TSIN02 Internetworking General networking Daniel Persson Exercise 1 Show the communication at the application layer for the following simple private internet: Exercise 2 Show the communication at the application layer for the following simple private internet: Exercise 3 Describe three possible reasons to why a sender does not receive an ACK for a transmitted packet! Exercise 4 Describe the hidden terminal problem! Exercise 5 Describe two different ways of performing channel partitioning! Exercise 6 You are to design a wireless system that reads railway sensor data over the Internet, and use GSM-Railway (GSM-R) – a GSM standard for railway applications. It is important that the system is robust. It is known that commercial GSM bands disturb GSM-R. Therefore, you choose to use a strong link layer repetition code: 0 1 0000 1111 a) Assume that the channel and digital modulation gives you an effective binary symmetric channel, with a transition probability less than 0.5 for a transition between 0 and 1, and assume further that there is equal probability for that the codeword 0000 and the codeword 1111 are used at the encoder. How do you maximum likelihood (ML)-decode 0001? b) How do you ML-decode 1101? c) How do you ML-decode 1100? d) Is decoding always giving the right answer? Exercise 7 Ethernet uses CSMA-CD. User 1 starts transmitting at time 0, and user 2 starts to transmit 1 microseconds later. The users are situated at a distance of 900 m from each other. Assume that the propagation speed of the signal is the speed of light. The jamming signal lasts one microsecond. a) When does user 2 detect user 1’s signal? b) When is the first time that user 1 can start retransmitting? Exercise 8 Why is CSMA-CD chosen for Ethernet, while CSMA-CA is chosen for WIFI? Exercise 9 What is the range of addresses in the following blocks: a) 123.56.77.32/29 b) 200.17.21.128/27 c) 17.34.16.0/23 d) 180.34.64.64/30 Exercise 10 An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants to distribute these blocks to customers as follows: a) The first group has 200 medium-size businesses, each needs 128 addresses. b) The second group has 400 small businesses, each needs 16 addresses. c) The third group has 2048 households, each needs 4 addresses. Design the subnets for the businesses and the households and give the slash (CIDR) notation for each subblock. Find out how many addresses are still available after these allocations. 1 General networking TSIN02 Internetworking Daniel Persson Exercise 11 A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organisations A, B, C and D request 4000, 2000, 4000, 8000 addresses respectively, and in that order. For each of these, give the first IP address assigned, the last address assigned, and the subnetwork address in the CIDR notation. Exercise 12 A router has the following (CIDR) entries in its routing table: Address/mask Next hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 default Router 2 For each of the following IP addresses, what does the router do if a packet with that destination address arrives? a) 135.46.63.10 b) 135.46.52.2 c) 135.46.57.14 d) 192.53.40.7 e) 192.53.56.7 Exercise 13 For a given IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address (in slash notation)? Exercise 14 Show the shortest form of the following IPv6 adresses: a) 2340:1ABC:119A:A000:0000:0000:0000:0000 b) 0000:00AA:0000:0000:0000:0000:119A:A231 c) 2340:0000:2222:0000:0000:119A:A001:0000 d) 0000:0000:0000:2340:0000:0000:0000:0000 Exercise 15 The network layer divides the datagrams into smaller datagrams if they are bigger than the MTU of a link layer over which they are to be sent. a) Write down an advantages of having a large MTU. b) Write down an advantage of having a small MTU. Exercise 16 Host A sends an ICMP query message to host B, but never receives an answer. Give three possible causes and the corresponding course of actions for host A. Exercise 17 In the figure below, a router is connected to some (sub)networks. The figure also shows the routing table for the router. A datagram arrives at one of the router interfaces. To which interface is the datagram forwarded when the destination address is a) 145.14.192.71? b) 135.11.80.21? 2 General networking TSIN02 Internetworking Daniel Persson Exercise 18 A datagram arrives to at router R1 in the figure below. The figure also shows the routing table for router R1. To which interface is the datagram forwarded when the destination address is a) 201.4.16.70? b) 202.70.20.30? 3 General networking TSIN02 Internetworking Daniel Persson Exercise 19 You will transport the final of Eurovision song contest via IP-TV to a majority of the European households from Copenhagen 2014. The problem is that the IP network in Copenhagen will be overloaded when unicasting such a massive flood of packets to all the households. Instead you plan to set up a network layer multicast service. To better understand the problem, you model the distribution network as a tree, where each node is connecting to 2 nodes at each level, and where there are 28 levels. The households are all on level 28, and all nodes on this level are households. a) For every datagram that has to be delivered to the households, how many unicast packets will need to be sent on the most charged link? b) Same question in the case of a perfect multicast, where each node receives one datagram, and retransmits two copies, one for each link? Exercise 20 How does each router table look in a network with three routers A, B, and C, where all routers connect to each other, but where the transport cost between router A and B; and A and C are 1; while the cost between routers B and C is 3? Exercise 21 A router has three interfaces, each of them connected to a subnet. a) What is the computational complexity for forwarding the packet on the right interface? What is the storage complexity associated with the sorting? b) What would the complexity be if the IP addresses were not organized in subnets? What is the storage complexity associated with the sorting? Exercise 22 a) Why is fragmentation performed at the network layer? b) Discuss why we need to reassembly at the final destination, not at each router. Exercise 23 A home user has installed a switch to link her ADSL modem M, her two laptop computers A and B, and her husband’s desktop H. M is on switch interface 1, A is on switch interface 2, B is on switch interface 3, and H is on switch interface 4. How are frames forwarded by the switch after that the following frames have been sent: A to H, B to M, M to B, M to A? The switch’s forwarding table is initially empty. Assume that the computers know their destination IP and MAC addresses. Exercise 24 In the same network, assume again that the switch’s forwarding table is empty. Assume now that the host A wants to send a message to host B, and that A knows B’s IP address, but not B’s MAC address. a) List the steps until the first packet is sent, if A would be using ARP. Also discuss the switch’s behaviour! b) List the steps if A would not be using ARP c) Which strategy of that in (a) and that in (b) is best, and why? Exercise 25 1/2 of the users served by an ISP tend to use real time speech communication over the Internet, and use 10 kbit/s each. 1/4 of the users tend to like to stream mp3 songs, and use 100 kbit/s each. ¼ of the users like video applications, and use 1Mbit/s. The ISP routers connecting to the backbone can only handle 1 Gb/s. The ISP considers two choices: 1) Continue business as usual with the TCP/IP stack 2) Take part in a worldwide initiative to implement IntServ to get QoS. The ISP would then have to guarantee video quality to all users. a) How many more users would the ISP be able to serve while continuing using TCP/IP alone, compared to when IntServ is used? b) What happens if 1/8 of the music-listeners started to prefer a new music video service if we use TCP/IP, and with IntServ, with the user allocation in (a)? c) What are the pros and cons of non-circuit-switched networks? 4 TSIN02 Internetworking General networking Daniel Persson d) To what extent does a connection-oriented service help a non-circuit-switched network? e) What is a virtual circuit? Exercise 26 Which parameters does a newly added host in a network need to know in order to communicate outside the local network? Exercise 27 A DHCP packet in encapsulated in a UDP packet, which is encapsulated in an IP packet, which is encapsulated in an Ethernet frame. Find the efficiency of a DHCP packet when no option is used. The efficiency in this case is measured in the number of bytes in the DHCP packet to the total number of bytes transmitted on the physical layer. Exercise 28 Why does a newly added host need to know a) the IP address of a router? b) the IP address of a name server? c) its subnet? Exercise 29 Which are the two address allocations provided by DHCP? Describe when they are used! Exercise 30 A user Ada connects a new computer to an Ethernet LAN, opens a browser, and types in google.com. Well at google, she types in the word “guitar”. She gets a list of sites and accesses guitar.com. What happens on the different TCP/IP stack layers? Exercise 31 a) A name space that maps each address to a unique name can be organized in two ways. Describe these two ways of organizing the name space! b) What is the difference between a root server, a primary server, and a secondary server? c) Which are the three sections of the domain name space (tree)? Describe them! d) What does “name-address resolution” mean? e) What is the difference between recursive resolution and iterative resolution? Exercise 32 Is registration required if the mobile host acts as a foreign agent? Explain your answer. Exercise 33 Redraw Figure 10.7 in the course book (also shown below) with the corresponding data transfer path if the mobile host acts as a foreign agent. 1 4 2 3 Exercise 34 We have the following IP addresses in a mobile IP scenario shown below: 5 TSIN02 Internetworking General networking Daniel Persson Mobile host home address: Mobile host care-of address: Remote host address: Home agent address: 130.45.6.7/16 14.56.8.9/8 200.4.7.14/24 130.45.10.20/16 Let us define a simplified IP datagram in the following way: HEADER | DATA = O.H.F. | S.IP | D.IP | DATA where O.H.F. = Other Header Fields (with details that we are not so interested in here), S.IP = Source IP address, and D.IP = Destination IP address. Show the contents of a simplified IP datagram sent from the remote host to the home agent. Exercise 35 Using the information in Exercise 11, show the contents of a simplified IP datagram sent by the home agent to/via the foreign agent. Use tunnelling. Exercise 36 Using the information in Exercise 11, show the contents of a simplified IP datagram sent by the foreign agent to the mobile host. Exercise 37 Using the information in Exercise 11, show the contents of a simplified IP datagram sent by the mobile host to the remote host. Exercise 38 What type of inefficiency do we have in Exercise 5? Explain your answer. 1 4 2 3 Exercise 39 Are both UDP and IP unreliable to the same degree? Why or why not? Exercise 40 A client uses UDP to send data to a server. The data length is 16 bytes. a) What is efficiency of this transmission at the transport layer, in terms of the ratio of data bytes to the total number of transmitted bytes? b) What is the corresponding efficiency at the network layer (assume no options for the IP datagram header)? Exercise 41 TCP is sending data at 1 megabyte per second (8Mbps). If the sequence number starts with 7000, how long does it take before the sequence number goes back to zero? 6 General networking TSIN02 Internetworking Daniel Persson Exercise 42 Compare the TCP segment header and the UDP datagram header. Make a table, like the one below, where you list all the fields in the TCP segment header and all the fields in the UDP datagram header. Explain shortly in the rightmost column the purpose of each field. Fields Source port numbers …. …. UDP TCP Purpose You should fill in this field… …. …. Exercise 43 UDP is a message-oriented protocol, TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its messages, which protocol should be used, UDP or TCP? Exercise 44 In a TCP connection, the value of cwnd is 3000 and the value of rwnd is 5000. The host has sent 2.000 bytes, which has not yet been acknowledged. How many more bytes can be sent? Exercise 45 A TCP connection is using a window size of 10.000 bytes and the previous acknowledgement number was 22.001. It receives a segment with acknowledgement number 24.001 and a window size advertisement of 12.000. Draw a diagram to show the situation of the window before and after. 7
© Copyright 2024