You are on page 1of 4

Department of Information Technology

Faculty of Computing and Information Technology


King Abdulaziz University, Jeddah, Saudi Arabia
_____________________________________________________________________________________
CPIT-370
Final Assessment – Spring 2020
Submission deadline: April 20, 2020

Student Name: ___________________________________________________________

Student ID: ____________________________________________________________

Instructions:
1. Attempt all questions.
2. Hand written assignment will only be accepted.
3. Upload your work on the blackboard.

Q.1 An ftp client connects to an ftp server and sends a file of 1000 bytes as a continuous
byte stream (with no overhead imposed by the FTP layer). Assume that one
acknowledgment is sent for every TCP data segment received. Assume that the initial
sequence number at the client end is 100 and at the server end is 200. Assume that the
message data size is 500 bytes. Show the sequence numbers and acknowledgment numbers
in a time line diagram below. Put the number of each arrow.

No Event
1 ACK = 601
2 ACK = 1101
3 FIN = 1, SEQ = 1101, ACK = 201
4 SYN = 1, SEQ= 100
5 ACK = 1102
6 SEQ = 101, ACK: 201
7 SEQ = 601, ACK = 201
8 SYN = 1, SEQ = 200, ACK= 101
9 FIN =1, SEQ = 201, ACK = 1102
10 ACK = 202
11 ACK = 201
Q.2 Consider the following figure and answer the following questions

a) Identify the intervals of time when TCP congestion avoidance is operating?


b) After the 16th transmission round, is segment loss detected by a triple duplicate
ACK or by a timeout?
c) What is the value of ssthresh at the 18th transmission round?
d) After the 22nd transmission round, is segment loss detected by a triple duplicate
ACK or by a timeout?
2
e) What is the value of ssthresh at the 24th transmission round?

Q.3 Suppose a router receives an IP packet containing 600 data bytes and has to forward
the packet to a network with maximum transmission unit of 200 bytes. Assume that the IP
header is 20 bytes long. Show the fragments that the router creates and specify the relevant
values in each fragment header (i.e., total length, more bit, and fragment offset).

Q.4 It is required to divide the network 192.168.1.0/25 into three sub networks as shown
on the table. The first subnet “A” contains 64 host IP addresses, “B” contains 32 host IP
addresses and “C” contains 15 host IP addresses. Answer the following and show all
computations details. Compute all missing information and place it properly in the table
shown below.
Subnet IP’s Network First address Last address Broadcast address Mask
address
A 64 192.168.1.0 192.168.1.1 192.168.1.62 192.168.1.63 255.255.255.192

B 32 192.168.1.0 192.168.1.1 192.168.1.30 192.168.1.31 255.255.255.224

C 15 192.168.1.0 192.168.1.1 192.168.1.14 192.168.1.15 255.255.255.240

Q.5 A CRC-4 is defined by the generator polynomial x4+x+1 (divisor ‘10011’). Check if
the received codeword ‘1110010010 ’ is a legitimate codeword? Show all work by long
division and explain your conclusions.

Q.6 Six stations (S1-S6) are connected to an extended LAN through bridges (B1 and B2),
as shown in the figure below. Initially the forwarding tables are empty. Suppose the
following stations transmit frames: S2 transmits to S1, S5 transmits to S4, S3 transmits to
S5, S1 transmits to S2, S6 transmits to S5. Fill in the forwarding tables with appropriate
entries after the frames have been completely transmitted.

3
Q.7 For the 9 LAN subnet shown, port numbers are increasing clockwise from the top.
a) Identify the root bridge and root port for each bridge. Indicate which ports are not
selected by the spanning tree algorithm.

b) If Bridge B3 fails, what are the consequences?

You might also like