A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

Similar documents
Question A B C D E F Points / 28 / 16 / 21 / 15 / 18 / 2

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

CS 640: Introduction to Computer Networks

Carnegie Mellon Computer Science Department Spring 2005 Final

ECE 158A: Lecture 13. Fall 2015

CSCI 466 Midterm Networks Fall 2011

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Internetwork Basic. Possible causes of LAN traffic congestion are

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Carnegie Mellon Computer Science Department Spring 2016 Midterm Exam

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSE 123: Computer Networks Fall Quarter, 2013 MIDTERM EXAM

EE122 Spring 2001 Final

Homework 3 Discussion

ECE 4450:427/527 - Computer Networks Spring 2017

EECS 122: Introduction to Communication Networks Final Exam Solutions

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Medium Access Protocols

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Summary of MAC protocols

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CSCI Networking Name:

cs144 Midterm Review Fall 2010

Lecture 9: Bridging & Switching"

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CSCI 466 Midterm Networks Fall 2011

CS 640 Lecture 4: 09/11/2014

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

CIS 632 / EEC 687 Mobile Computing

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

COMP 361 Computer Communications Networks. Spring Semester Final Examination Solution Key

Link Layer Review. CS244A Winter 2008 March 7, 2008 Ben Nham

Principles behind data link layer services

ECSE 414 Fall 2014 Final Exam Solutions

Principles behind data link layer services:

Principles behind data link layer services:

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Chapter 9. Ethernet. Part II

Duke University CompSci 356 Midterm Spring 2016

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

===================================================================== Exercises =====================================================================

Networks Fall This exam consists of 10 problems on the following 13 pages.

CSCI Computer Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

UNIVERSITY OF TORONTO ELECTRICAL AND COMPUTER ENGINEERING ECE 361 Test February 2, 2012

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

6.033 Computer System Engineering

CSE 461 Midterm Winter 2018

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

EE122 Midterm Exam UC Berkeley, Spring 1999

Networking Technologies and Applications

CSE 461: Bridging LANs. Last Topic

CSC 4900 Computer Networks: The Link Layer

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

LAN Overview (part 2) Interconnecting LANs - Hubs

CS 43: Computer Networks. 20: The Network Layer November 5, 2018

15-441: Computer Networks Homework 1

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Housekeeping. Fall /5 CptS/EE 555 1

Local Area Network Overview

Putting it all together

Routers: Forwarding EECS 122: Lecture 13

Lecture 8. Network Layer (cont d) Network Layer 1-1

cs/ee 143 Fall

Routers: Forwarding EECS 122: Lecture 13

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

ECE 435 Network Engineering Lecture 12

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Some portions courtesy Srini Seshan or David Wetherall

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Computer Networks CS 552

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

Informal Quiz #01: SOLUTIONS

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Transcription:

Carnegie Mellon Computer Science Department. 15-441 Spring 2010 Midterm Name: Andrew ID: INSTRUCTIONS: There are 10 pages (numbered at the bottom). Make sure you have all of them. Please write your name on this cover and at the top of each page in this booklet except the last. If you find a question ambiguous, be sure to write down any assumptions you make. It is better to partially answer a question than to not attempt it at all. Be clear and concise. Limit your answers to the space provided. A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

A True and False 1. For the following statements, answer if they are true or false. True OR False If we have bandwidth of t Hz, and the noise on the channel is about 1/8th the received signal strength, then it is very reasonable to expect transmission speed of 2t bits per second. True OR False Both Manchester encoding and NRZI can handle long strings of 1 s and long strings of 0 s True OR False UDP is a better choice than TCP for a real time voice application True OR False Modern high speed routers use shared busses to gain benefits from statistical multiplexing. True OR False Modern high speed routers use virtual output queues to avoid head-of-line blocking. 2. A forwarding table for a router in a network using CIDR is given below. Address prefix Next hop 196.94.2.0/24 A 196.94.2.128/25 B 196.94.0.0/16 C 196.94.64.0/18 D 196.76.0.0/14 E 140.0.0.0/8 F 128.0.0.0/2 G 0.0.0.0/1 H State the next hop for the following destination addresses. (a) 139.1.1.1 (b) 196.94.2.100 (c) 196.94.2.200 (d) 196.94.3.100 3. We discussed two different routing techniques: link state routing (LS), and distance vector routing (DV). Please answer the following questions by circling the protocol(s) for which the claim applies: LS, DV - Requires each router to obtain a map of the complete topology LS, DV - Sends its routing table to its neighbors LS, DV - Requires flooding LS, DV - Suffers the count to infinity problem 4. One of the tasks in a router is determining which output port a packet should use. This is done by doing a longest prefix match (LPM) on the IP address of the incoming packet. Among the approaches to doing LPM are: binary trie (B), patricia trie (P), and direct high-radix trie (D). For each statement below circle the type of trie for which the claim applies: B, P, D - Requires the fewest number of lookups to perform LPM. B, P, D - May require backtracking to find the LPM. B, P, D - Uses the least amount of memory. Page 2

5. Suppose you have a client C, a local name server L, and authoritative name servers A root, A com, and A foo.com, where A x is the name server that knows about the name zone x (and A root is a root name server). C wants to lookup the address for www.foo.com. Assuming that all name servers initially have nothing in their cache, which of the following order of events is correct? A. C asks L, L asks A root, A root tells L to ask A com, L asks A com, A com tells L to ask A foo.com, L asks A foo.com, A foo.com answers to L, L answers to C. B. C asks A root, A root tells C to ask A com, C asks A com, A com tells C to ask A foo.com, C asks A foo.com, A foo.com answers to C, C tells L the address. C. C asks L, L asks A root, A root asks A com, A com asks A foo.com, A foo.com answers to C. D. C asks L, L asks A foo.com, A foo.com answers to L, L answers to C. E. C asks L, L asks A root, A root tells L to ask A com, L asks A com, A com tells L to ask A foo.com, L asks A foo.com, A foo.com answers to C. 6. Client C performs a lookup for ftp.foo.com immediately after the previous request. Assuming all records have long TTLs, which of the above order of events is correct? Page 3

B Link Layer: Yesterday and Today 7. Aloha was the first random medium access control protocol. It worked by having nodes transmit whenever they were ready and then wait for an acknowledgment packet from the destination to confirm successful reception. If no acknowledgment was heard within a certain period, the source assumed a collision happened and tried resending after a random delay. The Ethernet protocol, CSMA/CD can be seen as an evolution of the original Aloha design. For each of its two features below, give a very brief explanation of what it is and why it is an improvement over aloha. (a) Carrier sense (b) Collision detection 8. The original Ethernet used 8 bit addresses and even today, LANs rarely have more than a few hundred nodes, so you might think something like 16 bits would be more than sufficient for a physical address. Give one significant reason that Ethernet uses 48 bit physical addresses despite the additional overhead? Page 4

9. Oceanic Airlines has just built a new office on a desert island and you are hired to help design its local area network. The chosen technology is Ethernet, with copper wires for a propagation speed of 1.8 10 8 m/s and a length of 600m. (a) Assuming the employes would be happy with 100 Mbps, how big must your packets be to ensure perfect collision detection? Justify by showing your calculations. (b) Somehow there aren t many clients on a desert island and employees are spending all of their time watching videos on You Tube, so you need to upgrade to 1 Gbps. What are the two ways you can change either the network topology, network protocol, or both to handle this new speed? (c) There is a malfunctioning machine in your 1 Gbps network that thinks the maximum packet size is 100 bits and starts sending packets immediately after seeing the 100th bit of a packet, causing collisions. Your network interface card reports this collision after 700 bits have been sent. Can you identify the malfunctioning node by computing its relative distance to your own machine? Page 5

C BGP relationships Consider the network depicted and answer the questions below. 10. Which paths may packets take between a pair of end-hosts considering Internet economics? Circle valid and invalid for the paths and, if it is invalid, give a short statement why. Valid OR Invalid x1 AS X AS Q AS P AS A a1 why? Valid OR Invalid r1 AS R AS Q AS X x1 why? Valid OR Invalid y1 AS Y AS R AS B AS A a1 why? Valid OR Invalid y1 AS Y AS R AS Q AS P p1 Page 6

why? 11. Suppose AS s Q and R begin fighting (a) Using only BGP, is it possible for AS Q to implement a policy stating that traffic outbound from AS Q should not cross AS R? Why or why not? (b) Using only BGP, is it possible for AS R to implement a policy stating that it doesn t want to carry traffic from Q to AS R s customers? Why or why not? Page 7

D Repeaters, Bridges, Routers and Tunneling 12. In the above topology, Hn represents a host machine and A, B, C, D are repeaters/bridges/routers. The edges represent Ethernet cabling between the devices. (a) Suppose A, B, C and D are repeaters (hubs). Assuming that the sender does not hear the packet it sends, list the hosts that can overhear a packet sent from H1 destined to H4. (b) If A is a switch (learning bridge) which knows where the hosts are (i.e. has a filled in bridging table), and B, C and D are repeaters (hubs), list the hosts that can overhear a packet sent from H1 destined to H4. (c) If A, B, C and D are learning bridges which know about the hosts locations, which hosts can hear the packet from H1 to H4? Page 8

13. For this question, we use the following notation. The IP address and link-layer address of a node is IP- <name> and MAC-<name> (e.g. IP-H1 is the IP address of H1 and MAC-A is the link-layer address of A). In a setting where A, B, C and D are all hubs, the table below shows the headers for a packet sent from H1 to H4 as it traverses the link B-A. Answer the remaining questions using the same notation. Header Type Src Addr Dest Addr link-layer MAC-H1 MAC-H4 IP IP-H1 IP-H4 (a) In a setting where A is a switch and B, C and D are repeaters (hubs), show the network and link-layer headers for the packet sent from H1 to H4 (outermost header first) as it traverses link B-A. Header Type Src Addr Dest Addr link-layer MAC-H1 MAC-H4 IP IP-H1 IP-H4 (b) Suppose A, B, C and D are routers. show the network and link-layer headers for a packet sent from H1 to H4 (outermost header first) as it traverses link B-A. Header Type Src Addr Dest Addr link-layer MAC-B MAC-A IP IP-H1 IP-H4 (c) Suppose A, B, C and D are routers, and there is an IP-in-IP tunnel from B to C. Show all network and link-layer header(s) for a packet sent from H1 to H4 (outermost header first) as it traverses link B-A. (hint: remember to show any encapsulated headers) Header Type Src Addr Dest Addr link-layer MAC-B MAC-A IP IP-B IP-C IP IP-H1 IP-H4 Page 9

The End Phew! E 3 Free Points for Tearing Off Page: Anonymous Feeback List one thing you liked about the class and would like to see more of or see continued (any topic - lectures, homework, projects, bboards, topics covered or not covered, etc., etc.): List one thing you would like to have changed or have improved about the class: Page 10