Skip to main content
留学咨询

辅导案例-EECS 3214:

By May 15, 2020No Comments

1 Department of Computer Science and Engineering EECS 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Instructions: • Examination time: 180 min. • Print your name and CS student number in the space provided below. • This examination is closed book and closed notes. Use of calculators is allowed. • There are 9 questions. The points for each question are given in square brackets, next to the question title. The overall maximum score is 100. • Answer each question in the space provided. If you need to continue an answer onto the back of a page, clearly indicate that and label the continuation with the question number. FIRST NAME: ___________________________ LAST NAME: ___________________________ STUDENT #: ___________________________ Question Points 1 / 10 2 / 7 3 / 12 4 / 9 5 / 12 6 / 16 7 / 12 8 / 22 Total / 100 2 1. Multiple Choice, True/False [10 points] Multiple choice questions – each question is worth [1 point]. (1) QoS parameter that measures/reflects ‘variation in packet delay’ is called _____________ . (a) reliability (b) throughput (c) jitter (d) deviation (2) _________ is generally more suitable for implementation/use of multiple routing metrics then _________ . (a) OSPF, RIP (b) RIP, OSPF (c) both protocols are equally suitable (d) none of the above (3) AS that has multiple connections to the outside world but refuses to carry transit traffic (i.e., carries only local traffic) is called __________________ . (a) Stub AS (b) Transit AS (c) Multihomed AS (d) none of the above (4) When an ICMP Error Reporting message is issued, (in its body) this message will contain/carry __________________ of the original IP packet that has caused/provoked the ‘error’. (a) IP header only (b) IP payload only (c) entire IP packet (header + payload) (d) none of the above (5) UDP uses __________________ to handle incoming user datagrams that go to different processes on the same host. (a) flow control (b) multiplexing (c) demultiplexing (d) none of the above 3 (6) Hosts A and B are exchanging TCP packets, sending useful data both ways (from A to B, and B to A). The value of ‘window size’ field in TCP packets sent from A to B is used to ______________________ . (a) control the rate of packet transmission from A to B (b) control the rate of packet transmission from B to A (c) control the size of packets sent from A (d) control the size of packets sent from B (7) Assume a TCP client has connected to a TCP server, then exchanged a few TCP packets with the server, and finally issued a TCP-FIN request. Upon receiving the TCP-FIN request from this client, the server will ______________________ . (a) immediately release the receive buffer associated with this client (b) immediately release the send buffer associated with this client (c) immediately release both the send and receive buffer associated with this client (d) the server will not release any resource at this point (8) What is usually returned when a request is made to connect to a TCP port at which no server is listening? (a) A TCP segment with the ACK and SYN bits set to 1. (b) A TCP segment with the ACK and FIN bits set to 1. (c) A TCP segment with the ACK and RST bits set to 1. (d) A TCP segment with the ACK and PSH bits set to 1. (9) In most operating systems, the duration of TCP Keep-Alive Timer is set to ___________ . (a) 1 minute (b) 10 minutes (c) 1 hour (d) 2 hours (10) In a network, after the load reaches and exceeds the network capacity, throughput _________________ . (a) Increases sharply. (b) Increases proportionally with the load. (c) Declines sharply. (d) Declines proportionally with the load. 4 2. NAT [7 points] Consider a node A behind a NAT, sending packets to a node B. We will follow a simple packet exchange of A sending to B, having the packet altered by NAT, and then the response coming back, again altered by NAT, and finally arriving at A. You know the following: Packet leaving A: Destination address: 4.3.2.1 Source address: 192.168.2.7 Destination port: 80 Source port: 1067 Packet leaving B: Destination address: 2.2.2.2 Source address: 4.3.2.1 Destination port: 2500 Source port: 80 (a) [4 points] For the packet leaving the NAT towards A, please fill in the blanks: Destination address: ___________________________ Source address: ___________________________ Destination port: ___________________________ Source port: ___________________________ (b) [3 points] Fill in the following blanks: IP address of the NAT: ___________________________ IP address of node A: ___________________________ IP address of node B: ___________________________ 5 3. Subnetting [12 points] A small university campus is assigned a large address block 12.1.0.0/17, but is only using a portion of these addresses (in 12.1.1.0/24) to number its computers. The campus uses a single Internet Service Provider (ISP) to reach the rest of the Internet. This picture shows the forwarding tables on the ISP’s router (on the left) and the campus edge router (on the right): For example, the ISP forwards all packets with destination addresses in 12.1.0.0/17 out link #2 toward the campus edge router. Both routers include a default forwarding entry 0.0.0.0/0 that can match any (other) destination IP address not specified by the previous entry. (a) [2 points] How many IP addresses does the campus “own” in its 12.1.0.0/17 block? (b) [2 points] What are the smallest and largest IP addresses that the campus “owns”, whether or not the campus is currently using the address? (c) [2 points] Suppose the ISP router receives a packet with destination IP address 12.1.1.1? What path does this packet follow? (I.e., specify the list of links this packet is sent through.) (d) [3 points] Suppose the ISP router receives a packet with destination IP address 12.1.6.1? What path does this packet follow? (I.e., specify the list of links this packet is sent through.) 6 (e) [3 points] What ultimately determines the number of links a packet with destination IP address 12.1.6.1 is sent through (i.e., the number of times this packet is actually forwarded)? 7 4. Auxiliary Network Protocols [9 points] 4.1) [6 points] Suppose there is a LAN network as shown in the figure below. Further assume that Evil Jose machine is in hands of a malicious hacker. The hacker would like to interfere with the internal operation of the network, so whenever any of the other hosts (i.e., their respective IP module) have an IP packet destined for MIDN Happy, the IP packet actually gets sent/delivered to the IP module of Evil Jose. (Recall, the actual delivering of a packet to an appropriate host is resolved by/at MAC layer.) a) [2 points] Which protocol do you think the hacker should use/manipulate to have his goal accomplished? b) [4 points] How many packets (of the protocol specified in a)), and of which type and content, should Evil Jose generate to have this goal accomplished. (You can assume that the hacker is able to alternate the operation of Evil Jose’s OS.) 8 4.2) [3 points] We have seen in class that the implementation of ICMP Source Quench functionality, both on end-hosts and routers, is optional. Explain why it is so (i.e., why the implementation is not mandatory)? 9 5. Queueing [12 points] Consider the scenario shown in the below figure. Host A is sending tiny packets to hosts B and C (neglect transmission time, just consider latency). Q is
a store-and-forward switch with an average arrival rate of 10-Gbps and a buffer that contains 16 Mbytes of packets on average. (All units are in base-10.) (a) [3 points] What is the average queueing delay that packets will incur going through the switch? (b) [2 points] What is the overall latency between A and B? 10 (c) [2 points] What is the overall latency between A and C? (d) [2 points] What is the overall latency between B and C? (e) [3 points] Without changing the network, can you propose a solution to decrease the delay between A and B? 11 6. Packet Switching & Message Segmentation [16 points] In modern packet-switched networks the source segments long, application-layer messages (e.g., an image or a music file) into smaller packets, and then sends these packets into the network, while the receiver reassembles the received segments back into the original message. We refer to this process as message segmentation. Now, consider a message that is 8 Mbits long that has to be sent from source to destination as shown in the below figure. Suppose each link has a maximum capacity of 2 Mbps. Ignore propagation, queueing and processing delays. (a) [4 points] Consider sending the message from source to destination without message segmentation. Keeping in mind that each switch uses store-and-forward packet switching, low long does it take to move the message from source host to destination host? 12 (b) [8 points] Now suppose that the message is segmented into 4,000 packets, which each packet being 2,000 bits long. How long does it take to move the file from source host to destination host when message segmentation is used? Is this better or worse time/result than in a)? (c) [4 points] What are potential drawbacks of message segmentations (as discussed in class)? 13 7. Routing [12 points] 7.1) [8 points] Run Dijkstra’s algorithm on the following network to determine the routing tables for Node 3. Show all intermediate steps! 14 7.2) [4 points] Explain what is meant by the count-to-infinity problem in distance vector routing. How does BGP, which uses distance vector, avoid this problem? 15 8. TCP Potpourri [22 points] 8.1) [12 points] For this problem you should familiarize yourself with the below figure first. Namely, assume that in the network shown in the below figure two parallel TCP transmissions are performed. TCP1 is a transmission between Source A and Sink A that uses TCP Tahoe. TCP2 is a transmission between Source B and Sink B that uses TCP Reno. Initial sstresh for both TCP transmissions is set to 32. In this specific scenario no additional delay through forwarding is introduced. In other words, RTT is only composed of the sums of the delay indicated on each link, times two! a) [6 points] For the TCP1 transmission, in the provided graph, draw the change in the size of the resulting congestion window, assuming that a packet loss (triple duplicate ACKs) is detected at time t=900ms. b) [6 points] For the TCP1 transmission, in the same provided graph, draw the change in the size of the resulting congestion window, assuming that a packet loss (triple duplicate ACKs) is detected at time t=650ms. 16 (Space left for calculations related to 8.1).) 8.2) [5 points] Show the acknowledgments (i.e., respective ACK numbers) in response to the following TCP segments, arriving in the given order. Note: the 1st number in a segment is the segment’s sequence number, and the 2nd number is the amount of application-layer data carried in the segment. Seg(2501, 500), respective Ack (_________) Seg(4001, 200), respective Ack (_________) Seg(4201, 300), respective Ack (_________) Seg(3001, 1000), respective Ack (_________) Seg(4501, 100), respective Ack (_________) 17 8.3) [5 points] Assume that a TCP process A first measures the actual round trip time to another TCP process to be 30 ms, and A thus sets its estimated round trim time to be 30 ms. The second actual round trip time that A sees is 60 ms. In response, A increases its estimated round trip to 50 ms. The third actual round trip time that A sees is 40 ms. What is the next (3rd) estimated round trip time computed by A? Justify your answer. 18 IPv4 and IPv6 PACKET FORMATs: TCP PACKET FORMAT: 19 20

admin

Author admin

More posts by admin