Sie sind auf Seite 1von 9

Islamic University of Gaza

Faculty of Engineering
Computer Department
Computer Networks
ECOM 4321
Review Questions
Eng. Motaz Murtaja

Note :
Some of these question is solved and some only give you the final answer and for these
questions you must know how these answer come
Solve only problems you think that it is covered in our course.

Alice and Bob communicate in an alphabet that has L letters. They use a monoalphabetic
substitution cipher with key K. Assume that Trudy obtains a plaintext m and the corresponding
ciphertext c. Under what conditions can Trudy recover the key K completely?
(a) m contains at least L - 1 unique letters
(b) |m| _ L.
(c) |m| _ |K|.
(d) m is not empty.

One advantage of a path vector protocol over distance vector and link state is that
(a) it requires fewer messages between the routers
(b) it is guaranteed to converge to the shortest paths
(c) it enables the implementation of policies that may not correspond to simple metrics
(d) it enables load balancing across parallel paths
(e) None of the above

TCP tries to
(a) minimize the number of retransmissions of erroneous packets
(b) share the bandwidth of bottleneck links among different connections
(c) acknowledge packets link by link instead of end to end
(d) correct packets so that they do not have to be retransmitted the third time (using the 3-dup ack)
(e) None of the above

Two hosts simultaneously send data through a link of capacity 1Mbps. Host A generates data
with a rate of 1Mbps and uses TCP. Host B uses UDP and transmits a 100bytes packet every
1ms. Which host will obtain higher throughput?
(a) Host A.
(b) Host B.
(c) They obtain roughly the same throughput.
(d) They experience congestion collapse and negligible throughput.
What is the theoretical upper-bound on the number of simultaneous TCP/IPv4 connections that
a host with a single IP address can handle? (Ignore memory limitations.)
(a) 216
(b) 232
(c) 264
(d) unlimited

Host A sends a TCP segment (Seq = 43, ACK = 103), to which host B replies with a TCP segment
(Seq = 103, ACK = 57). The payload of the first TCP segment is
(a) 14 bytes long.
(b) 43 bytes long
(c) 46 bytes long.
(d) 57 bytes long.
(e) 60 bytes long.

The Distance-Vector algorithm is not:


(a) iterative.
(b) asynchronous.
(c) distributed.
(d) used in RIP.
(e) None of the above.

Longest prefix matching is used:


(a) in routers to know on which link interface to forward packets.
(b) in classless addressing to use the address space more efficiently than in classful addressing
(c) by NAT to increase the available address space in home networks.
(d) to assign subnet masks.
(e) None of the above.
An authoritative DNS server knows a top-level domain server via:
(a) hostname.
(b) IP address.
(c) canonical hostname.
(d) alias.
(e) domain.

A user requests aWeb page that consists of some text and 3 images. The browsers cache is
empty. For this page, the clients browser:
(a) sends 1 http request message and receives 1 http response messages.
(b) sends 1 http request message and receives 3 http response messages.
(c) sends 1 http request message and receives 4 http response messages.
(d) sends 3 http request messages and receives 3 http response messages.
(e) sends 4 http request messages and receives 4 http response messages.
Solve the following questions :
1- Consider the network below. Show the iterations followed by node A to compute the
shortest paths from itself to all the other nodes using the Dijkstra algorithm. Assume A
has already collected all link state information in the network.

B C
3
1 8
4

A D
7 2
2 1

4
F E

Solution:

2- (a)For the following topology, fill in the link-state table provided below using Dijkstra
algorithm.
The ties are broken based on the node ID, where the node with the lower ID wins.

Solution:
(b) Repeat question (a) after add the following two links to the above topology: AD
with a cost of 2, and CF with a cost of 2.
Token Bucket and Leaky Bucket :
1- Consider a source sending traffic at 1.6Mbps for the first second of each period, and at
0.4Mbps after that. For simplicity, neglect the packet size.
a) Calculate the token bucket parameters R, r and b for the flow.
R = 1.6Mbps, r= 0.4Mbps, b = (R r)*1s = 1.2Mb = 150KB
b) Assume a router X that can allocate at most 100KB of buffer to this flow. What is the
minimum rate ra that X needs to allocate to the flow so that the flow experiences no losses?
0.8Mbps
c) Repeat question (b) assuming that router X can allocate 200KB to the flow.
ra=0.4Mbps

2- Calculate the token bucket parameters rate r and bucket depth b for a flow with the
following traffic requirements: the maximum rate is R = 20Mbps, the maximum rate can only be
used up to 4 seconds, and in the first 10 seconds up to 140Mb can be transmitted.
The data sent in the first 4 seconds at the rate R is 80Mb. Then, in the next 6s another 60Mb
need to be sent at the rate r. This means r = 10Mbps.

To compute the value for b, we have b/(R-r) = 4s (i.e. b is depleted at the rate R-r up to its
exhaustion), thus b = 40Mb.

Router X wants the traffic of this flow to experience a delay of at most 1 second. In this case,
what is the minimum rate ra that X needs to allocate to the flow?
In the worst case, running at rate ra, for time 4s+1s, we need to transmit the maximum
received burst (80Mb), and thus, ra = 80 /(4+1)Mbps = 16Mbps.

3- A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled
at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer
transmit at the full 6 Mbps?
Solution:

Notes:
Token Bucket Parameters :
r average rate, i.e., rate at which tokens fill the bucket
b bucket depth (limits size of burst)
R maximum link capacity or peak rate
4- A host on a network is regulated by a token bucket. The token bucket is filled at a rate of
1M tokens/sec. It is initially filled to capacity with 2M tokens.
It takes one token for a data cell to be released into the network. Now suppose that data comes
in three 4M-cell bursts (i.e., each burst contains 4M cells). Bursts occur at the beginning of the
first, second, and third second, and each lasts for 800 msec. How long does it take the host to
release all the cells onto the network?
Solution:

Final solution = 10 seconds

5- The table below shows the transmission schedule for a given flow. The table shows the
number
of packets sent in the first second and in each subsequent second. The flow must stay
within the bonds of a token bucket filter. Assume the bucket is initially full of tokens. What
bucket depth does the flow need for a token rate of 2 packets per second?

Solution: 9 seconds
6- Consider the network below consisting of four routers. Every link has capacity of 1Mbs, and
every flow sends data at 1Mbps. Assume that all flows are UDP and use the same packet size.

In words, Flow 1 uses links AB, BC, CD; Flow 2 uses link AB; Flow 3 uses link BC; and Flow 4 uses
link CD.
a) What is the throughput of each flow, if all routers implement FIFO scheduling? In this case,
assume that in case of congestion each packet is dropped with the same probability.

Final Answer : Flow 1: 1/4Mbps, Flow 2: 1/2Mbps, Flow 3: 2/3Mbps, Flow 4: 3/4Mbps.

Why ???

b) What is the throughput of each flow if all routers implement Fair Queuing?
Final Answer : Every flow gets 1/2Mbps.
Why ???

c) What is the throughput of each flow if all routers implement Weighted Fair Queuing, and
each Flow i has weight i?
Final Answer : Flow 1: 1/5Mbps, Flow 2: 2/3Mbps, Flow 3: 3/4Mbps, Flow 4: 4/5Mbps.
Why ???
Answer the following questions about weighted fair queuing.
a) For the following packets arriving at a router compute the order in which they will be
sent. Both flows have weight 1. In case of ties assume Flow 1 has priority.
(ignore packet size and dont compute finishing time)

b) Now answer the same question except Flow 1 has weight 1 and Flow 2 has weight 2.
(ignore packet size and dont compute finishing time)
a- Figure below shows a system of four queues being serviced according to a WFQ policy. The
weight given to queues is show in the figure ( A 4 , B 1 and so on ). They are being serviced
by a processor at the rate of 10 Mbps.

Fill in the resultant output rates for each these four queues for the different input traffic rates.
INPUT RATES OUTPUT RATES
A B C D A B C D
1 1 1 1 1 1 1 1
10 10 10 10 4 1 3 2
6 6 2 2
8 0 0 8
1 5 3 5

b- Now consider the same system with four queues , but work as follows :

Each of the two second level processors X and Y have a weight of 5. The policy implemented
between these two processors is that of TDM, i.e. each of the processors gets a fixed share of
the bandwidth.
Processor X implements a WFQ scheduling between its two queues A and B. A has a weight of 3
and B has a weight of 2. But Processor Y implements a strict priority between its two queues C
and D. Queue C has strictly higher priority than queue D.
Fill in the resultant output rates for each these four queues for the different input traffic rates.
INPUT RATES OUTPUT RATES
A B C D A B C D
6 6 2 2
2 6 2 6
6 2 6 2

Das könnte Ihnen auch gefallen