CS310 Exam
CS310 Exam
CS310 Exam
Final Examination
Semester 1 2017
Instructions:
Name: ___________________________________
ID:
Section I: Multiple Choice Question [18 Marks]
Circle the correct answer in the grid provided below for Questions 1-18.
Question Answer
1 a b c d e
2 a b c d e
3 a b c d e
4 a b c d e
5 a b c d e
6 a b c d e
7 a b c d e
8 a b c d e
9 a b c d e
10 a b c d e
11 a b c d e
12 a b c d e
13 a b c d e
14 a b c d e
15 a b c d e
16 a b c d e
17 a b c d e
18 a b c d e
Page 2 of 23
4. A reliable transfer protocol can detect if a received packet is a duplicate by using
a. timeout
b. sequence number
c. checksum
d. TTL
e. none of the above
7. The technique that allows a local network to use just one IP address to connect to the outside world is
called
a. DHCP
b. DNS
c. NAT
d. AIMD
e. none of the above
8. Utilizing ___ bandwidth can allow P2P model to perform better than client/server model for file
distribution.
a. server download
b. server upload
c. peer download
d. peer upload
e. none ofthe above
9. Which of the followings can be used to measure the rate (bits/time unit) at which bits transferred
between sender and receiver?
a. loss rate
b. latency
c. bandwidth
d. traffic intensity
e. none of the above
Page 3 of 23
10. Which of the followings is the type of the answer to a DNS query for the IP address of a domain
name?
a. Type A
b. Type NS
c. Type (NAME
d. Type MX
e. none of the above
Page 4 of 23
16. Ethernet is
a. unreliable as the receiving NIC does not transmit any ACKs to the sending NIC
b. reliable as data in dropped frames can be detected and recovered by using higher layer
protocols
c. unreliable as it does not use TCP and thus no handshaking between the sending NIC and the
receiving NIC
d. reliable as it is a dominant wired LAN technology
e. none of the above
18. When the efficiency of CSMA/CD is defined as lithe long-run fraction of time during which frames are
being transmitted on the channel without collision when there is a large number of active nodes,
with each node having a large number of frames to send", the approximation of efficiency can be
stated by using the following formula:
1
efficiency - - - - - - - -
1 + 5t prop/ttrans
where
tprop = max prop delay between 2 nodes in LAN
ttrans = time to transmit max-size frame
a. According to the formula, efficiency goes to 1 as t prop goes to O. However, this cannot reflect the
efficiency since when propagation delay is 0, colliding nodes will abort immediately and
therefore the channel is wasted.
b. According to the formula, efficiency goes to 1 as ttrans goes to infinity. However, this cannot
reflect the efficiency since when a frame grabs the channel, it will hold on to the channel for a
very long time and therefore the channel will not be doing productive work.
c. Efficiency calculated from the formula can reflect the following case: the longer the time for a
signal to propagate is, the less chance a carrier-sending node is able to sense a transmission
already begun at another node.
d. all of the above
e. none of the above
Page 5 of 23
Section II: Matching Question [14(2+3+2+3+4) Marks]
Chose the correct option provided below to fill in the blanks in the following 5 questions.
a. a TCP connection
b. an eBGP session
c. an iBGP session
d. a prefix
e. an AS-PATH
f. a NEXT-HOP
k. start_timer
I. stop_timer
m. timeout
n. sndpkt
o. done
p. sent ACKed
r. not usable
s. protocol number
t. port number
Page 6 of 23
1. A BGP session includes _ _ _ _ and _ __
2. When a gateway router receives prefixes from _ _- " it uses _ _ to distribute the prefixes
to _ _
3. While _ _ binds the Network Layer and the Transport Layer together, _ _ binds the
Transport Layer and the Application Layer together.
rdt_send(data}
rdt_rcv(rcvpkt} &&
\ =
sndpkt makeJ)kt(O, data, checksum} ( corrupt(rcvpkt) II
\ udCsend(sndpkt} isACK(rcvpkt,1} }
rdt rcv(rcvpkt} \ ACfiOJr_l A
A
timeout
udCsend(sndpkt}
start_timer
rdCrcv(rcvpkt}
&& notcorrupt(rcvpkt} rdCrcv(rcvpkt}
&& isACK(rcvpkt,1} && notcorrupt(rcvpkt}
stop_timer && isACK(rcvpkt,O}
rdt_rcv(rcvpkt}
rdt_send(data} A
=
sndpkt make...,pkt(1, data, checksum}
udt_send('.rO_BB_SBR'.E'}
start_timer
Figure 1
Page 7 of 23
5. For rcp sender's sequence number space showed in Figure 2 below,
A indicates
B indicates _ __
C indicates _ __
D indicates _ __
vvindovv
,- ~ -+----~~
I1I111111
sender sequence number space
111111111
----~----- I
B usable not
but not usable
yet sent
Figure 2
Page 8 of 23
Section III: Short Answer [48(6+4+2+5+4+8+6+2+5+6) Marks]
Page 9 of 23
3. Do you agree that BGP is the glue that holds the Internet together? Justify your answer. [2 marks]
4. What is the effect of out-of-order delivery on Go-Back-N, Selective Repeat and TCP? [5 marks]
Page 10 of 23
5. Indicate the next hop in the following scenarios. [4(1+2+1) marks]
Figure 3
b. Host 10.0.0.1 sends a request datagram to host 128.119.40.186, 80. The response datagram from
Host 128.119.40.186 contains a destination address 138.76.29.7, 5001. The datagram arrives at
host 10.0.0.1 has source address 128.119.40.186,80 and destination address 10.0.0.1, 3345.
10.0.0.2
10.0.0.3
Figure 4
Page 11 of 23
c. Clearly indicate the position of 24.128.190.197 in Figure 5 below using the Wireshark
captured data provided in Figure 6.
Figure 5
Figure 6
Page 12 of 23
6. Consider the TCP congestion control in Figure 7 below. [8(6+2) marks]
Congestion Windo_
(CWND)
1 11 1 1 1 Time
A Be D E F G
Figure 7
a. Each of the marked points (i.e., A, B, C, D, E, F, G) along the timeline in Figure 7 (above) indicates
relevant phase and corresponding events and actions of TCP congestion control. These phases,
events and actions can be found in the FSM Description of TCP Congestion Control presented in
Figure 8 (below). For each of the marked points in the Figure 7 (above), circle or tick the
appropriate phase, events and actions, and clearly indicate the corresponding marked points in
Figure 8 (below).
newACK
duplicate ACK
SJ
cwnd =cwnd + MSS .(MSSlcwnd)
dupACKcount++ new ACK dupACKcount = 0
A
O cwnd = cwnd+MSS
dupACKcount = 0
tmnsmit new segment(s), as ai/owed
Figure 8
Page 13 of 23
b. Assume CWND is 10,000 right before F. What is the value of ssthresh at G?
7. Suppose a laptop is connected to Ethernet and sends a DNS query message. What is the sequence of
packet header on this request packet (that contains the DNS query) as it leaves the laptop starting
from the outer most header? What are their corresponding layers? What addresses will be contained
in this packet? [6 marks]
8. What is the major difference between CSMA and CSMA/CD? What is the major difference between
CSMA/CD collision detection in wired LANs and wireless LANs? [2 marks]
Page 14 of 23
9. Figure 9 below represents routers with the indicated link costs in an institutional network. [5 marks]
~
,:.
2\'" 1
7
...
'•..•.,•..
<;i":''' ..... .
Figure 9
a. What is the name of the routing algorithm used to compute the following tables presented
in Figure 10 (below) for the least-cost paths in the institution's network?
b. Replace the blanks in Figure 10 (below) with the letters (Le., a,b,c) used to represent the
nodes in Figure 9 (above). E.g., "Node ~ table".
c. Use the arrows to show how the algorithm updates the tables in sequence. Draw the arrows
in Figure 10 (below).
d. Show how the costs in the circled row (i.e., "20 1") in Figure 10 (below) are derived. Present
your solution on page 16.
e. Do the tables in Figure 10 (below) require more updates? Justify your answer.
c 00 00 00 c 7 1 0 c 3 1 0
Node_table a
cog toc a b c
cost to cost to
i a b c
a 00 00 00 a 0 2 a 0 2 3
~ b 2 0 1
c
~b
0;;:::
c 7 1 0
.gE b 2 0 1
00 00 00 c 3 1 0
Page 15 of 23
Page 16 of 23
10. Figures 12-16 presented on page 18 show relevant data for a TCP connection captured by Wireshark.
Figure 12 shows relevant packets captured. Figures 13-16 show associated data for each highlighted
packet. [6(3+3) marks]
a. What is the sequence number of the segment that is indicated by Wireshark as the No.4 packet
(Le., packet number 4)? Packet numbers are showed in the column that has the "No." as its
column header. Clearly indicate the position of this sequence number in the sender sequence
number space in Figure 11 below.
b. What is the packet number (indicated by Wireshark) of the segment that acknowledges the
receipt of the segment mentioned in point a (above)? What is the sequence number
acknowledged by this acknowledgement segment? Clearly indicate the position of this
sequence number in the sender sequence number space in Figure 11 below.
window size
14 IV -I
I111111111111111111111111
sender sequence number space
Figure 11
Page 17 of 23
No, TIme Source Destination Protocol Langtllnfo
,e'
,
1 ••ee.e 192.168.1.102 128.119:245.12 Tep 62 1161 ~ 80 [5¥N] Seq:8 Win=16384 Len--0 M55=1469 5ACKJEIv4=1
2 0.823172 128.119.245.12 192.168.1.102 Tep 62 80 • 1161 [S'ffl, ACK] Seq=0 Ack=1 Win=5840 Len-i HS5=1460 SACK}EPIoI=I
; 3 U23265 192.168.1.102 128.119.245.12 rcp 54 1161 • 89 [ACK] Seq:l Ack:l Win:17528 Len=8
i 4 0.826417 192.168.1.102 128.119.245.12 rep 619 [TCP segment of a reassembled POU]
, 50.841737 192.168.1.102 128.119.245.12 TCP 15,. [rCp segment of a reassembled POU]
I 6 0.053937 128.119.245.12 192.168.1.102 Tep 60 80 • 1161 [ACK] Seq:! Ack:566 Win=6780 Len=0
! 1 0.954026 192.168.1.182 128.119.245.12 TCP 15. [Tep segment of a reassembled POU]
i
8 0.054690 192.168.1.102 128.119.245.12 TCP 15. [TCP segment of a reassembled POU]
,
9 0.077294 128.119.245.12 192.168.1.102 rcp 60 80 • 1161 [ACK] Seq:! Ack=2026 Win=8760 Len:0
!
10 8.077405 192.168.1.102 128.119.245.12 rep 15m [Tep segment of a reassembled POU]
11 8.078157 192.168.1.102 128.119.245.12 TCP 15. [TCP segment of a reassembled POU]
12 •• 124085 128.119.245.12 192.168.1.102 rep 60 80 • 1161 !ACK] Seq:l Ack:3486 Win-11680 Len:0
Figure 12
Figure 14
Page 18 of 23
Section IV: Problem Solving [20 (10+10) Marks]
1. The Networking Team is evaluating the performance of a network. Alice is tasked to measure the
throughput of a TCP connection based on the Wireshark captured data presented on hardcopy. The
data Alice has received is presented in 9 figures. These figures are Figures 12-16 (presented on page
18) and Figures 17-20 (presented below).
As she examines the Wireshark captures, Alice believes that she would need more data to
complete this task. She believes that she has not received the complete captured data. The Team
Leader would like you to help Alice to identify the missing data so that she can measure the
throughput of the TCP connection. What other data is needed? Show your reasoning on page 20 (e.g.,
provide a formula with illustrations on how the throughput of a TCP connection can be measured).
[10 marks]
Figure 20
Page 19 of 23
Page 20 of 23
2. A network designer is asked to address the reliable data transfer issues in a network. As you are
completing (5310, the network designer would like to seek your suggestions. Use the concepts and
techniques you have learned from (5310 to give your suggestions to the network designer.
Show steps whenever necessary. [10 marks]
Page 21 of 23
Extra Working Page 1
Page 22 of 23
Extra Working Page 2
THE END
Page 23 of 23
,,
,,
"