Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
20 views

Assignment

Uploaded by

Mohammad Ali
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Assignment

Uploaded by

Mohammad Ali
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Q1 (Total 5 marks) Below, you are given the packet dump of an Ethernet packet (not

including preamble/Start of Frame Delimiter). The dump is in hexadecimal format with


bytes ordered across the page. The numbers 1-20 above the line are there to assist in
counting bytes.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
C2 D4 65 A2 16 27 3B E3 36 27 28 B7 03 F3 67 B3 06 37 55 70
i. Is the format of this frame Version 2.0 frame or IEEE 802.3?
ii. Determine the values of the destination address and source address.
iii. Write out the first 4 bits of the destination address to be transmitted, indicating
the order of transmission.
Answer:
i. The frame is in IEEE 802.3 format.
802.3 Ethernet frames begin with a 1-byte preamble, followed by a 7-
byte starting frame delimiter. These are inferred from our properties.
The next two are Destination MAC Address (1-6) and Destination MAC Address
(7-1). Each field has 6 bytes. Since the 13th and 14th values in our
problem give the field length, it is 03F3, which is less than 05DC and shows
that the frame complies with the 802.3 standard.The source address is from
the 7th to 12th value: 3B E3 36 27 28 B7
The destination address is from 1st to 6th value: C2 D4 A2 16 27
ii. The first 4 bits of the destination address is C i.e. 1100 in binary
The transmission order will be reversed i.e. the least significant bit (0) will be
transmitted first and the most significant bit (1) will be transmitted last.
Q2 (4 marks) The current MAC address table of a bridge is given as follows.
0/1 98-5D-67-09-D6-94 4B-CD-96-10-35-76
0/2 AD-CD-67-EE-FF-22 87-DE-04-05-06-D8
0/3 56-98-98-00-22-44
i. Suppose the bridge receives a packet on port 0/3 with the following source
and destination addresses:
Dest=AD-CD-67-EE-FF-22 Source=88-77-33-EF-11-A4
Describe what actions the bridge does in its role as a bridge.
Answer:
Initially, it will identify the IP address matching port 0/3 with the destination IP address. If
found, it will send the packet but in case of not available, it will check the other ports that are
connected to the bridge and check for the correct match. For the above data the destination IP
address will get a match at port 0/2
ii. Suppose a second packet is received shortly after the first packet on port 0/3
(with no other packets received in the meantime on port 0/3 or any other
ports) with the following source and destination addresses:
Dest= B8-33-8A-72-E3-F7 Source=88-77-33-EF-11-A4
Describe what actions the bridge does in its role as a bridge.?
Answer:
Transferring the packet shortly after sending the first packet may lead to waiting
since port 0/3 is full. In this case, if the Destination address is not in the table the
packet will forwarded to the appropriate output port or ignored.
Q3 :
A dynamic RAM is used to hold MAC addresses in the MAC address table.
Suppose the table size was 500 and that the memory access time was 100 ns.
Assuming that a binary search was used to find an address, what would be
the worst case look-up time?
Answer:
Table size: 500
Memory access time = 100ns
Each access to the table is followed by a comparison in binary search.
Therefore, number of accesses in worst case=𝑙𝑜𝑔2 500+1=8+1=9
Number of access =9
Hence total time taken= 9*100 ns = 900 ns
Q4
The figure below shows a network of bridges running the Spanning Tree Protocol
(STP). Port costs for each bridge in the network are as shown in the figure. Assuming
Bridge 5 is the root bridge,
i. Draw in your answer sheet the network showing all the root ports, designated
ports and blocked ports of each bridge that are determined by the operation
of the Spanning Tree Protocol.
Answer:
ii. Write down the cost of each bridge to the root bridge for each bridge after
the SPT has converged.

iii. If line speeds, L, satisfy L = 1000/Cost in Mbps, determine the maximum


throughput in Mbits per second which can be supported for packets going
from Bridge 3 to Bridge 5 over the Spanning Tree.

Answer:
Cost through Bridge 3 = 140
Cost through Bridge 4 = 20
Total cost = 140+20 = 160
L = 100/160 = 6.25 Mbps.

iv. If any one of the line speeds is increased, in general it would expected that the
maximum possible throughput on the links in the spanning tree would also
increase. This is not always the case though. Show an example for the
network below, where the maximum possible throughput supported between
two given bridges actually goes down, when one of the link speeds is
increased. Assume that the line speeds are inversely proportional to the costs.
Answer:
Q5
The figure below shows a university internal network. All the lines can support
transmissions at 300 Mbps in both directions. The switches are full duplex. Also each
switch can switch as many packets per second as the network can offer on its ports.
i) What is the maximum aggregate throughput that can be supported on this
network (in other words, find a scenario in which the largest amount of data
is being transmitted between pairs of devices at the same time)?

Answer:

The maximum aggregate throughput is the one that can be attained only is there is no
bottleneck situation in the network.

Bottleneck: When many data packets travel through the same switch and that causes
delay in the transmission of data packets through the network. Which reduces the
throughput of the network.

So, the maximum aggregate throughput of this network will be 300 Mbps.

ii) If the line speeds of the connections between servers A and B and the top
switch in the figure were increased to 600 Mbps, would the aggregate
throughput in your answer to i) increase?

Answer:

Increasing line speed doesn't necessarily increase the throughput. It may increase the
traffic in the network and increase the bottleneck.

So, the possibility of increase in the throughput is less.

You might also like