Assignment 3 -Computer Network

advertisement
Assignment 3
B.Tech. (CS/IT)-V Semester
Computer Network (TCS-502/TIT-502)
Last Date for Submission: 26/11/2015
1. Give three examples of protocol parameters that might be negotiated when a connection
is set up.
2. If an application layer packet size is 5 Bytes long, how big is the corresponding Ethernet
frame? Assume that the application uses TCP at Transport layer and IP v4 at Network
layer.
3. A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is
filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can
the computer, transmit at the full 6 Mbps?
4. Is TCP checksum necessary or could TCP allow IP to checksum the data.
5. Describe four different scenarios when an IP router would drop packets that arrive on one
of its interfaces.
6. Datagram subnets route each packet as a separate unit, independent of all others. Virtualcircuit subnets do not have to do this, since each data packet follows a predetermined
route. Does this observation mean that virtual-circuit subnets do not need the capability to
route isolated packets from an arbitrary source to an arbitrary destination? Explain your
answer.
7. Suppose two TCP connections are present over some bottleneck link of rate R bps. Both
connections have a huge file to send (in the same direction over the bottleneck link). The
transmissions of the files start at the same time. What is the transmission rate that the
TCP would like to give to each of the connections?
8. Consider the following design problem concerning implementation of virtual-circuit
service. If virtual circuits are used internally to the subnet, each data packet must have a
3-byte header and each router must tie up 8 bytes of storage for circuit identification. If
datagrams are used internally, 15-byte headers are needed, but no router table space is
required. Transmission capacity costs 1 cent per 106 bytes, per hop. Very fast router
memory can be purchased for 1 cent per byte and is depreciated over two years, assuming
a 40-hour business week. The statistically average session runs for 1000 sec, in which
time 200 packets are transmitted. The mean packet requires four hops. Which
implementation is cheaper, and by how much?
9. “A datagram cannot be larger than the MTU of a network over which it is sent.” Is the
statement true or false? Explain with the help of a suitable example.
10. Explain Three-Way Handshake Mechanism used by TCP to terminate a Session reliably.
11. The byte-counting variant of the leaky bucket algorithm is used in a particular system.
The rule is that one 1024-byte packet, or two 512-byte packets, etc., may be sent on each
tick. Give a serious restriction of this system that was not mentioned in the text.
12. Suppose nodes A, B, and C each attach to the same broadcast LAN (through their
adapters). If A sends thousands of frames to B with each frame addressed to the LAN
address of B, will C's adapter process these frames? If so, will C's adapter pass the IP
datagram’s in these frames to C (i.e., the adapter's parent node)? How will your answers
change if A sends frames with the LAN broadcast address?
13. A large number of consecutive IP address are available starting at 192.16.0.0. Suppose
that four organizations, A, B, C, and D, request 4000, 2000, 500, 1000 and 7000
addresses, respectively, and in that order. For each of these, give the first IP address
assigned, the last IP address assigned, and the mask in the w.x.y.z/s notation.
14. Suppose there are three routers between a source host and destination host. Ignore
fragmentation. An IP datagram sent from the source host to the destination host will
travel over how many interfaces? How many forwarding table will be indexed to move
the datagram from the source to destination?
15. A router has just received the following new IP addresses: 57.6.96.0/21, 57.6.104.0/21,
57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoing line, can they be
aggregated? If so, to what? If not, why not?
16. How could you change the IP datagram format to support high-speed packet switching at
router? Considering the fact that a router must recompute a header checksum after
decrementing the time-to-live field.
17. Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes.
Suppose the original datagram is stamped with the identification number 422. How many
fragments are generated? What are the values in the various fields in the IP datagram(s)
generated related to fragmentation?
18. Most IP datagram reassembly algorithms have a timer to avoid having a lost fragment tie
up reassembly buffers forever. Suppose that a datagram is fragmented into four
fragments. The first three fragments arrive, but the last one is delayed. Eventually, the
timer goes off and the three fragments in the receiver's memory are discarded. A little
later, the last fragment stumbles in. What should be done with it?
19. What is the fastest line speed at which a host can blast out 1500-byte TCP payloads with
a 120-sec maximum packet lifetime without having the sequence numbers wrap around?
Take TCP, IP, and Ethernet overhead into consideration. Assume that Ethernet frames
may be sent continuously.
20. When the IPv6 protocol is introduced, does the ARP protocol have to be changed? If so,
are the changes conceptual or technical?
21. Suppose Host A sends two TCP segments back to back to Host B over a TCP connection.
The first segment has sequence 100; the second segment has sequence number 1025.
a. How much data is there in the first segment?
b. Suppose that the first segment is lost but the second segment arrives at B. In the
acknowledgement that Host B send to Host A, what will be the acknowledgement
number?
22. Consider the effect of using slow start on a line with a 10-msec round-trip time and no
congestion. The receive window is 24 KB and the maximum segment size is 2 KB. How
long does it take before the first full window can be sent?
23. Explain with the help of diagram the TCP connection management and Window
management policy using proper flags.
24. Consider a TCP connection between Host A and Host B. Suppose that the TCP segments
traveling from Host A to Host B have source port number x and destination port number
y. What are the source and destination port numbers for the segments traveling from Host
B to Host A?
25. Describe why an application developer might choose to run an application over UDP
rather than TCP.
Download