ECE 653: Computer Networks Mid Term Exam all

Similar documents
Midterm Exam CSCE 232: Computer Networks Fall Instructions:

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CSE 461: Multiple Access Networks. This Lecture

CSMA/CD (Collision Detection)

CS 3640: Introduction to Networks and Their Applications

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Multiple Access Links and Protocols

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

ECSE 414 Fall 2014 Final Exam Solutions

ECEN 5032 Data Networks Medium Access Control Sublayer

FINAL May 21, minutes

CSE 461: Wireless Networks

Housekeeping. Fall /5 CptS/EE 555 1

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS457 Transport Protocols. CS 457 Fall 2014

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS164 Final Exam Winter 2013

Multiple Access Protocols

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Medium Access Control Sublayer

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Lecture 15 Networking Fundamentals. Today s Plan

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Unit 7 Media Access Control (MAC)

ECE 4450:427/527 - Computer Networks Spring 2017

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

CSCI 466 Midterm Networks Fall 2011

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

ICE 1332/0715 Mobile Computing (Summer, 2008)

EE 122 Fall st Midterm. Professor: Lai Stoica

CSE/EE 461 Section 2

ECE/CSC 570 Section 001. Final test. December 11, 2006

CS 4453 Computer Networks Winter

3201 Computer Networks (Final Exam) (Model Answer)

Link Layer and Ethernet

Outline: Connecting Many Computers

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 12 Multiple Access 12.1

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Chapter 1 : Introduction to Computer Networks

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks (Unit wise Questions)

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

CPE 548 Exam #1 (50 pts) February 17, 2016

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

The Link Layer II: Ethernet

Strengthening Unlicensed Band Wireless Backhaul

Course Introduction. Purpose. Objectives. Content. Learning Time

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

CMPE150 Midterm Solutions

Link Layer and Ethernet

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CSCI Spring Final Exam Solution

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Redes de Computadores. Medium Access Control

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Total /75 xxxxxxxxxx

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

Interface The exit interface a packet will take when destined for a specific network.

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Data Link Layer, Part 3 Medium Access Control. Preface

Communication (III) Kai Huang

COMP/ELEC 429/556 Introduction to Computer Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CSC 4900 Computer Networks: The Link Layer

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

Networks Homework # 2

Data Link Control Protocols

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 4. The Medium Access Control Sublayer

Ethernet. Introduction. CSE 3213 Fall 2011

Links. CS125 - mylinks 1 1/22/14

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Computer and Network Security

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Transcription:

ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers of the OSI reference model and briefly what is the purpose of each one? Why adopt a layered architecture? Physical layer: responsible for delivering raw bits from one node to the next. Data link layer: hop-by-hop reliable frame transmission between transmitter and receiver. The layer is also responsible for error and flow control. Network layer: handles packet routing from source to destination. Transport layer: End-to-end reliable packet delivery. Stream multiplexing and demultiplexing. Flow and congestion control. Session layer: Session management and synchronization. Presentation layer: Syntax and semantics of the information transmitted in the network Application layer: Protocols that are needed by the user applications. The layered architecture is needed in order to hide the complexity of the operations handled by one layer from the rest. In addition it achieves modularity making the architecture independent of the implementation. Finally, it makes it easier to make changes in one layer without affecting the operation of the remaining layers.. What is the advantages and disadvantages of Manchester encoding compared to the simple encoding where ones are represented by +1V and zeros by -1V. Manchester encoding also includes the clock pulses making it much easier to achieve transmitter receiver-synchronization. On the other hand, it requires twice as much bandwidth.. The physical layer transmits a continuous bit stream, while the data link layer segments streams into frames. Why are frames necessary? Frames allow for error control and enable reliable transmission. In case of an error, it is only required to retransmit the damaged frame! 4. What is bit stuffing and how it works? Sometimes, frame delimiters like 01111110 may appear in the body of the message. Bit stuffing is the process of inserting bits in a bit stream so that such bit streams are not confused with the frame delimiters. In this case, after consecutive 1s a zero is inserted by the transmitter and it is thrown out by the receiver. 1

. During the negotiation period, the transmitter and receiver have agreed to use the polynomial 1001 for their CRC code. Suppose that a receiver has received the following frame 11001001010. Should the receiver accept or reject the frame? 1 0 0 1 0 1 0 1 1 0 1 0 1 0 1 1 0 0 1 0 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 0 0 1 The remainder is not equal to zero, thus the packet should be rejected. 6. During a job interview with TMC Ltd (True Mobile Computers), one of the managers is showing you the prototype of their new wireless Ethernet adaptor and he tells you that their R&D team has spent a lot of effort to design a state-of-the-art receiver that consumes extremely low power. He seems very excited with the potential of their new product, however, he is a little concerned because in a couple of experiments the collision detection algorithm did not work very well. During the conversation he mentioned that they have implemented the standard Ethernet CSMA\CD (carrier sense multiple access \ collision detection) and still there are some minor problems. How do you respond assuming that you really want to get the job? CSMA/CD does not work for wireless networks due to the hidden and exposed nodes problem. They should redesign their medium access protocol to include the request to send (RTS) and clear to send messages (CTS). 7. Ethernet is 1-persistent. What does this mean? How does Ethernet handle congestion? Once a node has a frame to transmit, it first senses the channel. If it is idle it starts transmitting. If it is busy, it waits for the station that transmits to finish and immediately after, it starts transmitting (As soon as the channel becomes idle, a node transmits with probability 1). Congestion is handled through the exponential backoff algorithm. After the i-th collision it transmits during any of the next i contention slots with probability -i. 8. What is the minimum frame size of a 1Gbps Ethernet with 7 nodes over a wire that is 00 meters long? Assume that the speed of light in the medium is 6 microseconds per Km. The round trip delay is 6 microseconds. Thus the minimum frame size is 10 9 bps 6 10-6 s= 6Kbits 9. A frame is m bits long and there is a bit error probability p. Suppose we can use an error correcting code that has an overhead of bits and can detect any errors and correct errors of up to 1 bit. What is the probability of a successful transmission? success m ( 1 ) ( ) ( 1 ) + m+ P = p + m+ p p

10. Suppose that a frame is again m bits long with error probability p. Suppose now that an error detection code is used that has an overhead of 1 bit and which can detect any error. Assuming a real time application (no retransmissions) what values of p will justify the error correction of question 9 and what values of p will make error detection more preferable? m 1 For this case, P = ( 1 p ) +. Error correction is justified when success m+ m+ m+ 1 ( p) ( m ) p( p) ( p) ( p) ( m ) p( p) 1 + + 1 > 1 1 + + 1 > 1 + + + + > + + > m + 1 p < m + m + 1 p > m + 1 p p ( m ) p ( m ) p 1 0 ( m 1) p ( m ) p 0 Error detection is justified when 11. Assume a link has a round-trip propagation delay of 100msec. Also, assume an 8Kbps transmitter and a frame with bit sequence numbers. What is the minimum frame size that can guarantee a 0% channel utilization assuming the stop-and-wait protocol? t Let t be the transmission time, then 0. t 100msec t+ 100m > >. If the transmitter is to transmit for 100msec every cycle, then the minimum frame size is 800 bits = 100 bytes. 1. Assume a link has a round-trip propagation delay of 100msec. Also, assume an 8Kbps transmitter and a frame with bit sequence numbers. What is the minimum frame size that can guarantee a 0% channel utilization assuming the go back N protocol? The maximum window can be 7 frames, thus the minimum frame size is 800/7 bits. 1. Assume a link has a round-trip propagation delay of 100msec. Also, assume an 8Kbps transmitter and a frame with bit sequence numbers. What is the minimum frame size that can guarantee a 0% channel utilization assuming the selective repeat protocol? The maximum window can be 4 frames, thus the minimum frame size is 00 bits. 14. Isn t this the most fun exam ever? Of course! 1. Draw the finite state machine for the transmitter of the go back N protocol when the frame sequence number is bits long. Since we have bit long sequence number, the maximum allowable window is. The state represents the sequence number of the unacknowledged packets, for example the state 01 means that the transmitter has sent packets 0, 1 and and it is waiting for the corresponding acknowledgments. Over each transition we write the event that triggers the transition, i.e., either a timeout event (TM OUT) or the reception of an acknowledgement packet (ACK). Finally, under the triggering event we write the action of the transmitter, i.e., send certain packets (Pkt xyz).

TM OUT 0 Pkts 0,1, ACK Pkt ACK Pkt 01 1 ACK Pkts 0,1, Pkts,0,1 ACK 1 Pkts,0 Pkts 0,1 Pkts 1,, ACK 1 Pkt 0 TM OUT 1 Pkts 1,, TM OUT Pkts,1,0 Pkts, ACK Pkts 1, ACK 1 Pkts,,0 01 Pkt 1 ACK 1 0 TM OUT Pkts,,0 16. Draw the finite state machine for the receiver of the go back N protocol when the frame sequence number is bits long. The state of the receiver represents the expected next packet. On top of each transition we write the event that triggered the transition (e.g., arrival of packet 0,, (Pkt x)) and then we write the action taken by the receiver, (e.g., send the right Acknowledgement ACK) Pkt 0 / Pkt 1 / ACK 1 Pkt / Wait Pkt 0 Wait Pkt 1 Wait Pkt Wait Pkt Pkt 0,, Pkt 0,1, ACK 1 Pkt 0,1, Pkt 1,, ACK Pkt / ACK 4

17. For the network shown below, use Dijkstra's algorithm to find the optimal route from A to J. A B C 1 7 E 4 8 F G 6 I 1 D 6 7 H 4 J A B C D E F G H I J A 0 A A A AB A A 7B 9B ABC 4C 4C 9B ABCD 4C 9B 11D ABCDE 8E 1E 7E ABCDEH 8E 1E 1H ABCDEHF 10F 14F 1H ABCDEHFG 1G 1H ABCDEHFGJ 1G ABCDEHFGJI Optimal path is A C E H J with cost 1. 18. Assume the link state algorithm. For the network shown above, what information should A share with the rest of the network? How is this information propagated? A will send the cost of connecting to its immediate neighbors, i.e., it can connect to B with cost, to C with cost and to D with cost. This information will be placed in a packet and will be sent to all other nodes using flooding.

19. Suppose that the table below shows the routing tables at each router. Given these tables, what is the path that a packet that originated at B and destined to I will follow? What is the optimum cost? Also, what is the path that a packet that originated at A and destined to F will follow? Dest A B C D E F G H I C N C N C N C N C N C N C N C N C N A 0 - A A 4 C 4 C 8 E 10 F 7 E 11 H B B 0 - A 6 C B 7 B 9 F 8 E 1 F C C A 0-1 C 1 C E 7 F 4 E 8 H D 4 C 6 A 1 D 0 - C 6 E 8 F E 9 H E 4 C E 1 E C 0-4 E 6 F E 7 H F 8 C 7 F E 6 C 4 F 0 - F 7 E F G 10 C 9 F 7 E 8 C 6 F G 0-9 E 7 F H 7 C 8 E 4 E C H 7 E 9 F 0-4 H I 11 C 1 F 8 E 9 C 7 H I 7 F 4 I 0 - The cost from B to I is 1 and the path goes from B F I The cost from A to G is 10 and the path goes from A C E F G 0. How do you envision the networks of 00? Give me a crystal ball and I will tell you 6