• No results found

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

N/A
N/A
Protected

Academic year: 2021

Share "EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

EINDHOVEN UNIVERSITY OF TECHNOLOGY

Department of Mathematics and Computer Science

Examination Computer Networks (2IC15) on Monday, June 22nd 2009, 9.00h-12.00h.

First read the entire examination. There are 7 exercises in total. Grades are included between parentheses at all parts and sum up to 11 points. Good luck!

1. (2.0 pt) Network Delay - Consider a server sending a 64 MB audio file to a receiver over a 1Mbps connection using packets of size 1 MB. After a packet is sent, the sender waits until an ACK packet of size 8 bytes is received before a new packet can be sent (no pipelining). Find the latency of the connection if the data transfer lasts 10 minutes in total. Assume that the packet processing delays (tproc) at the sender and the receiver are

negligible. Answer

(2)

Total transmission time is:

T = MP (ttran1+ tprop+ tproc−rec+ ttran2+ tprop+ tproc−tran)

= MP(PR + 2 × tprop+ tproc−tran+AR + tproc−rec)

latency = ttran1+ tprop

Neglecting both processing delays, latency = (P −A)M +P T R2RM = 8.6874s

2. Transmission Control Protocol (TCP)- Consider the following plot of TCP window size as a function of time.

Assuming TCP Reno is the protocol experiencing the behavior shown above, answer the following questions. In all cases, you should provide a short discussion justifying your answer.

(a) (0.2 pt) Identify the intervals of time when TCP slow start is operating. Answer TCP slowstart is operating in the intervals [1,6] and [23,26]

(b) (0.2 pt) Identify the intervals of time when TCP congestion avoidance is operating. Answer TCP congestion advoidance is operating in the intervals [6,16] and [17,22] (c) (0.2 pt) After the 16th transmission round, is segment loss detected by a triple

dupli-cate ACK or by a timeout?

Answer After the 16th transmission round, packet loss is recognized by a triple du-plicate ACK. If there was a timeout, the congestion window size would have dropped to 1.

(d) (0.2 pt) After the 22nd transmission round, is segment loss detected by a triple

du-plicate ACK or by a timeout?

Answer After the 22nd transmission round, segment loss is detected due to timeout,

and hence the congestion window size is set to 1.

(3)

(f) (0.3 pt) What is the value of Threshold at the 18th transmission round?

Answer Threshold is set to half the value of the congestion window when packet loss is detected. When loss is detected during transmission round 16, the congestion windows size is 42. Hence the threshold is 21 during the 18th transmission round.

(g) (0.3 pt) During what transmission round is the 70th segment sent?

Answer During the 1st transmission round, packet 1 is sent; packet 2-3 are sent in the 2nd transmission round; packets 4-7 are sent in the 3rd transmission round;

packets 8-15 are sent in the 4th transmission round; packets 15-31 are sent in the

5th transmission round; packets 32-63 are sent in the 6th transmission round; packets 64 - 96 are sent in the 7th transmission round. Thus packet 70 is sent in the 7th

transmission round.

(h) (0.3 pt) Assuming a packet loss is detected after the 26th round by the receipt of a triple duplicated ACK, what will be the values of the congestion control window size and of Threshold?

Answer The congestion window and Threshold will be set to half the current value of the congestion window (8) when the loss occurred. Thus the new values of the threshold and window is 4.

3. Network Routing - Consider the network shown below, which consists of 4 autonomous systems (AS).

Suppose AS3 and AS2 are running OSPF for their intra-AS routing protocol, and AS1 and AS4 are running RIP for their intra-AS routing protocol. Suppose eBGP and iBGP are used for the inter-AS routing protocol.

(a) (0.15 pt) Router 3c learns about prefix x from which routing protocol: OSPF, RIP, eBGP, or iBGP?

(4)

(e) (0.15 pt) Router 4b learns about x from which routing protocol?

(f) (0.25 pt) Once router 1d learns about x, it will put an entry (x, l) in its forwarding table. Will l be equal to l1 or l2 for this entry? Explain in one sentence.

(g) (0.25 pt) Now suppose that there is a physical link between AS2 and AS4 (between 2c and 4a). Suppose router 1d learns that x is accessible via AS2 as well as AS3. Will l be set to l1 or l2? Explain in one sentence.

(h) (0.25 pt) Now suppose that there is another AS, called AS5, which lies on the path between AS2 and AS4 (not shown in diagram). Suppose router 1d learns that x is accessible via AS2 AS5 AS4 as well as via AS3 AS4. Will l be set to l1 or l2? Explain

in one sentence. Answer a. eBGP b. iBGP c. eBGP d. iBGP e. RIP

f. l1. This interface begins the least cost path from 1d towards the gateway router 1c. g. l2. Both routes have equal AS-PATH length but l2 begins the path that has the closest NEXT-HOP router.

h. l1. l1 begins the path that has the shortest AS-PATH.

4. (0.8 pt) IP Addressing - A router has just received the following new IP address ranges: 57.6.96.0/21, 57.6.104.0/21, 57.6.112.0/21, 57.6.120.0/21. If all of these IP’s refer to the same outgoing line interface, can they be aggregated? If so, to what? If not, why not? Answer They can be aggregated to 57.6.96.0/19

5. Link Layer Addressing - Consider the network depicted in the figure below. The IP addresses and MAC addresses of individual interfaces are as denoted in the figure.

(5)

(a) (0.3 pt) How many subnets are there in this network? Which IP addresses belong to which subnet?

Answer Subnet1: 111.111.111.110, 111.111.111.111, 111.111.111.112 Subnet2: 222.222.222.220, 222.222.222.221, 222.222.222.222

(b) (0.3 pt) What is the destination IP address of the datagram when it leaves the sender host? What is the destination IP address of the datagram when it leaves the router? Answer In both cases 222.222.222.222

(c) (0.9 pt) What is the destination MAC address of the frame when it leaves the sender host? What is the destination MAC address of the frame when it leaves the router? Which protocol is used to determine the destination MAC address?

Answer ARP protocol is used.

From sender: E6-E9-00-17-BB-4B, From router: 49-BD-D2-C7-56-2A 6. Quality of Service (QoS)

(a) (0.6 pt) List 3 network performance characteristics that have a big impact on the end-to-end network QoS, in the perception of the end user.

Answer Throughput, delay, jitter, loss, availability.

(b) (0.6 pt) List 3 mechanisms that can be used in order to achieve better network QoS. Answer Overprovision of capacity, reservation of resources, admission control, pri-oritization of services.

7. (2.0 pt) True/False Questions - Each correct answer is worth 0.2 pt. Each wrong answer costs -0.1 pt. No answer means no points are earned or lost. The lowest mark for this question is 0. Please write down True or False.

(a) If stored video is streamed directly from a Web server to a media player, then TCP is used as the underlying transport protocol.

True (b) In an RTP/UDP streaming scenario, UDP segments are carried inside RTP

packets.

False (c) When using RTP, it is possible for a sender to change encoding in the

middle of a session.

True (d) RTP does not provide mechanisms to ensure timely delivery of data. True (e) For a given digital modulation scheme, the higher the Signal-to-Noise Ratio

(SNR), the higher the Bit Error Rate (BER).

False (f) The IEEE 802.11 wireless LAN uses CSMA/CD as the random access

pro-tocol.

False (g) An 802.11 frame header contains 4 address fields, each of which can hold a

6-byte MAC address.

True (h) Consider a mobile node in the Internet. In case of direct routing, a

corre-spondent node (sender) needs to first query the home agent of the mobile node to learn the mobile node’s care-of-address (COA).

True

(i) Assume Alice and Bob want to communicate securely. Alice can use her private key to sign a message.

True (j) Alice can use her public key to encrypt a message such that only Bob can

decrypt it.

References

Related documents

National Conference on Technical Vocational Education, Training and Skills Development: A Roadmap for Empowerment (Dec. 2008): Ministry of Human Resource Development, Department

Three-point bend tests showed that the alkali treatments of Alfa fibers have also a significant effect on flexural modulus. From the histogram in Fig.2b, It is clearly seen that

19% serve a county. Fourteen per cent of the centers provide service for adjoining states in addition to the states in which they are located; usually these adjoining states have

The ethno botanical efficacy of various parts like leaf, fruit, stem, flower and root of ethanol and ethyl acetate extracts against various clinically

How Many Breeding Females are Needed to Produce 40 Male Homozygotes per Week Using a Heterozygous Female x Heterozygous Male Breeding Scheme With 15% Non-Productive Breeders.

Despite the fact that the rise in net saving rate, capital stock and total consumption are the same in these two economies, the permanent increase in consumption that an