0% found this document useful (0 votes)
42 views2 pages

Reading Assignment #1: 5. This Is Question 3.4 in Stalling's Book

This document outlines the reading and homework assignments for an introductory broadband networks course. The reading assignments cover topics on networking fundamentals from two textbooks. The homework assignments involve tasks such as comparing different networking concepts in a table, analyzing IPv4 and IPv6 headers, calculating subnetting values, and analyzing network protocol behaviors. Students are to complete 11 homework problems analyzing topics like packet fragmentation, subnet masking, collision probabilities on shared networks.

Uploaded by

MUHAMMAD AHSAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views2 pages

Reading Assignment #1: 5. This Is Question 3.4 in Stalling's Book

This document outlines the reading and homework assignments for an introductory broadband networks course. The reading assignments cover topics on networking fundamentals from two textbooks. The homework assignments involve tasks such as comparing different networking concepts in a table, analyzing IPv4 and IPv6 headers, calculating subnetting values, and analyzing network protocol behaviors. Students are to complete 11 homework problems analyzing topics like packet fragmentation, subnet masking, collision probabilities on shared networks.

Uploaded by

MUHAMMAD AHSAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

EE555: "Broadband Networks Architecture"

Professor A. Zahid, Summer Semester 2003


HW#1: Due June 5

Reading Assignment #1
"Warland and Varaiya" Text: "William Stalling" Text:

• Chapter 1: Sections 1.1 through 1.3 • Chapter 1: Sections 1.1 through 1.3
• Chapter 2: Sections 2.1 through 2.7 • Chapter 2: Sections 2.1 through 2.4
• Chapter 3: Sections 3.1, 3.2 • Chapter 3: Sections 3.1 through 3.4
• Chapter 4: Sections 4.1, 4.2, 4.3.1,
4.6.3

Problems Assignment #1

1. List at least three differences (in a table format) between the following

• Circuit switching vs. Packet switching


• Connection-Oriented vs. Connection-less Packet switching
• Bridges vs. Routers
• Layer 2 switches vs. Hubs
• TCP vs. UDP

2. Compare the header fields of IPv.4 and IPv.6 and explain the differences. What are
the limitations of IPv.4 and what are some proposed solutions for these limitations?
This is question 3.12 in Stalling's book

3. List at least three advantages in subnetting. A class B network on the Internet has a
subnet mask of 255.255.240.0. What is the maximum number of hosts per that
subnet? A host on that subnet has an IP address of 128.125.100.100. What is the
subnet address?

4. Suppose machine C receives an ARP request sent from A looking for the MAC
address of B, and suppose C has the binding from the IP address of B and the MAC
address of B in its cache. Should C answer the request? Why?

5. What are the pros and cons of intermediate re-assembly of an Internet fragmented
packet vs. re-assembly at the final destination? This is question 3.4 in Stalling's book

6. A 4480-Octet packet is to be transmitted over an Ethernet with a maximum MTU of


1500 octets. Show the fragments indicating the total length, the M-Flag and the offset
values in each of them. This is question 3.8 in Stalling's book

1
7. Assume that all packets use only the basic 20-byte IP header.

a) If a 1000-byte packet encounters a link with a 300-byte MTU, how many


fragments will traverse the link? What are the values of the offset fields in each of
the fragments?

b) If these fragments now encounter a network with a 100-byte MTU, how many
fragments will traverse this link?

c) Think of a jumbo IPv4 datagram of size 65,535 bytes. If the original jumbo
datagram is fragmented into as many Datagrams as possible, then how many
Datagrams will be produced?

8. Explain how one might implement a program to discover the smallest MTU along a
path from source host A to destination host B. The program should operate using only
standard protocols, and any new code must be constrained to run only on host A.

9. Suppose that there are 22 hops from source A to destination B, but 7 of the hops are
through an IP tunnel. If the TTL of the packet was set to 31 by A, then what will be
the value of the TTL when the packet arrives at B?

10. An organization has a class C network 200.1.1.0 and wants to form subnets for four
departments, with hosts as follows: A (72 hosts), B (35 hosts), C (20 hosts) and D (18
hosts). Give a possible arrangement of subnet masks to make this possible. Suggest
what the organization might do id department D grows to 34 hosts?

11. An application generates chunks of 40 bytes of data every 20 msec. Each chunk gets
encapsulated in a TCP segment and then in an IP packet. What percentage of the IP
packet is a header and what percentage is data?

12. A disadvantage of legacy (shared) LANs is that the capacity is wasted due to
collisions when multiple stations attempt to transmit at the same time. Suppose the
time is divided into discrete slots with each of N stations attempting to transmit, with
probability "p", during each time slot. What fraction of time slots is wasted due to
multiple simultaneous transmission attempts? (Hint: You can use the Binomial
distribution here). This is question 6.3 in Stalling's book

You might also like