Uploaded by Ashraf Soliman

REVIEW MODEL MINOR networks 2023 (1)

advertisement
REVIEW MODEL FOR MINOR
COMPUTER NETWORKS
pc
[COMPANY NAME] [Company address]
REVIEW MODEL QUESTIONS & ANSWERS
----------------------------------------------------------------------------------------------------------------QUESTION 1: MATCH [10 marks]
Stands for hybrid fiber coax which is asymmetric link
1
HFC:
A
rate (bits/s) at which bits are being sent from sender to receiver at
Instantaneous
2
B
3
4
Throughput:
A Network
Protocol
Bottleneck link
C
D
given point in time
Set of rules and activities as well as the actions taken on the
transmission and/or receipt of a message or other event
link on end-end path that constrains end-end throughput
packet-switched
networks
circuit-switched
networks
The transmission
delay
The propagation
delay
The processing
delay.
E
10
The queuing
delay
J
The time that a witing packet has to stay in the buffere before getting
sent
11
Quick UDP Internet
Connections (QUIC)
K
12
Base station
L
An application-layer protocol, using UDP as its underlying transportlayer protocol, and is designed to interface above specifically to a
simplified but evolved version of HTTP/2
A major element in infrastructure wireless networks with on anlogy
in wired ones whose function is to connect wireless network side to
the larger network (e.g., the Internet, corporate or home network),.
13
Hand-off/
Handover
M
14
Multipath
propagation
N
15
Bit Error Rate
(BER)
O
The probability that a transmitted bit is received in error at the
receiver side
16
UDP checksum
P
One’s complement sum of segment content.placed into UDP
checksum field to compare both values at sender and receiver side
5
6
7
8
9
F
G
H
I
resources are not reserved but on demand as a consequence, may
have a wait (queue) for access to a communication link
requires reserving the resources needed along a path (buffers,
link,..etc) for the duration of the communication
This is the amount of time required to push all of the packet’s bits
into the link on the order of microseconds to
The time needed once 1st bit of the packet is transmitted out of router
A to router B end with distance
The time required to examine the packet’s header / trailer to direct
the packet to destination and check for bit-level errors in the packet
Refers to the process when a mobile host moves beyond the range of
one base station and into the range of another,(.e., change the base
station with which it is associated)
.A common problem in wireless networks which may be caused due
to moving objects between the sender and receiver which can cause
multipath propagation to change over time
1
17
Pipelining in data
transfer :
Q
sender allows multiple, “in-flight”, yet-to-be-acknowledged packets
thus range of sequence numbers must be increased
buffering at sender and/or receiver
18
Flow control
R
19
Maximum Segment
Size (MSS).)
S
A mechanism to the calamity of a receiver being over-run by a sender
that is sending too fast which enables the RECEIVER to explicitly
control the SENDER so sender won’t overflow receiver’s buffer by
transmitting too much, too fast
In TCP, the CongestionWindow is not allowed to fall below the
size of a single packet,
20
A Trojan horse
T
21
A Spyware
22
Flow control
23
Congestion
24
forwarding
25
Routing:
26
Multipath
propagation
Is a malware that appears, to the user, to perform a desirable function
but, in fact, facilitates unauthorized access to the user's computer
system
Is a malware that is installed surreptitiously on personal computers to
collect information about users, their computer or browsing habits
without their informed consent
A mechanism that allows the RECEIVER to explicitly control
the SENDER so sender won’t overflow receiver’s buffer by
transmitting too much, too fast
Takes palce when too many sources sending too much data too fast
for network to handle
A network layer function which move packets from a router’s input
link to appropriate router output link
A network layer function which determines optimal route taken by
packets from source to destination
A typical wireless communivation problem as radio signal reflects off
objects ground, arriving at destination at slightly different times
QUESTION (2): TRUE & FALSE
FOR EACH OF THE FOLLOWING STATEMENTS, IDENTIFY TRUE OR FALS AND
CORRECT THE FALSE ONES:
1) The smaller SNR makes the easier for the receiver to extract the transmitted signal from the
background noise
FALSE, THE LARGER THE SNR
2
2) Code Devision Multiple Access (CDMA) belongs to the family of random access protocols and it’s
prevalent in wireless LAN and cellular technologies.
FALSE, ITBELONGS TO channel partitioning FAMILY PROTOCOLS
3) UDP is an unreliable service protocol at the transport layer which does not guarantee that data sent by
one process will arrive intact (or at all!) to the destination process.
[ true]
4) In connectionless demultiplexing that takes place in transport layer, the IP/UDP
datagrams with same dest. port #, but different source IP addresses and/or source port numbers will
be directed to same socket at receiving host
[ TRUE]
5) Both Multiplexing, demultiplexing take place in all layers and are based on segment,
datagram header field values [ True]
6) Both UDP and TCP demultiplexing use only destination port number but (only)
[ False] UDP use destination port number only but TCP: demultiplexing using 4-tuple:
source and destination IP addresses, and port numbers
7) Despite the unrialble feature of UDP as compared to TCP, developer mstly favor it for
their applications due to its no connection establishment (which can add RTT delay) and
simplicity but it’s necessary to its enforced congestion control
[FALSE] it’s preferred for simplicity and no delay but it doesn’t require congestion control
8) For reliable data transfer, communication over unreliable channel is TWO-way as sender
and receiver will exchange messages back and forth to enable implement one-way reliable data
transfer
3
[ TRUE]
9) Here’s how TCP implement flow control. The basic idea is simple – the receiver informs the
sender how much free buffer space there is, and the sender is limited to send no more than this
amount of data. That the value o RWND in the diagram to the right.
This information is carried from the receiver to the sender in the “receiver advertised
window” (do a PIP of header) in the TCP header, and the value will change as the amount
of free buffer space fluctuates over time.
10) The network limit is estimated using the CongestionWindow parameter whereas the
receiver limit is advertised using the AdvertisedWindow parameter
[TRUE]
11) In TCP congestion control, the Slow start mechanism effectively increases the
congestion window exponentially, rather than linearly.
4
1
2
3
4
5
6
7
A packet switch is
A) a device with
B) Its core job is to
C) requires reserving D) A +B
several inputs and
take packets that
the resources needed
outputs leading to
arrive on an input and along
during
the
and from the hosts
forward along the
communication
that the switch
proper route reach
session duration
interconnects.
their destination.
Which of the following media are valid examples of guided link media
A) UTP, & STP
B) RADIO LINKS
C) FIBER OPTICS
D) A+C
Which of the following causes a problem of contention
A) If packets destined
B) If packets destined C) if we have Wire
D) NOT ALL
for a certain output
for a certain output tapping to capture data
arrive at a switch and
arrive at a switch and in a network.
their arrival rate is
their
arrival
rate
slower to fill the
exceeds the capacity
capacity of that output, of that output,
Which of the following attacks are valid examples against AVAILABILITY
A) An asset of the
B) Changing data file
C) Destruction of some D) All of above
system is destroyed or
Altering a program
hardware or jmming
becomes unavailable
and the contents of a
signals
or unusable.
message
The IP protocol is
A) An important
C) It’s a protocol that D) A + B
B) Essential routine
internet protocol
for internet which for
works in the
among the TCP/IP
addressing of network application layer of
protocol stack
and format of the
the OSI
packets
The delay components in the end-to-end delay which are fixed in time are
A) transmission delay
B) propagation delay
C) queuing delay
D) A +B
If there’s no intervention traffic, the throughput can simply be calculated as
D) ALL
A) the minimum
B) depends not only
C) the maximum of
transmission rate
on the transmission
transmission rate
along the path
rates of the links
along the path
between source and
along the path, but
between source and
destination
also on the
destination
intervening traffic. I
In reference to OSI model, following tasks that a layer can perform are
A-) error and flow
B-) segmentation
C-) multiplexing, and D- All
control,
8
9
and reassembly
connection setup.
A socket interface
A) specifies how a
B) An encryption
C) An essential SW
program running on
algorithms that include routine for internet
one end system asks
hash algorithms
which specifies the
the Internet
addressing of network
infrastructure to
and format of the
deliver data to a
packets that are sent
specific destination
and received
program running on
another end system.
Which is NOT TRUE of the following statements ?
5
D) B + C
A) An asset of the
system when destroyed
or becomes unavailable
is an attack on
availability principles
10
11
B) Destruction of
C) An unauthorized
D) B+ C
some hardware, or and party gains access to an
disabling file
asset is an attack on
management systems
Non-repudiation
is an example of
security principle
static/passive attack
Which of the following statements is TRUE FOR Voie over-IP (VoIP) applications?
B) In addition to
C) It encounters Only
D) A+B
A) It has media
transmission
and
packetization delay, as processing,
queing delays
transmission, and
the sending side must
propagation delays,
first fill a packet with
there’s also
encoded digitized
packetization delay
speech before passing
the packet to the
Internet.
https://webmail.niit.org.pk/src/login.php where 2nd level (.org) is spoofed is an example
A) of email spoofing
12
13
14
15
B) URL Spoofing
(phishing)
C) DNS spoofing
Which is aTRUE about Secret key encryption algorithms
A) Are often referred
B) The decryption
C) . One acceptable
D) ALL
to as symmetric
algorithm is the
solution to the problem
encryption algorithms
inverse of the
encountered by secret
encryption algorithm – key encryption is to
(i.e. if the encryption
rely on trusted third
algorithm uses a
party, a key distribution
combination of
center (KDC) where .
addition and
it’s normally a server
multiplication, the
that shares a key with
decrypting algorithm
each user.
would use a
combination of
subtraction and
division
Which of the following statements is valid for Client server architecture
A) No or a minimal
B) Hosts are esktops
C) Cost effective as
D) NOT ALL
dedicated servers
and laptops controlled they don’t require
therefore application
by users, with most of significant server
exploits direct
the peers residing in
infrastructure neither
communication
homes, universities,
server bandwidth
between pairs of
and offices.
connected hosts,
If there’s no intervention traffic, the throughput can simply be calculated as
A) the minimum
B) Depends on both
C) the maximum of
D) ALL
transmission rate along the transmission rates
transmission rate along
the path between
of the links and on the the path between
source and destination
intervening traffic.
source and destination
Datagram switching is done at which layer of OSI model?
A) Network layer
B) Application layer
6
C) Transport layer
D) ALL
16
Datagram networks mainly refers to _________
A) Connection
oriented networks
17
D) NOT ALL
B) Datagram table
C) Routing table
D)NOT ALL
The main contents of the routing table in datagram networks are ___________
A) Source and
Destination address
19
C) Telephone
networks
Datagrams are routed to their destinations with the help of ________
A) Switch table
18
B) Connection less
networks
B) Destination
address and Output
port
C) Source address
and Output port
D) NOT ALL
ransport layer aggregates data from different applications into a single stream before
passing it to ____________
A) network layer
B) data link layer
C) application layer
D) physical layer
20
Which of the following are transport layer protocols used in networking?
21
A) TCP and FTP
B) UDP and HTTP
7
C) TCP and UDP
D) NOT ALL
22
Which is TRUE about the functions of the Network layer data Plane ?
A) Forward datagrams
from their input links
to their output links
23
B) Determine the
paths a packet takes
from its source to its
destination
C) Iteroperate
with the link
layer at the
other side of
the incoming
link, and
perform lookup
function at the
input ports.
D) A+C
Which is TRUE about the functions of the Network layer Control Plane ?
A) Forward datagrams
from their input links
to their output links
B) Determine the
paths a packet takes
from its source to its
destination
C) Iteroperate
with the link
layer at the
other side of
the incoming
link, and
perform lookup
function at the
input ports.
D) A+C
24
Which of the following is NOT TRUE about components of a router?
25
A) Input port,
B)A routing
C) Input port, switching D)
switching fabric, and
processor uses SW for fabric, and output ports
output ports are HW
executing routing
are SW because their
because their
protocols, maintaining datagram-processing
datagram-processing
routing tables router fneeds more control on
functionality is far too
their number and
fast for software
functions and to avoid
implementation.
high cost of HW.
Which of the following are transport layer protocols used in networking?
A) TCP and FTP
B) UDP and HTTP
C) TCP and UDP
D) HTTP and FTP
26
Which one of the following is not a function of network layer?
A) routing
27
C) congestion
control
D) error control
The network layer protocol for internet is __________
C) hypertext transfer
protocol
A 4 byte IP address consists of __________
A) Ethernet
28
B) inter-networking
B) Internet protocol
8
D) file
protocol
transfer
A) only network
address
29
B) only host
address
C) network address
& host address
D)
network
address & MAC
address
Suppose two packets arrive to two different input ports of a router at the same time and there
are no other packets anywhere in the router. If the two packets are to be forwarded to two
different output ports. Which of the following is Correct ?
A) No, you can only
transmit one packet
at a time over a
shared bus.
B) It’s possible to
forward the two
packets at the same
time over a shared bus
B) It’s possible to
D) NOT ALL
forward the two packets
at the same time using a
crossbar switching
fabric
ESSAY QUESTIONS
QUESTION(3)
A)Discuss the key Difference between Forwarding and Routing in the Network layer?
B) In reference to the network layer, if R_switch is N times faster than R_line,(e.g. only negligible
queuing will occur at the input ports, even if all the packets are to be forwarded to the same output
port). Now suppose that R_switch = R_line, but all packets are to be forwarded to different output
ports. Let D be the time to transmit a packet. As a function of D, what is the maximum input queuing
delay for a packet for the (i) memory, (ii) bus, and (iii) crossbar switching fabrics?
C) Suppose that a Web server runs in Host C on port 80. and this Web server uses persistent
connections, and is currently receiving requests from two different Hosts, A and B. Discuss and
9
explain.
i) Are all of the requests being sent through the same socket at Host C?
ii) If they are being passed through different sockets, do both of the sockets have port 80?
(D) In reference to the TCP :
i) State five of its main features/charchterstics?
ii) Explain briefly the approach taken by TCP for classical congestion control?
iii) Explain briefly the approach taken by TCP forflow control?
(E) Explain briefly the main axioms of classifying wireless networks and state the corresponding main
types?
QUESTION(4): Explain briefly each of the following :
A- Signal to Noise Ratio (SNR)
B- difference between UDP and TCP portocols
C- Multiplexing and demultiplexing at Transport layer
D) Traceout in application layer process
E)EXPLAIN BRIEFLY THE NETWORK LAYER SERVICE MODEL?
QUESTION(5)
A- Explain briefly reliable data transfer mechanisms and indicate use of each of them?
B) Consider a 1 Gbps link with 15 ms prop. Delay and size of packets is 8000 bits, given that
time of RTT (request to transmit) is 30 msec
i) Calculate the time to transmit packet into channel? Corresponding throughput
ii) Calculate the utilization of the channel based on Stop and wait mechanism
iii) What’s meant by pipelined and does it improves utilization of channel
iv) Reclaculate the utilization of the channel based on 3 stage pipelined mechanism(
sending 3 packets )per session
10
ANSWER:
QUESTION(3)
A)Discuss the key Difference between Forwarding and Routing in the Network layer?
Answer:
The key differences between routing and forwarding is that forwarding is a router’s local action of
transferring packets from its input interfaces to its output interfaces, and forwarding takes place at very short
timescales (typically a few nanoseconds), and thus is typically implemented in hardware. Routing refers to
the network-wide process that determines the end-to-end paths that packets take from sources to destinations.
Routing takes place on much longer timescales (typically seconds), and is often implemented in software.
B) In reference to the network layer, if R_switch is N times faster than R_line,(e.g. only negligible
queuing will occur at the input ports, even if all the packets are to be forwarded to the same output
port). Now suppose that R_switch = R_line, but all packets are to be forwarded to different output
ports. Let D be the time to transmit a packet. As a function of D, what is the maximum input queuing
delay for a packet for the (i) memory, (ii) bus, and (iii) crossbar switching fabrics
Answer:
i) Maximum queueing delay if a memory = D *( n-1)
ii) Maximum queueing delay if a bus =
iii) Maximum queueing delay if a crossbar = 0
C) Suppose that a Web server runs in Host C on port 80. and this Web server uses persistent
connections, and is currently receiving requests from two different Hosts, A and B. Discuss and
explain.
i) Are all of the requests being sent through the same socket at Host C?
ii) If they are being passed through different sockets, do both of the sockets have port 80?
Answer:
i) No. for each persistent connection, the Web server creates a separate “connection socket”. Each
connection socket is identified with a four-tuple: (source IP address, source port number, destination IP
address, destination port number).
ii) The identifier for both of these sockets has 80 for the destination port; however, the identifiers for
these sockets have different values for source IP addresses.
11
(D) In reference to the TCP :
i) State five of its main features/charchterstics?
ii) Explain briefly the approach taken by TCP for classical congestion control?
iii) Explain briefly the approach taken by TCP forflow control?
i) main features and charcterstics of TCP?








point-to-point:one sender, one receiver
reliable, in-order byte steam:no “message boundaries"
full duplex data:bi-directional data flow in same connection
MSS: maximum segment size
cumulative ACKs
pipelining:TCP congestion and flow control set window size
connection-oriented: handshaking (exchange of control messages) initializes sender,
receiver state before data exchange
flow controlled: sender will not overwhelm receiver
ii) Classic Congestion control :
The approach taken by TCP is to have each sender limit the rate at which it sends traffic into its connection
as a function of perceived network congestion.
iii) Here’s how TCP implement flow control.:
The basic idea is simple is the receiver informs the sender how much free buffer space there is, and the
sender is limited to send no more than this amount of data.
E) Explain briefly the main axioms of classifying wireless networks and state the corresponding main
types?

Main axioms for classification are:
•
(i) whether a packet in the wireless network crosses exactly one wireless hop or multiple
wireless hops,
•
(ii) whether there is infrastructure such as a base station in the network:
Corresponding types are summarized as follows:
1-Single-hop, infrastructure-based. :
12
•
have a base station that is connected to a larger wired network (e.g., the Internet).
•
all communication is between this base station and a wireless host over a single wireless
hop.
2-Single-hop, infrastructure-less.:
•
there is no base station that is connected to a wireless network.
•
However, as we will see, one of the nodes in this single-hop network may coordinate the
transmissions of the other nodes.
•
Bluetooth networks (that connect small wireless devices such as keyboards, speakers, and
headsets are single-hop, infrastructure-less networks.
3- Multi-hop, infrastructure- based :In these networks, a base station is present that is wired to the larger
network , However, some wireless nodes may have to relay their communication through other wireless
nodes in order to communicate via the base station.

Examples are some wireless sensor networks and so-called wireless mesh networks deployed in
homes fall in this category.
•4-Multi-hop, infrastructure-less.:
•
There is no base station in these networks, and nodes may have to relay messages among
several other nodes in order to reach a destination.
•
Nodes may also be mobile, with connectivity changing among nodes
•
a class of networks known as mobile ad hoc networks (MANETs). If the mobile nodes are
vehicles, the network is a vehicular ad hoc network (VANET).
QUESTION (4) Explain briefly each of the following :
a- Signal to Noise Ratio (SNR)
b- difference between UDP and TCP portocols
c- Multiplexing and demultiplexing at Transport layer
d) Traceout in application layer process
Answer:
a) The signal-to-noise ratio (SNR) is a relative measure of the strength of the received signal (i.e.,
the information being transmitted) as compared to picked up noise and is measured in decibles
13
unit . The larger SNR makes the easier for the receiver to extract the transmitted signal from the
background noise
B)
UDP

TCP
Stands for User
Datagram Protocol
•
similarity
TCP:
Transmission 1- both provides integrity
checking by including error
Control Protocol
detection fields in their
segments’ headers.
2-The fundamental
responsibility of UDP and
no-frills extension of “best- It is possible to have TCP is to extend IP’s
congestion therefore needs to delivery service between
effort” IP
two end systems to a
control congestion
delivery service between
two processes running on
the end systems.
unordered delivery
It enables flow control
unreliable,
reliable, in-order delivery

Requires connection setup
C) Multiplexing takes place at the sender side where its process is gathering data chunks at the
source host from different sockets, and encapsulating each data chunk with header information to
create segments .

Demultiplexing. Takes place at the receiver side where the process is to deliver the data in
a transport-layer segment to the correct socket .
D) Traceout?
Traceroute is a simple program that can run in any Internet host. When the user specifies a destination
hostname, the program in the source host sends multiple, special packets toward that destination
passing through a series of routers.
E) Network layer service model:
14

Guaranteed delivery. This service guarantees that a packet sent by a source host will
eventually arrive at the destination host.

Guaranteed delivery with bounded delay. This service not only guarantees delivery of
the packet, but delivery within a specified host-to-host delay bound (for example, within
100 msec).

In-order packet delivery. This service guarantees that packets arrive at the destination in
the order that they were sent.

Guaranteed minimal bandwidth. emulates the behavior of a transmission link of a
specified bit rate (for example, 1 Mbps) between sending and receiving hosts.

Security. The network layer could encrypt all datagrams at the source and decrypt them at
the destination, thereby providing confidentiality to all transport-layer segments
QUESTION(5)
A- Explain briefly reliable data transfer mechanisms and indicate use of each of them?
B) Consider a 1 Gbps link with 15 ms prop. Delay and size of packets is 8000 bits, given that
time of RTT (request to transmit) is 30 msec
i) Calculate the time to transmit packet into channel? Corresponding throughput
ii) Calculate the utilization of the channel based on Stop and wait mechanism
iii) What’s meant by pipelined and does it improves utilization of channel
iv) Reclaculate the utilization of the channel based on 3 stage pipelined mechanism(
sending 3 packets )per session
ANSWER
A) Reliable Data Transfer mechanisms
1
Checksum
Used to detect bit errors in a transmitted packet.
15
2
Timer
Used to timeout/retransmit a packet, possibly because the packet (or
its ACK) was lost within the channel.
3
Sequence number
Used for sequential numbering of packets of data flowing from sender
to receiver.
4
Acknowledgment
Used by the receiver to tell the sender that a packet or set of packets
has been received correctly.
5
Negative
acknowledgment
Used by the receiver to tell the sender that a packet has not been
received correctly.
6
Window, pipelining
The sender may be restricted to sending only packets with sequence
numbers that fall within a given range. By allowing multiple packets to
be transmitted but not yet acknowledged, sender utilization can be
increased over a stop-and-wait mode of operation. We’ll see shortly
that the window size may be set on the basis of the receiver’s ability to
receive and buffer messages, or the level of congestion in the network,
or both
B) i) Dtrans = L/ R= 8000 bits/ 109 bits= 8 10 -6 sec= 8 microsecs
ii) Utilization of channel= time used for transmission / wait time (RTT) + time used for
transmission
= Dtrans / RTT + Dtrans = 8 10 -6 / 30 10-3 + 8 10 -6 = 0.008/ 30.008= 0.00027

Which is extremely low utilization indicating that Protocol limits performance of
underlying infrastructure (channel)
iii) In case of pipelined protocol which allows multiple, “in-flight”, yet-to-be-acknowledged
packetswhich means that range of sequence numbers must be increased and implies buffering at
sender and/or receiver , Yes it increases the channel utilization ratio
iv) in case of 3 stage pipeline it means that 3 packets are sent from sender to RX but ACK from
Rec for each received packet however the RTT is counted from time last bit of 1st packet is sent
ACK arrives, send next
packet, t = RTT + L / R
Utilization becomes = 3L/R / RTT + L/R = 0.0024 / 30.008 = 0.00081
16
Comment: utilization was improved as compared to first mechanism 81/27= 3 times
17
Download