1 COMP/ELEC 429/556 Fall 2015 Homework #1 Name: _________________________ Email: _________________________ Student ID: _____________________ Assigned 9/24/2015.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Topic 7 Local Area Networks (LAN)
ECE358: Computer Networks Fall 2014
1 Data Networks Summer 2007 Midterm Exam ProblemsPoints Total Name: _________________________ _________________________ Student ID: _____________________.
Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Physical and Link Layers CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
Chapter 5 – Big Picture Dr. V.T. Raja Oregon State University.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
ECE358: Computer Networks Spring 2012
Chapter 2 Network Models.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
COMPUTER NETWORKS.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Computer Networks Layering and Routing Dina Katabi
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
: Data Communication and Computer Networks
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
ICS156 final review Xiaowei Yang. What this course is about  Reinforcing basic networking concepts  Practical networking knowledge  Today Review concepts.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Delivery, Forwarding, and Routing of IP Packets
Link Layer Review CS244A Winter 2008 March 7, 2008 Ben Nham.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Chapter 21 Multicast Routing
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Ch 22. Routing Direct and Indirect Delivery.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Connection-orientated Service. Connection in data networks Another type of network, such as the telephone network, was developed based on the connection.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Networking CS 3470, Section 1 Sarah Diesburg
Networking Devices.
Routing Information Protocol (RIP)
Chapter 4 Data Link Layer Switching
Net431:advanced net services
Intra-Domain Routing Jacob Strauss September 14, 2006.
NT2640 Unit 9 Activity 1 Handout
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
CS4470 Computer Networking Protocols
Protocol layering and data
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
COMP/ELEC 429/556 Fall 2017 Homework #1
COMP/ELEC 429/556 Fall 2017 Homework #2
Protocol layering and data
EE469 Review 1.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

1 COMP/ELEC 429/556 Fall 2015 Homework #1 Name: _________________________ _________________________ Student ID: _____________________ Assigned 9/24/2015 Due 10/8/ :55pm Submit Electronically to Owlspace (Hard deadline, no slip day may be used) This homework is worth 10% of your final grade IMPORTANT: To be completed by each student individually. See syllabus for policy details. Type set your responses either in the space provided in this document or in a separate document. No hand-written responses will be accepted. Notations: K=1,000, M=1,000,000, G=1,000,000,000, 1 byte (B) = 8 bits (b).

22 Problem 1 (20 points) – A student wants to measure as accurately as possible the time it takes to send 1GB, in 10KB chunks, to a remote computer using a SOCK_STREAM socket. To do so, he writes a sender program which contains the following code fragment: There are two fundamental design flaws in this code fragment. One causes the program to sometimes send fewer than 1GB. Another one causes the program to be very inaccurate. Identify these flaws and provide a revised code fragment that removes these flaws. You may find the man pages on CLEAR for the various system calls useful. /* some standard code to create a socket * and to establish a connection */... code omitted... fcntl(send_socket, F_SETFL, O_NONBLOCK); gettimeofday(&start, NULL); for (i=0; i<100000; i++) { chunk = malloc(10000); send(send_socket, chunk, 10000, 0); free(chunk); } gettimeofday(&end, NULL); /* compare start and end to obtain * the elapsed time */

3 Problem 2 (10 points) The weakness of the NRZI bit representation scheme is that a long sequence of 0’s in the input bit stream will cause the electrical signal to contain no voltage transition for a long period of time, thus making it difficult for the receiver to detect clock drifts. One solution to this problem is to translate the input bit stream into an encoded bit stream that eliminates long sequences of 0’s. Design a way to translate every 3-bit sequence in the input bit stream to a 4-bit encoded sequence such that the resulting encoded bit stream is guaranteed to contain no more than 2 consecutive 0’s. Write down your answer in the shaded boxes below. 3-bit input sequence4-bit encoded sequence

4 Problem 3 (20 points) -- Suppose you are designing a multi-access (i.e. broadcast) wired network using CSMA/CD (Carrier Sense Multiple Access/Collision Detect) mechanisms similar to the Ethernet for media access control. Assume that in your design, the network’s link speed is 15Mbps, frame sizes may range from 200 bytes to 2000 bytes. Also assume that data signal propagates on the network link at a speed of 2*10 8 meters per second. (a)To guarantee that a collision is detected, what is the maximum allowable link length (in meters) between any pair of hosts connected to the same link? Show your work. (10 points) (a)State the reasons why broadcast Ethernet, where all hosts on the network share one single channel (i.e. wire) and CSMA/CD (carrier sense multiple access/collision detect) is used to arbitrate media access among the hosts, cannot (1) achieve high goodput when the number of hosts is large, or (2) support hosts spread across a large geographic area. (10 points)

5 Problem 4 (20 points) Consider a bridged Ethernet shown below. There are 4 computers A, B, C, and D in the network. The ports of bridge B6 are labeled p0, p1, p2, p3 respectively. Assume the forwarding tables of all bridges are currently empty. (a) Indicate which ports are blocked by the bridge spanning tree protocol by putting an “X” over the corresponding ports. The bridge IDs are the numeric values. (10 points) (b) With the spanning tree established, suppose A transmits a single packet addressed to B, and C transmits a single packet addressed to D. Explain how the Ethernet bridges forward these packets and how they learn forwarding table entries. Use the space on the next page to write your answer. (7 points) (c) After the transmissions of the two packets have been completed and the network is idle, what is the content of the forwarding table at bridge B6? (3 points) B3 B2 B8 B10 B6 B4 B7 B9 B5 A C B D p0 p1 p2p3

6 (blank page for answer)

7 Problem 5 (10 points): Suppose an IP router using CIDR (Classless Interdomain Routing) has the following initial routing table entries: (a)Identify the table entries that can be aggregated to reduce the table size. (5 points) (b)Show the final routing table entries after aggregation has been performed. (5 points) Entry #Address PatternCIDR MaskNext Hop R R R R R R R3

8 Problem 6 (20 points) One of the main problems with the distance vector routing algorithm is the potential to form a routing loop. (a)Based on the network shown above, describe a sequence of events that will cause a routing loop to form (and thus lead to the count-to-infinity situation). Assume poison reverse is not used. (10 points) (b)Poison reverse is an addition to the basic distance vector routing algorithm. The idea is, if a node X uses node Y as its next hop to get to node Z, then X would advertise a cost of infinity for node Z when sending a distance vector update message to node Y. Do you think poison reserve is sufficient to prevent routing loop? Explain your answer. (10 points) A B CD