A-I
A-I
Assignment
Name: ID:
1 (2 Marks) True or false: When a BGP router receives an advertised path from its neighbor,
it must add its own identity to the received path and then send that new path on to all
of its neighbors. Explain.
4 (2 Marks) What are some of the possible services that a link-layer protocol can offer to
the network layer? Which of these link-layer services have corresponding services in IP?
In TCP?
6 (2 Marks) How big is the MAC address space? The IPv4 address space? The IPv6 address
space?
A-I-1
(d) YES NO ECMP (Equal Cost MultiPath) is associated to OSPF routing.
(e) YES NO Random back-off mechanism not used for CSMA/CA.
(f) YES NO Token ring is a special routing mechanism.
(g) YES NO Split horizon is solution for Denial of service (DoS) attack.
(h) YES NO IEEE 802.16 is wireless local area network(WLAN) standard.
8 Consider the network described in the previous problem. Now suppose that the two
TCP connections, C1 and C2 , have the same RTT of 100 msec. Suppose that at time t , C1 ’s
congestion window size is 15 segments but C2 ’s congestion window size is 10 segments.
(a) What are their congestion window sizes after 2200 msec?
A-I-2
(b) In the long run, will these two connections get about the same share of the band-
width of the congested link?
(c) We say that two connections are synchronized, if both connections reach their max-
imum window sizes at the same time and reach their minimum window sizes at the
same time. In the long run, will these two connections get synchronized eventually?
If so, what are their maximum window sizes?
(d) Will this synchronization help to improve the utilization of the shared link? Why?
Sketch some idea to break this synchronization.
10 (5 Marks) A 1-km-long, 10-Mbps CSMA/CD LAN (not 802.3) has a propagation speed
of 200 m/µsec. Repeaters are not allowed in this system. Data frames are 256 bits long,
including 32 bits of header, checksum, and other overhead. The first bit slot after a suc-
cessful transmission is reserved for the receiver to capture the channel in order to send
a 32-bit acknowledgment frame. What is the effective data rate, excluding overhead,
assuming that there are no collisions?
A-I-3
11 (5 Marks) Suppose a router has built up the routing table shown in Table . The router
can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers
R2 , R3 , or R4 . Assume the router does the longest prefix match. Describe what the router
does with a packet addressed to each of the following destinations:
(a) 128.96.171.92
(b) 128.96.167.151
(c) 128.96.163.151
(d) 128.96.169.192
(e) 128.96.165.121
A-I-4
13 (5 Marks)
(a) A token bucket scheme is used for traffic shaping. A new token is put into the
bucket every 5 µsec. Each token is good for one short packet, which contains 48
bytes of data. What is the maximum sustainable data rate?
(b) A computer on a 6-Mbps network is regulated by a token bucket. The token bucket
is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How
long can the computer transmit at the full 6 Mbps?
14 (5 Marks)
(a) What is HOL blocking? Does it occur in input ports or output ports? (1 Mark)
(b) What is meant by a “plug-and-play” or “zeroconf” protocol? (1 Mark)
(c) Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes.
Suppose the original datagram is stamped with the identification number 422. How
many fragments are generated? What are the values in the various fields in the IP
datagram(s) generated related to fragmentation? (3 Marks)
A-I-5
””Knowledge is being aware of what you can do. Wisdom is knowing when not to do it.” - -
A-I-6