Вы находитесь на странице: 1из 45

BENI DEKTOS HERONIMUS 165150201111056

FIRHAN FAUZAN HAMDANI 155150200111284


VERA WATI 125150400111048

CHAPTER 4

1. Give some advantages and disadvantages of the connectionless service.

- Advantages:
Connectionless service is simpler because the source, destination, and router need to handle each packet
separately without seeing the relationship between the two.
- Deficiency :
But the connectionless service cannot come in sequence, so it will be marked with a message and address.

2. Give some advantages and disadvantages of the connection-oriented service.


- Advantages:
Connection-oriented services have packages that come in sequence, so that problems caused by delayed
duplicate packages can be avoided.
- Deficiency :
Table space is needed on the router so there are no alternative routes to avoid crowded areas. Connection-
oriented services are also difficult to implement with unreliable datagram networks.

3. If a label in a connection-oriented service is n bits, how many virtual circuits can


be established at the same time?

A n bit can create a different 2n virtual circuits identifier, we take an example, for example n = 5, the
number of virtual circuits is 2 * 5 = 10.

4. Assume a destination computer receives messages from several computers. How


It can be sure that the fragments from one source are not mixed with the fragments
from another source.

A complete IP header will be in each fragment. The source address, destination address, IP ID,
fragmentation offset, and more fragment bits will be present. The key piece in all fragments is that the IP
header consists of the same source address, destination address, and IP ID field tuples.

5. The aume destination computer receives several packets from a source. How can it be
be sure that the fragments of belonging to a datagram are not mixed from the fragments belonging
to another datagram.

Each datagram must have a unique identification number that distinguishes it from other datagrams sent
by the same source. Identification number copied to all fragments. In other words, the identification
number attaches all the fragments included in the same datagram.

6. Why do you think that the packets in Figure 4.7 need both addresses and labels?

In the setup stage, the source and destination address of the sender and receiver are used to create table
entries for connection-oriented services. In the teardown phase, the source and destination inform the
router to delete the appropriate entry. Each packet is forwarded based on the label in the package. To
follow the connection-oriented design ideas that will be used on the Internet, we assume that the package
has a label when it reaches the router

7. Compare and contrast delays in connectionless and connection-oriented services. Which service
creates less delay if the message is large?

Which service creates less delay if the message is small?


Connectionless delay is always less than delay in connection-oriented services no matter the message is
long or short. But phase setting and teardown delays for delays transfer smaller data for long messages
than short messages in connection-oriented services.

8. In Figure 4.13, why should the fragmentation be the last service?

When the network layer finds its next hope, the MAC address then fragments the datagram in accordance
with MTU before sending it to the network layer because each network (LAN and WAN) has limited
MTU capacity and is therefore needed to avoid datagram errors.

9. Discuss why we need fragmentation at each router.

Each time a packet enters a different network of several sizes, the router requires fragments into smaller
sizes that enter the new MTU.

10. Discuss why we need to reassemble the final destination, not at each router.

Forwarding and complex mechanisms must be carried out at the end point unless adding them to network
components improves performance.

11. In Figure 4.15, why do we need to set a timer and destroy all fragments if the timer
expires? What criteria do you use for expiration?

A fragment may have been lost and never arrived. The destination host cannot wait forever. The
destination host starts the time and after a time-out, it can send an error message to notify the source host
that the packet is lost and, if necessary, must be resent. The duration of time spent can be based on
information that the destination host might gather about the status of the Internet. If there are a lot of
delays in the arrival of the previous packet, that means that the Internet is jammed, and the fragments will
arrive soon (it's not always lost).
CHAPTER 5
23. D. 250
24. C. Temukan alamat pertama dan terakhir di subnet pertama.
25. D. Temukan alamat pertama dan terakhir di subnet terakhir (subnet 1024).
26. D. Temukan alamat pertama dan terakhir di subnet terakhir (subnet 32).
27. A. 255.255.255.0
28. C. 17.34.16.0/23
29. Sebelum menghitung prefix sebaiknya kita mengetahui angka biner

128 64 32 16 8 4 2 1
Urutkan kelas sesuai netmask

Kelas A : Oktet 1 > Network


Oktet 2 – 4 Host
Kelas B : Oktet 1 – 2 Network
Oktet 3 – 4 Host
Kelas C : Oktet 1 – 3 Network
Oktet 4 > Host
Contoh : IP 192.168.0.1 kelas apa dan hitung subnetmasknya
- kelas C

- Subnet masknya /26 = →


255 . 255 . 255 . 192
*ket : bit 1 nya ada 26 didapat dari soal yaitu /26(slash26).
Dapat 192 dari 11000000 yaitu penjumlahan angka biner dari 128 + 64 = 192.

30. Sebelum menghitung prefix sebaiknya kita mengetahui angka biner

128 64 32 16 8 4 2 1
Urutkan kelas sesuai netmask

Kelas A : Oktet 1 > Network


Oktet 2 – 4 Host
Kelas B : Oktet 1 – 2 Network
Oktet 3 – 4 Host
Kelas C : Oktet 1 – 3 Network
Oktet 4 > Host
Contoh :
IP : 127.0.0.1/27
Karena setelah dihitung subnetnya /27 yaitu :

Netmask = yaitu kelas C


network | host

Jawabannya secara pembagian kelas IP yaitu kelas A dan pembagian kelas setelah menghitung
subnetnya yaitu kelas C karena hostnya ada di oktet ke 4.
31. Tidak dapat karena ipv4 32 bit dan ipv6 128
32. Bisa karena prefix berkaitan dengan IPaddress (internet protocol address).
33. 150.168.0.1/26
34. 120.60.4.255/26
35. Tidak perlu karena alamat yang dimiliki 1024 dan dibagi ke dan di bagi ke 1024 telah memenuhi
semua alamat yang di bagi.
CHAPTER 6
1. Pengirimannya langsung karena ip pengirim dan ip tujuan berada di kelas yang sama.
2. Perngirimannya tidak bisa langsung karena walapun block pertama sama, tapi block terakhir
berbeda.
3.

4.
5.

6.

Dari 147.26.50.30 ke m1
7.

Dari 145.14.64.1/18 ke m1
8.

Dari 135.11.80.21 ke m0
9.
Dari 201.4.16.70 ke m1
10.

Dari 201.4.16.2/22 ke m1, m3


11.

12.
13.

14. Ya dapat menerima karena masih sama kelas alamat ipnya.


15. Ya karena dalam satu kelas alamat ip dan subnetmaask.
16.

17.

18.

19.
CHAPTER 7

1. Which fields of the IP header change from router to router?

Answer :

Total Length, Flags,


Fragmentation Offset (when the data is fragmented at a router), time to live, and Option(if
there is one to begin with like record route and timestamp option)

2. Calculate the HLEN value if the total length is 1200 bytes, 1176 of which is data
from the upper layer.

Answer :

Calculate
HLEN
Total Length = 1200 bytes
Header Length = 1200
-
1176
= 24
HLEN = 24/4 so HLEN = 6

3. Table 7.3 lists the MTUs for many different protocols. The MTUs range from 296
to 65,535. What would be the advantages of having a large MTU? What would be
the advantages of having a small MTU?

Answer :

The advantages of having a large MTU are:


better TCP performance, less work for the
routers (fragmentation), less traffic, and reduction of loss packets
if we have strict source
route in the option making sure that no MTU of lower capacity is on the route
.
The advantage
of having a smaller MTU is that the packet will be less likely to be
fragmented
which implies less overhead for the routers thus faster delivery
4. Given a fragmented datagram with an offset of 120, how can you determine the
first and last byte number?

Answer :

Given the offset value of 120, we can determine that the first byte is 120*8 = 960 but since
we don’t have the flag field
we cannot determine the last byte.

5. An IP datagram must go through router 128.46.10.5. There are no other restrictions


on the routers to be visited. Draw the IP options with their values.

Answer :

6. What is the maximum number of routers that can be recorded if the timestamp
option has a flag value of 1? Why?

Answer :

Since the flag value for the timestamp is one each router must add its IP and timestamp.
Since we only have a maximum of 40 bytes for option the maximum number of routers that
will be recorded is 4( 4 IP addresses and 4 timestamps
for a total of 36 byte
s, the code field
and the length field have 4 bytes all together
)

7. Can the value of the header length in an IP packet be less than 5? When is it
exactly 5?

Answer :

The value of the HLEN can never be less than 5. When the datagram has no option, the
value of the HLEN is 5 because the size of the datagram header is 20 which is 5*4

8. The value of HLEN in an IP datagram is 7. How many option bytes are present?

Answer :
f the value of HLEN i
s 7 then the size of the datagram header is 4*7 = 28 since the minimum
header size is 20 when there is no option then the option size is 8 bytes

9. The size of the option field of an IP datagram is 20 bytes. What is the value of
HLEN? What is the value in binary?

Answer :

If the value of the option field is 20 bytes then the total length is 20 + 20 = 40 therefore the
value of HLEN
= 10 (10*4 = 40 the total length)

10. The value of the total length field in an IP datagram is 36 and the value of the
header length field is 5. How many bytes of data is the packet carrying?

Answer :

Knowing the total length


(36 bytes) and the value of HLEN (5)
the data length is 36

(4*5) = 16 bytes

11. A datagram is carrying 1024 bytes of data. If there is no option information, what
is the value of the header length field? What is the value of the total length field?

Answer :

A datagram that is carrying 1024 bytes of data with no option information, the value of
HLEN is 5 and the value of t
otal length is 1024 + 20 = 1044 bytes

12. A host is sending 100 datagrams to another host. If the identification number of the
first datagram is 1024, what is the identification number of the last?
Answer :

If a host is sending 100 datagrams to another host


and the first datagram has an
Identification of 1024 then the last datagram will have the same identification
if all 100
datagrams are part of the same fragmented data
gram.

13. An IP datagram arrives with fragmentation offset of 0 and an M bit (more fragment
bit) of 0. Is this a first fragment, middle fragment, or last fragment?

Answer :

If an IP datagram has an offset value of 0 and an M bit of


0
then it’s the last fragment (M =
0) and the only fragment (offset = 0).

14. An IP fragment has arrived with an offset value of 100. How many bytes of data
were originally sent by the source before the data in this fragment?

Answer :

An IP fragment with an offset value of 100 will have a data of 800 bytes sent by the source
before the data in this f
ragment.

15. An IP datagram has arrived with the following information in the header (in hexadecimal):
45 00 00 54 00 03 00 00 20 06 00 00 7C 4E 03 02 B4 0E 0F 02
CHAPTER 7 INTERNET PROTOCOL VERSION 4 (IPV4) 219

Answer :

a. Are there any options?


Answer :

Since HLEN is 5, there is no option

b. Is the packet fragmented?


Answer :
The packet is not fragmented because the offset value is 0 and the flags is 0

c. What is the size of the data?


Answer :

The size of the data is 54 – 20 = 34 bytes

d. Is a checksum used?
Answer :

No checksum is used

e. How many more routers can the packet travel to?


Answer :

The packet can travel to 20 more routers

f. What is the identification number of the packet?


Answer :

The identification number of this packet is 0003

g. What is the type of service?


Answer :

The type of service is normal (0)

16. In a datagram, the M bit is zero, the value of HLEN is 5, the value of total length is
200, and the offset value is 200. What is the number of the first byte and number of
the last byte in this datagram? Is this the last fragment, the first fragment, or a middle
fragment?
Answer :

Since HELN is 5 then there is no option so the leader length is 20 bytes. Knowing the total length 200
bytes we can find the data length which is 200-20 = 180 bytes. Since the offset is 200 then the first byte in
this fragment is 200 * 8 = 1600 bytes. The last byte number is 1600+180-1 = 1779 since M= 0 then it’s
the last fragment
CHAPTER 8

1. Is the size of the ARP packet fixed? Explain.


Answer :

No. It can have two MAC addresses in it and two different protocol ad-dresses in it. The size
depends upon the network and datalink protocol.

2. What is the size of an ARP packet when the protocol is IP and the hardware is Ethernet?
Answer :

28 bytes = 2 + 2 + 1 + 1 + 2 + 6 + 4 + 6 + 4

3. What is the size of an Ethernet frame carrying an ARP packet?


Answer :

The size of the ARP packet is 28 bytes. We need to pad the data to have the minimum size of 46.
The size of the packet in the Ethernet frame is then calculated as 6 + 6 + 2 + 46 + 4 = 64 bytes
(without preamble and SFD)

4. What is the broadcast address for Ethernet?


Answer :

The broadcaset for Ethernet is All is or 0xFFFFFFFFFFF

5. A router with IP address 125.45.23.12 and Ethernet physical address23:45:AB:4F:67:CD


has received a packet for a host destination with IP address 125.11.78.10 and Ethernet
physical address AA:BB:A2:4F:67:CD.
Answer :

a) Show the entries in the ARP request packet sent by the router. Assume no subnetting.

OX 0001

OX 0800

OX 06 OX 04
OX 0001

OX 23:45:AB:4F:67:CD

Ox 7D:2D:17:0C

Ox 00:00:00:00:00:00
Ox 7D:0B:4E:0A
b) Show the entries in the ARP packet sent in response to part a. PART 2 NETWORK
LAYER

OX 0001

OX 0800

OX 06 OX 04

OX 0002

AA:BB:A2:4F:67:CD

Ox 7D:0B:4E:0A

OX 23:45:AB:4F:67:CD

Ox 7D:2D:17:0C
c) Encapsulate the packet made in part a in a data link frame. Fill in all the fields.

d) Encapsulate the packet part b in a data link frame. Fill in all the fields.

Same as above fig. the data part will be raplaced by the ans of q.2 and the destination
address
will be: AA:BB:A2:4F:67:CD. And the source address field will be OX 23
:45:AB:4F:67:CD.
6. A router with IP address 195.5.2.12 and Ethernet physical address AA:25:AB:1F:67:CD has
received a packet for a destination with IP address 185.11.78.10. When the router checks its
routing table, it finds out the packet should be delivered to a router with IP address 195.5.2.6 and
Ethernet physical address AD:34:5D:4F:67:CD.
a. Show the entries in the ARP request packet sent by the router. Assume no subnetting.
b. Show the entries in the ARP packet sent in response to part a.
c. Encapsulate the packet made in part a in the data link layer. Fill in all the fields.
d. Encapsulate the packet made in part b in a data link frame. Fill in all the fields.

7. Show the contents of ATMARP inverse packets exchanged between two routers that have a
PVC connection. The IP addresses are 172.14.20.16/16 and 180.25.23.14/24. Choose two
arbitrary 20-byte physical addresses. Use hexadecimal values in filling the fields.
Answer :

Explanation of the request packet:


• 0x0013 is used to show the hardware type of the packet.
• 0x0800 represent the type of the protocol which is used to sending the packet over the network.
• 0x14 is the hardware length, protocol length and hardware length of the senders.
• 1 is used to show the operation code.
. 0x444444444444444444444 use to show the address in the Hexadecimal format.
• 202.23.54.8/24 And 14.56.12.8/16 are two arbitrary 20-byte physical addresses.

8. Show the contents of ATMARP packets (request and reply) exchanged between a router
and a server. The IP address of the router is 14.56.12.8/16 and the IP address of the server
is 200.23.54.8/24. Choose two arbitrary 20-byte physical addresses. Use hexadecimal values
in filling the fields.
Answer :

Explanation of the request packet:


• 0x0013 is used to show the hardware type of the packet.
• 0x0800 represent the type of the protocol which is used to sending the packet over the network.
• 0x14 is the hardware length, protocol length and hardware length of the senders.
• 1 is used to show the operation code.
. 0x444444444444444444444 use to show the address in the Hexadecimal format.
• 202.23.54.8/24 And 14.56.12.8/16 are two arbitrary 20-byte physical addresses.
Explanation of the reply packet:
• 0x0013 is used to show the hardware type of the packet.
• 0x0800 represent the type of the protocol which is used to sending the packet over the network.
• 0x14 is the hardware length, protocol length and hardware length of the senders.
• 2 is used to show the operation code.
• 0x55555555555555555 use to show the address in the Hexadecimal format.
• 202.23.54.8/24 And 14.56.12.8/16 are two arbitrary 20-byte physical addresses.

9. Add IP addresses for the routers in Figure 8.12. Note that the prefix in each LIS must be
the same, but it must be different for the two LISs. Note also that the routers that belong to
two LISs must have two IP addresses. 195.5.2.12
Answer
2 is used to indicate the operating code.
• 0x55555555555555555 is used to show addresses in Hexadecimal format.
• 202.23.54.8/24 and 14.56.12.8/16 are two arbitrary 20-byte physical addresses.

10. An ATMARP packet must also be carried in cells. How many cells are needed to carry an
ATMARP packet discussed in this chapter?
Answer :

The ATMARP packet is 60 bytes in length; each cell can carry 48 bytes, so 2 cells are needed
CHAPTER 9

1. Host A sends a timestamp-request message to host B and never receives a reply.Discuss


three possible causes and the corresponding course of action.
Answer:

-If the host A send a message which is lost in chanel, then host A can resend the message
- if the host B received the message which is sent by the host A and host B send reply to host A
but reply message is lost then host A can send again message to host B

2. Why is there a restriction on the generation of an ICMP message in response to a failed


ICMP error message?
Answer :

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet
Protocol Suite. It is chiefly used by the operating systems of networked computers to send error
messages indicating, for example, that a requested service is not available or that a host or router
could not be reached. ICMP can also be used to relay query messages.

3. Host A sends a datagram to host B. Host B never receives the datagram and host A never
receives notification of failure. Give two different explanations of what might have
happened.
Answer :

It could happen that host B is unreachable, for some reason. The error message generated by an
intermediate router could then be lost on its way back to host A. Or perhaps the datagram was
dropped due to congestion and the error message generated by an intermediate router was lost

4. What is the purpose of including the IP header and the first 8 bytes of datagram data in the
error reporting ICMP messages?
Answer :

The reason that the IP header and first 8 bytes of a datagram data in the error reporting ICMP
message is included is to help you understand what conditions might have created the
error message. ... For protocol unreachable messages, having the first bytes of
the payload would be the TCP source and destination port

5. What is the maximum value of the pointer field in a parameter-problem message?


Answer :

the maximum value of the pointer :59


6. Give an example of a situation in which a host would never receive a redirection message
Answer.

 The interface on which the packet comes into the router is the same interface on which
the packet gets routed out.
 The subnet or network of the source IP address is on the same subnet or network of the
next-hop IP address of the routed packet.
 The datagram is not source-routed.
 The kernel is configured to send redirects. (By default, Cisco routers send ICMP
redirects. The interface subcommand no ip redirects can be used to disable ICMP
redirects.)

7. Make a table showing which ICMP messages are sent by routers, which are sent bythe
nondestination hosts, and which are sent by the destination hosts.
Answer:

8. Can the calculated sending time, receiving time, or round-trip time have a negative value?
Why or why not? Give examples.
Answer

sending time = receive timestamp - original timestamp


receiving time = returned time - transmit timestamp
round-trip time = sending time + receiving time

sending time = 59 - 46 = 13 milliseconds


receiving time = 67 – 60 = 7 milliseconds
round-trip time = 13 + 7 = 20 milliseconds

9. Why isn’t the one-way time for a packet simply the round-trip time divided by two?
Answer

The one way time is not the round trip divided by 2 because the request packet may havetraveled
by a different route than the response packet. In this case, the transmission time inone direction
may be different than the transmission time in the other direction.
10. What is the minimum size of an ICMP packet? What is the maximum size of an ICMP
packet?
Jawab:

the minimum size of an ICMP = 8bytes


the maximum size of an ICMP = 2048 bytes

11. What is the minimum size of an IP packet that carries an ICMP packet? What is the
maximum size?
Answer

The minimum size of an IP packet that carries an ICMP packet would be 28 bytes (a 20 byte IP
header + an 8 byte router solicitation packet). The maximum sizewould be 2068 bytes (a 20 byte
IP header + a 2048 byte router )

12. What is the minimum size of an Ethernet frame that carries an IP packet which in turn
carries an ICMP packet? What is the maximum size?
Answer

The original Ethernet IEEE 802.3 standard defined the minimum Ethernet frame size as 64
bytes and the maximum as 1518 bytes. The maximum was later increased to 1522 bytes to allow
for VLAN tagging. The minimum size of an Ethernet frame that carries an ICMP packet is
74 bytes

13. How can we determine if an IP packet is carrying an ICMP packet?


Answer

You just need to check if the 10th byte of the packet (Protocol field) matches ICMP’s protocol
number (= 1, from /etc/protocols).

14. Calculate the checksum for the following ICMP packet: Type: Echo Request Identifier: 123
Sequence Number: 25 Message: Hello
Answer

Identifier = 123 = 7B in hex


Sequence number = 25 = 19 in hex
Each character is represented as 1 byte and we have to group these in 16 bits or 2 bytes
H and E = 48 and 45 respectively = 4845 in hex
L and L = 4C and 4C respectively = 4C4C in hex
O and 0 = 4F and 0 respectively = 4F00 in hex
So Add these in 16 bits chunk in order to get checksum =
0800+007B+0019+4845+4C4C+4F00 = EC25
checksum = 1's complement of EC25 = FFFF-EC25 = 13DA in hex

15. A router receives an IP packet with source IP address 130.45.3.3 and destination IP
address 201.23.4.6. The router cannot find the destination IP address in its routing table.
Fill in the fields (as much as you can) for the ICMP message sent.
Answer:

16. TCP receives a segment with destination port address 234. TCP checks and cannot find an
open port for this destination. Fill in the fields for the ICMP message sent.
Answer:

17. An ICMP message has arrived with the header (in hexadecimal):

What is the type of the message? What is the code? What is the purpose of the
message?
Answer :

The type in this message is 3, which means the message is an unreachable destination. The code
in this message is 3, which means that the target port cannot be reached. The purpose of this
message is to notify the sender that the destination port is
not available at the current destination host.

18. An ICMP message has arrived with the header (in hexadecimal):

What is the type of the message? What is the code? What is the purpose of the
message? What is the value of the last 4 bytes? What do the last bytes signify?
Answer :

The type in this message is 5, which means the message is redirection. The code in this message
is 0, which means that the message is a diversion for network-specific routes. The last 4 byte
value is 17.11.3.2, which is the IP address of another router on the network. The purpose of this
message is to tell the sender that any data sent to the original destination must be sent to the
router with IP address 17.11.3.2

19. A computer sends a timestamp request. If its clock shows 5:20:30 A.M. (Universal Time),
show the entries for the message.
Answer

5:20:30 AM = 5*60*60*1000 + 20*60*1000 + 30*1000 = 19,230,000 ms

20. Repeat Exercise 19 for the time of 3:40:30 P.M. (Universal Time).
Answer

3:40:30 AM = 3*60*60*1000 + 40*60*1000 + 30*1000 = 13,230,000 ms

21. A computer receives a timestamp request from another computer at 2:34:20 P.M. The
value of the original timestamp is 52,453,000. If the sender clock is 5 ms slow, what is the
one-way time?
Answer

2:34:20 PM = 52,460,000 ms
52,460,000 ms − 52,453,000 ms = 7000 ms
7000 ms + 5 ms = 7005 milliseconds
22. A computer sends a timestamp request to another computer. It receives the corresponding
timestamp reply at 3:46:07 A.M. The values of the original timestamp,receive timestamp, and
transmit timestamp are 13,560,000, 13,562,000, and 13,564,300, respectively. What is the
sending trip time? What is the receiving trip time? What is the round-trip time? What is the
difference between the sender clock and the receiver clock?
Answer :

13,564,300 = 2,700 milliseconds


Round trip time = 2,000 + 2,700 = 4,700 milliseconds

23. If two computers are 5000 miles apart, what is the minimum time for a message to go from
one to the other?
Answer

The link can carry data at 1 Mbps . Consider a single bit propagating over the link. By the time it
reaches the other end

CHAPTER 10
1. Jika host mobile bertindak sebagai agen asing, pendaftaran masih diperlukan. Agen asing perlu
untuk mengidentifikasi kan diri ke agen rumah.
2.
Home agent foreign
agent

Registration request

Registrarion Reply

3.
ICMP
Advertisement Message
16 8 1456
10800 0 Reserved
4.
ICMP
Advertisement Message
16 20 1672
14400 0 Reserved
128.1.1.2
128.1.1.3
128.1.1.4

5. Router ICMP daoat digunakan untuk solisasi agen oleh host seluler yang telah dipindah ke
jaringan. Karena agen sedang mencari informasi maka tidak diperlukan adanya field tambahan.
Alamat agen juga termasuk dalam pesan.
6. ICMP

7.
4 5 0 44
42 0 0
15 1 Header Checksum
Source IP Address
Destination IP Address
ICMP Advertisement Message
16 8 1456
10800 0 reserved

8. agen perlu menjalankan program server yang berjalan terus menerus sambil menunggu pesan
pendaftaran. jenis program server ini membutuhkan port yang dikenal dan protokol transport
layer (UDP) untuk mendukungnya.

9.
4 5 0 length
42 0 0
15 Protocol Header Checksum
200.4.7.14
130.45.6.7
Data

10.
4 5 0 Length
107 0 0
15 Protocol Header Checksum
130.45.10.20
14.67.34.6
4 5 0 Length
42 0 0
15 protocol Header Checksum
200.4.7.14
130.45.6.7
Data

11.
4 5 0 Length
207 0 0
15 Protocol Header Checksum
14.67.34.30
14.56.8.9
4 5 0 Length
42 0 0
15 protocol Header Checksum
200.4.7.14
130.45.6.7
Data

12.
4 5 0 Length
42 0 0
15 protocol Header Checksum
130.45.6.7
200.4.7.14
Data

13. Triangle routing.

CHAPTER 11
1. Nilai kadaluarsa timer adalah 6 kali, untuk memungkinkan beberapa komunikasi yang tidak
terjawab antar router.
2. Batas jumlah hop meningkatkan stabilitas RIP dengan membatasi berapa kali sebuah pesan dapat
dikirim melalui router yang sama, sehingga membatasi kembali dan memperbaharui yang mungkin
terhadi jika bagian dari jaringan turun.
3. Dalam distance vector routing, setiap router mengirimkan semua pengetahuannya tentang sistem
automatis ke semua router di jaringan tetangganya secara berkala. Ini menggunakan algoritma yang
cukup sederhana untuk memperbarui tabel routing tetapi menghasilkan banyak lalu lintas jaringan
yang dibutuhkan. Dalam keadaan link routing, router membanjiri sistem otonom dengan informasi
tentang perubahan dalam jaringan hanya ketika perubahan terjadi. Ini menggunakan sumber daya
jaringan tanpa jarak dari rute vektor dalam mengirimkan lebih sedikit lalu lintas melalui jaringan
tetapi menggunakan Algoritma Dijkstra yang jauh lebih kompleks untuk menghitung tabel keluar
dari basis data keadaan tautan.
4. Pesan OSPF disebarkan lebih cepat karena router yang menggunakan OSPF akan segera
membanjiri jaringan dengan berita tentang segala perubahan di lingkungannya. Pesan RIP
didistribusikan secara lambat karena jaringan menggunakan RIP bergantung pada tanggal periodik
yang terjadi setiap 30 detik untuk membawa berita apa pun dari satu router ke router berikutnya.
Proses ini mungkin membutuhkan banyak waktu
5. Ukuran pesan RIP yang mengadvertisementkan satu jaringan adalah 24 byte.
Ukuran pesan RIP yang mengadvertisementkan jaringan N adalah (4 + 20  N) byte
formula umum 4 + (20  N)
6. Diperlukan satu penghitung waktu berkala.
Diperlukan dua puluh timer kedaluwarsa, satu untuk setiap entri.
Diperlukan lima timer pengumpul sampah, satu untuk setiap rute yang tidak valid.
7.
2 Version Reserved
Family: 2 All 0s
Net 1
All 0s
All 0s
4
Family: 2 All 0s
Net 2
All 0s
All 0s
2
Family: 2 All 0s
Net 3
All 0s
All 0s
1
Family: 2 All 0s
Net 4
All 0s
All 0s
5

8. Router C dengan 1 hop.

Network Hops
Net 1 3
Net 2 2
Net 3 4
Net 4 8

Network Hops Next Router


Net 1 3 C
Net 2 2 C
Net 3 4 F
Net 4 8 G

9. General header memiliki dua byte kosong (set ke 0's). Setiap bagian advertisement memiliki 10
byte kosong. Ini berarti kami memiliki 2 + (10  N) byte kosong di jaringan N advertisement pesan.

10.
11.

12.
13.
14.

15.
16. Tidak ada hubungan antara router C dan D. Tabel routing, oleh karena itu, tidak berubah.
17.
18.
19.
20.
21.
CHAPTER 12

1. jika kita ingin menemukan notasi CIDR untuk rentang alamat ketika alamat pertama dan terakhir
dalam blok diberikan, kita perlu menemukan nilai n (panjang awalan). Salah satu cara untuk
melakukannya adalah menemukan jumlah maksimum bit paling kanan yang sama di kedua alamat
(potensial n).

jika kita menganggap bahwa bagian ini adalah awalan, maka sufiks harus semua 0 di alamat
pertama dan semua 1 di alamat terakhir. jika dua alamat lulus tes ini, kami telah menemukan n
dan blok dapat ditulis dalam notasi CIDR dengan n sebagai jumlah maksimum bit umum.
perhatikan bahwa tes juga menjamin bahwa alamat pertama dapat dibagi dengan jumlah alamat di
blok

a. blok tidak lulus tes karena ada 1 di akhiran alamat pertama

blok ini dapat dipecah menjadi beberapa blok CIDR yang lebih kecil di masa depan

b. blok ini tidak lulus ujian karena ada dua 1 di akhiran alamat pertama

blok ini dapat dipecah menjadi beberapa blok CIDR yang lebih kecil di masa depan

c. blok ini tidak lulus tes karena ada 1 di akhiran alamat pertama dan satu 0 di akhiran alamat
terakhir

kunci ini dapat dibagi menjadi beberapa blok CIDR yang lebih kecil di masa depan

2. nomor AS 24101 adalah (94.37) pada basis 256. kami menyisipkan dua byte ini di blok
233.x.y.0 untuk mendapatkan blcok 233.94.37.0/24

3. kami menggunakan notasi biner untuk melakukan trasnformasi:


alamat yang dihasilkan adalah heksadesimal adalah: 01: 00: 5E: 18: 3C: 09. menggunakan
metode yang sama, kami mendapatkan hasil yang sama

4. dalam setiap kasus, kami menemukan tiga byte paling kanan, kurangi 8 dari digit paling kiri jika
lebih besar dari 8, dan tambahkan hasilnya ke alamat Ethernet awal. perhatikan bahwa a dan b
mewakili alamat Ethernet yang sama

a.

b.

c.

d.

5. tidak perlu pesan laporan untuk bepergian ke luar jaringannya sendiri karena satu-satunya tujuan
adalah untuk memberi tahu router berikutnya di pohon spanning keanggotaan grup. tidak ada
pesan kueri untuk melakukan perjalanan ke luar jaringan lokal karena satu-satunya tujuan

adalah untuk menyurvei jaringan lokal untuk keanggotaan dalam grup apa pun
6. Pesan permintaan umum adalah 12 byte

a. panjang pesan khusus grup adalah 12 byte

b. panjang grup dan sumber pesan adalah (12 + N x 4) byte di mana N adalah jumlah alamat
spesifik

7. Pesan laporan keanggotaan adalah [8 + 3 x (8 + 5 x 4)] = panjang 92 byte. kami tidak dapat
memberikan rumus umum untuk ukuran karena jumlah alamat spesifik di setiap rekaman
mungkin berbeda

8.

9.
10. gambar di bawah ini memberikan header dan catatan grup

11. Gambar di bawah ini menunjukkan catatan header dan grup. kami menggunakan tipe catatan 6 untuk
mengecualikan pesan apa pun dari satu-satunya sumber yang didefinisikan dalam laporan sebelumnya

12. Gambar di bawah ini menunjukkan catatan header dan grup.


13. Gambar di bawah ini menunjukkan keadaan

14. a. karena Max Reponse Code (MRC) kurang dari 127, kami hanya menemukan nilai
Maximum Response Time (MRT) sebagai

perhatikan bahwa kita tidak perlu khawatir tentang bit yang paling signifikan karena itu
adalah 0 dan tidak berpengaruh dalam perhitungan. perhitungan dapat dilakukan dengan
menggunakan nilai desimal.

b. karena MRC> = 128, kita perlu menemukan eksponen

16

Ini mens bahwa kita perlu menggeser 10 delapan bit, (Exp + 3) ke kiri dan atau hasilnya dengan mantissa

15. a. ini adalah pesan query


b. checksum adalah 0xEEFF
c. dari alamat grup adalah (E80E1508)16 (1110 1110 1111 1111)atau 234.14.21.8 2

16. a. ini adalah laporan keanggotaan


b. checksum adalah 0xF9C0 atau (1111 1001 1100 0000)
c. hanya ada dua catatan dalam pesan karena nilai terakhir adalah (0002)16
17. Dalam setiap kasus, kami menemukan tiga byte paling tinggi, kurangi 8 dari digit paling kiri jika lebih
besar dari 8, dan tambahkan hasilnya ke alamat Ethernet awal. perhatikan bahwa a dan b mewakili alamat
Ethernet yang sama
a.

b.

c.

d.

18. Lihat tabel


dibawah ini :

19. Lihat tabel dibawah ini :

20. Lihat masukan di dalam tabel dibawah :

21. router B adalah router induk yang ditunjuk


22. tidak, RPF tidak membuat pohon jalur terpendek karena jaringan dapat menerima lebih dari satu
salinan paket multicast yang sama. RPF membuat grafik, bukan pohon

23. ya, RPB membuat pohon jalur terpendek karena paket multicast menjangkau setiap jaringan dan
jaringan hanya menerima satu salinan paket. daun pohon adalah jaringannya

24. ya, RPM membuat pohon jalur terpendek karena itu sebenarnya RPB dengan fitur prunning dan
okulasi. daun pohon adalah jaringannya

Вам также может понравиться