Final Exam of Computer Networks (ICE 1230) 2008.5. 27. Answer in English and Total 15 points 1. Why is it said that packet switching employs statistical multiplexing? Contrast statistical multiplexing with the multiplexing that takes place in TDM. (1 point) Answer: In a packet switched network, the packets from different sources flowing on a link do not follow any fixed, pre-defined pattern. In TDM circuit switching, each host gets the same slot in a revolving TDM frame. 2. In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second interval. Will Bob necessarily return the favor and provide chunks to Alice in the same interval? Why or why not? (1 point) Answer: It is not necessary that Bob will also provide chunks to Alice. Alice has to be in the top 4 neighbors of Bob for Bob to send out chunks to her; this might not occur even if Alice provides chunks to Bob throughout a 30 second interval. 3. What is a way using Last-Modified: header line in HTTP? (1 point) Answer: The header line is used by Conditional GET to check whether the object asked has been modified. 4. We saw that there is no network-layer protocol that can be used to identify the hosts participating in a multicast group. Given this, how can multicast applications learn the identities of the hosts that are participating in a multicast group? (1 point) Answer: The protocol must be built at the application layer. For example, an application may periodically multicast its identity to all other group members in an application-layer message. 5 In these days, the Internet needs to include the wireless communications network in addition to the wired networks. What is a way to extend the congestion control of TCP in this case? Why? (2 point) Answer: Packet losses occur from network congestion and wireless communication. Since the wired Internet does not consider the packet loss due to errors in wireless communication, the congestion control of TCP should be revised. A way is … 6. Describe the overall steps of Link State Routing algorithm. And show the technical issues (at least two) and their solutions of its implementation as Open Shortest Path First. (2 points) 1. discover its neighbors and learn their network address. 2. measure the delay or cost to each of its neighbors. 3. construct a packet telling all it has just learned. 4. send this packet to all other routers. 5. compute the shortest path to every other router. For example, OSPF has an architecture consisting of areas where the link state packets are flooding inside. Sequence number is with age number in order to solve … 7. Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of rate R. Denote the propagation delay between the two nodes as dprop. Will there be a collision dprop < L/R ? Why or why not? (1 points) There will be a collision in the sense that while a node is transmitting it will start to receive a packet from the other node. 8. What are the purposes of the HLR and VLR in GSM networks? What elements of mobile IP are similar to the HLR and VLR? (1 point) The home network in GSM maintains a database called the home location register (HLR), which contains the permanent cell phone number and subscriber profile information about each of its subscribers. The HLR also contains information about the current locations of these subscribers. The visited network maintains a database known as the visitor location register (VLR) that contains an entry for each mobile user that is currently in the portion of the network served by the VLR. VLR entries thus come and go as mobile users enter and leave the network. The edge router in home network in mobile IP is similar to the HLR in GSM and the edge router in foreign network is similar to the VLR in GSM. 9. What are some of the difficulties associated with the Intserv model and per-flow reservation of resources? (1 point) Scalability: Per-flow resource reservation implies the need for a router to process resource reservations and maintain per-flow state for each flow passing through the router. Flexibly service: The Intserv framework provides for a small number of prespecified service classes. 10. What are the differences between message confidentiality and message integrity? Can you have one without the other? Justify your answer. (2 points) Confidentiality is the property that the original plaintext message can not be determined by an attacker who intercepts the ciphertext-encryption of the original plaintext message. Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts, and one can have one without the other. An encrypted message that is altered in transmit may still be confidential (the attacker can not determine the original plaintext) but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential. 11. What is the purpose of a nonce in an end-point authentication protocol? (1 point) A nonce is used to ensure that the person being authenticated is “live.” Nonces thus are used to combat playback attacks. 12. What is the role of ASN.1 in the ISO/OSI reference model’s presentation layer? (1 point) The role of the presentation layer is to allow the sending and receiving of data in a machine-independent format (i.e., without regard to the particular storage and architectural conventions of the sender and receiver).