Documente Academic
Documente Profesional
Documente Cultură
CHAPTER 4
- Advantages:
Connectionless service is simpler because the source, destination, and router need to handle each packet
separately without seeing the relationship between the two.
- Deficiency :
But the connectionless service cannot come in sequence, so it will be marked with a message and address.
A n bit can create a different 2n virtual circuits identifier, we take an example, for example n = 5, the
number of virtual circuits is 2 * 5 = 10.
A complete IP header will be in each fragment. The source address, destination address, IP ID,
fragmentation offset, and more fragment bits will be present. The key piece in all fragments is that the IP
header consists of the same source address, destination address, and IP ID field tuples.
5. The aume destination computer receives several packets from a source. How can it be
be sure that the fragments of belonging to a datagram are not mixed from the fragments belonging
to another datagram.
Each datagram must have a unique identification number that distinguishes it from other datagrams sent
by the same source. Identification number copied to all fragments. In other words, the identification
number attaches all the fragments included in the same datagram.
6. Why do you think that the packets in Figure 4.7 need both addresses and labels?
In the setup stage, the source and destination address of the sender and receiver are used to create table
entries for connection-oriented services. In the teardown phase, the source and destination inform the
router to delete the appropriate entry. Each packet is forwarded based on the label in the package. To
follow the connection-oriented design ideas that will be used on the Internet, we assume that the package
has a label when it reaches the router
7. Compare and contrast delays in connectionless and connection-oriented services. Which service
creates less delay if the message is large?
When the network layer finds its next hope, the MAC address then fragments the datagram in accordance
with MTU before sending it to the network layer because each network (LAN and WAN) has limited
MTU capacity and is therefore needed to avoid datagram errors.
Each time a packet enters a different network of several sizes, the router requires fragments into smaller
sizes that enter the new MTU.
10. Discuss why we need to reassemble the final destination, not at each router.
Forwarding and complex mechanisms must be carried out at the end point unless adding them to network
components improves performance.
11. In Figure 4.15, why do we need to set a timer and destroy all fragments if the timer
expires? What criteria do you use for expiration?
A fragment may have been lost and never arrived. The destination host cannot wait forever. The
destination host starts the time and after a time-out, it can send an error message to notify the source host
that the packet is lost and, if necessary, must be resent. The duration of time spent can be based on
information that the destination host might gather about the status of the Internet. If there are a lot of
delays in the arrival of the previous packet, that means that the Internet is jammed, and the fragments will
arrive soon (it's not always lost).
CHAPTER 5
23. D. 250
24. C. Temukan alamat pertama dan terakhir di subnet pertama.
25. D. Temukan alamat pertama dan terakhir di subnet terakhir (subnet 1024).
26. D. Temukan alamat pertama dan terakhir di subnet terakhir (subnet 32).
27. A. 255.255.255.0
28. C. 17.34.16.0/23
29. Sebelum menghitung prefix sebaiknya kita mengetahui angka biner
128 64 32 16 8 4 2 1
Urutkan kelas sesuai netmask
128 64 32 16 8 4 2 1
Urutkan kelas sesuai netmask
Jawabannya secara pembagian kelas IP yaitu kelas A dan pembagian kelas setelah menghitung
subnetnya yaitu kelas C karena hostnya ada di oktet ke 4.
31. Tidak dapat karena ipv4 32 bit dan ipv6 128
32. Bisa karena prefix berkaitan dengan IPaddress (internet protocol address).
33. 150.168.0.1/26
34. 120.60.4.255/26
35. Tidak perlu karena alamat yang dimiliki 1024 dan dibagi ke dan di bagi ke 1024 telah memenuhi
semua alamat yang di bagi.
CHAPTER 6
1. Pengirimannya langsung karena ip pengirim dan ip tujuan berada di kelas yang sama.
2. Perngirimannya tidak bisa langsung karena walapun block pertama sama, tapi block terakhir
berbeda.
3.
4.
5.
6.
Dari 147.26.50.30 ke m1
7.
Dari 145.14.64.1/18 ke m1
8.
Dari 135.11.80.21 ke m0
9.
Dari 201.4.16.70 ke m1
10.
12.
13.
17.
18.
19.
CHAPTER 7
Answer :
2. Calculate the HLEN value if the total length is 1200 bytes, 1176 of which is data
from the upper layer.
Answer :
Calculate
HLEN
Total Length = 1200 bytes
Header Length = 1200
-
1176
= 24
HLEN = 24/4 so HLEN = 6
3. Table 7.3 lists the MTUs for many different protocols. The MTUs range from 296
to 65,535. What would be the advantages of having a large MTU? What would be
the advantages of having a small MTU?
Answer :
Answer :
Given the offset value of 120, we can determine that the first byte is 120*8 = 960 but since
we don’t have the flag field
we cannot determine the last byte.
Answer :
6. What is the maximum number of routers that can be recorded if the timestamp
option has a flag value of 1? Why?
Answer :
Since the flag value for the timestamp is one each router must add its IP and timestamp.
Since we only have a maximum of 40 bytes for option the maximum number of routers that
will be recorded is 4( 4 IP addresses and 4 timestamps
for a total of 36 byte
s, the code field
and the length field have 4 bytes all together
)
7. Can the value of the header length in an IP packet be less than 5? When is it
exactly 5?
Answer :
The value of the HLEN can never be less than 5. When the datagram has no option, the
value of the HLEN is 5 because the size of the datagram header is 20 which is 5*4
8. The value of HLEN in an IP datagram is 7. How many option bytes are present?
Answer :
f the value of HLEN i
s 7 then the size of the datagram header is 4*7 = 28 since the minimum
header size is 20 when there is no option then the option size is 8 bytes
9. The size of the option field of an IP datagram is 20 bytes. What is the value of
HLEN? What is the value in binary?
Answer :
If the value of the option field is 20 bytes then the total length is 20 + 20 = 40 therefore the
value of HLEN
= 10 (10*4 = 40 the total length)
10. The value of the total length field in an IP datagram is 36 and the value of the
header length field is 5. How many bytes of data is the packet carrying?
Answer :
11. A datagram is carrying 1024 bytes of data. If there is no option information, what
is the value of the header length field? What is the value of the total length field?
Answer :
A datagram that is carrying 1024 bytes of data with no option information, the value of
HLEN is 5 and the value of t
otal length is 1024 + 20 = 1044 bytes
12. A host is sending 100 datagrams to another host. If the identification number of the
first datagram is 1024, what is the identification number of the last?
Answer :
13. An IP datagram arrives with fragmentation offset of 0 and an M bit (more fragment
bit) of 0. Is this a first fragment, middle fragment, or last fragment?
Answer :
14. An IP fragment has arrived with an offset value of 100. How many bytes of data
were originally sent by the source before the data in this fragment?
Answer :
An IP fragment with an offset value of 100 will have a data of 800 bytes sent by the source
before the data in this f
ragment.
15. An IP datagram has arrived with the following information in the header (in hexadecimal):
45 00 00 54 00 03 00 00 20 06 00 00 7C 4E 03 02 B4 0E 0F 02
CHAPTER 7 INTERNET PROTOCOL VERSION 4 (IPV4) 219
Answer :
d. Is a checksum used?
Answer :
No checksum is used
16. In a datagram, the M bit is zero, the value of HLEN is 5, the value of total length is
200, and the offset value is 200. What is the number of the first byte and number of
the last byte in this datagram? Is this the last fragment, the first fragment, or a middle
fragment?
Answer :
Since HELN is 5 then there is no option so the leader length is 20 bytes. Knowing the total length 200
bytes we can find the data length which is 200-20 = 180 bytes. Since the offset is 200 then the first byte in
this fragment is 200 * 8 = 1600 bytes. The last byte number is 1600+180-1 = 1779 since M= 0 then it’s
the last fragment
CHAPTER 8
No. It can have two MAC addresses in it and two different protocol ad-dresses in it. The size
depends upon the network and datalink protocol.
2. What is the size of an ARP packet when the protocol is IP and the hardware is Ethernet?
Answer :
28 bytes = 2 + 2 + 1 + 1 + 2 + 6 + 4 + 6 + 4
The size of the ARP packet is 28 bytes. We need to pad the data to have the minimum size of 46.
The size of the packet in the Ethernet frame is then calculated as 6 + 6 + 2 + 46 + 4 = 64 bytes
(without preamble and SFD)
a) Show the entries in the ARP request packet sent by the router. Assume no subnetting.
OX 0001
OX 0800
OX 06 OX 04
OX 0001
OX 23:45:AB:4F:67:CD
Ox 7D:2D:17:0C
Ox 00:00:00:00:00:00
Ox 7D:0B:4E:0A
b) Show the entries in the ARP packet sent in response to part a. PART 2 NETWORK
LAYER
OX 0001
OX 0800
OX 06 OX 04
OX 0002
AA:BB:A2:4F:67:CD
Ox 7D:0B:4E:0A
OX 23:45:AB:4F:67:CD
Ox 7D:2D:17:0C
c) Encapsulate the packet made in part a in a data link frame. Fill in all the fields.
d) Encapsulate the packet part b in a data link frame. Fill in all the fields.
Same as above fig. the data part will be raplaced by the ans of q.2 and the destination
address
will be: AA:BB:A2:4F:67:CD. And the source address field will be OX 23
:45:AB:4F:67:CD.
6. A router with IP address 195.5.2.12 and Ethernet physical address AA:25:AB:1F:67:CD has
received a packet for a destination with IP address 185.11.78.10. When the router checks its
routing table, it finds out the packet should be delivered to a router with IP address 195.5.2.6 and
Ethernet physical address AD:34:5D:4F:67:CD.
a. Show the entries in the ARP request packet sent by the router. Assume no subnetting.
b. Show the entries in the ARP packet sent in response to part a.
c. Encapsulate the packet made in part a in the data link layer. Fill in all the fields.
d. Encapsulate the packet made in part b in a data link frame. Fill in all the fields.
7. Show the contents of ATMARP inverse packets exchanged between two routers that have a
PVC connection. The IP addresses are 172.14.20.16/16 and 180.25.23.14/24. Choose two
arbitrary 20-byte physical addresses. Use hexadecimal values in filling the fields.
Answer :
8. Show the contents of ATMARP packets (request and reply) exchanged between a router
and a server. The IP address of the router is 14.56.12.8/16 and the IP address of the server
is 200.23.54.8/24. Choose two arbitrary 20-byte physical addresses. Use hexadecimal values
in filling the fields.
Answer :
9. Add IP addresses for the routers in Figure 8.12. Note that the prefix in each LIS must be
the same, but it must be different for the two LISs. Note also that the routers that belong to
two LISs must have two IP addresses. 195.5.2.12
Answer
2 is used to indicate the operating code.
• 0x55555555555555555 is used to show addresses in Hexadecimal format.
• 202.23.54.8/24 and 14.56.12.8/16 are two arbitrary 20-byte physical addresses.
10. An ATMARP packet must also be carried in cells. How many cells are needed to carry an
ATMARP packet discussed in this chapter?
Answer :
The ATMARP packet is 60 bytes in length; each cell can carry 48 bytes, so 2 cells are needed
CHAPTER 9
-If the host A send a message which is lost in chanel, then host A can resend the message
- if the host B received the message which is sent by the host A and host B send reply to host A
but reply message is lost then host A can send again message to host B
The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet
Protocol Suite. It is chiefly used by the operating systems of networked computers to send error
messages indicating, for example, that a requested service is not available or that a host or router
could not be reached. ICMP can also be used to relay query messages.
3. Host A sends a datagram to host B. Host B never receives the datagram and host A never
receives notification of failure. Give two different explanations of what might have
happened.
Answer :
It could happen that host B is unreachable, for some reason. The error message generated by an
intermediate router could then be lost on its way back to host A. Or perhaps the datagram was
dropped due to congestion and the error message generated by an intermediate router was lost
4. What is the purpose of including the IP header and the first 8 bytes of datagram data in the
error reporting ICMP messages?
Answer :
The reason that the IP header and first 8 bytes of a datagram data in the error reporting ICMP
message is included is to help you understand what conditions might have created the
error message. ... For protocol unreachable messages, having the first bytes of
the payload would be the TCP source and destination port
The interface on which the packet comes into the router is the same interface on which
the packet gets routed out.
The subnet or network of the source IP address is on the same subnet or network of the
next-hop IP address of the routed packet.
The datagram is not source-routed.
The kernel is configured to send redirects. (By default, Cisco routers send ICMP
redirects. The interface subcommand no ip redirects can be used to disable ICMP
redirects.)
7. Make a table showing which ICMP messages are sent by routers, which are sent bythe
nondestination hosts, and which are sent by the destination hosts.
Answer:
8. Can the calculated sending time, receiving time, or round-trip time have a negative value?
Why or why not? Give examples.
Answer
9. Why isn’t the one-way time for a packet simply the round-trip time divided by two?
Answer
The one way time is not the round trip divided by 2 because the request packet may havetraveled
by a different route than the response packet. In this case, the transmission time inone direction
may be different than the transmission time in the other direction.
10. What is the minimum size of an ICMP packet? What is the maximum size of an ICMP
packet?
Jawab:
11. What is the minimum size of an IP packet that carries an ICMP packet? What is the
maximum size?
Answer
The minimum size of an IP packet that carries an ICMP packet would be 28 bytes (a 20 byte IP
header + an 8 byte router solicitation packet). The maximum sizewould be 2068 bytes (a 20 byte
IP header + a 2048 byte router )
12. What is the minimum size of an Ethernet frame that carries an IP packet which in turn
carries an ICMP packet? What is the maximum size?
Answer
The original Ethernet IEEE 802.3 standard defined the minimum Ethernet frame size as 64
bytes and the maximum as 1518 bytes. The maximum was later increased to 1522 bytes to allow
for VLAN tagging. The minimum size of an Ethernet frame that carries an ICMP packet is
74 bytes
You just need to check if the 10th byte of the packet (Protocol field) matches ICMP’s protocol
number (= 1, from /etc/protocols).
14. Calculate the checksum for the following ICMP packet: Type: Echo Request Identifier: 123
Sequence Number: 25 Message: Hello
Answer
15. A router receives an IP packet with source IP address 130.45.3.3 and destination IP
address 201.23.4.6. The router cannot find the destination IP address in its routing table.
Fill in the fields (as much as you can) for the ICMP message sent.
Answer:
16. TCP receives a segment with destination port address 234. TCP checks and cannot find an
open port for this destination. Fill in the fields for the ICMP message sent.
Answer:
17. An ICMP message has arrived with the header (in hexadecimal):
What is the type of the message? What is the code? What is the purpose of the
message?
Answer :
The type in this message is 3, which means the message is an unreachable destination. The code
in this message is 3, which means that the target port cannot be reached. The purpose of this
message is to notify the sender that the destination port is
not available at the current destination host.
18. An ICMP message has arrived with the header (in hexadecimal):
What is the type of the message? What is the code? What is the purpose of the
message? What is the value of the last 4 bytes? What do the last bytes signify?
Answer :
The type in this message is 5, which means the message is redirection. The code in this message
is 0, which means that the message is a diversion for network-specific routes. The last 4 byte
value is 17.11.3.2, which is the IP address of another router on the network. The purpose of this
message is to tell the sender that any data sent to the original destination must be sent to the
router with IP address 17.11.3.2
19. A computer sends a timestamp request. If its clock shows 5:20:30 A.M. (Universal Time),
show the entries for the message.
Answer
20. Repeat Exercise 19 for the time of 3:40:30 P.M. (Universal Time).
Answer
21. A computer receives a timestamp request from another computer at 2:34:20 P.M. The
value of the original timestamp is 52,453,000. If the sender clock is 5 ms slow, what is the
one-way time?
Answer
2:34:20 PM = 52,460,000 ms
52,460,000 ms − 52,453,000 ms = 7000 ms
7000 ms + 5 ms = 7005 milliseconds
22. A computer sends a timestamp request to another computer. It receives the corresponding
timestamp reply at 3:46:07 A.M. The values of the original timestamp,receive timestamp, and
transmit timestamp are 13,560,000, 13,562,000, and 13,564,300, respectively. What is the
sending trip time? What is the receiving trip time? What is the round-trip time? What is the
difference between the sender clock and the receiver clock?
Answer :
23. If two computers are 5000 miles apart, what is the minimum time for a message to go from
one to the other?
Answer
The link can carry data at 1 Mbps . Consider a single bit propagating over the link. By the time it
reaches the other end
CHAPTER 10
1. Jika host mobile bertindak sebagai agen asing, pendaftaran masih diperlukan. Agen asing perlu
untuk mengidentifikasi kan diri ke agen rumah.
2.
Home agent foreign
agent
Registration request
Registrarion Reply
3.
ICMP
Advertisement Message
16 8 1456
10800 0 Reserved
4.
ICMP
Advertisement Message
16 20 1672
14400 0 Reserved
128.1.1.2
128.1.1.3
128.1.1.4
5. Router ICMP daoat digunakan untuk solisasi agen oleh host seluler yang telah dipindah ke
jaringan. Karena agen sedang mencari informasi maka tidak diperlukan adanya field tambahan.
Alamat agen juga termasuk dalam pesan.
6. ICMP
7.
4 5 0 44
42 0 0
15 1 Header Checksum
Source IP Address
Destination IP Address
ICMP Advertisement Message
16 8 1456
10800 0 reserved
8. agen perlu menjalankan program server yang berjalan terus menerus sambil menunggu pesan
pendaftaran. jenis program server ini membutuhkan port yang dikenal dan protokol transport
layer (UDP) untuk mendukungnya.
9.
4 5 0 length
42 0 0
15 Protocol Header Checksum
200.4.7.14
130.45.6.7
Data
10.
4 5 0 Length
107 0 0
15 Protocol Header Checksum
130.45.10.20
14.67.34.6
4 5 0 Length
42 0 0
15 protocol Header Checksum
200.4.7.14
130.45.6.7
Data
11.
4 5 0 Length
207 0 0
15 Protocol Header Checksum
14.67.34.30
14.56.8.9
4 5 0 Length
42 0 0
15 protocol Header Checksum
200.4.7.14
130.45.6.7
Data
12.
4 5 0 Length
42 0 0
15 protocol Header Checksum
130.45.6.7
200.4.7.14
Data
CHAPTER 11
1. Nilai kadaluarsa timer adalah 6 kali, untuk memungkinkan beberapa komunikasi yang tidak
terjawab antar router.
2. Batas jumlah hop meningkatkan stabilitas RIP dengan membatasi berapa kali sebuah pesan dapat
dikirim melalui router yang sama, sehingga membatasi kembali dan memperbaharui yang mungkin
terhadi jika bagian dari jaringan turun.
3. Dalam distance vector routing, setiap router mengirimkan semua pengetahuannya tentang sistem
automatis ke semua router di jaringan tetangganya secara berkala. Ini menggunakan algoritma yang
cukup sederhana untuk memperbarui tabel routing tetapi menghasilkan banyak lalu lintas jaringan
yang dibutuhkan. Dalam keadaan link routing, router membanjiri sistem otonom dengan informasi
tentang perubahan dalam jaringan hanya ketika perubahan terjadi. Ini menggunakan sumber daya
jaringan tanpa jarak dari rute vektor dalam mengirimkan lebih sedikit lalu lintas melalui jaringan
tetapi menggunakan Algoritma Dijkstra yang jauh lebih kompleks untuk menghitung tabel keluar
dari basis data keadaan tautan.
4. Pesan OSPF disebarkan lebih cepat karena router yang menggunakan OSPF akan segera
membanjiri jaringan dengan berita tentang segala perubahan di lingkungannya. Pesan RIP
didistribusikan secara lambat karena jaringan menggunakan RIP bergantung pada tanggal periodik
yang terjadi setiap 30 detik untuk membawa berita apa pun dari satu router ke router berikutnya.
Proses ini mungkin membutuhkan banyak waktu
5. Ukuran pesan RIP yang mengadvertisementkan satu jaringan adalah 24 byte.
Ukuran pesan RIP yang mengadvertisementkan jaringan N adalah (4 + 20 N) byte
formula umum 4 + (20 N)
6. Diperlukan satu penghitung waktu berkala.
Diperlukan dua puluh timer kedaluwarsa, satu untuk setiap entri.
Diperlukan lima timer pengumpul sampah, satu untuk setiap rute yang tidak valid.
7.
2 Version Reserved
Family: 2 All 0s
Net 1
All 0s
All 0s
4
Family: 2 All 0s
Net 2
All 0s
All 0s
2
Family: 2 All 0s
Net 3
All 0s
All 0s
1
Family: 2 All 0s
Net 4
All 0s
All 0s
5
Network Hops
Net 1 3
Net 2 2
Net 3 4
Net 4 8
9. General header memiliki dua byte kosong (set ke 0's). Setiap bagian advertisement memiliki 10
byte kosong. Ini berarti kami memiliki 2 + (10 N) byte kosong di jaringan N advertisement pesan.
10.
11.
12.
13.
14.
15.
16. Tidak ada hubungan antara router C dan D. Tabel routing, oleh karena itu, tidak berubah.
17.
18.
19.
20.
21.
CHAPTER 12
1. jika kita ingin menemukan notasi CIDR untuk rentang alamat ketika alamat pertama dan terakhir
dalam blok diberikan, kita perlu menemukan nilai n (panjang awalan). Salah satu cara untuk
melakukannya adalah menemukan jumlah maksimum bit paling kanan yang sama di kedua alamat
(potensial n).
jika kita menganggap bahwa bagian ini adalah awalan, maka sufiks harus semua 0 di alamat
pertama dan semua 1 di alamat terakhir. jika dua alamat lulus tes ini, kami telah menemukan n
dan blok dapat ditulis dalam notasi CIDR dengan n sebagai jumlah maksimum bit umum.
perhatikan bahwa tes juga menjamin bahwa alamat pertama dapat dibagi dengan jumlah alamat di
blok
blok ini dapat dipecah menjadi beberapa blok CIDR yang lebih kecil di masa depan
b. blok ini tidak lulus ujian karena ada dua 1 di akhiran alamat pertama
blok ini dapat dipecah menjadi beberapa blok CIDR yang lebih kecil di masa depan
c. blok ini tidak lulus tes karena ada 1 di akhiran alamat pertama dan satu 0 di akhiran alamat
terakhir
kunci ini dapat dibagi menjadi beberapa blok CIDR yang lebih kecil di masa depan
2. nomor AS 24101 adalah (94.37) pada basis 256. kami menyisipkan dua byte ini di blok
233.x.y.0 untuk mendapatkan blcok 233.94.37.0/24
4. dalam setiap kasus, kami menemukan tiga byte paling kanan, kurangi 8 dari digit paling kiri jika
lebih besar dari 8, dan tambahkan hasilnya ke alamat Ethernet awal. perhatikan bahwa a dan b
mewakili alamat Ethernet yang sama
a.
b.
c.
d.
5. tidak perlu pesan laporan untuk bepergian ke luar jaringannya sendiri karena satu-satunya tujuan
adalah untuk memberi tahu router berikutnya di pohon spanning keanggotaan grup. tidak ada
pesan kueri untuk melakukan perjalanan ke luar jaringan lokal karena satu-satunya tujuan
adalah untuk menyurvei jaringan lokal untuk keanggotaan dalam grup apa pun
6. Pesan permintaan umum adalah 12 byte
b. panjang grup dan sumber pesan adalah (12 + N x 4) byte di mana N adalah jumlah alamat
spesifik
7. Pesan laporan keanggotaan adalah [8 + 3 x (8 + 5 x 4)] = panjang 92 byte. kami tidak dapat
memberikan rumus umum untuk ukuran karena jumlah alamat spesifik di setiap rekaman
mungkin berbeda
8.
9.
10. gambar di bawah ini memberikan header dan catatan grup
11. Gambar di bawah ini menunjukkan catatan header dan grup. kami menggunakan tipe catatan 6 untuk
mengecualikan pesan apa pun dari satu-satunya sumber yang didefinisikan dalam laporan sebelumnya
14. a. karena Max Reponse Code (MRC) kurang dari 127, kami hanya menemukan nilai
Maximum Response Time (MRT) sebagai
perhatikan bahwa kita tidak perlu khawatir tentang bit yang paling signifikan karena itu
adalah 0 dan tidak berpengaruh dalam perhitungan. perhitungan dapat dilakukan dengan
menggunakan nilai desimal.
16
Ini mens bahwa kita perlu menggeser 10 delapan bit, (Exp + 3) ke kiri dan atau hasilnya dengan mantissa
b.
c.
d.
23. ya, RPB membuat pohon jalur terpendek karena paket multicast menjangkau setiap jaringan dan
jaringan hanya menerima satu salinan paket. daun pohon adalah jaringannya
24. ya, RPM membuat pohon jalur terpendek karena itu sebenarnya RPB dengan fitur prunning dan
okulasi. daun pohon adalah jaringannya