Name: Student ID: CPSC 558 Advanced Computer Networking Midterm Examination (October 26, 2004) Multiple Choices: (30%) 1. What option below about “Store-and-Forward” technology is correct? (C) a. The host(s) is used to stored and forward the packets b. There is a dedicated path maintained in a network for this purpose c. It is mainly used in a packed switching network d. It is mainly used in a circuit switching network e. The major reason to use this technique is for network security. 2. What issues about STDM and FDM below is true?(C) a. Both are the techniques used for network routing purposes b. The max number of network flow is adjustable and resizable c. The data flow for these two techniques are subject to under utilization d. STDM is used for circuit switching and FDM is used in VC networking e. STDM and FDM’s data flow is transferring on demand. 3. Which option below about digital encoding could be a potential problem? (D) a. Encode makes 0 as low signal and 1 as high signal b. Encode is to modulate electromagnetic waves c. Signals propagate over a physical medium d. Low signal (0) may be interpreted as no signal e. There could be alternative encoding methods 4. Which option below about representing network as graph is wrong? (B) a. Nodes are part of the components of the graph b. Node costs is used to represent values related to physical distance, capacity, delay, etc c. Routers is used to support the protocols and algorithm in the dynamic approach d. The assumption of edge cost in dynamic approach is known. e. The distance vector algorithm maintaining the next hop value for every destination. 5. Which of the following option about ATM is wrong? (B) a. ATM is a connection-oriented packet-switched network b. The Cells in ATM network are variable length. c. ATM used in both WAN and LAN settings d. Different ATM AAL (ATM Adaptation Layer) provides different services for network applications e. Segmentation and Reassembly (SAR) are necessary processes in ATM 1 Name: Student ID: 6. Which one below about limitation of a Learning Bridge is wrong? (E) a. Learning Bridge uses Spanning Tree Algorithm to remove loops b. There is limited scalability capability for Learning Bridge c. There could be a transparency problem for Learning Bridge d. Learning Bridge use VLAN to support scalability e. It is easy for different types of network structures can be interconnected using Learning Bridge. 7. Which one below about Datagram Switching Network is wrong? (A) a. Connection setup phase is needed b. Every packet contains the complete destination address c. This is sometimes called connectionless model d. Each Switch maintains a routing table for packets e. Source host has no way of knowing if the network is capable of delivering a packet or if the destination host is even up 8. Which one below about VC (Virtual Circuit) Network is wrong? (D) a. Typically wait full RTT for connection setup before sending first data packet. b. If a switch or a link in a connection fails, the connection is broken and a new one needs to be established. c. Each data packet contains only a small identifier d. Include only Outgoing Interface for packets transfer e. It contains connection setup and data transfer phases 9. Which one below about Network Channels is wrong? (C) a. Request/reply (client/server) channel Used by the file transfer and digital library application. b. Message Stream channel could be used by both video-on-demand and videoconferencing applications c. Request/reply (client/server) channel has no need to guarantee all messages are delivered d. Message Stream channel support both one or two-way traffic and delay properties e. Message Stream channel needs to ensure that messages are delivered arrives in the same order in which they were sent. 10. Which one below is NOT a network function? (E) a. Provide Connectivity b. Addressing c. Resource Sharing d. Switching and Data Forwarding e. Server Application Supports 2 Name: Student ID: Questions and Answers: (30%) (Please provide a short/concise answer for each question.) 1. What are two Network Channels and what are the major applications used by these two channels? Briefly explain it. Request/reply (client/server) channel Used by the file transfer and digital library application. Guarantee every message sent by one side is received by the other side and only one copy of each message is delivered. Message Stream channel Could be used by both video-on-demand and videoconferencing applications Support both one or two-way traffic and delay properties No need to guarantee all messages are delivered Need to ensure that messages are delivered arrive in the same order in which they were sent. (To avoid displaying frame out of sequence.) 2. Compare datagram packet switching and VC packet switching (list four different points) See lecture slide on Chapter 1 (Part 1) 3. Briefly explain what is congestion Data packets could not continue forwarding due to the conflicts in the communication link or switch is busy of serving other packets. 4. Briefly explain what is a Layered Network Architecture See lecture slide on Chapter 1 (Part 2) 5. What are two problems of Internetworking? Briefly explain it. Heterogeneity and scaling. See lecture slide on Chapter 4 (Part 1) 6. What are three methods of source routing? Briefly explain it. See lecture slide on Chapter 3 (Part 1) Computations and Derive Questions (40%) – Extra paper allowed if you need 1. Suppose a computer B receives a message in hexadecimal format from a computer A. The message contains the payload “B246B” and the 32-bit CRC “00000107” a. What is a polynomial represented for this 32-bit CRC b. Does computer A receive a correct message? Show work and explain. c. Can computer B detect the error if the payload contains an 11-bits error? Explain why. 2. Suppose that a TCP message that contains 1964 bytes of data and 20 bytes of TCP header is passed to IP for delivery across three networks of the Internet (i.e. from the source host to a first router to a second router to the destination host). The first network uses 14-byte headers and has a MTU (maximum transmission unit) of 1024 bytes; the second uses 8-bytes headers with a MTU of 512 bytes; the third uses 16-bytes headers with a MTU of 4500 bytes. Each network’s MTU gives the total packet size that may be sent, including the network header. Give the sizes 3 Name: Student ID: and offsets of the sequences of fragments delivered to the network layer at the destination host. Assume all IP headers are 20 bytes. 3. A company has a network as the figure follows: 128.96.34.130 128.96.34.140 R1 H1 128.96.34.240 128.96.34.240 128.96.34.240 H3 R2 128.96.33.14 H2 128.96.33.1 The hosts H1, H2, H3 has the subnet masks 255.255.255.192, 255.255.255.192, and 255.255.255.0 respectively. a. What network class does this network belong to? What is network id of this network? b. How many subnets does this network have? What are subnet Ids? c. H1 has a routing table. Fill in the entries of routing table as follows: Subnet Number Subnet Mask Next hop (router) Interface 0 R1 R1 d. R1 has a routing table. Fill in the entries of routing table as follows: Subnet Number Subnet Mask Next hop (router) Interface 0 Interface 1 R2 4 Name: Student ID: 4. Give the steps as in following table in the forward search algorithm as it builds the routing database for node B in the network shown in figure as follows: A 3 4 Step Confirmed list 1 2 3 4 5 6 7 8 9 (B,0,-) 10 1 B C 6 1 1 E F 1 D Tentative list 5. (Extra Credit Question) a. What layers does ISO reference model have? Give the short description of any two layers. b. What layers does a host (end-user computers) support? c. What layers does a router support? Give the name of a protocol that each layer of router supports. (Answer) 1. a. C(x) = x^8 + x^2 + x + 1 b. C(x) = x^8 + x^2 + x + 1 CRC = 0x00000107 = 0000 0000 0000 0000 0000 0001 0000 0111 C(x) = 100000111 M(x) = 0xB246B = 1011 0010 0100 0110 1011 5 Name: Student ID: 1011 0010 0100 0110 1011 1000 0011 1 0011 0001 110 10 0000 111 01 0001 0010 1 0000 0111 00001 0101 0110 1 0000 0111 0 0101 0001 10 100 0001 11 001 0000 0111 1 0000 0111 0 0000 0000 c. Yes. It can detect any odd number of errors because C(x) contains (x+1) 2. TCP message = payload + TCP header = 1964 + 20 = 1984 bytes First network: MTU = 1024 = link header + IP header + payload = 14 bytes + 20 bytes + TCP data TCP data = 990 bytes but 990 is not in multiples of 8. TCP data fragment must be 984 which is in multiples of 8. Therefore the first network generates three fragments (size, offset) = (984, 0), (984, 123) Second network: MTU = 512 = link header + IP header + payload = 8 bytes + 20 bytes + TCP data TCP data = 484 bytes but 990 is not in multiples of 8. TCP data fragment must be 480 that is in multiples of 8. Therefore the second network generates 6 fragments (size, offset) = (480, 0), (480, 60), (24, 120), (480, 123), (480, 183), (24, 243) Third network: The third network only forwards 6 fragments (size, offset) = (480, 0), (480, 60), (24, 120), (480, 123), (480, 183), (24, 243) to the destination host because its MTU is 4500 bytes, that is larger than the size of incoming packets. 3. A company has a network as the figure follows: 128.96.34.130 128.96.34.140 H1 128.96.34.240 R1 6 Name: Student ID: The hosts H1, H2, H3 has the subnet masks 255.255.255.192, 255.255.255.192, and 255.255.255.0 respectively. d. What network class does this network belong to? What is network id of this network? 1.Class B because the first two bits of 128.96.34.240 are “10” 2.Network id is 128.96. e. How many subnets does this network have? What are subnet Ids? 1.3 subnets 2.Subnet Ids are 128.96.34.128 (H1), 128.96.34.192 (H2), 128.96.33.0 (H3) f. H1 has a routing table. Fill in the entries of routing table as follows: Subnet Number 128.96.34.128 128.96.34.192 128.96.33 Subnet Mask 255.255.255.192 255.255.255.192 255.255.255. Next hop (router) Interface 0 R1 R1 g. R1 has a routing table. Fill in the entries of routing table as follows: Subnet Number 128.96.34.128 128.96.34.192 128.96.33.0 Subnet Mask 255.255.255.192 255.255.255.192 255.255.255.0 Next hop (router) Interface 0 Interface 1 R2 4. Give the steps as in table below in the forward search algorithm as it builds the routing database for node B in the network shown in figure as follows: A 3 4 C 6 1 10 1 B 1 E F 1 D 7 Name: Student ID: Step Confirmed list 1 2 3 4 5 6 7 (B,0,-) (B,0,-) (B,0,-), (E,1,E) (B,0,-), (E,1,E), (A,2,E) (B,0,-), (E,1,E), (A,2,E), (D,2,E) (B,0,-), (E,1,E), (A,2,E), (D,2,E) (B,0,-), (E,1,E), (A,2,E), (D,2,E), (C,3,E), (B,0,-), (E,1,E), (A,2,E), (D,2,E), (C,3,E), (F,8,E) 8 Tentative list (A,3,A), (C,4,C), (E,1,E) (A,2,E), (C,4,C), (D,2,E), (F,11,E) (C,4,C), (F,8,E) (C,4,C), (F,8,E) (C,3,E), (F,8,E) (F,8,E) 5. Extra Question ISO Ref Model layer Physical Link Host X X Network Transport Session Presentation Application X X X X X Router X X = PPP, Ethernet frame X = IP 8