Computer Communication EDA344, EDA343, DIT 420

Similar documents
CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Course on Computer Communication and Networks. Lecture 16 Synthesis, Summary/flashback and Projection (related topics continuation of study)

Computer Communications DIT 420 EDA343

===================================================================== Exercises =====================================================================

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013

CS164 Final Exam Winter 2013

TDTS06: Computer Networks

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Computer Networks - Midterm

Operating Systems EDA092, DIT 400 Exam

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

TDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014

Homework 3 50 points. 1. Computing TCP's RTT and timeout values (10 points)

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

EECS 3214 Final Exam Winter 2017 April 19, 2017 Instructor: S. Datta. 3. You have 180 minutes to complete the exam. Use your time judiciously.

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Lecture 14 Summary - flashback

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Expected Time: 90 min PART-A Max Marks: 42

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

Student ID: CS457: Computer Networking Date: 3/20/2007 Name:

Computer Networks - Midterm

Networks Fall This exam consists of 10 problems on the following 13 pages.

PLEASE READ CAREFULLY BEFORE YOU START

FINAL Tuesday, 20 th May 2008

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.

Sirindhorn International Institute of Technology Thammasat University

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

PLEASE WRITE NEATLY I need to be able to read your answers! (seemingly encrypted solutions can not be decrypted!)

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

PLEASE READ CAREFULLY BEFORE YOU START

Final Exam for ECE374 05/03/12 Solution!!

FINAL Wednesday, 30 th July 2008

EECS 122: Introduction to Communication Networks Final Exam Solutions

CS244a: An Introduction to Computer Networks

FINAL May 21, minutes

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

ETSF10 Internet Protocols Network Layer Protocols

PLEASE READ CAREFULLY BEFORE YOU START

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Sirindhorn International Institute of Technology Thammasat University

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours

cs/ee 143 Communication Networks

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

Question Points Score total 100

Name: Personnr: Include this page with your answers

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

Computer Science 461 Midterm Exam March 14, :00-10:50am

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Solution to Question 1: ``Quickies'' (25 points, 15 minutes)

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4!

EXAM TCP/IP NETWORKING Duration: 3 hours

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

1. (10 points): For each of the following, choose exactly one best answer.

Date: June 4 th a t 1 4:00 1 7:00

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions

MOCK EXAMINATION. Computer Networks

MID II Tuesday, 1 st April 2008

Your Name: Your student ID number:

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Computer Science 461 Final Exam May 22, :30-3:30pm

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Data Communication & Networks Final Exam (Fall 2008) Page 1 / 13. Course Instructors: Engr. Waleed Ejaz. Marks Obtained Marks

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: Fall 2003

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences

EE-311 Data Communication & Networks

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

ETSF10 Internet Protocols Transport Layer Protocols

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM

Lecture 15 Networking Fundamentals. Today s Plan

Name: Personnr: Course: [ ] 1DT131 (DV, 4p) [ ] 1DT633 (MN, 5p)

Written examination in TDTS06 Computer Networks at 8 12

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

Mid Sweden University Dept. of IT and Media (ITM) Magnus Eriksson Tel , Jan 2009.

PLEASE READ CAREFULLY BEFORE YOU START

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

AN exam March

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Course on Computer Communication and Networks. Lecture 16 Synthesis, Summary/flashback and Projection (related topics continuation of study)

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

CMPE150 Midterm Solutions

EC441 Midterm Two Fall 2017

Duke University CompSci 356 Midterm Spring 2016

UNIT IV -- TRANSPORT LAYER

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

Midterm Review. EECS 489 Computer Networks Z. Morley Mao Monday Feb 19, 2007

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Data Communication Networks Final

Transcription:

CTH, GU Computer Science and Engineering Computer Communication EDA344, EDA343, DIT 420 Time and Place: Wednesday 16 March, 2016, 14.00-18.00 M Course Responsible: Marina Papatriantafilou (Tel: 772 5413), Ali Salehson (Tel 772 5746) Allowed material: - English-X (X can be French, German, Swedish, etc) dictionary - No other books, no notes, no calculators, no electronic devices. Grading: CTH students registered for the EDA344 or EDA343 course, 7.5 hp: 3: 30-40 p, 4: 41-50 p, 5: 51-60 p GU (DIT 420): Godkänd 30-44, Väl godkänd 45-60 p Instructions Write clearly your course-code (EDA344/EDA343/DIT420) Start answering each assignment on a new page; use only one side of each sheet of paper; please sort the sheets according to the question-ordering and number them. Write in a clear manner and motivate (explain, justify) your answers. If it is not clear what is written for some answer, it will be considered wrong. If some answer is not explained/justified, it will get significantly lower marking. If you make any assumptions in answering any item, do not forget to clearly state what you assume. A good rule-of-thumb for the extend of detail to provide, is to include enough information/explanation so that a person, whose knowledge on computer communication is at the level of our introductory lecture, can understand. Please answer in English, if possible. If you have large difficulty with that (with all or some of the questions) and you think that your grade might be affected, feel-free to write in Swedish. Results, inspection of exam: Monday April 4, 12.00-13.00, room 5128 (EDIT building, west wing) Good Luck!!! Lycka till!!!!

1. General questions and applications (12 p) (a) (2p) Consider sending a packet from a source to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these are constant and which are variable? (b) (5p) Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; this incurs an RTT (Round-trip-time )of D1 per DNS. Suppose also that the Web page associated with the link contains m very small objects. Suppose the HTTP running is nonpersistent and let D2 denote the RTT between the local host and the server for each object. Assuming zero transmission time of each object, how much time elapses from when the client clicks on the link until the client receives all the objects? Consider (i) Nonpersistent HTTP with no parallel TCP connections. (ii) Nonpersistent HTTP with the browser configured for m parallel connections? (c) (5p) A popular social network site can become overwhelmed if it has only one server handling all its requests. How is this tackled in practice? Explain carefully, including both end-server approaches and network-infrastructure-based approaches. Answer hints - Transmission, propagation, queuing, processing: cf slides chapter Introduction, section 1.4 - cf excercise session for chapter 2, Applications - From lecture on multimedia and p2p networking: overlays, data-centers, CDN infrastructures with DNS support. It replicates to proxy servers, or CDNs. DSN is needed to translate the addresses appropriately 2. Transport layer, reliable data transfer and congestion control(12p) (a) (4p) In reliable data transfer methods, why are sequence numbers needed when retransmissions can occur due to timeouts? Explain what can go wrong without them and illustrate that with a figure. (b) (4p) (i) What is end-to-end and what network-assisted congestion control? Which of the two types is applied in the Internet? (ii) What is the basic assumption for TCP s congestion control? (c) (4p) Consider a pipelined protocol for reliable data transfer between two hosts (for simplicity we assume that they are directly connected with each other). Show how to compute the sending window size in order to have effective throughput greater than 0.8 10 9 bits/sec, supposing that the packet size is 1200 bytes, that transmission rate is 10 9 bits/sec and the one-way propagation delay is 20 msec. Make sure to also use a space-time diagram in your answer. HINTS - If not, same packet can be percieved for another one (a retransmitted one, cf section 3.4) even in the simple stop-and-wait protocol - Section 3.6; slide 33 in lecture 5-chapter3B; Internet has TCP s end-to-end CC; assumes that loss/long delays are mainly due to congestion 1

- Similar ex. done in exercise session for chapter 3, reliable data transfer and pielined protocols 3. Data Link Layer and Wireless (12p) (a) (5p) Consider partitioning-based methods and random access methods for medium access: (i) Explain in which cases the former can be preferable over the latter and vice-versa. (ii) Describe one method from each of these types and comment on its properties with respect to the previous question. (b) (2p) Explain the differences between link layer switches and network-layer routers. (c) (2p) Each host and router has an ARP (Address Resolution Protocol) table in its memory. What are the contents of this table? (d) (3p) Describe the indirect method for routing to mobile hosts; draw a figure explaining how it works in mobile IP or GSM networks. HINTS - (i) continuous load from all users, known set of users: the former is better; dynamic set of users, uneven load, light load: the latter better; (ii) e.g. TDMA/FDMA, ALOHA/CSMA; description details in the book, section 5.3 - In book, ch 5.4; selective forwrading vs optimized routing - Mapping from IP addr to MAC addr in the same LAN, cf section 5.4 or even 6.3. - when host is at another cell (not home), route to host through home mobile switching-center/base-station, slides 49, 62 lecture 10, sections 6.5-6.7 4. Network core and routing (12 p) (a) (8p: 2+4+2) The figure is showing the topology of an IP network, which consists of eight nodes (routers) marked with s, t, u, v, w, x, y and z. The nodes are connected to each other by links shown in the figure, where the numbers beside indicate the current link costs. The following sub-questions are about the routing algorithms used by common routing protocols within an autonomous system. (i) Which information is advertised as link-state? Describe the content of such information when used by Internet routing protocols. (ii) Suppose that routing between nodes in the above figure is based on the link-state approach. Use Dijkstra s algorithm only, (no other methods) to find out the shortest path (with minimal cost) from node v to every other node in the network. Present your results with a table and according to the algorithm, step by step until the final solution. (iii) Make use of the results from the above questions to construct the routing table for node v. (b) (4p) It has become usual that a home network connecting many devices through a home router, can provide Internet access using only one global address. However, the devices (laptops, smart phones, etc.) will be configured with private IPv4 addresses and can have access to the Internet simultaneously. Describe clearly how this is possible and how it works in practice so that the devices will be able to have access to the Internet at the same time. 2

HINT - cf appendix - section 4.4.2 5. Media-streaming and Security-related topics (12 p) (a) (4p) Symmetric and asymmetric encryption methods are two different categories of encryption systems. Explain (with a figure) the principles of asymmetric encryption. Why are both encryption methods needed in networking? (b) (2p) In implementing video streaming applications, why can TCP-based streaming be prefered compared to UDP-based streaming? (c) (4p) What is FEC (Forward Error Correction)? Describe a method to achieve that. (d) (2p) Explain the role of playout delay in taking care of jitter in media-streaming traffic. HINT - Figure 8.6 (or slide 8-19). Symmetric encryption is much faster then asymmetric encryption, however asymmetric encryption solves the key distribution problem of symmetric encryption. - Security issues (large number of UDP segments might not go through firewalls). - Non-ack-based; eg methods slides 13-14 lecture 11, section 7.3 - Extra delay added at receiver to (in combination with buffering) adjust playtime, in order to "play" packets at the desired rate (rather than the rate of arrival, which contains jitter); section 7.3 3

Appendix 4

Exam DIT420/EDA344/EDA343 Vt 2016 4. Routing 12p 4a) (2 + 4 + 2) points Refer to sub-section 4.5.1 of the text book (i) link state is the information about the node s identity, neighbor routers, status, type and cost of each active directly-connected link. (ii) Results of computation according to Dijkstra s algorithm: Steg N D(s),p(s) D(t),p(t) D(u),p(u) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 v 3,v 1,v 1,v 1 vx 3,v ---- 1,v 3,x 2 vxy 3,y 3,v ---- 3,x 3 vxyw 3,y 6,w ---- 3,x 4 vxywz 3,y 6,w ---- 5 vxywzt 6,t ---- 5,t 6 vxywztu 6,t ---- 7 vxywztus ---- (iii) Based on results from (ii) Routing table of nod v : Destination Next hop Cost s y 6 t y 3 u y 5 w v 3 x v 1 y v 1 z x 3 Page 1

Exam DIT420/EDA344/EDA343 Vt 2016 Graf: node v is rot: 4b) (4) points Refer to sub-section 4.4.2 of the text book The private addresses may be used and reused within private network. Packets with private addresses (source or destination) must not be routed to the global Internet. The routers ensure blocking forwarding such packets to the Internet otherwise a router using NAT has to translate addresses into global addresses. Home-network devices are usually assigned IP addresses from a private CIDR address block (e.g. 192.168.0.0/24). Home router reserves the first available address of its own interface to the local network and thus this becomes an internal "default gateway". Home computers communicate directly with this interface to send and receive IP packets to and from the Internet. The home router will be typically assigned a global address of the second interface connected to the ISP towards the Internet. The home router will be using the NAT function to replace the private source address of each outgoing packet with its own global address and replace the source port number with a NAT-port number. This translation is repeated for all packets coming from the same source address with the same source port number. NAT function stores this information (source address and source port number + NAT port number) and creates a table to be used to be used also in the opposite direction when the incoming packet addressed to the home router (which really should be to the computers on your home network) re-directed and forwarded to the local network. With more port numbers, NAT can translate packets from more devices simultaneously and keep track of the translations using the NAT-table. Page 2