Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.

Slides:



Advertisements
Similar presentations
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Advertisements

CSE331: Introduction to Networks and Security Lecture 8 Fall 2002.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5-1 Internet Protocol (IP): Packet Format, Fragmentation, Options Shivkumar Kalyanaraman Rensselaer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS Time: 75 min (strictly enforced)
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar 1 ECSE-4670: Computer Communication Networks (CCN) Network Layer Shivkumar.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME (1.
Shivkumar KalyanaramanRensselaer Q1-1 Internet Protocols: Quiz 1 q This quiz consists of true/false questions for 25 pts and two quantitative problems.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates performance.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
Introduction to TCP/IP
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) Points: 50 YOUR NAME: Be.
Extending Networks. Three Levels of Extension Physical Layer –Repeaters Link Layer –Bridges –Switches Network –Routers: “Connecting networks”
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates scalability.
Spring 2002CS 4611 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Internetworking: addressing, forwarding, resolution, fragmentation Shivkumar Kalyanaraman Rensselaer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 2 Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 2 True or False? T F  The IP checksum protects the entire IP datagram 
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #03 SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 Time: 75 min (strictly enforced) Points: 50.
 RIP — A distance vector interior routing protocol  IGRP — The Cisco distance vector interior routing protocol (not used nowadays)  OSPF — A link-state.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) [Hint: spend time roughly.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
Computer Communication Networks
Networking CS 3470, Section 1 Sarah Diesburg
Network Layer Protocols
Scaling the Network: The Internet Protocol
CS 457 – Lecture 10 Internetworking and IP
Chapter 9: Subnetting IP Networks
Chapter 9: Subnetting IP Networks
Internetworking Outline Best Effort Service Model
Network Core and QoS.
Chapter 15. Internet Protocol
ECSE-4670: Computer Communication Networks (CCN)
Scaling the Network: The Internet Protocol
Introduction to Networks
ECSE-4670: Computer Communication Networks (CCN)
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
NET 323D: Networks Protocols
Review of Internet Protocols Network Layer
Network Core and QoS.
Presentation transcript:

Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail

Shivkumar KalyanaramanRensselaer Q1-2 True or False? [2.5*10 = 25] T or F [0.5 points ]. Either way, state the correct explanation/reason. [2 pts ]. Right ideas earn partial (or even full) credit.    Cumulative acks are used in TCP because other types of ACKs or NAKs do not work for TCP. No. Because other types of ACKs or NAKs are inefficient in terms of overhead, or providing reliability on the reverse channel.    When a 900-byte packet is fragmented at a link whose MTU = 576 bytes, the fragment offset field in the second fragment is set to 68. No. The offset is set to 552/8 = is the nearest multiple of 8 to = 556.    If variable length subnet masks (VLSM) are used in a network, it means that a single subnet can be configured with multiple masks. No. It means that different subnets can have different length masks.

Shivkumar KalyanaramanRensselaer Q1-3    A layer-2 switch performs better than a bridge because it does forwarding at both layer-2 and layer-3. No. Because it provides multiple parallel paths through a switch fabric. Vanilla bridges do not have such switch fabrics.    Transport protocols must minimally provide error recovery capabilities. No. Transport protocols must minimally provide error detection and port addressing.    Subnet masking is used to solve the internetworking problem of heterogeneity. No. Subnet masking is used to improve efficiency of address allocation.    Statistical multiplexing is useful when traffic is bursty. Yes. Statistical multiplexing is useful when the peak rate significantly exceeds average rate (eg: for bursty traffic)

Shivkumar KalyanaramanRensselaer Q1-4   TCP uses the 2 MSL wait during connection setup to avoid confusion between multiple connection incarnations. Yes. MSL= maximum segment lifetime. 2 MSL wait assures TCP that segments belonging to the earlier incarnation have been flushed from the network.   Telephony does not require ARP because it does not have multiple levels of addresses and runs over point-to-point links. True. ARP is necessary only when there is a “resolution” problem which occurs due to the overlay model of internetworking. Point-to-point links don’t need addresses at the link level.    When the header checksum fails at a router, the IP packet is dropped and an error message is sent to the source. No. IP does not send error messages. And even ICMP does not send error messages for this particular error case.

Shivkumar KalyanaramanRensselaer Q1-5 q [13 pts] Why is classful addressing inefficient ? Explain how subnet masks and VLSMs help to address this problem. Assume that you are given the class B address space and you had to configure 250 subnets with 120 hosts each, and 1000 networks with 30 hosts each. What subnet masks will you use to accomplish this task ? q Classful addressing is inefficient in two ways: q Internal fragmentation: An enterprise will not be able to use all the class B address space because no single network is that large leading to several host numbers being unused q External fragmentation: everyone wants class B addresses, and hence the class C and class A network numbers are unused. q Subnet masks allow sub-division of a class into sub-networks so that each subnet will have fewer host numbers to represent a single broadcast domain. q VLSMs allow a single class to have multiple lengths of subnet masks. This allows each subnet to have exactly the number of bits necessary to number all its hosts.

Shivkumar KalyanaramanRensselaer Q1-6 q For the numerical problem, we have to use 2 subnet masks (VLSMs) within the class B space given to us. q 120 hosts require 7 bits => subnet mask = = 25 bits. q Mask = /25 q 30 hosts require 5 bits => subnet mask = = 27 bits. q Mask = /27

Shivkumar KalyanaramanRensselaer Q1-7 q [12 pts] Explain how IP solves the problems of heterogeneity and scale, and what design tradeoffs does it make in the process. Why is the IP solution better than that provided by bridges ? q Scale: IP provides a new address space with addressing structure and forwarding procedures to distinguish between direct and indirect connected nodes. The two-level forwarding algorithm is supported by scalable routing infrastructure that enables better filtering at the network level leading to scalability. q Heterogeneity: IP is a minimal overlay protocol and with a new address space and packet format and which is mapped to/from lower layer protocols. The minimalism allows simple mapping to a variety of lower layer technologies. Similarly, it provides a minimal (best-effort) interface to the higher layer protocols. The mapping of addresses requires a protocol ARP, and the mapping of the packet format requires fragmentation/reassembly support in IP. q The design tradeoffs are are follows: q The addressing structure leads to address allocation and address space management problems.

Shivkumar KalyanaramanRensselaer Q1-8 q The minimalistic IP design leads to the definition of multiple protocols to provide additional functionality (ARP, TCP, DNS, ICMP, Routing). q The best-effort model means that new adaptive applications must be written to exploit the new infrastructure. q Similarly, special features of lower layers cannot be exploited because of the minimal interface. The performance characteristics of the end-to- end virtual link can vary wildly. q IP solution vs Bridges: q Bridges provide only a single level of forwarding and depend upon flat addresses. This means that their forwarding tables are large and require more updating as the size of the network grows. Moreover, when the bridge does not find an entry, it will flood the network whereas a router sends it on a default route. The table setup is also based upon a rudimentary learning algorithm compared to the sophisticated routing algorithms used at the network layer.