Download ReviewSheet Midterm2 Last modified January 7

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Policies promoting wireless broadband in the United States wikipedia , lookup

Peering wikipedia , lookup

CAN bus wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Cellular network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer network wikipedia , lookup

I²C wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

IEEE 802.11 wikipedia , lookup

Airborne Networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
COE 371
Student Name:
Midterm 2
Student ID:
Question 1: [15 points]
State whether the following statements are True or False. No explanation needed.
1. ICMP messages are encapsulated inside IP datagrams.
2. In addition to error reporting, ICMP corrects the related errors as well.
3. The ICMP source-quench error message is sent to the source host when there is a problem in
the header field of a datagram.
4. The parameter-problem ICMP message is sent to the source host when a datagram is
undeliverable to the destination.
5. The redirection ICMP message is sent to the source host when a datagram is undeliverable to
the destination.
6. In a Frequency Hopping Spread Spectrum (FHSS) technique, each bit to be transmitted by the
sender is replaced by its chip code.
7. RIP (Routing Information Protocol) is used inside an autonomous system.
8. RIP is based on distance vector routing.
9. The hopping sequence in FHSS (Frequency Hopping Spread Spectrum) is generated by a
pseudorandom number generator.
10. In an ad hoc network, the stations can form a network without the need of access points.
11. In wireless LAN, a collision will always be heard by all stations in the network.
12. An autonomous system is a group of networks and routers under the authority of more than
one administration bodies.
13. In OSPF, each router builds the overall topology of the network.
14. OSPF routing tables are calculated by using Dijkstra’s algorithm.
15. Bluetooth uses FHSS (Frequency Hopping Spread Spectrum) method in the physical layer.
Question 2 (10 points): Circle the correct choice. No explanation needed.
1. In CSMA/CA, each station, before sensing the physical medium to see if it idle, first checks
its ____to see if it has expired. (a) DIFS (b) SIFS (c) NAV (d) RTS (e) none of the above.
2. A wireless LAN uses ____ frames for acknowledgement. (a) management (b) control (c)
data (d) none of the above.
3. In an autonomous system with n areas, how many areas are connected to the backbone? (a) 1
(b) n-1 (c) n (d) n+1.
4. If 8-bit chip code is used in DSSS (Direct Sequence Spread Spectrum) and the user original
data rate is 1 K bits/sec, then the output data rate of the DSSS transmitter will be ___.
(a) 1 Kbits /sec (b) 8 K bits/sec (c) 1 / 8 Kbits/sec (d) none of the above.
5. In DSSS-CDMA, the dot product between two chip codes for two different users will produce
___. (a) 0 (b) +1 (c) –1 (d) none of the above.
6. In CSMA/CA, after receiving RTS frame and waiting for a time period called, ____, the
destination station sends _______frame to the source.
(a) DIFS; RTS (b) DIFS; CTS
(c) SIFS; CTS (d) SIFS; RTS (e) none of the above.
7. Bluetooth devices use ___ technique for exchanging data . (a) Time Division Multiplexing
(b) Time Division Duplexing (c) Frequency Division Multiplexing (d) any of the above.
8. A Bluettoth piconet may have up to ___ Bluetooth devices in total. (a) 1 (b) 2 (c) 7 (d) 8 (e)
none of the above.
9. Link State Packets (LSPs) in link state routing are generated _____ . (a) when there is a
change in the topology of the domain (b) on a periodic basis (c) a and b (d) none of the above.
10. The ____ protocol does not sense the carrier (or channel) before transmitting a frame. (a)
CSMA/ CD (b) CSMA / CA (c) ALOHA (d) none of the above.
1
Question 3 (6 points):
A router receives an IP packet with source IP address 130.45.3.33 and destination IP address
201.23.4.33. The router cannot find the destination IP address in its routing table.
(a) Which type of ICMP message will be sent by the router?
(b) Which host will receive the ICMP message (i.e., what will be IP address of the destination
host which will eventually receive the ICMP message)?
Question 4 (7 points):
Draw the topology of the network when the following table is the routing table for router R1.
Mask
/27
/18
Default
Network Address
202.14.17.224
145.23.192.0
Default
Next-hop Address
--130.56.12.4
Interface
m1
m0
m2
Question 5 [7 points]:
Suppose two Bluetooth devices (a master and a slave) are communicating using the following
frequency hopping sequence (all frequencies in GHz): 2.402, 2.411, 2.404, 2.409, 2.405, 2.407,
2.403, 2.401, 2.422, 2.428,… Assume the master and slave take turns. Draw a timing diagram for
first five slots to show which frequency channel will be used in a given slot. The hope rate is
1600 hops/ sec.
2
Question 6 (15 points):
The router R1 in a network has the following routing table.
Mask
/32
/26
/25
/24
/8
/0
Network Address
180.70.65.202
180.70.65.192
180.70.65.128
201.4.22.0
202.0.0.0
0.0.0.0
Next-hop Address
---
180.70.65.200
Interface
m1
m0
m3
m5
m4
m2
Which interface at R1 will be used to transmit the packet for the IP packets destined for the hosts
at the following IP addresses?
(a) 182.77.55.66
(b) 180.70.65.140
(c) 180.70.65.203
(d) 180.70.65.202
(e) 16.24.25.26
Question 7: [10 points]
In a 802.11 wireless LAN using CSMA/CA, there are three stations X, Y, and Z. Station Y is in
the coverage range of station X, while Z is not in the coverage range of X. The station Z is in the
coverage range of Y. The station X wants to send a data frame of size 200 bytes to station Y.
Show, with the help of a timing diagram, the sequence of different control and data frames
transmitted or received at X , Y, and Z.
3
Question 8 (15 points):
The router A in autonomous system has the following RIP routing table:
To
A
B
C
D
E
Cost
0
10
3
9
7
Next Router
-E
C
C
E
Router A receives the following RIP message from router C. The router C is at cost 3 from A.
To
A
B
C
D
E
Cost
3
4
0
5
8
What would be the contents of the routing table at the router A after the reception of the RIP
message from C. Indicate your results in three column (To, Cost, Next router) in a tabular form?
4
Question 9 (15 points):
Apply Dijkstra algorithm to the autonomous system described below and find the link state
routing table for router B. The cost (written on a link) from any element X to Y is the same as for
connecting Y to X.
5