![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem P20P
Program Plan Intro
Given scenario:
In the given network, ASs “X” and “Z” are connected by AS “Y”. Where, “Z” has a peering agreement with “Y” and “Y’ has a peering agreement with “Z”. The AS “Z” wants to transit all of “Y’s” traffic but it does not want to transit “X’s” traffic.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Computer Science
Suppose KDC X serves one community of users
and KDC Y serves a different community of
users. KDC X and KDC Y have an established
shared symmetric key KXY. Develop the steps
of communication needed to enable customer A of
KDC X community, to obtain a shared
session key with customer B of KDC Y community.
KDC X shares a symmetric key with A,
KAX, and KDC Y shares a symmetric key with B,
KBY. At the end of the steps of
communication A and B will have established a
session key, KAB.
Consider a scenario in which Host A wants to simultaneously send packets to Hosts B and C. A is connected to B and C via a broadcast channel—a packet sent by A is carried by the channel to both B and C. Suppose that the broadcast channel connecting A, B, and C can independently lose and corrupt packets (and so, for example, a packet sent from A might be correctly received by B, but not by C). Design a stop-and-wait-like error-control protocol for reliably transferring packets from A to B and C, such that A will not get new data from the upper layer until it knows that both B and C have correctly received the current packet. Give FSM descriptions of A and C.
Suppose nodes A and B are on the same 10 Mbps broadcast channel, and the propagation delay between the two nodes is 245 bit-times. Suppose A and B send Ethernet frames at the same time. Suppose the transmission time of the entire frame is 295 bit-times. So, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. A node chooses the value of K at random from {0,1,2,...2n−1} where n is the number of collisions experienced on the channel – note n is set to 1 in this case). For Ethernet, the actual amount of time a node waits is K*512 bit times (i.e., K times the amount of time needed to send 512 bits into the Ethernet). Suppose A chooses a K value of 0 and B chooses a K value of 1. Assuming no other nodes are active, can the retransmissions from A and B collide? Justify your answer by showing all the intermediate steps of your calculations.
Chapter 5 Solutions
EBK COMPUTER NETWORKING
Ch. 5 - SECTION 5.1 R1. What is meant by a control plane...Ch. 5 - Prob. R2RQCh. 5 - Prob. R3RQCh. 5 - Prob. R4RQCh. 5 - Prob. R5RQCh. 5 - Prob. R6RQCh. 5 - Prob. R7RQCh. 5 - Prob. R8RQCh. 5 - Prob. R9RQCh. 5 - Prob. R10RQ
Ch. 5 - Prob. R11RQCh. 5 - Prob. R12RQCh. 5 - Prob. R13RQCh. 5 - Prob. R14RQCh. 5 - Prob. R15RQCh. 5 - Prob. R16RQCh. 5 - Prob. R17RQCh. 5 - Prob. R18RQCh. 5 - Prob. R19RQCh. 5 - Prob. R20RQCh. 5 - Prob. R21RQCh. 5 - Prob. R22RQCh. 5 - Prob. R23RQCh. 5 - Prob. P1PCh. 5 - Prob. P2PCh. 5 - Prob. P5PCh. 5 - Prob. P7PCh. 5 - Prob. P8PCh. 5 - Prob. P9PCh. 5 - Prob. P10PCh. 5 - Prob. P12PCh. 5 - Prob. P13PCh. 5 - Prob. P14PCh. 5 - Prob. P15PCh. 5 - Prob. P16PCh. 5 - Prob. P17PCh. 5 - Prob. P18PCh. 5 - Prob. P19PCh. 5 - Prob. P20PCh. 5 - Prob. P21PCh. 5 - Prob. P22P
Knowledge Booster
Similar questions
- Suppose there are three nodes in a network, A, B, and C. A starts transmitting over the medium at time t = 0. The time to transmit a single frame is 100 units. B and C both sense the medium at t = 5 units and detect that the medium is busy. B and C both have data to transmit. If A, B, and C were to use a CSMA/CD protocol, suppose that the time at which B and C attempt transmission is given by tB1 and tC1. If A, B, and C were to use a CSMA/CA protocol, suppose that the time at which B and C attempt transmission is given by tB2 and tC2. What can be said about the values of tB1, tC1, tB2, and tC2? Choose the most appropriate response. In the choices below, the notation >= represents "greater than equal to", and != represents "not equal to". tB1= tC1 = 105, tB2 >= 105, and tC2 >= 105 tB1> 100, tC1 > 100, tB2 > 100, and tC2 > 100 tB1= tC1 = tB2 = tC2 = 100 tB1= tC1 = 100, tB2 >= 100, and tC2 >= 100arrow_forwardSuppose a router's drop policy is to drop the highest-cost packet whenever queues are full, where it defines the "cost" of a packet to be the product of its size by the time remaining that it will spend in the queue. (Note that in calculating cost it is equivalent to use the sum of the sizes of the earlier packets in lieu of remaining time.) (a) What advantages and disadvantages might such a policy offer, compared to tail drop? (b) Give an example of a sequence of queued packets for which dropping the highest-cost packet differs from dropping the largest packet. (c) Give an example where two packets exchange their relative cost ranks as time progresses.arrow_forwardSuppose KDC X serves one community of users and KDC Y serves a different community of users. KDC X and KDC Y have an established shared symmetric key KXY. Develop the steps of communication needed to enable customer A of KDC X community, to obtain a shared session key with customer B of KDC Y community. KDC X shares a symmetric key with A, KAX, and KDC Y shares a symmetric key with B, KBY. At the end of the steps of communication A and B will have established a session key, KAB.arrow_forward
- Imagine two autonomous systems ASX and ASY , and assume all of the following: • ASY has been allocated a prefix P Y containing a host H's public IP address. • A router R resides within the domain of ASX. • ASX uses RIP for intra-AS routing, a shortest AS-PATH policy for inter-AS routing, and an intra-AS hot-potato policy to break AS-PATH ties for inter-AS routing. • ASX contain three gateways, G1, G2, and G3. • R has three interfaces, 1, 12, and 13, and entries (G1, 1) and (G2, 12), in its forwarding table. • G1 is fewer hops away than G2 along their respective shortest paths from R, though the path to G1 traverses an older set of links with lower average throughput. • At time Tj the only path to prefix P Y to have been advertised to ASX is ASB ASC ASY with NEXT-HOP address G7. Answer the question: a. If G7 has an inter-AS peering link with ASX only to G2, to which interface will R forward datagrams addressed to H?arrow_forwardWe have 5 routers labled A-E. Suppose we have the forwarding tables shown below after the routingalgorithm is stable. Let all links have cost 1. a. If a message is originated from A and a destination is E. Which path does it take?b. If a message is originated from C and a destination is D. Which path does it take?c. Give a diagram of a possible network consistent with these tables.arrow_forwardQUESTION 77 Consider the network topology shown below with routers labeled A through F, inclusive. Each link is labeled with its "cost" for routing purposes. The link state routing algorithm is used in this network. (a)Show how Djikstra's algorithm works to compute paths from Router E to all other routers (show your answer in a table format similar to the one used in the lectures). (b)Show the final forwarding table at Router E after completion of the algorithm.arrow_forward
- Consider a packet of length L that begins at end system A and travels over three links to a destination end system. These three links are connected by two packet switches. Let d, s , and R denote the length, propagation speed, and the transmission rate of link i, for i=1,2,3 . The packet switch delays each packet by d . Assuming no queuing delays, in terms of d, s , R, , and L, what is the total end-to-end delay for the packet? Suppose now the packet is 1,500 bytes, the propagation speed on all three links is 2.5⋅108m/s the transmission rates of all three links are 2 Mbps, the packet switch processing delay is 3 msec, the length of the first link is 5,000 km, the length of the second link is 4,000 km, and the length of the last link is 1,000 km. For these values, what is the end-to-end delay?arrow_forwardSuppose four active nodes—nodes A, B, C and D—are competing for access to a channel using slotted ALOHA. Assume each node has an infinite number of packets to send. Each node attempts to transmit in each slot with probability . The first slot is numbered slot 1, the second slot is numbered slot 2, and so on. (a) What is the probability that node A succeeds for the first time in slot 5? (b) What is the probability that some node (either A, B, C or D) succeeds in slot 4? (c) What is the probability that the first success occurs in slot 3? (d) What is the efficiency of this four-node system?arrow_forwardCould this scheme protect against an malicious attacker that can intercept and inject into the transmission? Why? Could this scheme protect against transmitting error? (E.g., if a transmitting error happens by flipping a bit or two due to bad link quality, could Bob discover it?arrow_forward
- Consider a node called A that sends packets to an adjacent node called B. To control the packet flow to node B, node A employs a credit manager scheme in which parameters C=3(credits), C_max=4(credits) and \tao=6(msec), respectively. node A has an infinite buffer to temporarily store packets. When a packet arrives at node A, node A stores the packet at the bottom of the buffer. Node A also has a single server (transmitter). As soon as the server becomes idle, the server picks up a packet at the head of the buffer, if any, and serves the packet for packet transmission time T_p as far as there remains a credit. (The packet transmission time T_p = 4 (msec).) We observed the arrival times of the first 12 packets, denoted by aA(1)⋯A(12), which were as follows: n A(n) 1 0.5 msec 2 1.0 3 1.5 4 2.0 5 4.5 6 5.5 7 6.5 8 12.5 9 13.0 10 13.5 11 14.0 12 14.6 1. Let R(n) denote the departure time of the n th packet from the buffer for n∈{1,2,...}. Find R(n) for…arrow_forwardConsider a sender using a reliable data transfer protocol. The sender wants to send 9 packets to a receiver. The transmission delay for a single packet is 40 milliseconds. The propagation delay between the hosts is 100 milliseconds. Assume an ACK is small enough that you can ignore its transmission delay. You may also assume that no packets are lost, damaged, or reordered. For this question, a reliable data transfer is considered finished when all ACKs have been received by the sender. How long would this take using a pipelined reliable data transfer protocol with a window size of 6? In milliseconds How long would this take using a non-pipelined reliable data transfer protocol? In millisecondsarrow_forward4. Consider a LAN cable with a 100Mbps network link which is connecting the two campuses of SEU. A PC from Lab1(SEUPC1) and other PC from lab2(SEUPC2) are the only two stations on this network. Each PCs has some frames to send. Both SEUPC1 and SEUPC2 attempt to send a frame, collided at the first transmission and this time SEUPC1 wins the backoff race. At the end of successful transmission by SEUPC1, both stations (SEUPC1 and SEUPC2) attempt to transmit and collide. What will be the probability that SEUPC2 wins the second backoff race?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education