0% found this document useful (0 votes)
6 views15 pages

Final Exam

Uploaded by

Dan Carbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views15 pages

Final Exam

Uploaded by

Dan Carbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

American University of Beirut

Department of Electrical and Computer Engineering

EECE 651 – Internet Engineering

Final Exam

Fall 2011-2012 - January 19, 2012

Open Notes

180 minutes

Problems are courtesy of Prof. J. Y. Le Boudec.

Name:_________________________ ID number: ______________________

ALL ANSWERS SHOULD BE WRITTEN ON THIS BOOKLET.

ALL OTHER SHEETS WILL NOT BE CONSIDERING DURING


GRADING.

Problem Grade
1 /20
2 /15
3 /25
4 /14
5 /26
Total /100

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  1  of  15  
Problem 1. [20 points]

Figure 1 – Network for Problem 1

Consider the network in Figure 1. Customers CA and CB have IPv6 networks: all of
their hosts, such as A and B, are IPv6 only. Customer CB is connected to the IPv6
Internet, by means of Internet Service Provider Y. In contrast, Customer CA is
connected only to the IPv4 Internet, by means of Internet Service Provider X.

ISPs X and Y are connected to both the IPv4 and IPv6 Internets.

CA’s connection to X is by means of router R1, which has an IPv6 interface (interface
1 in the figure) and an IPv4 interface (interface 2 in the figure). The IPv4 address of
interface 2 is 122.1.1.23.

CB’s connection to Y is by means of router R2, which has only IPv6 interfaces. The
address of interface 9 (see figure) is 2001:1234:9ABC:1:1234:5678:9ABC:FFFF.

1. What is the value of the 49th to 64th bits of interface 9’s IPv6 address? What is the
value of the 128th bit? (note that bit 1 is the left-most bit).

ANS [4 points]________________________________________________________
Bit

49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 128

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  2  of  15  
2. Give a possible value for A’s IP address.

ANS [4 points]________________________________________________________

Justification: __________________________________________________________

3. A sends one packet to B. State at which of the points labeled 1 to 9 the packet will
be visible. At each of these points, give all IP addresses (IPv4, IPv6, source,
destination) that may be visible in the packet. Assume that each ISP will try to “get
rid” of the packet as soon as possible.

ANS [6 points]_______________________________________________________
In the table below, use “N/A” to indicate not applicable, does not exist, or not seen.

Point Src IPv4 Dst IPv4 Src IPv6 Dst IPv6

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  3  of  15  
4. Same question as 3 above, for a packet sent from B to A.

ANS [6 points]______________________________________________________
In the table below, use “N/A” to indicate not applicable, does not exist, or not seen.

Point Src IPv4 Dst IPv4 Src IPv6 Dst IPv6

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  4  of  15  
Problem 2. [15 points]

Figure 2. Network for Problem 2

Consider the network shown in Figure 2. Hosts A1 to A5 and B1 to B5 are


downloading content from server S1. The devices X, Y, and Z are routers, unless
otherwise specified.
• The link rates are indicated in the figure: the link rates between Ai and X as well as
between Bi and Z are 100 Mbps, for i = 1 to 5.
• All links are full duplex with the same rate in both directions.
• There is no other system than those shown in the figure, and we neglect all flows
other than from S1 to Ai and Bi. We also neglect the impact of the acknowledgement
flows, if any, in the reverse direction.
• The round-trip time from S1 to Ai is 200 ms. The round-trip time from S1 to Bi is
20 ms. These numbers include all processing delays.
• We neglect all overhead (in headers and otherwise) and assume that the links are
error-free and their capacities can be fully utilized.
• The TCP MSS values and window sizes are the same for all flows.

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  5  of  15  
1. Assume that, by some mechanism using a simple transport protocol such as UDP,
the rates of the 10 flows (from S1 to Ai and Bi) are allocated fairly. What are the
values of the rates for the 10 flows?

ANS [5 points]____________________________________________________
Flow from S1 to (in Kbps)

A1 A2 A3 A4 A5 B1 B2 B3 B4 B5

Justification: __________________________________________________________

2. We now assume that the 10 flows are using TCP. What is the value of the rate for
each flow?

ANS [5 points]____________________________________________________
Flow from S1 to (in Kbps)

A1 A2 A3 A4 A5 B1 B2 B3 B4 B5

Justification: __________________________________________________________

3. Assume now that Y is an application-layer web proxy, and not a router. All flows
use TCP. The round trip time from Y to Ai is 182 ms; the round trip time from S1 to
Y is 20 ms. What is the value of the rate of each flow at S1?

ANS [5 points]____________________________________________________
Flow from S1 to (in Kbps)

A1 A2 A3 A4 A5 B1 B2 B3 B4 B5

Justification: __________________________________________________________

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  6  of  15  
Problem 3. [25 points]

Figure 3. Network for Problem 3


Consider the network shown in Figure 3. A1 to A6, B1, C1 and D1 are routers. All
physical links are shown. There are no other routers than those shown in the figure.
Some of the IP addresses are shown; if you need some IP addresses that are not
indicated, write them down on the figure. All routers in AS A run RIP. All routers run
BGP, unless otherwise specified. We do not re-distribute BGP into RIP. BGP routers
ignore the values of LOCAL-PREF, WEIGHT and MED.
1. At time t0, B1 sends to A1 the BGP announcements
B1 to A1: 33.33.33/24, AS-PATH =B, NEXT-HOP=22.22.33.2
B1 to A1: 44.44.44/24, AS-PATH =B C, NEXT-HOP=22.22.33.2
Assume that before t0, A1 did not have any route in any of its RIB-INs for these two
destinations. Will A1 accept these routes? To which routers will A1 announce a route
to 33.33.33/24? to 44.44.44/24?

ANS [2 points]__________________________________________________
Circle one: A1 accepts A1 does not accept

Justification: __________________________________________________________

A1 announces to:
[3 points]

Justification: __________________________________________________________

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  7  of  15  
2. At time t1 > t0, D1 sends to A2 the BGP announcements
D1 to A2: 33.33.33/24, AS-PATH = D B, NEXT-HOP=22.22.55.2
D1 to A2: 44.44.44/24, AS-PATH = D C, NEXT-HOP=22.22.55.2
State which routes to 33.33.33/24 and to 44.44.44/24 the decision process at A2 will
choose. Justify your answer and explain what BGP rules were used.
ANS [5 points]________________________________________________________

3. Repeat question 2 for the decision process at A5. Justify your answer and explain
what BGP rules were used.
ANS [5 points]________________________________________________________

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  8  of  15  
4. Assume, in this question only, that at time t2 > t1 the link between A1 and B1 fails.
Explain what happens at all routers inside AS A. Which routes to 33.33.33/24 and to
44.44.44/24 will A5 now choose?
ANS [5 points]________________________________________________________

5. Assume, in this question only, that A3, A4, A5 and A6 do not run BGP (but all
routers in AS A run RIP). Assume that A1 and A2 both advertise into RIP the prefix
*/0 (default route). Assume that A5 has a packet to send to destination 33.33.33.1.
After all routing protocols have converged, what is the path followed by this packet
until its exit point out of AS A?
ANS [5 points]________________________________________________________

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  9  of  15  
Problem 4. [14 points]

Figure 4. Timing Diagram for Problem 4

Figure 4 shows one possible message sequence for two hosts A and B that are
transferring data using one TCP connection. The times t1 to t8 are the instants at which
a TCP segment is either received or sent by B. The figure shows the values of
sequence numbers and acknowledgements, but some acknowledgement numbers are
missing.
The figure shows some of the fields relative to the TCP header. For example, the first
line shows a packet with
8001:8101(100) ack 101 win 1000
which means the following:
• the segment contains the bytes with sequence numbers 8001 to 8100; there are 100
data bytes in the packet
• the ACK number is 101
• the advertised window size is 1000
The figure also shows that, at time t1, B delivers bytes numbered up to 8100 to the
application layer.

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  10  of  15  
1. Give the values of the missing acknowledgement numbers at lines 4, 5, 6, 7, 9.
ANS [10 points]_______________________________________________________

Segment at Line ACK Number

Justification: __________________________________________________________

2. At what time are bytes 8301 to 8400 delivered to the application by B?


ANS [2 points]________________________________________________________

At t = _______________
Justification: __________________________________________________________

3. After receiving the packet at line 9, A has 1000 bytes of data ready to be sent. The
maximum segment size at A is 100 bytes. How many TCP segments can A
immediately send without waiting for an acknowledgement?

ANS [2 points]________________________________________________________

Number of segments: _______________


Justification: __________________________________________________________

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  11  of  15  
Problem 5. [26 points]

Figure 5. Network for Problem 5


Consider the network configuration shown in Figure 5. A is a personal computer, X is
a box that can be configured either as a layer-2 transparent bridge or as a router. M is
a computer used as an application-layer web proxy; it does not function as a router. A,
X and M are in Saeed’s apartment; S is a web server on the Internet. Only S and M
are connected to the Internet.
The connections are as indicated in the figure; there are no other connections.
The IP addresses are shown in the figure. The MAC addresses are represented as A1,
X1, etc.
The circle labeled “1” is an observation point (where we install a packet sniffer).
Unless otherwise specified, all machines are configured to set TTL = 64 in the IP
packets for which they are the source.

In the tables below, use N/A to indicate Not Applicable, Does Not Exist, or Not Seen.

1. In this question, device X is configured as a router.


(a) What should the IP configuration at interfaces A1 and M1 be for this setting to
work well? (configuration means: netmask and default gateway only).
ANS [4 points]________________________________________________________

Netmask Default Gateway


A1
M1

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  12  of  15  
(b) Assume that all ARP caches are empty. Then A sends a ping packet to
192.168.1.11; there is no system with this address. We observe all packets resulting
from this activity with a packet sniffer at observation point 1. For each of these
packets, give: the MAC source and destination addresses; for the packets that are IP
packets, give: IP source and destination address and TTL.
ANS [3 points]________________________________________________________

Packet Source MAC Destination MAC Source IP Destination IP TTL


1
2
3
4

(c) Assume now that the ARP caches and the DNS caches are populated with the
correct values. A downloads a file from S. We observe all packets resulting from this
activity with a packet sniffer at observation point 1. We observe only the packets
flowing from A to S (not in the reverse direction). For each of these packets, give: the
MAC source and destination addresses; for the packets that are IP packets, give: IP
source and destination address and TTL.
ANS [3 points]________________________________________________________

Packet Source MAC Destination MAC Source IP Destination IP TTL


1
2
3
4

(d) A runs a media server program that sends broadcast packets with destination IP
address 255.255.255.255 and TTL = 1. We observe all IP packets resulting from this
activity with a packet sniffer at observation point 1. For each of these packets, give:
the MAC source and destination addresses; the IP source and destination address; the
TTL.

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  13  of  15  
ANS [3 points]________________________________________________________

Packet Source MAC Destination MAC Source IP Destination IP TTL


1
2
3
4

2. In this question, device X is configured as a transparent layer-2 bridge.


(a) What should the IP configuration at interfaces A1 and M1 be for this setting to
work well? (configuration means: netmask and default gateway only).
ANS [4 points]________________________________________________________

Netmask Default Gateway


A1
M1

(b) Assume that all ARP caches are empty. Then A sends a ping packet to
192.168.1.11; there is no system with this address. We observe all packets resulting
from this activity with a packet sniffer at observation point 1. For each of these
packets, give: the MAC source and destination addresses; for the packets that are IP
packets, give: IP source and destination address and TTL.
ANS [3 points]_______________________________________________________

Packet Source MAC Destination MAC Source IP Destination IP TTL


1
2
3
4

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  14  of  15  
(c) Assume now that the ARP and DNS caches are populated with the correct values.
A downloads a file from S. We observe all packets resulting from this activity with a
packet sniffer at observation point 1. We observe only the packets flowing from A to
S (not in the reverse direction). For each of these packets, give: the MAC source and
destination addresses; for the packets that are IP packets, give: IP source and
destination address and TTL.
ANS [3 points]________________________________________________________

Packet Source MAC Destination MAC Source IP Destination IP TTL


1
2
3
4

(d) A runs a media server program that sends broadcast packets with destination IP
address 255.255.255.255 and TTL = 1. We observe all IP packets resulting from this
activity with a packet sniffer at observation point 1. For each of these packets, give:
the MAC source and destination addresses; the IP source and destination address; the
TTL.
ANS [3 points]________________________________________________________

Packet Source MAC Destination MAC Source IP Destination IP TTL


1
2
3
4

EECE  651  –  Internet  Engineering  –  Final  Exam  –  Fall  2011-­‐2012  –  Page  15  of  15  

You might also like