Вы находитесь на странице: 1из 2

CSCI4211 Spring 2011 Assignment #3 Due date: April 12, 2011 (Tuesday) 1.

IP Fragmentation and Reassembly: An IP packet originally has a size of 6000 bytes including 20-byte header and 5980-byte payload. To reach the destination, the route goes through three networks, A, B, and C. Network A is the one where the sender is directly connected, and Network C is where the receiver is connected. Network A has an MTU of 5000 bytes. Network B has an MTU of 2000 bytes. Network C has an MTU of 800 bytes. (a) How is fragmentation done when the original IP packet enters Network B from Network A? Draw a graph to indicate the outcome of fragmentation. (b) When these fragments enter Network C from Network B, how are the fragmentations done? Draw a graph to show the results for each fragment from (a).

C
receiver

MTU=800 Bytes

A
sender

MTU=2000 Bytes

MTU=5000 Bytes

2. A router has the following (CIDR) entries in its routing table: Address/mask Next hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 default Router 2 For each of the following IP address, what does the router do if packets with the following addresses arrives? (a) 135.46.63.10 (b) 135.46.57.14 (c) 135.46.52.2 (d) 192.53.40.7 (e) 192.53.56.7

3. Consider the network shown below. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone service to regional ISP D. B and C are peering with each other in two places using BGP. Consider the traffic going from A to D. B would prefer to hand that traffic over to C on the West Coast (so that C would have to absorb the cost of carrying the traffic cross-country), while C would prefer to get the traffic via its East coast peering point with B (so that B would have carried the traffic across-country). What BGP mechanism might C use, so that B would hand over A-to-D traffic at their East Coast peering point? N ISP A W S ISP B E

ISP C

ISP D

4. Reverse path forwarding. Consider the network topology and link costs shown below. Suppose that node E is the multicast source. Using arrows like those shown in Figure 4.44 in the textbook to indicate links over which packets will be forwarded using RPF and links over which packets will not be forwarded given that node E is the source. A
3 3

3
3

4 5
3

C
3

B
3

2
3

1 2 D 1 2

Вам также может понравиться