1 Data Networks Summer 2007 Midterm Exam ProblemsPoints 1 2 3 4 5 Total Name: _________________________ Email: _________________________ Student ID: _____________________.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

Primitives for Achieving Reliability 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London.
Communication Networks Recitation 3 Bridges & Spanning trees.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Hui Zhang, Fall Computer Networking TCP Enhancements.
Copyright 2008 Kenneth M. Chipps Ph.D. Cisco CCNA Exploration CCNA 2 Routing Protocols and Concepts Chapter 4 Distance Vector Routing Protocols.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.
What is Flow Control ? Flow Control determines how a network resources, such as channel bandwidth, buffer capacity and control state are allocated to packet.
1 Switching and Forwarding Bridges and Extended LANs.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Problems.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Process-to-Process Delivery:
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
Distance Vector Routing Protocols W.lilakiatsakun.
Packet-Switching Networks Routing in Packet Networks.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Mobile Adhoc Network: Routing Protocol:AODV
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Wireless TCP Prasun Dewan Department of Computer Science University of North Carolina
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
1 COMP/ELEC 429/556 Fall 2015 Homework #1 Name: _________________________ _________________________ Student ID: _____________________ Assigned 9/24/2015.
CS244A Midterm Review Ben Nham Some slides derived from: David Erickson (2007) Paul Tarjan (2007)
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Protocol Layering Chapter 11.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Instructor & Todd Lammle
Getting Connected (Chapter 2 Part 3)
(How the routers’ tables are filled in)
Routing Information Protocol (RIP)
ECE 544 Protocol Design Project 2016
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
THE NETWORK LAYER.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Transport Layer Unit 5.
ECE 544 Protocol Design Project 2016
Dynamic Routing Protocols part2
Routing in Packet Networks Shortest Path Routing
Chapter 20 Network Layer: Internet Protocol
Process-to-Process Delivery:
Getting Connected (Chapter 2 Part 3)
COMP/ELEC 429/556 Fall 2017 Homework #1
COMP/ELEC 429/556 Fall 2017 Homework #2
Presentation transcript:

1 Data Networks Summer 2007 Midterm Exam ProblemsPoints Total Name: _________________________ _________________________ Student ID: _____________________

2 1 (20 points) Circuit switching vs datagram packet switching. (a)State two reasons why circuit switching can provide more predictable communication performance than datagram packet switching. (6 points) (b)Assume you wish to transfer an n-byte file along a path composed of the source, destination, 3 point-to-point links, and 2 switches. Suppose each link has a propagation delay of 20 ms, bandwidth of 2 Mbps, and that the switches support both circuit and datagram packet switching. Thus you can either break the file up into 1 KB packets, or set up a circuit through the switches and send the file as one contiguous bit stream. Suppose that packets have 24 bytes of packet header information and 1000 bytes of payload, that store-and-forward packet processing at each switch incurs a 1 ms delay after the packet has been completely received, that packets may be sent continuously without waiting for acknowledgements, and that circuit setup requires a 1 KB message to make one round- trip on the path incurring a 1 ms delay at each switch after the message has been completely received, and the delay at the destination is zero. Assume switches introduce no delay to data traversing a circuit. You should ignore the circuit teardown. You may also assume that file size is a multiple of 1000 bytes. For what file size n bytes is the total latency incurred before the entire file arrives at the destination less for circuits than for packets? (14 points) For packet, total transmission time is: Tp = (n/1000) * (1024*8/2M) + 3*20ms + 2*(1ms *8/2M) = n*4.096u ms For circuit: Tc = (3*1000*8/2M + 3*20ms + 2*1ms)*2 + (n/1000) * (1000*8/2M) + 3 * 20ms = 208ms + n*4u So, for Tc < Tp, n*4u+ 208ms < n*4.096u ms n > MB Guaranteed bandwidth or time slot, fixed network path.

3 2 (20 points) Broadcast and switched Ethernet. (a)State two reasons why broadcast Ethernet, where all hosts on the network share one single channel (i.e. wire) and CSMA/CD (carrier sense multiple access/collision detect) is used to arbitrate media access among the hosts, cannot support a large number of hosts spread across a large geographic area. (6 points) (b)A network based on Ethernet bridges (i.e. a switched Ethernet) does not use any routing protocol like distance vector or link-state to compute forwarding tables at the Ethernet bridges. Instead it uses two primitives: flooding and address learning. Briefly explain how these two mechanisms work together to let Ethernet bridges create forwarding tables. You may assume that the network has a tree topology. (14 points) If a bridge doesn’t know the destination address, flood packet, packet will reach destination. Each bridge notices the incoming port for each source address in the flooded packets and caches the port for subsequent forwarding to the previously seen source address. (1)To implement collision detection correctly, the maximum propagation delay of the network must be limited and related to the minimum packet size, thus as the physical length of the network increase, the minimum packet size must also increase, leading to inefficiency when sending small messages. (2)Since the medium is shared and has a limited bandwidth/capacity, performance will be very poor when a large number of hosts are sharing the medium.

4 3 (20 points) IP forwarding table aggregation. (a)Because IP packet forwarding is based on longest prefix matching of the packet destination address against forwarding table entries, it is possible to have redundant entries in the forwarding table. Forwarding table aggregation is a technique used to combine redundant entries to reduce the size of the forwarding table. In a few sentences, describe under what conditions two table entries can be combined and what the combined entry should contain. (10 points) (b)Perform forwarding table aggregation on the following IP forwarding table and write down the final table contents after all possible aggregations have been performed. Note that you may or may not receive any partial credit in this part if your answer to part (a) is incorrect. (10 points) Entry #Address PatternMaskNext Hop R R R R R R R3 (1)Both table entries have the same next hop output. (2)One entry’s address prefix defines an address space that is a superset of the other entry’s address space (3)The combined entry should contain the address pattern and the mask of the original entry that is the superset and the same next hop output Entries 1, 6 can be aggregated, so can entries 3, 4. Entry #Address PatternCIDR MaskNext Hop R R R R R3 Aggregated entries

5 4 (20 points) Consider the simple network in the figure below, in which A and B exchange distance-vector routing information. All links have cost 1. Suppose the distance vector routing information has already converged, and now the A-E link fails. (a)Give a sequence of routing table updates that leads to a routing loop between A and B. (8 points) (b)Describe an addition to the basic distance-vector routing algorithm that will prevent the problem identified in (a). Show how it solves the problem in this specific case. (6 points) (c)Describe a generalization of the distance-vector routing algorithm that avoids the problem identified in (a) regardless of the network topology. (6 points) E E A A B B DestCostNext B1B E1E DestCostNext A1A E2A Node A Node B time A-E fails DestCostNext B1B Einfty- DestCostNext B1B E3B DestCostNext B1B E3E DestCostNext A1A E2A DestCostNext A1A E2A DestCostNext A1A E4A Split horizon, with or without poison reverse, eliminates the problem in this case. With split horizon, a node does not advertise a route to the node that it uses as a next hop to a given destination. With poison reverse, a node advertises a cost of infinity to the node that it uses as a next hop to a given destination. A path-vector algorithm eliminates the problem in any topology. With path-vector, nodes advertise the full path, thus allowing all nodes to check for routing loops.

6 5 (20 points) Sliding window based retransmission protocols. (a)In the stop and go protocol (i.e. the sliding window size is one packet), what is the minimum number of bits required to encode the sequence number for the protocol to work correctly? (3 points) (b)If sequence number is not used, the resulting “broken” stop and go protocol may fail to transfer data correctly. Describe a specific scenario that explains the problem of not using sequence number in stop and go. (7 points) (c)Assuming there is never any packet corruption or loss along a network path, therefore retransmission is never needed, what are the two primary factors that determine the overall throughput (in bits per second) of a data transfer using a sliding window protocol? (3 points) (d)State a mathematical formula to describe how the two factors determine the throughput.. (2 points) (e)What problems can arise if the retransmission timeout value is chosen arbitrarily? Be as specific as possible. (5 points) 1 bit Suppose the acknowledgement for the first packet is lost, and the sender retransmits the first packet after a timeout, then the receiver would mistake the retransmitted first packet as the second packet when no sequence number is used. The sliding window size and the round-trip delay. Window size in bits Round trip delay in seconds Throughput = If the RTO is chosen to be smaller than the RTT, then many unnecessary packet retransmission will result and waste network bandwidth. If the RTO is chosen to be much larger than the RTT, then the retransmission of a lost packet will be unnecessarily delayed, leading to poor performance.

7 (Extra work space)

8

9

10 COMP/ELEC 429 Spring 2006 Midterm Exam Exam instructions: 1.Once you open this exam, you have exactly 1.5 contiguous hour to work on the exam. It is your responsibility to time yourself and stop after 1.5 hour. No time credit for breaks allowed. 2.This exam is closed books, closed notes, closed computers. You must work on this exam on your own. 3.You are allowed to use a hand-held calculator for doing arithmetic. 4.You may not ask the instructors questions during the exam. The exam has been designed to eliminate ambiguities. When absolutely necessary, state your assumptions and proceed. 5.Be sure to fill out the front page with your name, address, student ID number, and the time you started and finished the exam. 6.Sign the pledge in the space provided. 7.Notation: K=1000, M= , G= , 1 byte (B) = 8 bits (b). 8.You may use the reverse side of a page to write your answers. The last few pages are scratch sheets you may use. 9.This exam is assigned on 3/2/2006 at 2:20pm. 10.This exam is due on 3/9/2006 at 1:00pm at Duncan Hall room Late exam turn-in will not be accepted. Early turn-in can be submitted to DH This exam accounts for 15% of your final grade. 12.Points assigned to each problem roughly corresponds to the problem’s difficulty. 13.Be sure to show your work appropriately. 14.You should write all your answers in this provided exam, and only attach additional sheets of paper if necessary.