Sei sulla pagina 1di 4

CSE 2248 TUTORIAL 1 (SEMESTER 2, 2012)

Network 1.0 Router A Router B Network 2.0

Network 3.0

Router C

Router D

Network 4.0

The above represents the network infrastructure for ISP Services Dans Dif. It consists of 4 networks linked together by Ethernet cabling. The link of router A to router C through interface b is old 10Base2 cabling, the link of router A to router D through interface a, is fiber optic, the link of router B to router C through interface d is STP cable Type 1 (100 mbps), the link of router B to router D through interface e is 100BaseT. Router interfaces are: a, b, c, d, e and g. Network 3.0 is highly congested and to provide some reasonable amount of QoS, a QoS algorithm will be implemented so that if one or more processes within a host in Network 3.0 tries to send a packet when the maximum number is already queued on router C the new packet is abruptly discarded. Also, the standardized architecture for class-based Quality of Services (QoS), i.e., Differentiated Services (DS) has been preferred to Integrated Services. Network 1.0 and 2.0 use Class A IP addresses while Network 3.0 and 4.0 uses Class B and C respectively. Network 2.0 and 4.0 imposes different limits (maximum size) on their packet size. Therefore, packets transmitted between them need to be fragmented. Network 4.0 is equipped with a primary DNS Controller (Server) for name translation. Like every domain, (single or a top-level) it has a set of resource records associated with it. The Web Controller (server) hosts the web site for Network 3.0. The canonical name of the web site is www.malinbte.ac.mu and its IP address is 150.125.100.75.

Question 1 (relates to the Case Study above) (a) Explain what, in general, does xBasey stand for. (b) Draw the routing table for router D. (c) The figure below shows the detailed sink tree for Network C, where secondary routers are inter-connected and numbers written on/above the links are the respective distance (in kilometres) between routers. E 7 D 5 7 B 4 A 3 C 10 5 I H 3 1 2 6 2 J 1 L 1 2 G 3 1 3 K 5 9 4 F

(d)

(e)

(f)

Use the optimality principle to establish the optimal path, if a packet is sent from a source D to a destination F. Justify your answer. (i) Propose a QoS algorithm, which satisfies the requirements imposed on Network 3.0. Explain in detail and with the help of a diagram how this algorithm operates. (ii) If at the 59th clock tick, a packet is transmitted, but at the 60th clock tick no packet is transmitted. What can be inferred from the above information? Networks 1.0 and 2.0 uses Class A IP. These IP addresses are in the form 1-126.X.X.X, where X can be any integer in the range 1-254 (or 0-255, depending on the routers being used). (i) Explain how the range 1-26 is obtained and why the value 127 is not used, though it is theoretically valid. (ii) Explain the meaning of subnet mask. How is the default value of subnet mask obtained for Class C IP addresses? (iii) The following is an alternative notation of a subnet mask. 255.255.248.0/22. Interpret it. (i) With respect to the DNS controller (server) database file, what are the functions of the resource types: Domain_name, Time_to_live and Class? Assume that Network 4.0 uses IPv4. (ii) Resource records are presented in ASCII text, one line per resource record. What is the format that is normally used for it? (iii) What happens when a resolver gives a domain name to a DNS? (iv) Why have zones been created in the DNS name space? (v) What are reverse lookups, as they apply to a DNS?

(g)

(h)

Network 2.0 and 4.0 imposes different limits (maximum size) on their packet size. These limits can be attributed to various causes. What could be these causes? A user working on PC W (Personal Computer W) in Network 1.0 clicks on the hyperlink http:// www.malinbte.ac.mu/cse/NDSTutorial2.html. List all the steps from the user clicking on that hyperlink to the series of steps carried out by the browser to fetch the page NDSTutorial2.html. Web site www.malinbte.ac.mu has IP address 150.125.100.75. This question is quite challenging. Try to give a try. Remember that the DNS will be used for name translation purposes her.

The remaining questions are open-ended type and require a sound theoretical and analytical background. Question 2 (a) Describe admission control as it applies to congestion control in virtualcircuits. Support your answer with a diagram to show how to route all new virtual circuits around congested routers. (b) The table below shows the Data link policies that can affect congestion.

(c)

Briefly explain each of these policies. Discuss how jitter can be controlled?

Question 3 The choke packets mechanism seems to be a good reactive approach to combat congestion. Propose one advantage and two disadvantages of the choke packets approach. Question 4 (a) Traffic shaping can be performed on a per connection OR on a per host basis. Give one concrete example where you would want to use it on a per connection basis and one example when you would want to use it on a per host basis. {I admit, thats a tough question} (b) Explain how a domain could protect traffic from customers, which exceed their specified flow specification. (Seems difficult but very easy!!!} (c) What are the advantages using Address Resolution Protocol (ARP) instead of configuration files? Question 5 (a) When measuring the line cost with link state routing algorithm requires each router to know, or at least have a reasonable estimate of, the delay to each of its neighbors (time to reach its neighbors). An interesting issue is whether to take the load (amount of traffic on the link) into account when

(b)

(c)

measuring the delay. Will this choice result in better performance? Justify your reasoning. Describe in detail the connectionless and connection-oriented types of network service. State their respective goal, outline their respective key features, their applications and give one example for each service. With regards to (b) above, is one type of service is better than the other?

Question 6 (a) During the transmission of light through fiber, attenuation of light through the glass occurs. For the kind of glass used in fibers, (i) Write down the attenuation formula (in decibels). (ii) On what factor does attenuation of light through glass depend? (b) Write down Shannons result (formula) for the maximum data rate of a noisy channel. (c) A certain channel has a 2800-Hz bandwidth and a signal to thermal ratio of 25 dB. Calculate the data rate for this channel. (d) A message, M, is produced by the application process running in OSI layer 5 of a source machine. Describe in detail how this message passes through and is processed by the underlying OSI layers (4 to 1) before it sent to a destination host. {Tough question}

Potrebbero piacerti anche