EE122 Spring 2001 Final

Similar documents
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

There are 10 questions in total. Please write your SID on each page.

INSTRUCTIONS TO CANDIDATES

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

EECS 122: Introduction to Communication Networks Final Exam Solutions

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

The Network Layer and Routers

CS610- Computer Network Solved Subjective From Midterm Papers

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

cs/ee 143 Communication Networks

CSCI 466 Midterm Networks Fall 2011

Module 15: Network Structures

===================================================================== Exercises =====================================================================

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences

What is the difference between unicast and multicast? (P# 114)

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

ICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing

Module 16: Distributed System Structures

Outline: Connecting Many Computers

TOC: Switching & Forwarding

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

CSCI 466 Midterm Networks Fall 2011

Networks Fall This exam consists of 10 problems on the following 13 pages.

TERM EXAMS CS610- COMPUTER NETWORKS

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

CMSC 332 Computer Networks Network Layer

Principles behind data link layer services:

CCNA MCQS with Answers Set-1

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

TOC: Switching & Forwarding

Defining the Internet

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

CSC 4900 Computer Networks: The Link Layer

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

Cisco IOS Switching Paths Overview

Data Link Layer, Part 3 Medium Access Control. Preface

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CSCI Networking Name:

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

SYED AMMAL ENGINEERING COLLEGE

Data Link Layer, Part 5. Medium Access Control

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Network Architecture

Chapter 4 Network Layer

Duke University CompSci 356 Midterm Spring 2016

Lecture 8. Network Layer (cont d) Network Layer 1-1

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

Distributed Queue Dual Bus

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

VU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012

ECE 650 Systems Programming & Engineering. Spring 2018

Imi :... Data:... Nazwisko:... Stron:...

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Cisco Cisco Certified Network Associate (CCNA)

More on LANS. LAN Wiring, Interface

Computer Science 461 Final Exam May 22, :30-3:30pm

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

CSCI Spring Final Exam Solution

CS164 Final Exam Winter 2013

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Chapter 18. Introduction to Network Layer

Second Midterm Exam Solution CMPSCI 591 and 453: Computer Networks Spring 2005 Prof. Jim Kurose

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS APRIL 2015 EXAMINERS REPORT

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Unit 09 Computer Networks

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

Module 15: Network Structures

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

I Communication Networks A First Course

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Applications/Design. Example. Locating Resource. End-to-end. Connection UCB. Applications EECS 122

Virtual Link Layer : Fundamentals of Computer Networks Bill Nace

HW3 and Quiz. P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) TCP), 20 mins

TOC: Switching & Forwarding

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

Virtual Link Layer : Fundamentals of Computer Networks Bill Nace

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

CSC 401 Data and Computer Communications Networks

Example questions for the Final Exam, part A

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

19: Networking. Networking Hardware. Mark Handley

Transcription:

EE122 Spring 2001 Final 1: True or False [20%] 1. Light in a fiber travels faster than signals in copper. 2. Block coding can achieve a higher compression than Huffman codes. 3. Layer 2 switching cannot be used for a large network because CSMA/CD is inefficient. 4. IP routers implement Go Back N to retransmit erroneous or missing packets. 5. DHCP improves the utilization of the IP address space. 6. In public key cryptography, the encryption and decryption are numerically simpler than in private key cryptography. 7. In the Internet, routers do not modify the IP source address and the IP destination address (unless they implement a tunnel). 8. DVMRP routers multicast packet along the shortest tree from the source to the destinations. 9. ADSL transports IP packets as ATM frames from the DSL modem to the IP router. 10. RED attempts to improve TCP by reducing the synchronization of connections. 2: Multiple Choice [20%] 1. [2%] The capacity of a telephone line with a bandwidth of 1MHz is a. 0.5 Mbps b. 2 Mbps c. 1 Mbps d. an increasing function of the SNR. 2. [3%] The transmission control protocol TCP performs the following tasks: a. Flow control b. Congestion control c. Error control d. Routing optimization e. ARP f. DNS lookup file:///c /Documents%20and%20Settings/Jason%20Rafte...2%20-%20Spring%202001%20-%20Walrand%20-%20Final.htm (1 of 5)1/27/2007 4:25:19 PM

3. [2%] Packets with an average length of 1000 bits arrive at an average rate of 800 packets per second at a queue served by a 1-Mbps link. The M/M/1 model predicts an average delay per packet through the queue equal to a. 10 ms b. 1 ms c. 5 ms d. 8 ms e. None of the above 4. [3%] Consider two queues served in the proportions 20% and 80% (respectively) using deficit round robin by a 10- Mbps link. Assume that the arrival rates at the two queues are 6Mbps and 18Mbps, respectively. The average service rates of the two queues are as follows: a. 2Mbps and 8Mbps b. 2.5Mbps and 7.5Mbps c. 5Mbps and 5Mbps d. None of the above. 5. [2%] The address resolution protocol performs the following task(s): a. Translate Name into IP address b. Translate MAC address into IP address c. Translate IP address into Name d. Translate IP address into MAC address e. Look up the port that corresponds to a given destination address 6. [2%] When using CIDR, the router performs the next-hop lookup using a. OSPF b. BGP c. A longest matching prefix search d. Huffman coding algorithm 7. [2%] In an Ethernet with a hub, a. the nodes share a collision domain b. collisions are avoided by a reservation protocol c. collisions are avoided by a learning algorithm d. collisions are resolved by delayed retransmissions e. the hub prevents collisions by granting slots 8. [2%] When Alice sends a message to Bob, a possible digital signature scheme is as follows: a. Using public key cryptography, Alice can encrypt using her decryption rule b. Using public key cryptography, Alice can encrypt using Bob's encryption rule c. Using public key cryptography, Alice can encrypt using bob's decryption rule d. Using public key cryptography, Alice can encrypt using her encryption rule file:///c /Documents%20and%20Settings/Jason%20Rafte...2%20-%20Spring%202001%20-%20Walrand%20-%20Final.htm (2 of 5)1/27/2007 4:25:19 PM

9. [2%] The objective of the additive-increase, multiplicative-decrease algorithm of TCP is to a. Make sure that every packet is received exactly once b. Share the network links fairly among the TCP connections c. Avoiding packet losses in routers d. Avoiding packet losses in the host 3. Problem [20%] Consider the network below a. [3%] Fill in the following table: Port Number 1 2 Learned Addresses for that Port file:///c /Documents%20and%20Settings/Jason%20Rafte...2%20-%20Spring%202001%20-%20Walrand%20-%20Final.htm (3 of 5)1/27/2007 4:25:19 PM

b. [2%] Specify the routing table of the router. 3 c. [5%] consider a packet that goes from N1.h3 to N3.h2. Indicate the headers [EDA ESA IPSA IPDA] of the packet on the four links a, b, c, d: Link a b c d [EDA ESA IPSA IPDA] d. [10%] Assume that all the links are 10Mbps and are full-duplex at the switch. Assume also that each node wants to send R Mbps to every other node. Thus, N1.h2 wants to send R Mbps to N1.h3, and R Mbps to N1.h4, and R Mbps to N1.h5, and R Mbps to N3.h2. Similarly, N1.h3 wants to send R Mbps to each of N1.h2, N1.h4, N1.h5, and N3. h2, and similarly for all the nodes. Assuem that the shared Ethernet (with the hub) is 60% efficient and that the switched Ethernet is 100% efficient. Find the maximum possible value of R. (Show your work.) 4. Problem [15%] In the network below, all the links are bi-directional 10-Mbps links. The circles represent MPLS routers and the squares are hosts. We use MPLS to set up a normal and backup paths between pairs of hosts. The objective of these paths is to enable every pair of hosts to exchange information at R Mbps, even in the event of a single failure of a link between the MPLS routers. Describe a choice of normal and backup paths that corespond to the largest possible value of R and determine that value. Show your work. file:///c /Documents%20and%20Settings/Jason%20Rafte...2%20-%20Spring%202001%20-%20Walrand%20-%20Final.htm (4 of 5)1/27/2007 4:25:19 PM

5. Problem [15%] Consider a connection from host A to host B that goes through a single router R. The link from B to A is lossless and infinitely fast and has a propagation time of 50ms. the link from R to B is lossless, infinitely fast, and has zero propagation time. the link from A to R transmits at 1Gbps, is lossless, and has a propagation time of 50ms. The packets all are 1000- bits long. The connection uses Go Back N with a window of a fixed size equal to N. Determine the average rate of packet transmissions from A to B as a function of N. Give the values of that average rate for N=1, N=10, and N=1000. show your work. [Hint: Draw a timing diagram.] 6. Problem [10%] The optical network below uses burst switching. Assume that the switching time of the optical switch is 1ms. The system operates by connecting the switch to a queue 1 for S seconds, then switching it over to queue 2 for S seconds, and so on. While a queue is not attached to the outgoing link, it stores the incoming bits. Assume that the two links a and b have constant bit rate streams of R Mbps each. Find the maximum value of R as a function of the maximum latency T through the system (ignoring propagation times and processing times). Show your work. file:///c /Documents%20and%20Settings/Jason%20Rafte...2%20-%20Spring%202001%20-%20Walrand%20-%20Final.htm (5 of 5)1/27/2007 4:25:19 PM