Problem 5. Distance Vector (DV) Routing (12 pt.)
Consider the network in the LS problem. Assume all the nodes other than the source node have the optimal distance information to all other nodes. Calculate the distance from the source to the destination node, and determine the next hop node. In case of a tie, you can choose any of the best nodes (Hint: “Bellman-Ford example”)
(i) dw(s)
(ii) dw(t)
(iii) dw(y)
Here since all the distance metric is non-negative, therefore DIjkstra algorithm can be applied from the source node s to compute the shortest path to every other nodes.
(i) To compute dw(s) i.e. shortest distance from node w to node s, note that source node w has 3 neighbours which are x , v and u.
As mentioned in the question, apart from source node every node has shortest path computed to other node.
Here, dx(s) = weight(x,v) + weight(v,t) + weight(t,s) = 3+4+1 = 8
dv(s) = weight(v,t) + weight(t,s) = 4+1 = 5
du(s) = weight(u,t) + weight(t,s) = 2+1 = 3
Hence the next hop from for node w will be selected based on min{weight(w,x) + dx(s) , weight(w,v) + dv(s) , weight(w,u) + du(s) = min(6+8 , 4+5 , 3+3) = 6
Hence dw(s) = 6 and next hop selected for destination s from node w will be node u.
ii.
dx(t) = weight(x,v) + weight(x,t) = 3+4 = 7
dv(t) = weight(v,t) = 4
du(t) = weight(u,t) = 2
Hence the next hop from for node w will be selected based on min{weight(w,x) + dx(t) , weight(w,v) + dv(t) , weight(w,u) + du(t) = min(6+7 , 4+4 , 3+2) = 5
Hence dw(t) = 5 and next hop selected for destination t from node w will be node u.
iii.
dx(y) = weight(x,v) + weight(v,y) = 3+1 = 4
dv(y) = weight(v,y) = 1
du(y) = weight(u,v) + weight(v,y) = 3+1 = 4
Hence the next hop from for node w will be selected based on min{weight(w,x) + dx(y) , weight(w,v) + dv(y) , weight(w,u) + du(y) = min(6+4 , 4+1 , 3+4) = 5
Hence dw(y) = 5 and next hop selected for destination y from node w will be node v.
Please comment for any clarification.
Problem 5. Distance Vector (DV) Routing (12 pt.) Consider the network in the LS problem. Assume...
12 8 4 6 4 6 2. Consider the same network as in Problem 1. Assume node r is the only destination in the network. Use a table to show the computation process of the Bellman-Ford algorithm. Each row in the table corresponds to one iteration of the algorithm, and each column is a pair (D (A), H(A)) where D,(A) is the cost from node i to A and Hi(A) is the next hop on the path from i to...
Figure 1: Network for Problem 4 and 5 4. [10 pointsj: Link-state routing: (a) Explain how link-state routing works. Give an example of an Internet routing protocol based on link-state routing. b) Apply Dijkstra's algorithm to obtain the routing table for node a in the network given in Figure 1 5. [10 points Apply distance-vector routing to the subnetwork of the network shown in Figure 1 con sisting of only nodes fa, b, c, d (a) Write the initial distance-vector...
Consider the following network.
a. (16 pt.)
With the indicated link costs, use Dijkstra’s shortest-path
algorithm to compute the shortest path from “w” to
all network nodes. Show how the algorithm works by computing the
table below. Note: If there exists any tie in each step, choose the
left-most column first.
Step
N’
D(s),
p(s)
D(t),
p(t)
D(u),
p(u)
D(v),
p(v)
D(x),
p(x)
D(y),
p(y)
D(z),
p(z)
0
1
2
3
4
5
6
7
b. (7 pt.)
Construct the...
4. Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance-vector algorithm. 6 2 What are the distances from y to all other nodes after y receives one message from each of its direct neighbors (assuming that these messages are the only messages that have been sent and received so far in the entire system)? What are the distances from x to all other nodes after x receives...
1.0. Suppose the network is as follows, where distance-vector
routing update is used. Each link has cost 1, and each router has
entries in its forwarding table only for its immediate neighbors
(so A’s table contains 〈B,B,1〉, 〈D,D,1〉 and B’s table contains
〈A,A,1〉, 〈C,C,1〉).
(a). Suppose each node creates a report from its initial
configuration and sends that to each of its neighbors. What will
each node’s forwarding table be after this set of exchanges? The
exchanges, in other words,...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...