CSCI 466 Midterm Networks Fall 2011

Similar documents
CSCI 466 Midterm Networks Fall 2011

Housekeeping. Fall /5 CptS/EE 555 1

Networks Fall This exam consists of 10 problems on the following 13 pages.

CSCI Networking Name:

Links. CS125 - mylinks 1 1/22/14

Overview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

EECS 122. University of California Berkeley

EECS 122. University of California Berkeley. Network Architecture Network hierarchy Layering Performance. Link Layer Ethernet Wi-Fi

CS 640: Introduction to Computer Networks

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122

Midterm Review EECS 122. University of California Berkeley

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

Networks Fall This exam consists of 10 problems on the following 13 pages.

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

CPE 548 Exam #1 (50 pts) February 17, 2016

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

COMP 361 Computer Communications Networks. Spring Semester Final Examination Solution Key

CSCI Spring Final Exam Solution

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

Expected Time: 90 min PART-A Max Marks: 42

EECS 122: Introduction to Communication Networks Final Exam Solutions

Question Points Score total 100

TERM EXAMS CS610- COMPUTER NETWORKS

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

ECSE 414 Fall 2014 Final Exam Solutions

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca

Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2

CS 458 Internet Engineering Spring First Exam

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Top-Down Network Design

Topics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

Study Guide. Module Two

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

VU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012

Medium Access Protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Duke University CompSci 356 Midterm Spring 2016

Switching and Forwarding - continued

Switching and Forwarding - continued

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CSC 4900 Computer Networks: The Link Layer

EEC-684/584 Computer Networks

Midterm Review EECS 122. University of California Berkeley

CSCI 466 Midterm Networks Fall 2013

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Why dynamic route? (1)

Chapter 4. The Medium Access Control Sublayer

1. (10 points): For each of the following, choose exactly one best answer.

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Summary of MAC protocols

The Link Layer and LANs. Chapter 6: Link layer and LANs

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

Chapter 5 Link Layer and LANs

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Question 7: What are Asynchronous links?

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CS 6543 Computer Networks

===================================================================== Exercises =====================================================================

Chapter 6. The Network Layer

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

ECE 4450:427/527 - Computer Networks Spring 2017

Review is pretty much complete! Please help formatting review (indenting). - Jorden

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Lecture 3: Modulation & Layering"

Network Layer: Routing

Internet protocol stack

Chapter 12 Network Protocols

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

What is the difference between unicast and multicast? (P# 114)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Homework #4. Due: December 2, 4PM. CWND (#pkts)

LAN Interconnection and Other Link Layer Protocols

EEC-484/584 Computer Networks

Transcription:

CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No computers or communication devices of any kind are permitted. If you have a question, raise your hand and I will stop by. Since partial credit is possible, please write legibly and show your work. Problem Points Score 1 22 2 10 3 16 4 10 5 12 6 10 7 12 Total 92 1

1) Multiple choice (22 points total, 2 points each). Circle the best single answer. I. What is the name for the devices in the cloud in the diagram? a) switches b) routers c) hubs d) repeaters II. Which of the following link protocols best describes Ethernet? a) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) b) Frequency Division Multiple Access (FDMA) c) Carrier Sense Multiple Access with Collision Detection (CSMA/CD) d) Asynchronous Transfer Mode (ATM) III. Which of the following is true about Ethernet networks? a) Switches provide greater scalability and security than hubs. b) Ethernet frames have a minimize size to ensure good utilization of the network (i.e. senders would otherwise have a large overhead to send a small amount of data). c) When an Ethernet sender detects the media is idle it issues a jamming signal to inform other devices not to transmit. It then sends its packet. d) Ethernet frames contain a single 48- bit MAC address. IV. Which of the following is true about 802.11 Wi- Fi networks? a) All wireless networks must use access points. b) Collisions can still happen when Ready to Send- Clear to Send (RTS/CTS) is used. c) 802.11 frames contain a total of two MAC addresses, one for the sender and one the destination. d) Explicit frame acknowledgements are optional and normally not very helpful. V. Which of the following link protocols best describes 802.11 Wi- Fi? a) Time Division Multiple Access (TDMA) b) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) c) Carrier Sense Multiple Access with Collision Detection (CSMA/CD) d) Pure ALOHA 2

VI. Which of the following is true about the Address Resolution Protocol (ARP)? a) Maps domain names (e.g. youtube.com) to IP addresses b) A new host broadcasts its hardware address and the default gateway responds with an IP address. c) If a host hears a request for its IP address, it responds with its hardware address. d) Hosts send ARP requests using a multicast hardware address. VII. Which of the following statements is true about routers? a) Routers must not change the IP packets they forward b) Routers can arbitrarily drop packets if they want c) Routers must implement either the Border Gateway Protocol (BGP) or the Exterior Gateway Protocol (EGP). d) Routers are required to reassemble fragments if the next router supports the full datagram size. VIII. Which of the following framing protocols uses: an initial two- byte flag value, no bit stuffing, a fixed- sized frame, and scrambles bytes using XOR? a) DDCMP (byte- counting) b) PPP (sentinel- based) c) HDLC (bit- oriented) d) SONET (clock- based framing) IX. If you are transmitting 1 byte packets. What network performance metric is most important? a) Throughput b) Bandwidth c) Latency d) Speed of light in a vacuum X. You need to transmit a video to 10 different hosts on a large network. What type of routing would be the best fit? a) Multicast b) Unicast c) Broadcast d) Anycast XI. Which of the following is NOT a feature/advantage of IPv6? a) Larger address space b) Flexible variable sized headers c) Autoconfiguration of hosts d) Enhanced routing capabilities 3

2) Physical encoding (10 points). a) To transmit a bit, we could simply use a high voltage level for a 1 and a low voltage level for a 0: What are two reasons this simple scheme is problematic? 1) Baseline wander hard to tell threshold for what is a 0 and what is a 1 2) Synchronization hard to keep clocks in synch b) 100 Mbps Ethernet uses Non- Return to Zero Inverted (NRZI) and 4B/5B encoding. Briefly describe each encoding scheme and describe why each is helpful. NRZI A binary 1 is coded as a transition in signal level (from 0 to 1 or 1 to 0). A binary 0 is coded as no change in signal. This helps avoid long strings of 1's from causing the problems described in a). 4B/5B Encode each nibble of 4 bits as a 5 bit code. The code is chosen so there will never be a run of more than three consecutive 0's. Combined with NRZI it avoids the problems described in a). c) 10 Gigabit Ethernet uses 64B/66B, what is its advantage over 4B/5B? 4B/5B requires 1 extra bit for each 4 bits to be transmitted, thus 80% efficient. 64B/66B requires 2 extra bits for each 64 bits, thus 97% efficient. 4

3) Network performance (16 points). a) You record a 2 second video on your phone. The video is 320 x 240 resolution, 3 bytes/pixel, 15 frames per second. Assume no data compression. Calculate the file size in bytes. 15 frames / sec * (320 * 240 pixels) / frame * 3bytes / pixel * 2 sec = 6,912,000 bytes b) Assume you can transmit the video continuously with no connection setup and no other overhead. Your phone's network connection has a bandwidth of 512 Kbps and the Round Trip Time (RTT) to the destination server is 200 ms. How long will it take for the entire video to reach their server? 6,912,000 bytes * 8 bits / byte * 1 sec / 512,000 bits = 108 sec Add in ½ RTT for last bit on wire to propagate to server: 108 sec + 0.1 sec = 108.1 sec (continued on next page) 5

c) Instead of being able to send packets continuously, assume you use the stop- and- wait protocol with 1KB packets and no packet overhead. Assume no transmission errors occur. How many total packets are required to send the video? Draw a timeline diagram showing the first two packets of the transmission and the last packet. 6,912,000 bytes * 1 packet / 1024 bytes = 6750 packets Packet 1 ACK 1 Sender ACK 2 Packet 2. Packet 6750 Receiver ACK 6750 d) Given the setup described in c) and a bandwidth of 512 Kbps with an RTT of 200 ms, how long does it take for your entire video to reach the destination server? 1024 bytes * 8 bits / byte = 8192 bits / 512,000 bits per second = 16 ms (RTT + 16 ms) * 6749 packets + (½ RTT + 16 ms) * 1 packet (216 ms * 6749 + 116 ms) * 1 sec / 1000 ms = 1457.9 sec 6

4) Switching (10 points). a) In the network below, a bridge B1 received a packet from A to an unknown destination D. If B1 and B2 did NOT use the spanning tree algorithm, describe the problem that would result. Packets would get stuck in a loop going between B1 and B2 (at least until the packets die or B1/B2 learn where D actually is). b) The power has just been restored to the local area network (LAN) shown below. Hosts (not shown) are directly connected to the bridges (i.e. the network is entirely switched with no shared network segments). Circle the bridge that will (after a period of time) be designated as the root bridge. Fill in solid lines between bridges that are part of the spanning tree. B3 B5 B8 B2 B6 B1 B4 B1 B7 7

5) IP prefixes and forwarding (12 points). Consider the following three routers where router R has outgoing interfaces A, B, and C: A 11.0.0.0/8 R B 11.1.0.0/16 C 11.2.3.0/24 a) How many IP addresses does the prefix 11.2.3.0/24 represent? 2 8 = 256 b) List the forwarding table entries for router R. A new packet has just arrived at R. Describe how R uses its forwarding table to decide what to do with the packet. Prefix Next hop 11.2.3.0/24 C 11.1.0.0/16 B 11.0.0.0/8 A A packet will be examined to find the longest matching prefix in the forwarding table. c) Which outgoing interface does R use for a packet with destination 11.2.3.1? C d) Which outgoing interface does R use for a packet with destination 11.1.2.3? B e) Which outgoing interface does R use for a packet with destination 11.2.4.5? A 8

6) Intradomain routing (10 points). Assume a shortest- path, link- state routing protocol is running on the following network, where the numbers correspond to link weights: i 3 2 r k 1 4 1 2 n 5 5 3 m p 1 j q a) Suppose the link between nodes k and m fails. Before the failure, what is the shortest path from node i to node j? What is the new path after the failure (after the routing protocol converges)? before: i k m j (3 + 2 + 1 = 6) after: i r n j (2 + 1 + 5 + 1 = 9) b) A transient forwarding- loop might occur during protocol convergence. Which two nodes are involved in the loop? If convergence takes a long time, what might happen to a packet stuck in the loop? k and n The packet may out live its TTL and be dropped. Or the packet may escape once routing converges. 9

7) Interdomain routing (12 points). a) How does the Border Gateway Protocol (BGP) avoid the count- to- infinity problem that plagues distance- vector protocols? BGP uses the path vector protocol which includes the entire path instead of only the next hop. Thus a router can detect when a path includes itself and avoid a cycle. b) Give two reasons why BGP is used for Interdomain routing instead of a link- state protocol such as Open Shortest Path First (OSPF) that calculates optimal least- cost routes. 1) Scalability 2) Enforce AS policies 3) Hide details from competitors c) A campus network is a multi- homed Autonomous System (AS) with connections to two tier- 3 Internet Service Providers (ISPs). The border routers of the campus run BGP. Does the campus AS advertise routes learned from the first ISP to the second (and vice- versa)? Why or why not? No. The campus has no incentive to allow transit traffic (traffic not destined to a host at the campus) to pass through its network. 10