss can occur at output ports.

Answer: Packet loss can occur if the queue size at the output port grows large because of slow outgoing line-speed.

R11. What is HOL blocking? Does it occur in input ports or output ports?

Answer: HOL blocking a queued packet in an input queue must wait for transfer through the fabric because it is blocked by another packet at the head of the line. It occurs at the input port.

R16. Suppose Host A sends Host B a TCP segment encapsulated in an IP datagram. When Host B receives the datagram, how does the network layer in Host B know it should pass the segment (that is,the payload of the datagram) to TCP rather than to UDP or to something else?

Answer: The 8-bit protocol field in the IP datagram contains information about which transport layer protocol the destination host should pass the segment to.

R17. Suppose an application generates chunks of 20 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP datagram. What percentage of each datagram will be overhead, and what percentage will be application data?

Answer: 66.7% overhead

R19. It has been said that when IPv6 tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer protocols. Do you agree with this statement? Why or why not?

Answer: Yes, because the entire IPv6 datagram (including header fields) is encapsulated in an IPv4 datagram

R22. Is it necessary that every autonomous system use the same intra- AS routing algorithm? Why or why not?

Answer: No. Each AS has administrative autonomy for routing within an AS.

R24. Consider Figure 4.35. Starting with the original table in D, suppose that D receives from A the following advertisement: Destination Subnet Next Router Numbers of Hops to Destination z w x C - - Will the table in D change? If so how? 10 1 1

Answer: No. The advertisement tells D that it can get to z in 11 hops by way of A. However, D can already get to z by way of B in 7 hops. Therefore, there is no need to modify the entry for z in the table. If, on the other hand, the advertisement said that A were only 4 hops away from z by way of C, then D would indeed modify its forwarding table.

R26. Fill in the blank : RIP advertisements typically announce the number of hops to various destinations. BGP updates, on the other hand, announce the to the various destinations.

Answer: sequence of ASs on the routes

P1. Consider some of the pros and cons of virtual-circuit and datagram networks. a. Suppose that in the network layer, routers were subjected to stressful conditions that might cause them to fail fairly often. At a high level, what actions would need to be taken on such router failure? Does this argue in favor of VC or datagram architecture? b. Suppose that in order to provide a guarantee regarding the level of performance (for example, delay) that would be seen along a source-to-destination path, the network requires a sender to declare its peak traffic rate. If the declared peak traffic rate and the existing declared traffic rates are such that there is no way to get traffic from the source to the destination that meets the required delay requirements, the source is not allowed access to the network. Would such an approach be more easily accomplished within a VC or a datagram architecture?

Answer: a) With a connection-oriented network, every router failure will involve the routing of that connection. At a minimum, this will require the router that is upstream from the failed router to establish a new downstream part of the path to the destination node, with all of the requisite signaling involved in setting up a path. Moreover, all of the routers on the initial path that are downstream from the failed node must take down the failed connection, with all of the requisite signaling involved to do this. With a connectionless datagram network, no signaling is required to either set up a new downstream path or take down the old downstream path. We have seen, however, that routing tables will need to be updated (e.g., either via a distance vector algorithm or a link state algorithm) to take the failed router into account. We have seen that with distance vector algorithms, this routing table change can sometimes be localized to the area near the failed router. Thus, a datagram network would be preferable. Interesting, the design criteria that the initial ARPAnet be able to function under stressful conditions was one of the reasons that datagram architecture was chosen for this Internet ancestor.

b) In order for a router to determine the delay (or a bound on delay) along an outgoing link, it would need to know the characteristics of the traffic from all sessions passing through that link. That is, the router must have per-session state in the router. This is possible in a connection-oriented network, but not with a connectionless network. Thus, a connection-oriented network would be preferable.

P2. A bare-bones forwarding table in a VC network has four columns. What is the meaning of the values in each of these columns? A bare-bones forwarding table in a datagram network has two columns. What is the meaning of the values in each of these columns?

Answer : For a VC forwarding table, the columns are :Incoming Interface, Incoming VC Number, Outgoing Interface, Outgoing VC Number. For a datagram forwarding table, the columns are: Destination Address, Outgoing Interface.

P4. Consider a VC network with a 3-bit field for the VC number. Suppose that the network wants to set up a virtual circuit over four links: link A, link B, link C, and link D. Suppose that each of these links is currently carrying three other virtual circuits, and the VC numbers of these other VCs are as follows: In answering the following questions, keep in mind that each of the existing VCs may only be traversing one of the four links. Link A Link B Link C Link D 000 001 010 011 001 010 011 000 111 101 110 100

a. If each VC is required to use the same VC number on all links along its path, what VC number could be assigned to new VC? b. If each VC is permitted to have different VC numbers in different links along its path (so that forwarding tables must perform VC number translation), how many different combinations of four VC numbers (one for each of four links) could be used?

Answer : a) No VC number can be assigned to the new VC; thus the new VC can be established in the network. b) Each link has 5 available VC numbers. There are four links. So the number of combinations is 5 4.

P7. Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for some reason, all packets form A are destined to D, and all packets from B are destined to C, can a switch fabrics be designed so that there is no input port queuing? Explain why or why not in one sentence. b. Suppose now packets from A and B are randomly destined to both C and D. Can a switch fabric be designed so that there is no input port queuing? Explain why or why not in one sentence.

Answer : a) No. To have no input port queuing, the switching fabric should operated at a speed at least 2 times the line speed. b) No. To have no input port queuing, the switching fabric should operated at a speed at least 2 times the line speed.

P10. Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has the following table: Prefix Match Interface 1 0 11 1 111 2 otherwise 3 For each of the four interfaces, give the associated range of destination host addresses and number of addresses in the range.

Answer :

P11. Consider a router that interconnects three subnets: Subnet 1, Subnet 2,and Subnet 3. suppose all of the interfaces in each of these three subnets are required to have the prefix 220.2.240/20. Also suppose that Subnet 1 is required to support up to 2000 interfaces, and Subnets 2 and 3 are each required to support up to 1000 interfaces. Provide three network address (of the form a.b.c.d/x) that satisfy these constraints.

Answer : 220.2.240.0/21 220.2.248.0/22 220.2.252.0/22

P12. In section 4.2.2 an example forwarding table (using longest prefix matching) is given. Rewrite this forwarding table using the a.b.c.d/x notion instead of the binary string notation.

Answer :

P14. Consider a subnet with prefix 101.101.101.64/26. Give an example of one IP address (of from xxx.xxx.xxx.xxx) that can be assigned to this network. Suppose an ISP owns the block of addresses of the form 101.101.128/17. suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of from a.b.c.d/x) for the four subnets?

Answer : Any IP address in range 101.101.101.65 to 101.101.101.127 Four equal size subnets: 101.101.128/19, 101.101.160/19, 101.101.192/19, 101.101.224/19

P15. Consider the topology shown in Figure4.17. Denote the three subnets with hosts (starting clockwise at 12:00) as Networks A, B, and C. Denote the subnets without hosts as Networks D,E and F. a. Assign network address to each of these six subnets, with the following constraints: All addresses must be allocated from 214.97.254/23; Subnet A should have enough addresses to support 250 interfaces; Subnet B should have enough addresses to support 120 interfaces; and Subnet C should have enough addresses to support 120 interfaces. Of course, subnets D, E, and F should each be able to support two interfaces. For each subnet, the assignment should take the form a.b.c.d/x or a.b.c.d/x-e.f.g.h/y. b. Using your answer to part (a), provide the forwarding tables (using longest prefix matching ) for each of the three routers.

Answer :

P16. Consider sending a 4,000-byte datagram into a link that has an MTU of 400 bytes. Suppose the original datagram is stamped with the identification number 422. how many fragments are generated? What are their characteristics?

Answer : The maximum size of data field in each fragment = 380 (20 bytes IP header). Thus the number of required 4000 20 fragments = 11 380 Each fragment will have Identification number 422. Each fragment except the last one will be of size 400 bytes (including IP header). The last datagram will be of size 200 bytes (including IP header). The offsets of the 11 fragments will be 0, 48, 96, 144, 192, 240, 288, 336, 384, 432, 480. Each of the first 10 fragments will have flag=1; the last fragment will have flag=0.

P17. Suppose datagrams are limited to 1,500 bytes (including header) between source Host A and destination Host B. Assuming a 20-byte IP header, how many datagrams would be required to send an MP3 considering of 3 million bytes?

Answer : Assume the data is carried in TCP segment, with each segments also having 20 bytes TCP header. Thus each datagram can carry 1500-20-20=1460 bytes of MP3 file. Number of datagram required = 6 3*10 1460

P22. Consider the following network. With the indicated link costs, use Dijkstra s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3 x 6 z 12 6 y 8 w 1 4 9 5 v 8 4 3 t u 2 4 1 s

Answer :

P24. Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance-vector algorithm and show the distance table entries at node z. u 2 v 5 12 2 z 10 7 x 1 y

Answer :

P29. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for their intra-as routing protocol. Suppose AS1 and AS4 are running RIP for their intra-as routing protocol. Suppose ebgp and ibgp are used for the inter- AS routing protocol. Initially suppose there is no physical link between AS2 and AS4. a. Router 3c learns about prefix x from which routing protocol: OSPF, RIP, ebgp or ibgp? b. Router 3a learns about prefix x from which routing protocol? c. Router 1c learns about prefix x from which routing protocol? d. Router 1d learns about prefix x from which routing protocol?

4b 4c 4a x AS4 3c 2c 3b AS3 3a 2a 2b 1c AS1 1b AS2 1a 1d l 1 l 2

Answer : a. ebgp b. ibgp c. ebgp d. ibgp

P30. Referring to the previous problem, once router 1d learns about x will put an entry (x, l) in its forwarding table. a. Will l be equal to l 1 or l 2 for this entry? Explain why in one sentence. b. Now suppose that there is a physical link between AS2 and AS4, shown by the dotted line. Suppose router 1d learns that x is accessible via AS2 as well as via AS3. Will be set to l 1 or l 2? Explain why in one sentence. c. Now suppose there is another AS, called AS5, which lies on the path between AS2 and AS4 (not shown in diagram). Suppose router 1d learns that x is accessible via AS2 AS5 AS4 as well as via AS3 AS4. Will l be set to l 1 or l 2? Explain why in one sentence.

a) l 1 because this interface begins the least cost path from 1d towards the gateway router 1c. b) l 2. Both routes have equal AS-PATH length but l 2 begins the path that has the closest NEXT-HOP router. c) l 1. l 1 begins the path that has the shortest AS-PATH.