IT3104-Computer Networks Assignment - 2
IT3104-Computer Networks Assignment - 2
Note: The assignment needs to submit in a hard-bound register. No loose paper will be accepted.
1. A leaky bucket is at the host network interface. The data rate on the network is 2MByte/s
and the data rate on the link from the host to the bucket is 2.5Mbyte/s.
a) Suppose the host has 250 Mbytes to send onto the network and it sends the data in
a burst. What should be the minimum capacity of the bucket (in bytes) in order that
no data is lost?
Suppose the capacity of the bucket is 100M bytes. What is the longest burst time from the
host in order that no data is lost?
2. Compare and contrast distance-vector and link-state routing protocols. Also, discuss the
problems and solution strategies associated with each.
3. Consider following network and apply Distance Vector Routing Algorithm to find
Optimum routing table for router A.
4. The network shown in the below figure use link state routing protocol. Create a shortest
path tree for the Node A.
5. See the below two networks and are using Distance Vector Routing Protocol
Network 1 has three nodes A, B and C.
Network 2 has three nodes D, E and F.
D
B
A
C
E F
Network 1
Network 2
Assume advertisements are sent every 5 time steps, all links are fully functional and there
is no delay in the links. Nodes take zero time to process advertisements once they receive
them. The HELLO protocol runs in the background every time step in a way that any
changes in link connectivity are reflected in the next DV advertisement. We count time
steps from t=0 time steps.
A. Please fill in the following table:
Events Number of time steps taken
A's routing table has an entry for B
A's routing table has an entry for C
D's routing table has an entry for E
F's routing table has an entry for D
B. Now assume the link B-C fails at t = 51 and link D-E fails at t = 71 time steps.
Please fill in this table: