CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2
1.) Compare connection-oriented with connectionless protocols. What type of
protocol is IP? How about TCP and UDP?
Answer:
Connection-oriented protocols
Require a setup time to establish a connection
Always receive data in the order that it was sent.
Tend to be more reliable
Connection-less protocols
Require no setup time
Can receive data out of order
Tend to be less reliable
•
•
•
IP is an unreliable connectionless protocol.
TCP is a reliable connection-oriented protocol.
UDP is an unreliable connectionless protocol.
2.) Which of the following are guaranteed under IP?
×
×
×
×
×
Packets will arrive in the same order that they are sent.
IP uses the IP address stored in each datagram to route the packet.
IP packets will contain both source and destination IP addresses.
IP uses the port number stored in each datagram to route the packet.
Packets contain uncorrupted data.
Packets have a fixed length.
After the connection is established, packets all take the same route.
3.) Are packets sent inside frames, or is it frames inside packets? What about TCP
segments?
Answer:
Data from higher layers are encapsulated inside transmission units of lower
layers. Thus a data link layer frame might contain a network layer packet which
might contain a TCP segment.
4.) What is the MTU and what does it have to do with datagrams?
Answer:
MTU is the Maximum Transmission Unit. It is the maximum size for data link
layer frames. When a datagram will not fit inside a single frame, it must be
fragmented (divided into smaller packets).
5.) If a datagram is fragmented on the first hop on route to its destination, will the
destination host necessarily know that the packet was fragmented?
Answer:
Yes, because the packet will remain fragmented until it arrives at the final
destination.
6.) Is there a maximum number of routers that a packet can pass through on its way
to its destination? Why or why not?
Answer:
Yes, because the time to live value is decremented at each hop. The time to live
is fixed size (8-bits) so there can be no more than 255 hops.
7.) How can we tell a class B network address from a class C network address?
Answer: The first few bits of the address specify the class.
Which address class provides more host addresses per network?
Answer: A class “B” network provides close to 64K host addresses per network,
while a class “C” network provides about 256 host addresses per network.
Which address class allocates more network addresses?
Answer: A class “C” network provides more network addresses.
8.) What is subnetting, and how is it different from supernetting?
Answer: Subnetting utilizes address bits that the class designated as host address
bits to extend the network address. Supernetting utilizes address bits that the class
designated as network address bits to extend the host address.
9.) Suppose that we want to split a network with address 123.132.23.0/24 into 16
subnets. How many hosts could we put on each subnet?
10.)
Answer: In a class “C” network there 8 bits allocated for the host address.
Subnetting to create 16 subnets will require log216 bits = 4 bits. The remaining bits
will provide 24 = 16 host addresses. Two of these addresses are reserved for
broadcasting and to specify “this host,” leaving 14 addresses available for hosts.
11.)
What is the special significance of the following addresses?
1.) 0.0.0.0
♦ The address of “this host.” (the primary IP address of the machine
executing the instruction.
2.) 0.0.0.18
♦ The host with the host address 18 on “this local network.”
3.) 255.255.255.255
♦ Broadcast
4.) 161.115.255.255
♦ Broadcast on network 161.115
5.) 127.0.0.1
♦ The address of “this host.” (loopback)
12.)
Suppose host 161.115.144.19/16 wants to send a message to host
161.115.144.120/16. What is the minimum number of routers the packets have to
pass through? How is this determined?
Answer:
♦ There are 16 bits of the IP address allocated for the network address,
while the remaining 16 bits are used to specify the host address. So
the network address for both machines is 161.115. Because both the
source and destination are on the same network, the message will not
have to pass through any routers.
will be stored in a table for later use.
13.)
CS335: What does the fork() system call do? When would we want to
use it?
Answer:
The fork() system call, which is supported under Unix but not Windows, creates a
child process that is identical to the parent process in every respect with the
exception of the return status from the fork call itself.
The fork call is often used in network servers that handle multiple clients. Each
time a client connects to the server, a new child process is created to handle the
client’s requests. The parent process is then available to await other client
connections.
14.)
Which of the following protocols are transport-layer protocols?
× IP
TCP
UDP
15.)
Under which of the following protocols can data arrive out of order?
× TCP
UDP
16.)
Which of the following protocols is reliable
TCP
× UDP
17.)
Which of the following protocols is connection-oriented
TCP
× UDP
18.)
Which two network layers utilize sliding window protocols?
Answer:
Data link layer and transport layer.
19.)
Are TCP segments ever contained in packets?
Answer: Yes, lower-layer transmission units can contain higher-layer transmission units.
Are packets ever contained in TCP segments?
Answer: No, lower-layer transmission units can contain higher-layer transmission units,
but not the other way around.
Are frames ever contained in TCP segments?
Answer: No, lower-layer transmission units can contain higher-layer transmission units,
but not the other way around.
20.)
For each of the following, identify whether it occurs as part of distance
vector routing, link state routing, flooding, or some combination.
1.) Perform Dijkstra’s all shortest paths algorithm.
i. Link state routing
2.) Shortest paths are always followed.
i. Link state routing
ii. Flooding
3.) Only neighbors exchange information about their routes.
i. Distance vector routing
4.) Non-neighbors exchange information about their routes.
i. Link state routing
5.) Routing tables entries are determined.
i. Distance vector routing
ii. Link state routing
6.) The algorithm determines the complete topology of the network.
i. Link state routing
7.) The count to infinity problem might be encountered.
i. Distance vector routing
8.) The procedure must be repeated multiple time to generate good results.
i. Distance vector routing
9.) Neighbors might lie about the best routes they know.
i. Distance vector routing
21.)
Consider the network shown in the figure.
1
C
3
1
3
A
B
2
D
E
1
6
G
2
1
F
2
Using distance vector routing:
a.) Show the data that node A will receive on the first iteration of the
algorithm.
Answer:
From ode C:
B, 3
E, 1
From ode D:
B, 2
F, 1
From ode E:
C,1
F, 1
G, 6
b.) Show the routing table for node A after the first iteration of the
algorithm has been completed. (6 pts)
Answer:
A, 0, A
B, 4, C
C, 1, C
D, 2, D
E, 2, C
F, 3, D
G, 8 (or 9), E
22.) Use Dijkstra’s all shortest paths algorithm to determine the shortest
paths to node A. Record the order in which the nodes are made
permanent along with the next hop and the distance to the destination.
1
C
1.8
1
4
A
B
1
D
E
1
1.5
G
2.5
1
F
0.3
Answer:
ode ame
A
C
E
D
B
F
G
Distance to Destination
0
1
2
2.5
2.8
3
3.3
ext hop
A
A
C
A
C
E
F