Assignmen #5
Assignmen #5
IPv6 packets are encapsulated within IPv4 packets but we Use it when there are IPv4-only
routers between IPv6-enabled routers
Question #2
A) Yes
Example:
1. Consider a network:
o A—B—C, where link costs are: A-B = 1, B-C = 1.
o Initially, A’s cost to C is 2 (via B).
2. If the link between B and C breaks, B marks C as unreachable (cost = infinity).
However, A still thinks C is reachable via B with cost 2.
3. A updates its table:
o A → B → C with cost 2.
o B updates its table using A’s outdated information: B → A → C with cost 3.
4. This cycle continues, and the costs keep increasing indefinitely, leading to the count-
to-infinity problem.
B) This situation does not lead to a count-to-infinity problem because new links reduce
distance metrics. Adding a link creates new, shorter paths, and the network converges
quickly to the updated topology without looping or metric escalation.
Question #3
(b)
No, because:
o Real-time packet forwarding requires low latency, which is impractical with a
centralized data plane.
o Centralizing the data plane creates scalability and performance bottlenecks.
Instead, the control plane is centralized, and the data plane remains distributed for
efficiency.
Question #5
Question #6
Constraints:
BGP routers are constrained by policies and business agreements (inter-AS routing).
Intra-AS routers are constrained by metrics like hop count or cost (intra-AS routing).
Criteria:
BGP builds routes based on policies and path attributes.
Intra-AS routers use metrics to find the shortest or most efficient paths.
Justification:
BGP focuses on policy compliance, while intra-AS routing prioritizes path efficiency.
Question #7
a)
To w: The cost is the direct link c(x,w)=2c(x, w) = 2c(x,w)=2.
To y: The cost is the direct link c(x,y)=5c(x, y) = 5c(x,y)=5.
To u: Consider the paths through www and yyy:
Through www: c(x,w)+D(w,u)=2+5=7c(x, w) + D(w, u) = 2 + 5 = 7c(x,w)
+D(w,u)=2+5=7.
Through yyy: c(x,y)+D(y,u)=5+6=11c(x, y) + D(y, u) = 5 + 6 = 11c(x,y)
+D(y,u)=5+6=11.
The shortest path is via www with a cost of 7.
from x:
w=2 , y=5, u=7
b) .
To trigger an update from xxx to its neighbors, you can either:
Increase c(x,w)c(x, w)c(x,w) to a value greater than 5
Decrease c(x,y)c(x, y)c(x,y) to a value less than 2.
Question #8
Yes, BGP allows Z to implement a policy where it transfers Y's traffic but not X's traffic. This
is because BGP allows autonomous systems to implement traffic filtering and routing policies
based on route attributes such as the AS path and Z can inspect the AS path in the BGP
announcements to determine whether traffic originated from X and reject routes that include
X in the AS path. This selective routing is a key feature of BGP that provides ASs with the
flexibility to enforce policies based on their business agreements.
Question #9
Connectionless Demultiplexing:
Each segment is treated independently, without maintaining any persistent state.
Demultiplexing is based on the destination port number in the segment header.
Example protocol: UDP.
Does not provide guarantees for delivery, order, or reliability.
Connection-Oriented Demultiplexing:
A connection is established and maintained, with state information tracked at both
sender and receiver.
Demultiplexing is based on a quadruple: source IP address, source port, destination IP
address, and destination port.
Example protocol: TCP.
Provides reliable, ordered delivery of data with error detection and retransmission.