gazecummingNetworking and Communications

Oct 26, 2013 (4 years and 8 months ago)


Computer Networks

COMP 343/443: Fall 2002


Due in the submit folder 10 am Wednesday, 11

Dec. *


Write the steps of the distance
vector algorithm. What are the important features
of it?

(15 points)


Suppose there is a TCP/IP network containin
g two hosts A and B and two routers
R1 and R2. Host A with IP Address and Physical Address 5.6 wants
to communicate to Host B with IP Address and Physical Address 9.68.
The port number of Host A is 7000 and the port number of Host
B is 8000.

Host A is directly connected to R1, R1 is directly connected to R2, and R2 is
directly connected to Host B. The Physical Address of R1 is 92.9 and that of R2
is 93.10. The IP Addresses of R1 are, and The IP
es of R2 are, and

Show how the IP,TCP, Link Layer headers look like on link A to R1, R1
to R2 and R2 to B. You only need to show the relevant field values given
above. If any field value is unknown or is not given, leave it bla

(15 points)


CD exponential back
off algorithm, suppose that a host suffers
collision for three consecutive times and chooses values 1,3,6 randomly after first
collision, second collision, and third collision respectively. What are the
ransmission delays? You can assume 10 Mbps Ethernet.

(10 points)


True or False:


Quality of Service is present in today’s TCP/IP networks


Sequence number is used in TCP header to detect lost packets


IP V6 uses segmentation.


Address Resolution Protocol is u
sed to change IP Address to Physical
address and vice versa.


It is possible to have a network that does not use TCP/IP.


Flow control is designed to reduce congestion in a TCP/IP network.


Each LAN adapter has a unique LAN address.


The even parity bit scheme

can correct single bit errors.


Suppose the computer in your office has been configured with an IP
address, and you move (along with your computer) to an office down the
hall. If after the move your computer is connected to the same IP network,
then it is
not necessary to reconfigure the IP address in your computer.


homed hosts have one interface and routers typically have two or
more interfaces.


Host A is sending host B a large file over a TCP connection. Assume host
B has no data to send A. Host B
will not send acknowledgements to host
A because host B cannot piggyback the acknowledgements on data.


Consider a HTTP Web server using persistent connections. Suppose the
server spawns a separate process for each client that connects to the
server. Then e
ach of these spawned processes will have different server
port numbers


The size of the TCP

never changes throughout the duration
of the connection.


The TCP segment has a field in its header for


The MSS is the maximum size of a TCP segm
ent including headers


In TCP, the acknowledgement number that a host puts in a segment is
the sequence number of the next byte the host is expecting from the


Suppose host A sends host B one segment with sequence number 38
and 4 bytes of data. Then

in this same segment the acknowledgement
number is necessarily 42


Suppose host A is sending a large file to host B over a TCP connection. If
the sequence number for a segment of this connection is m, then the
sequence number for the subsequent segment wi
ll necessarily be m+1.


The TCP segment has a field in its header for


Suppose that the last

in a TCP connection is equal to 1 sec.

for the connection will necessarily be set to a value >= 1

(40 points)


Write a Java pr
ogram to implement the Link State algorithm with appropriate data
structures. You may use a two
dimensional array C[i,j] to store the link costs
from node i to j and an one
dimensional array D[v] to store the cost of the path
from the source node to desti
nation v and other arrays as needed. You can also
assume that the source node is always the node numbered 1.

(20 points)