Node A B 0 2 C D E F 6 0. Node A B C D E F

Similar documents
Computer Networks. Routing Algorithms

CSE 123: Computer Networks

Intra-domain Routing

Introduction to Intra-Domain Routing

CSE 123: Computer Networks

CSE 123: Computer Networks

Unicast Routing Protocols (RIP, OSPF, and BGP)

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

ECE 333: Introduction to Communication Networks Fall 2001

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing

(Refer Slide Time: 01:08 to 01:25min)

CS164 Final Exam Winter 2013

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan

C13b: Routing Problem and Algorithms

RIP V1 with Split Horizon, Route Poisoning, and Poison Reverse. Interpret the contents of the routing table using the show ip route command

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Computer Networks. Routing

Distance vector and RIP

ICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing

CCNA IP ROUTING. Revision no.: PPT/2K605/03

Comparative Study of Routing Protocols Convergence using OPNET Chapter Three: Simulation & Configuration

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Data Communication Networks Final

ECE 435 Network Engineering Lecture 11

II. Principles of Computer Communications Network and Transport Layer

Note: This practice midterm only covers a subset of the topics you are required to know.

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

Examination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC. Date: 20 May :00 19:00 SOLUTIONS

CSE 473 Introduction to Computer Networks. Final Exam Review

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

IP Routing Volume Organization

ECE 435 Network Engineering Lecture 11

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

RFC Compliance Test Report. Release 3.0

Lecture 9. Reminder: Homework 3, Programming Project 2 due today. Questions? Thursday, September 22 CS 475 Networks - Lecture 9 1

Some Thoughts on Multi-Domain Routing Ross Callon

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1

CSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes

ICMP (Internet Control Message Protocol)

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Review problems (for no credit): Transport and Network Layer

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

IP Addressing and Subnetting

Internetworking Protocols and Software (COMP416)

Top-Down Network Design

Routing. 4. Mar INF-3190: Switching and Routing

15-441: Computer Networks Spring 2017 Homework 3

Basic Idea. Routing. Example. Routing by the Network

CSE/EE 461 Distance Vector Routing

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:

Routing by the Network

9.1. Routing Protocols

UNIT 2 ROUTING ALGORITHMS


ITEC310 Computer Networks II

Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats

CMPE 151 Routing. Marc Mosko

Telecommunication Protocols Laboratory Course. Lecture 3

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Teldat Router. RIP Protocol

EEC-484/584 Computer Networks

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

Network Protocols. Routing. TDC375 Winter 2002 John Kristoff - DePaul University 1

The most simple way to accelerate a Router is at 9.8 m/sec/sec.

Module 7 Internet And Internet Protocol Suite

Routing in a network

Table of Contents Chapter 1 Multicast Routing and Forwarding Configuration

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1

EXAM TCP/IP NETWORKING Duration: 3 hours

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Homework 3 assignment for ECE671 Posted: 03/01/18 Due: 03/08/18

HP FlexFabric 5700 Switch Series

FiberstoreOS IP Routing Configuration Guide

Engr. Joseph Ronald Canedo's Note 1

FSOS IP Routing Configuration Guide

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Distance-Vector Routing: Distributed B-F (cont.)

FiberstoreOS IP Routing Configuration Guide

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Missing Pieces of the Puzzle

Two types of routing protocols are used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs).

cs/ee 143 Communication Networks

General comments on candidates' performance

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more

Chapter 8 LOCATION SERVICES

Configuring IP Multicast Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

Routing Protocols. Recap & Concepts

Transcription:

4.15 For the network given in Figure 4.50, give global distance-vector tables like those of table 4.5 and 4.8 when (a)each node knows only the distances to its immediate neighbor. (b)each node has reported the information it had in the preceding step to its immediate neighbors. (c)step (b) happens a second time (a) A 0 3 8 B 0 2 C 3 0 1 6 D 8 0 2 E 2 1 2 0 F 6 0 (b) A 0 3 8 4 9 B 0 3 4 2 C 3 3 0 3 1 6 D 8 4 3 0 2 E 4 2 1 2 0 7 F 9 6 7 0 (c) A 0 6 3 6 4 9 B 6 0 3 4 2 9 C 3 3 0 3 1 6 D 6 4 3 0 2 9 E 4 2 1 2 0 7 F 9 9 6 9 7 0 4.17 For the network given in Figure 4.50, show how the link-state algorithm builds the routing table for node D.

Step Confirmed Tentative 1 D (0,-) 2 D(0, -) A(8,A) E(2,E) 3 D(0, -), E(2, E) A(8, A), C(3, E), B(4, E) 4 D(0, -), E(2, E), C(3, E) A(6, E), B(4, E), F(9, E) 5 D(0, -), E(2, E), C(3, E), B(4, E) A(6, E), F(9, E) 6 D(0, -), E(2, E), C(3, E), B(4, E), A(6, E) F(9, E) 7 D(0, -), E(2, E), C(3, E), B(4, E), A(6, E), F(9, E) Done 4.20 For the network in Figure 4.50, suppose the forwarding tables are all established as in Exercise 15 and then C-E link fails. Give (a) The tables of A, B, D, and F after C and E have reported the news. (b) The tables of A and D after their next mutual exchange. (c) The table of C after A exchanges with it. (a) A: B C 3 C D E F 9 C B: A C D 4 E F D: A B 4 E C F F:

A 9 C B C 6 C D E (b) A: B 12 D C 3 C D 8 D E 10 D F 9 C D: A 8 A B 4 E C 11 A F 17 A (c) C: A 3 A B 15 A D 11 A E 13 A F 6 F 4.25 Suppose a set of routers all use the split-horizon technique; we consider here under what circumstances it makes a difference if they use poison reverse in addition. (a) Show that poison reverse makes no difference in the evolution of the routing loop in the two examples described in Section 4.2.2, given that the hosts involved use split horizon. (b) Suppose split-horizon routers A and B somehow reach a state in which they forward traffic for a given destination X toward each other. Describe how this situation will evolve with and without the use of poison reverse. (c) Give a sequence of events that leads A and B to a looped states as in (b), even if poison reverse is used. (Hint: Suppose B and A connect through a very slow link. They each reach X through a third nod, C, and simultaneously advertise their routes to each other.) (a). The textbook already explains how poison reverse is not needed when F-G fails. When the A-E

link fails, the following sequence (or something similarly bad) may happen depending on the timing, whether or not poison reverse is used. i. A sends (E, inf) to B. ii. C sends (E, 2) to B. This route is via A. iii. A sends (E, inf) to C. iv. B sends (E, 3) to A. This route is via C. v. C sends (E, inf) to B. vi. A sends (E, 4) to C. This route is via B. vii. B sends (E, inf) to A. viii. C sends (E, 5) to B. This route is via A. ix. A sends (E, inf) to C. x. B sends (E, 6) to A. The oscillation goes on and on like this. (b)without poison reverse, A and B would send each other updates that simply didn t mention X; presumably (this does depend somewhat on implementation) this would mean that the false routes to X would sit there until they eventually aged out. With poison reverse, such a loop would go away on the first table update exchange. (c) 1. B and A each send out announcements of their route to X via C to each other. 2. C announces to A and B that it can no longer reach X; the announcements of step 1 have not yet arrived. 3. B and A receive each others announcements from step 1, and adopt them. 4.40 An organization has a class C network 200.1.1 and wants to form subnets for four departments, with hosts as follows: A 72 hosts B 35 hosts C 20 hosts D 18 hosts There are 145 hosts in all. (a) Give a possible arrangement of subnet masks to make this possible. (b) Suggest what the organization might do if department D grows to 34 hosts. (a) Giving each department a single subnet, the nominal subnet sizes are 27, 26, 25, 25 respectively; we obtain these by rounding up to the nearest power of 2. A possible arrangement of subnet numbers is as follows. Subnet numbers are in binary and represent an initial segment of the bits of the last byte of the IP address; anything to the right of the / represents host bits. The / thus represents the subnet mask. Any individual bit can, by symmetry, be flipped throughout; there are thus several possible bit assignments. A 0/ one subnet bit, with value 0; seven host bits

B 10/ C 110/ D 111/ The essential requirement is that any two distinct subnet numbers remain distinct when the longer one is truncated to the length of the shorter. (b) We have two choices: either assign multiple subnets to single departments, or abandon subnets and buy a bridge. Here is a solution giving A two subnets, of sizes 64 and 32; every other department gets a single subnet of size the next highest power of 2: A 01/ 001/ B 10/ C 000/ D 11/