Anda di halaman 1dari 9

EEE3007/0910/08pg/4xShortAB/C

UNIVERSITY OF SURREY

Faculty of Engineering & Physical Sciences


Department of Electronic Engineering Undergraduate Degree Programmes

Module EEE3007; 15 Credits

DATA AND INTERNET NETWORKING


Level HE3 Examination

Time allowed: 2 hours

Semester 2 2009/0

READ THESE INSTRUCTIONS Answer FOUR questions, TWO from each section. If you attempt more than TWO questions from a section, only your best two answers will be taken into account. USE A SEPARATE ANSWER BOOK FOR EACH SECTION On the front of EACH answer book, indicate the questions attempted in that book. Then draw a line below, and add the question numbers you have attempted in the other book. Where appropriate the mark carried by an individual part of a question is indicated in square brackets [ ].

Additional materials:
None

EEE3007/0910/08pg/Req: None

2/9

SECTION A
A1 (a) Figure A1.1 shows the TCP segment header format.

Figure A1.1 (i) Describe the functions of the following fields in the TCP header: source port address, destination port address, sequence number, acknowledgement number and window size. [25%] (ii) What is the type of the TCP segment in which the control field (flags) are: 000000 and 010001? [15%] (iii) What are the minimum and maximum sizes of a TCP header? [10%] (iv) What is the length of the header, type of segment and window size (decimal) in the following dump of TCP header in hexadecimal format: (05320017 00000001 00000000 500207FF 00000000) [20%] Question A1 continues on the next page

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

3/9

Question A1 continued

(b)

In the Internet email application, non-ASCII characters are encoded using either base64 or quoted-printable methods. Calculate the following:

(i)

A non-ASCII message of 1000 bytes is encoded using base64 method. What is the ratio of redundant bytes to the total message length? [15%]

(ii)

A message of 1000 bytes is encoded using quoted-printable method. The message consists of 90% ASCII and 10% non ASCII characters. redundant bytes to the total message length? [10%] What is the ratio of

(iii)

Compare the encoding efficiency in (i) and (ii). [5%]

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

4/9

A2 (a) Pretty Good Privacy (PGP) is an email security package that uses secret key systems to provide privacy, public key systems to provide user authentication and base64 encoding for email system compatibility. Describe the sender and receiver actions in the PGP system. [30%]

(b)

Logical Key Hierarchy (LKH) is used for scalable rekeying in secure multicast. Figure A2.1 shows a secure multicast group of 16 members. (i) Illustrate the rekeying required when member 4 leaves this group. [20%]
O Group key

M Key hierarchy

Group members 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Figure A2.1

(ii)

If the multicast group consists of 4096 members, how many rekey messages are needed to remove a single member, in case of LKH and flat key systems? [10%]

Question A2 continues on the next page

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

5/9

Question A2 continued

(c)

(i)

How are congestion control and Quality of Service related? What is the difference between open-loop and closed-loop congestion control? [10%]

(ii)

Figure A2.2 shows the packet differentiation model in Differentiated Services. What are packet classification and traffic conditioning? Explain the functions of the meter, marker, and shaper/dropper entities shown in the diagram. [30%]

Figure A2.2

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

6/9

A3 (a) Explain the use of the Network Allocation Vector (NAV) in the random access method CSMA/CA used in wireless LANs. [10%]

(b)

ALOHA and Slotted ALOHA are random access methods for accessing shared media (channel) used in wired and wireless LANs. Assume 100 stations share a 1 Mbps channel. If frames are 1000 bits long and each station sends 10 frames per second, find the throughput in ALOHA and Slotted ALOHA networks. [30%]

(c)

What is the ratio of useful data carried to the entire frame size for the smallest and largest Ethernet frames? [20%]

(d)

An Ethernet MAC sublayer receives 1520 bytes of data from the upper layer. Can the data be encapsulated in one Ethernet frame? Describe what happens. [30%]

(e)

Which has more functionality, a repeater or a bridge? Briefly describe their functions. [10%]

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

7/9

SECTION B
B4 (a) Figure B4.1 shows a network and its link weights. (i) Use the Bellman-Ford algorithm to find the least-cost paths of the network for NODE D as the source node. You should clearly show your working and

intermediate steps. Hence, construct a routing table for Node D. (ii) What is the total bandwidth used in sending a packet from Node D to Node C using shortest path routing? [45%]
A 2 B 1 D 2 5 3 E 1 C 1 4 F

Figure B4.1

(b)

A packet is to be sent from NODE D to NODE C in Figure B4.1 using FLOODING. Assume that the packets are forwarded in synchronous rounds by all the routers, and that the link weights are not used in the flooding algorithm. (i) (ii) For each round, list the packets that are transmitted in the network. Calculate the total bandwidth used in sending the packet from Node D to Node C using flooding. [30%]

(c)

What are the advantages and disadvantages of flooding compared with shortest path routing? [25%]

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

8/9

B5 (a) In an MPLS network, describe the key functions performed at an Ingress Label Edge Router (LER), a Label Switched Router (LSR) and an Egress LER. What is label stacking and when might it be used? [35%]

(b)

An implementation of IP uses the following algorithm for address resolution whenever a packet P destined for IP address D arrives: if ( <MAC address for D is in ARP cache> ) <send packet P> else { <broadcast an ARP query for D> <put P into separate queue and await ARP response> } The IP layer receives a burst of packets destined for address D. Comment on the efficiency of this algorithm. How might you improve the algorithm? [35%]

(c)

An IP datagram has a header of length 28 octets and a total length of 2000 octets. It is fragmented by a router into two, such that the first fragment fills an Ethernet frame. (i) For the original datagram and each fragment, give the numerical values of the following fields of the IP header: header length; total length; more fragments bit; fragment offset. (ii) Explain how these values are used during reassembly to reconstruct the original datagram. Include an explanation of how the destination knows it has received all the fragments of the original datagram. [30%]

SEE NEXT PAGE

EEE3007/0910/08pg/Req: None

9/9

B6 (a) (i) With the aid of a sketch, explain the principles of operation of the Generic Cell Rate Algorithm (leaky bucket) for traffic policing.

(ii)

The Generic Cell Rate Algorithm GCRA(4,3) is used for traffic policing. Determine the compliance or non-compliance of cells arriving at times t=0, t=2, t=3, and t=5. Assume the bucket contains no tokens at t=0.

(iii)

What is the maximum compliant burst size for GCRA(4,3), i.e. the maximum number of cells that can arrive without gaps and comply with the agreed cell rate? [60%]

(b)

An IP multicast source is transmitting on Class D address 224.60.81.3. (i) Describe the events in the network by which a receiver joins the multicast transmission and receives packets. (ii) (iii) Describe how a receiver can depart from the multicast group. How are the equivalent functions performed in multicast overlay? [40%]

Internal Examiners: Dr. M.P. Howarth Dr. H. S. Cruickshank External Examiners: Prof S Watts Prof I Bennion

SEE NEXT PAGE

Anda mungkin juga menyukai