All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other packets anywhere in the router.a. Suppose the two packets are to be
We noted that network layer functionality can be broadly divided into data plane functionality and control plane functionality. What are the main functions of the data plane? Of the control plane?
We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding?
What is the role of the forwarding table within a router?
We said that a network layer’s service model “defines the characteristics of end-to-end transport of packets between sending and receiving hosts.” What is the service model of the Internet s
In Section 4.2, we saw that a router typically consists of input ports. Output ports, a switching fabric and a routing processor Which of these are implemented in hardware and which are implemented
Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also
What is meant by destination-based forwarding? How does this differ from generalized forwarding (assuming you’ve read Section 4.4, which of the two approaches are adopted by Software-Defined
Suppose that an arriving packet matches two or more entries in a router’s forwarding table. With traditional destination-based forwarding, what rule does a router apply to determine which of these
Three types of switching fabrics are discussed in Section 4.2. List and briefly describe each type. Which if any, can send multiple packets across the fabric in parallel?
Consider the topology shown in Figure 4.20. Denote the three subnets with hosts (starting clockwise at 12:00) as Networks A, D, and C. Denote the subnets without hosts as Networks D, E, and F.a.
Describe how packet loss can occur at output ports. Can this loss he pre vented by increasing the switch fabric speed?
In Section 4.2, we studied FIFO, Priority, Round Robin (RR), and Weighted Fair queueing (WFQ) packet scheduling disciplines? Which of these queueing disciplines ensure that all packets depart in the
Give an example showing why a network operator might want one class of packets to be given priority over another class of packets.
Consider the network setup in Figure 4.25. Suppose that the ISP instead assigns the router the address 24.34.112.235 and that the network address of the home network is 192.168.1/24.a. Assign
What is an essential different between RR and WFQ packet scheduling? Is there a case (Consider the WFQ weights) where RR and WFQ will behave exactly the same?
Consider the SDN Open Flow network shown in Figure 4.30. Suppose that the desired forwarding behavior for data-grams arriving at s2 is as follows:Any datgrams arriving on input port 1 from hosts h5
Recall that we the Internet checksum being used in both transport-layer segment (in UDP and TCP headers, Figures 3.7 and 3.29 respectively) and in network-layer data-grarns (IP header, Figure 4.16).
When a large data-gram is fragmented into multiple smaller data-grams, where are these smaller data-grams reassembled into a single larger data-gram?
Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP data-gram sent from the source host to the destination host will travel over how many
Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP data-gram. What percentage of each data-gram will be
What is meant by the ‘match plus action” operation of a router or switch? In the case of destination-based forwarding packet switch, what is matched and what is the action taken? In the case of
What is the difference between a forwarding table that we encountered in destination-based forwarding in Section 4.1 and Open Flow’s flow table that we encountered in Section 4 · 4?
How does generalized forwarding differ from destination-based forwarding?
It has been said that when IPv6 tunnels through IPv4 routers, lPv6 treats the IPv4 tunnels as link-layer protocols. Do you agree with this statement? Why or why not?
Compare and contrast the lPv4 and the 1Pv6 header fields. Do they have any fields in common?
What is a private network address? Should a data-gram with a private network address ever be present in the larger public Internet? Explain.
What is meant by a “plug-and-play” or “zeroconf’ protocol?
What is meant by the term “route aggregation”? Why is it useful for a router to perform route aggregation?
Name three header fields in an LP data-gram that can be “matched” in Open- Flow 1.0 generalized forwarding. What are three IP data-gram header fields that cannot be ‘matched” in Open Flow?
What is ment by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented “monolithically,” what do we mean?
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices?
Compare and contrast the properties of a centralized and a distributed routing algorithm. Give an example of a routing protocol that takes a centralized and a decentralized approach.
What is the “count to infinity” problem in distance vector routing?
Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?
Why are different inter-AS and intra-AS protocols used in the Internet?
True or false: When an OSPF route sends its link state information, it is sent only to those nodes directly attached neighbors. Explain.
What is meant by an area in an OSPF autonomous system? Why was the concept of an area introduced?
Argue that for the distance-vector- algorithm in Figure 5.6, each value in the distance vector D(x) is non-increasing and will eventually stabilize in a finite number of steps. Figure 5.6 Node x
Consider Figure 5.7. Suppose there is another router w, connected to router y and z. The costs of all links are given as follows: c(x,v) 4, c(x,z) = 50, c(v,w) = 1, cz,w) = 1. c(v.z) = 3. Suppose
True or false: When a BGP router receives an advertised path from its neigh bor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
Describe the main role of the communication layer, the network - wide state- management layer, and the network-control application layer in an SDN controller.
Suppose you wanted to implement a new routing protocol in the SDN control plane. At which layer would you implement that protocol? Explain.
What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages sent from the controller across the southbound interface and who sends
Describe the purpose of two types of Open Flow messages (of your choosing) that are sent from a controlled device to the controller. Describe the purpose of two types of Open flow messages (of your
What is the purpose of the service abstraction layer in the Open Daylight SDN control?
Names four different types of ICMP messages
In Figure 5.13, suppose that there is another stub network V that is a customer of ISP A. Suppose that B and C have a peering relationship, and A is a customer of both B and C. Suppose that A would
What two types of ICMP messages are received at the sending host executing the Trace route program?
Suppose ASs X and Z are not directly connected but instead are connected by AS Y. Further suppose that X has a peering agreement with Y, and that Y has a peering agreement with Z. Finally, suppose
Define the following terms in the context of SNMP: managing server, managed device, network management agent and MIB.
What are the purposes of the SNMP Get Request and Set Request messages?
In Section 5.7 we saw that it was preferable to transport SNMP messages in unreliable UDP data-grams. Why do you think the designers of SNMP chose UDP rather than TCP as the transport protocol of
What is the purpose of the SNMP trap message?
Consider the transportation analogy in Section 6.1.1. If the passenger is analagous to a data-gram, what is analogous to the link layer frame?
Show (give an example other than the one in Figure 6.5) that two-dimensional parity checks can correct and detect a single bit error. Show (give an example of) a double-bit error that can be detected
Suppose the information portion of a packet (D in Figure 6.3) contains 10 bytes consisting of the 8-bit unsigned binary ASCII representation of string Networking. Compute the
Consider the previous problem, but instead suppose these 10 bytes containa. The binary representation of the numbers 1 through 10.b. The ASCII representation of the letters B through K (uppercase).c.
Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of rate R. Denote the propagation delay between the two nodes as dprop Will there be a collision if
Consider the 5-bit generator, G = 10011, and suppose that D has the value 1010101010. What the value of R?
In Section 6.3, we listed four desirable characteristics of a broadcast channel. Which of these characteristics does slotted ALOHA have? Which of these characteristics does token passing have?
Consider the previous problem, but suppose that D has the valuea. 1001010101.b. 0101101010.c. 1010100000.
In CSMA/CD, after the fifth collision, what is the probability that a node chooses K = 4? The result K̅ = 4 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?
In this problem, we explore some of the properties of the CRC. For the generator G (= 1001) given in Section 6.2.3. Answer the following questions.a. Why can it detect any single bit error in data
In Section 6.3, we provided an outline of the derivation of the efficiency of slotted ALOHA. In this problem we’ll complete the derivation.a. Recall that when there are N active nodes, the
How big is the MAC address space? The IPv4 address space? Tue IP6 address space?
Compare the frame structures for 10BASE-T. 100BASE-T, and Gigabit Ethernet. How do they differ?
What is the maximum number of VLANs that can be configured on a switch supporting the 802.1 Q protocol? Why?
Consider Figure 6.33. Now we replace the router between subnets I and 2 with a switch SI, and label the router between subnets 2 and 3 as Rl.Figure 6.33a. Consider sending an IP data-gram from Host E
Suppose now that the leftmost router in Figure 6.33 is replaced by a switch. Hosts A, B, C, and D and the right router are all star-connected into this switch. Give the source and destination MAC
Consider Figure 6.15. Suppose that all links arc loo Mbps. What is the maximum total aggregate throughput that can be achieved among the 9 hosts and 2 servers in this network? You can assume that any
Suppose the three departmental switches in Figure 6. 15 are replaced by hubs. All links are 100 Mbps. Now answer the questions posed in problem P23.Figure 6.15Data From Problem 23Consider Figure
Suppose that all the switches in Figure 6.15 are replaced by hubs. All links are 100 Mbps. Now answer the questions posed in problem P23.Data From Problem 6.23Consider Figure 6.15. Suppose that all
Consider the single switch VIAN in Figure 6.25, and assume an external router is connected to switch port 1. Assign IP addresses to the FE and CS hosts and router interface. Trace the steps taken at
Consider the data center network with hierarchical topology in Figure 6.30. Suppose now there are 80 pairs of flows, with ten flows between the first and ninth rack, ten flows between the second and
For the two-sender, two-receiver example, give an example of two CDMA codes containing 1 and 21 values that do not allow the two receivers to extract the original transmitted bits from the two CDMA
Suppose that Bob receives a POP message from Alice. How does Bob know for sure that Alice created the message (rather than, say, Trudy)? Does PGP use a MAC for message integrity?
Consider WEP for 802.11. Suppose that the data is 10101100 and the key-stream is 1111000. What is the resulting cipher text?
Streaming video systems can be classified into three categories. Name and briefly describe each of these categories.
In the VoIP example in Section 9.3, let h be the total number of header bytes added to each chunk including UDP and IP header. a. Assuming an IP datagram is emitted every 20 msecs, find the
Consider the simple model for HTTP? Streaming. Suppose the server sends bits at a constant rate of 2 Mbps and playback begins when 8 million bits have been received. What is the initial buffering
Section 9.3 describes two FEC schemes. Briefly summarize them. Both schemes increase the transmission rate of the stream by adding overhead. Does interleaving also increase the transmission rate?
Consider the hierarchical network in Figure 6.30 and suppose that the data center needs to support e-mail and video distribution among other applications. Suppose four racks of servers are reserved
Consider the sing-sender CDMA example in Figure 7.5. What would be the senders output (for the 2 data bits shown) if the senders CDMA code were (1, 1,
Consider sender 2 in Figure 7.6. What is the sender's output to the channel (before it is added to the signal from sender 1). Z2i,m? Figure 7.6 Senders T 3510g no 150 299R INRITOnini d=-1 Data bits
Suppose that the receiver in Figure 7.6 wanted to receive the data being sent by sender 2. Show (by calculation) that the receiver is indeed able to recover sender 2s data from the
Describe the role of the beacon frames in 802.11.
True or false; Before an 802.11 station transmits a data frame, it must first send an RTS frame and receive a corresponding CTS frame.
Suppose an 802.11 b station is configured to always reserve the channel with the RTS/CTS sequence. Suppose this station suddenly wants to transmit 1,000 bytes of data, and all other stations are idle
Why are acknowledgments used in 802.11 but not in wired Ethernet.
True or false: Ethernet and 802.11 use the same frame structure.
Consider the following idealized LTE scenario. The downstream channel (see Figure 7.21) is slotted in time, across F frequencies. There are four nodes, A, B, C, and D, reachable from the base station
In Section 7.5, one proposed solution that allowed mobile users to maintain their IP addresses as they moved among foreign networks was to have a foreign network advertise a highly specific route to
Suppose the correspondent in Figure 7.23 were mobile. Sketch the additional network-layer infrastructure that would be needed to route the data-gram from the original mobile user to the (now mobile)
What are the differences between a master device in a Bluetooth network and a base station in an 802.11 network?
What is meant by a super frame in the 802.15.4 Zigbee standard?
Consider the chaining example discussed at the end of Section 7.7.2. Suppose a mobile user visits foreign networks A, B. and C, and that a correspondent begins a connection to the mobile user when it
What is the role of the “core network” in the 3G cellular data architecture?
What is the role of the RNC in the 3G cellular data network architecture? What role does the RNC play in the cellular voice network?
What is the role of the eNodeB, MME. P-GW, and S-GW in 4G architecture?
Showing 1500 - 1600
of 2026
First
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21