Department of Computer Science and Engineering. CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016

Similar documents
Department of Computer Science and Engineering. COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005

Network Layer/IP Protocols

ECE 461 Internetworking Fall Quiz 1

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering

Chapter 5 OSI Network Layer

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Network Layer (4): ICMP

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

TSIN02 - Internetworking

ECE 461 Internetworking Fall Quiz 1

IP Addressing and Subnetting

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

The Internet. The Internet is an interconnected collection of netw orks.

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

CS/ECE 4457 FALL Name: Computing ID: WARM UP. Question 1: What type of transmission mode is depicted in the photo below:

Chapter 5 Network Layer

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

b. Suppose the two packets are to be forwarded to two different output ports. Is it

Network Layer PREPARED BY AHMED ABDEL-RAOUF

TCP /IP Fundamentals Mr. Cantu

Lecture 16: Network Layer Overview, Internet Protocol

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

ECE4110 Internetwork Programming. Introduction and Overview

Lecture 8. Network Layer (cont d) Network Layer 1-1

Internet Protocols (chapter 18)

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Information Network Systems The network layer. Stephan Sigg

II. Principles of Computer Communications Network and Transport Layer

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

Networking Theory CSCI 201 Principles of Software Development

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Linux System Administration

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Sirindhorn International Institute of Technology Thammasat University

IP: Addressing, ARP, Routing

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

OSI Network Layer. Chapter 5

Network Layer: Control/data plane, addressing, routers

COSC 6377 Mid-Term #2 Fall 2000

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

SEN366 (SEN374) (Introduction to) Computer Networks

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

The Internetworking Problem. Internetworking. A Translation-based Solution

Position of IP and other network-layer protocols in TCP/IP protocol suite

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Where we are in the Course

End-to-End Communication

IP - The Internet Protocol

The Network Layer Forwarding Tables and Switching Fabric

CSE 123: Computer Networks Fall Quarter, 2017 MIDTERM EXAM

Vorlesung Kommunikationsnetze

SE 4C03 Winter Sample Midterm Test. Instructor: Kartik Krishnan

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CHAPTER-2 IP CONCEPTS

EE-311 Data Communication & Networks

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Introduction to Internetworking

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Chapter 7. Local Area Network Communications Protocols

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EEC-484/584 Computer Networks

EE 610 Part 2: Encapsulation and network utilities

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

SE 4C03 Winter Midterm Test Answer Key. Instructor: Kartik Krishnan

Review of Important Networking Concepts

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

CSC 401 Data and Computer Communications Networks

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes

Network Layer: outline

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Networking: Network Layer

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Internet Control Message Protocol (ICMP)

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Lecture 10: Addressing

Your Name: Your student ID number:

MID II Tuesday, 1 st April 2008

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Transcription:

Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016 Midterm Examination Instructions: Examination time: 75 min. Print your name and CSE student number in the space provided below. This examination is closed book and closed notes. There are 6 questions. The points for each question are given in square brackets, next to the question title. The overall maximum score is 100. Answer each question in the space provided. If you need to continue an answer onto the last page, clearly indicate that and label the continuation with the question number. FIRST NAME: LAST NAME: STUDENT #: Question Points 1 / 20 2 / 24 3 / 12 4 / 14 5 / 14 6 / 16 Total / 100 1

1. Multiple Choice [20 points] Circle the correct answer(s) for the following statements. For each statement, you will obtain 0 marks if the number of circled answers is more/less than appropriate. (1.1) A host wants to send a 3000 byte datagram onto a link with an MTU of 500 bytes. (MTU is the maximum size of an IP packet (IP header + data) passed from the network to data-link layer.) Assuming an IP header of 20 bytes, how many bytes of overhead does IP add to this transmission? (a) 20 (b) 120 (c) 140 (d) 160 (1.2) How is a unique MAC address assigned to a Network Card?. (a) It is built into the card when the card is manufactured. (b) The network administrator must assign the address. (c) A unique address is automatically assigned when the card drivers are installed. (d) A unique address is automatically assigned whenever you boot up the computer. (1.3) Routers (traditionally) operate on the following layers? (a) data-link and physical (b) network, data-link and physical (c) transport, network, data-link and physical (d) application, transport, network, data-link, and physical (1.4) To check whether the Web server you are trying to reach is available or is down, which command-line utility should you use? (a) ping (b) ipconfig (c) traceroute (d) telnet (1.5) Multiple TCP streams can be distinguished on a given machine using. (a) ports (b) IP addresses (c) NICs (d) none of the above (1.6) The checksum in the header of an IPv4 packet is used to. (a) detect errors in the packet s payload (b) detect errors in the packet s header (c) detect and correct errors in the packet s payload (d) detect and correct errors in the packet s header 2

(1.7) An IPv6 address can have up to hexadecimal digits. (a) 16 (b) 32 (c) 8 (d) none of the above (1.8) The recommended length of Interface Identifier in IPv6 is. (a) 16 bits (b) 32 bits (c) 48 bits (d) 64 bits (1.9) In IPv6 fregmentation. (a) is performed by both hosts and routers (b) is performed by routers only (c) is not done at all there is no limit on packet size (d) none of the above (1.10) In IPv6, the use of Transport Mode Encryption implies that. (a) only headers of transmitted packets are encrypted (b) headers and extensions of transmitted packets are encrypted (c) only payloads of transmitted packets are encrypted (d) none of the above 3

2. Potpourri [24 points] 2.1 [4 points] How would moving the entire Internet to MAC-address based routing - instead of IP-address based routing - affect the performance of Internet routers? (Clearly state whether this solution would be better or worse, and why.) This solution would be worse, as MAC addresses are not hierarchical! That is, each router would now have to know the location of every single machine (its MAC address), instead of knowing just the location of their respective network (NetID) in the current IP-address based routing. Consequently, the routing tables would be considerably larger, and overall more routing information would have to be exchanged among routers 2.2 [5 points] How would this new MAC-address based routing/operation of the Internet affect the end-user (i.e., end-host) privacy? Explain. There are some pros and cons here. Cons: Reduced Privacy. Now the receiving machine would know the exact MAC-ID of the sending machine, including its make/manufacturer. (In the current Internet, only the IP of the sending machine is known, which is not unique and can change / be shared among multiple machines.) Pros: Improved Privacy: Now the receiving machine would not know where the sending machine is geographically located. 4

2.3 [7 points] Recall, traceroute is a tool that displays the addresses of all intermediate routers through which a packet travels on its way to a particular destination. In class, we have explained the exact mechanisms that traceroute relies on to accomplish its function. Now, in reality, traceroute may report a path that does not exist. For example, traceroute could return a path A-B-C (where A, B, and C are IP addresses) when there is no link between routers B and C. Give one example where that could happen. (Draw a picture if useful.) To accomplish its function, traceroute relies on TTL value in the IP-packet header. (An intermediate router will drop a packet if/when its TTL reaches 0, and the given router will send an ICMP message back to the sender thus facilitating its identification...) Based on this, by sending packets with gradually increased values of TTL 1, 2,, the sending machine can identify the 1 st, 2 nd, router on the path to the final destination. Now, the route to the remote destination may have changed during the measurement process. For example, suppose the route from A to Z changed from A-B-Y-Z to A-D-C-Z. Then, the first traceroute probe would return B and the second would return C, even though nodes B and C are not directly connected. Note, for this to actually happen, the hop distance of A-to-C should be for 1 larger than the hop distance of A-to-B. 5

2.4 [8 points] Suppose we have three networks connected by two routers (as shown below). Show the Source IP address, source MAC address, destination IP address and destination MAC address of packets at This Point if packets are transmitting from host A to F. LAN 2 143.163.XX.XX LAN 1 131.247.XX.XX LAN 3 C 28.181.XX.XX D Router #1 B Router #2 E This Point F A Assume the following network setting: Host A: 28.181.1.1 (MAC address: 1050) Host B: 28.181.1.2 (MAC address: 1ABC) Router #2 (LAN 3 side): 28.181.1.100 (MAC address: 2019) Router #2 (LAN 2 side): 143.163.32.99 (MAC address: 1021) Host C: 143.163.32.1 (MAC address: 3082) Router #1: (LAN 2 side): 143.163.32.98 (MAC address: 7547) Router #1: (LAN 1 side): 131.247.68.99 (MAC address: 7546) Host D: 131.247.68.1 (MAC address: ABCD) Host E: 131.247.68.2 (MAC address: 9356) Host F: 131.247.68.3 (MAC address: 5466) 6

3. Subnetting [12 points] Given the following IP address and subnet mask, answer the below questions. IP Address (decimal notation): 178.93.209.160 Subnet Mask (decimal notation): 255.255.255.224 IP Address (binary notation): 1011 0010 0101 1101 1101 0001 1010 0000 Subnet Mask (binary notation): 1111 1111 1111 1111 1111 1111 1110 0000 3.1 [3 points] What is the subnet address? Provide this in the dotted IP notation, not in binary. 3.2 [3 points] How many hosts can be on this subnetwork? 3.3 [6 points] What is the range of IP addresses for this subnet? In other words, what is the starting IP address and ending IP address of this subnet? Provide this in the dotted IP notation, not in binary. http://www-scf.usc.edu/~csci201/exams/final-written-spring2015-solution.pdf 7

4. IPv4 Fragmentation [14 points] Suppose an IP packet with the below properties/values will be forwarded to another network where the maximum packet size (MTU = IP header + data) is only 252 bytes. The original packet values: (1) Total Length = 748 (2) IHL = 7 (3) Fragment Offset = 0 (4) More = 0 Your task is to find/show (1) Total length, (2) IHL, (3) Fragment offset and (4) More fields in the last packet after fragmentation. Assume IHL = 7 for every packet. (1) BEFORE fragmentation: Header Payload (user data) 28 bytes 720 bytes (2) AFTER fragmentation: 1st packet Payload (user data) 3rd packet Payload (user data) 28 bytes 224 bytes 28 bytes 224 bytes 2nd packet Payload (user data) Last packet 28 bytes 224 bytes 28 bytes 48 bytes The total packet length of the last packet = 76 (28-byte header + 48- byte payload), IHL = 7 (given) Fragment Offset = (224 3) / 8 = 672/8 =84 More = 0 8

5. NAT [14 points] The figure below shows two residential networks with routers that implement NAT. NAT1 NAT2 (a) [4 points] Suppose that host A wants to connect to the web server at host E. In the below tables of NAT1, add an entry that would allow A to communicate with E. In cases where the value of a field is not predefined/known, you may choose any value that you think is reasonable. (b) [2 points] For a typical packet sent from A to E, show the values of the address and port fields in the diagram below (before the packet reaches NAT1). 9

(c) [2 points] Show the values of the address and port fields in the packet from (b) once it reaches (arrives at) E. (d) [6 points] Now, suppose that host A in NAT1 network is communicating with host D in NAT2 network. For a packet sent from A to D, show the values of the address and port fields of this packet as the packet moves between A to NAT1, NAT1 to NAT2, and NAT2 to D. (Again, in cases where the value of a field is not predefined/known, you may choose any value that you think is reasonable.) http://www.eng.utah.edu/~cs5480/homeworks/hw3_soln.pdf 10

6. PQ and WFQ [16 points] 6.1 [8 points] Consider a queueing (packet scheduling) system shown in the below figure. In this system, the router recognizes VoIP traffic and places it into the strict Priority Queue (PQ). The other classes/types of traffic are placed in the remaining three queues, as indicated in the figure. When processing the queues/packets, the router processes PQ until it is empty, at which point it starts processing the other queues according to standard Weighted Fair Queueing (WFQ) discipline. The weights of the three WFQ queues are: Priority 1: w=0.4 Priority 2: w=0.4 Priority 3: w=0.2 (You can assume that the router accesses the queues in the order of their indexes 1, 2, 3, and all packets require equal processing time/resources.) If the packets shown in the above figure are already in their respective queues, give the order in which packets will be served/transmitted. Order of serving/transmission: 1 1 2 2 3 3 4 3 3 4 4 4 Another possible solution: 1 1 2 3 2 3 4 3 3 4 4 4 11

6.2 [8 points] Now, for the system from 6.1, assume the weights of the three WFQ queues change to: Priority 1: w=0.2 Priority 2: w=0.2 Priority 3: w=0.6 Order of serving/transmission: 1 1 2 3 4 4 4 2 3 4 3 3 12

IPv4 PACKET FORMAT: IPv6 PACKET FORMAT: 13