COMS3200/7201 Computer Networks 1 (Version 1.0)
|
|
- Sharlene Hines
- 5 years ago
- Views:
Transcription
1 COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total marks are 100 marks. You only need to do two of these parts. For most students, Part A & Part B are the simplest and most useful to complete. Some students have explicitly requested an additional programming exercise, which is Part C. I expect only a small proportion of students will wish to attempt part C. If all three parts are submitted, the best two parts will count (with no extra credit for completing the third part). You should hand in these parts separately 100 marks total (worth 15% of course marks). For Part A This is in the form of a blackboard MCQ quiz, which is automatically marked. You may attempt the quiz a maximum of two times, and complete all the answers for one attempt in a single sitting, where possible. You should determine the answers (the questions are given below) before doing the submission. The topic will be some theory questions around the course material up to Wireless Networking. For Part B This is in the form of a blackboard quiz, which is automatically marked. You may attempt the quiz a maximum of two times, and complete all the answers for one attempt in a single sitting, where possible. You should determine the answers (the questions are given below) before doing the submission. The topic will be the analysis of a Wireshark trace. For Part C This is a programming assignment, which extends the programming assignment from Assignment 2, to allow webget to also download files from an FTP server 1
2 Part A. Answer the following questions on networking theory. 1. Which of the following are layers in the Internet Protocol Stack? (Select all correct answers) Application Layer Presentation Layer Session Layer Transport Layer Network Layer IP Layer Link Layer MAC Layer Data-Link Layer Physical Layer 2. HTTP with persistent connections is different from non-persistent connections because: It is always faster than non-persistent connections. It allows files from a single host to be pipelined without re-establishing the connection. It allows segments from multiple files from a server to be interleaved. It can use multiple client-side ports to improve throughput. It reduces the RTT (Round Trip Time). 3. In HTTP, a Conditional GET request is used to check the validity of an item in the cache by sending which of the following header fields in a request to the server? Last-Modified: 304 Not Modified: If-modified-since: Date: Time-to-live: 4. Which of the following application layer protocols are typically used to download messages from a mail server provided at enterprise level and a mail agent running on a user desktop, including web-based clients? (Select all correct answers)" HTTP SMTP POP3 IMAP Telnet 5. Which of the following application layer protocols are typically used to upload messages from a mail agent running on a user desktop, including web-based clients, and a mail server provided at enterprise level? (Select all correct answers) HTTP SMTP POP3 IMAP Telnet 2
3 6. ARP (Address Resolution Protocol) is used to map from an IP address into a hostname. to map from an IP address into a MAC address. to map from a MAC address into a hostname to map from a MAC address into an IP address. to map from a hostname into an IP address. to map from a hostname into a MAC address. 7. DNS (Domain Name System) is used to map from an IP address into a hostname. to map from an IP address into a MAC address. to map from a MAC address into a hostname to map from a MAC address into an IP address. to map from a hostname into an IP address. to map from a hostname into a MAC address. 8. TCP Flow Control ensures in-order packet delivery. identifies routers which are congested. ensures that the receiver buffer does not overflow. typically halves the congestion window size on packet loss indicated by a triple duplicate- ACK event sets the minimum transfer unit to prevent fragmentation. 9. TCP Congestion Control ensures in-order packet delivery. identifies routers which are congested. ensures that the receiver buffer does not overflow. typically halves the congestion window size on packet loss indicated by a triple duplicate- ACK event sets the minimum transfer unit to prevent fragmentation. 10. A server receives packets on port 80 from multiple clients, all on different hosts. How are these packets usually demultiplexed by UDP and TCP, assuming that TCP connections have already been established? In UDP data goes to one process listening on one socket, and in TCP data goes to one process listening on one socket. In UDP data goes to one process listening on one socket, and in TCP data from different clients go to different processes listening on separate sockets. In UDP data from different clients go to different processes listening on separate sockets, and in TCP data from different clients go to different processes listening on separate sockets In UDP data from different clients go to different processes listening on separate sockets, and In TCP data goes to one process listening on one socket. Different clients cannot send data to the same port on the server. 3
4 11. Which of the following possible network services are provided by the Internet s datagram-based network layer? Choose all correct answers or "None of the above" if none are correct. Guaranteed delivery. Guaranteed delivery with bounded delay. In-order packet delivery. Guaranteed minimum bandwidth. Guaranteed maximum jitter. None of the above. 12. Consider a TCP segment carried inside an IP datagram which is sent through a NAT gateway. Which of the following checksums would need to be recomputed (assume TTL isn't changed): The IP and TCP checksum are the same, so only one needs to be recomputed by the NAT gateway. The IP checksum needs to be recomputed by the NAT gateway, but the TCP checksum is unchanged. The TCP checksum needs to be recomputed by the NAT gateway, but the IP checksum is unchanged. The IP checksum and the TCP checksum are both unchanged. Both the IP checksum and the TCP checksum need to be recomputed by the NAT gateway. 13. The key difference between RIP and OSPF routing protocols is that RIP is a distance-vector protocol and OSPF is a link-state protocol. OSPF is a distance-vector protocol and RIP is a link-state protocol. RIP is an IETF standard and OSPF is an ISO/IEC standard. RIP is an intra-as routing protocol and OSPF is an inter-as routing protocol. OSPF is an intra-as routing protocol and RIP is an inter-as routing protocol 14. The key difference between RIP and BGP routing protocols is that RIP is a distance-vector protocol and BGP is a link-state protocol. BGP is a distance-vector protocol and RIP is a link-state protocol. RIP is an IETF standard and BGP is an ISO/IEC standard. RIP is an intra-as routing protocol and BGP is an inter-as routing protocol. BGP is an intra-as routing protocol and RIP is an inter-as routing protocol. 15. Ethernet and Link Layer protocols both use Carrier Sense Multiple Access, but a significant difference is that: Both use Collision Detection (CSMA/CD) but Ethernet uses a much longer backoff time. Ethernet uses Collision Detection (CSMA/CD) but uses Collision Avoidance (CSMA/CA). Ethernet uses Collision Avoidance (CSMA/CA) but uses Collision Detection (CSMA/CD). Ethernet uses Collision Detection (CSMA/CD) but does not generate collisions Both use Collision Avoidance (CSMA/CA) but Ethernet uses a much shorter backoff time. 4
5 16 Match the protocols with the statement about it which is most appropriate. QUIC RARP ICMP DASH DCCP A. Type=9 means a router discovery message B. Provides a low-overhead, message-oriented, UDP-like service with congestion control C. An experimental transport protocol used in Google Chrome D. Provides adaptive bit-rate streaming E. An obsolete protocol replaced by DHCP 5
6 PartB. Wireshark Trace (50 marks) The following 25 questions relate to the Wireshark Trace AS3.pcapng ( 2marks each) The trace was recorded on my Windows home computer (referred to below as PC-host) which is connected to a cable modem via Ethernet. Segment numbers below are the Wireshark numbers for the captured segments. Near the start of the trace, windows commands ipconfig/release and then ipconfig/renew are used to initiate renewal of a DHCP lease, and to initiate some ARP messages. You will need to answer the following 25 questions on Blackboard, but they are also given here so you can work through them at your own pace, and look up the reference materials that you need. IMPORTANT: When you enter answers in Blackboard, you will need to be precise when entering numbers since the answers will be auto-marked. IP addresses should be added in dotted decimal with no leading spaces, and no leading zeros, eg NOT MAC addresses should be entered as hexadecimal bytes with a colon between each digit, and with the digits (a,b,c,d,e) in lower case. Such addresses should be exactly 17 characters long. eg. d0:03:4b:07:89:55 Other hexadecimal values (eg. question 5) should just be listed as hexadecimal digits (lower case, without any leading 0x.). For one byte should have two characters, include leading zeros. 0c Answers which are not in the correct format will be automatically marked incorrect by BB. You will be able to me after results are released and I can check the answers if there is a minor formatting error (eg. if you put a space in the wrong place, O instead of 0, etc. ) and give extra marks, but it is obviously easiest if these are correct to start with. DHCP Questions. There are 5 DHCP messages in segments 3 (Release), 69 (Discover), 70 (Offer), 71 (Request), 73 (ACK). Q1. In the DHCP request message (segment 71), what is the source IP address in the IP datagram Q2. In the DHCP request message (segment 71), what is the destination IP address in the IP datagram 6
7 Q3. In the DHCP request message (segment 71), what is the source MAC address in the Ethernet Q4. In the DHCP request message (segment 71), what is the destination MAC address in the Ethernet Q5. In the DHCP request message (segment 71), the message indicates the IP address of the DHCP server that the PC-host is accepting an offer from. What is the value, in hexadecimal, of the onebyte option code that indicates the DHCP Server Identifier option. Q6. In the DHCP request message (segment 71), the message indicates the IP address of the DHCP server that the PC-host is accepting an offer from. What is the IP address of this DHCP server? Q7. In the DHCP request message (segment 71), the DHCP request indicates the Host Name (in ASCII) that will be used for PC Host. Give, as 10 characters, the value of this host name (e.g. home-comp1) Q8. In the DHCP ACK message (segment 73), what is the source IP address in the IP datagram Q9. In the DHCP ACK message (segment 73), what is the destination IP address in the IP datagram Q10. In the DHCP ACK message (segment 73), what is the source MAC address in the Ethernet Q11. In the DHCP ACK message (segment 73), what is the destination MAC address in the Ethernet Q12. In the DHCP ACK message (segment 73), what is the IP address of the Router that PC-host should use to forward messages beyond its subnet. Q13. In the DHCP ACK message (segment 73), what is the IP address of the first DNS server (out of the 3 given) that PC-host should use to resolve domain names. Q14. In the DHCP ACK message (segment 73), what is the four-byte value, in hexadecimal, of the IP Address Lease Time? Q15. In the DHCP ACK message (segment 73), which one of the following protocols is indicated by the two-byte Type field in the Ethernet Header: Ethernet, ARP, IP, IPv4, IPv6, UDP, TCP, DHCP, Bootstrap Protocol, or Boot Reply Q16. In the DHCP ACK message (segment 73), which of the following protocols is indicated by the one-byte Protocol field in the IP Datagram Header. Ethernet, ARP, IP, IPv4, IPv6, UDP, TCP, DHCP, Bootstrap Protocol, or Boot Reply 7
8 ARP Questions The following questions relate to ARP requests and answers that are in packets 78 and 93. Q17. In the ARP message in segment 78, which of the following protocols is indicated by the twobyte Type field in the Ethernet Header: Ethernet, DHCP, IP, IPv4, IPv6, UDP, TCP, ARP, ARP request, or ARP reply Q18. In the ARP message in segment 78, what is the destination MAC address in the Ethernet Q19. In the ARP message in segment 78, the sender requests the MAC address corresponding to which IP address? Q20. In the ARP message in segment 93, the sender answers the request in segment 78. What is this answer (i.e. what is the MAC address corresponding to the requested IP address in the request in segment 78.)? DNS Questions My home PC was originally set up to run in ITEE at UQ, so it sometimes thinks it is still at UQ due to its setup scripts, so it requests a lot of UQ hostnames with DNS. These next questions refer to DNS messages a query in segment 111, and its response (somewhere between 112 and 140). Q21: For the IP datagram in the Ethernet segment 111, what is the destination IP address? Q22: For the DNS request in segment 111, what is the host name whose IP address is being requested? Q23: What is the hexadecimal value of the two-byte Transaction ID in the DNS request in segment 111? Q24: By finding the response packet with the same Transaction ID (somewhere between segment 112 and 140), what is the IP address of the hostname that was requested in segment 111? Q25: In this response packet with the same Transaction ID as the request in segment 111, the source MAC address is 08:bd:43:9a:59:98. This is the MAC address corresponding to which IP address? 8
9 Part C Programming assignment. (50 marks) Enhance webget from Assignment 2 to also retrieve files using ftp. It should also still work for http. You can program webget in a language of your choice using (almost) any libraries of your choice, including ftp libraries such as Python s ftplib. It is also fine to implement the FTP protocol yourself with socket libraries. You can also use libraries to assist with parsing command lines. (You can also use other libraries for the http part if you wish to rewrite that part) You CANNOT write a program that simply calls the existing wget program, and you CANNOt use the python wget package or similar packages in other languages. The webget utility should work as a command line program with command line parameters as follows: webget PROTOCOL://HOST/FILENAME for example (not a real URL): webget ftp://ftp.someuni.edu.au/toplevel/welcome.msg will use the FTP protocol (as per RFC959) to retrieve the file welcome.msg in the subdirectory toplevel on the server ftp.someuni.edu.au on the usual FTP welcome port and store it in the file welcome.msg in the current directory. If your program uses python or another interpreted language and needs a slightly different format that is fine. You can either call the program from the command line, or from the console within the interpreter. Your program should login as anonymous on the FTP server, give coms3200@uq.edu.au as the password. Your program must use PASSIVE mode (PASV command) to open the data connection most firewalls won t allow an external host to open a TCP data connection. (Microsoft console FTP client can t do this, but most web browsers use this passive mode for FTP files.) Your program should echo any unexpected responses from the server. 9
10 Assessment: Hand-in: Your code via Blackboard in one or more files, as **.c, **.py, etc. Demonstration: 50 marks During your regularly scheduled lab session in the week 30 May 2 Juney, provide a short (5 minute) demonstration of the capabilities of your software. You should first log into the internet management system to be able to fetch URLs outside UQ. Your program should run in one of these modes: Running on your laptop connected via a wireless connection (WiFi or 3G) in the lab, OR Running directly on one of the lab computers, OR Running on moss, accessed from one of the lap computers or your laptop. 1. Code compiles (or is interpreted without errors) and runs and is able to retieve a HTTP file as per assignment 2. Code will be briefly examined to confirm that your code doesn t simply exec wget. 5 marks 2. File is able to retrieve the following file: 10 marks ftp://ftp.uq.edu.au/welcome.msg (First delete any existing copy of the file from your directory, run your program, and show the contents of the downloaded file. 3. Program is able to retrieve the following file: (10 marks) ftp://ftp.marine.csiro.au/pub/spencer_gulf/met/readme 4. Program gives appropriate error message when trying to retrieve the following file: 10 marks ftp://ftp.uq.edu.au/welcome.txt 5. Program gives appropriate error message which identifies incorrect directory rather than incorrect filename when trying to retrieve: (5 marks) ftp://ftp.uq.edu.au/toplevel/welcome.msg 6. Program gives appropriate error message which identifies incorrect host when trying to retrieve: (5 marks) ftp://ftp.itee.uq.edu.au/welcome.msg 7. Program gives appropriate error message which identifies unimplemented protocol when trying to retrieve: (5 marks) ftps://ftp.uq.edu.au/welcome.msg 10
TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCSCI Networking Name:
CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationFaculty of Science and IT Course title. Pre-requisite/corequisite
Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationCCNA Exam File with Answers. Note: Underlines options are correct answers.
CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationCSCI 466 Midterm Networks Fall 2013
CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationB.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems
B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015
More informationComputer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.
Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course
More informationVERSION Lab 3: Link Layer
Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and
More informationLab - Using Wireshark to Examine TCP and UDP Captures
Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ECPE / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Application Layer Transport Layer Network Layer Link Layer Physical Layer 2 Application Layer HTTP DNS IMAP
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationProtocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS
Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats
More informationUnit 28 Website Production ASSIGNMENT 1
Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web
More informationUNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12
UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols
More informationSoftware Engineering 4C03 Answer Key
Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationThe Internet Protocol (IP)
The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationNetwork Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical
TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationTable of Contents. Computer Networks and the Internet
Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1
More informationCISCO SYSTEM ADMINISTRATION (41)
CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:
More informationcs144 Midterm Review Fall 2010
cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)
More information15-441: Computer Networks Homework 3
15-441: Computer Networks Homework 3 Assigned: Oct 29, 2013 Due: Nov 12, 2013 1:30 PM in class Name: Andrew ID: 1 TCP 1. Suppose an established TCP connection exists between sockets A and B. A third party,
More informationCS3516 B10 Computer Networks Final Exam December 14, 2010
Name CS3516 B10 Computer Networks Final Exam December 14, 2010 Question Points Score 0 1 1 27 2 8 3 12 4 7 5 2 6 6 7 3 8 6 9 3 10 9 11 3 12 2 13 8 14 2 15 2 Total 100 Trivia Question (1 extra credit point)
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationStudent ID: CS457: Computer Networking Date: 3/20/2007 Name:
CS457: Computer Networking Date: 3/20/2007 Name: Instructions: 1. Be sure that you have 9 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed
More informationCSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose
CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers
More informationNT1210 Introduction to Networking. Unit 10
NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationCNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems
Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...
More information9th Slide Set Computer Networks
Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationTCP/IP Networking Basics
TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP
More informationInternet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer
Midterm Study Sheet Below is a list of topics that will be covered on the midterm exam. Some topics may have summaries to clarify the coverage of the topic during the lecture. Disclaimer: the list may
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationOSI Model with Protocols. Layer Name PDU Address Protocols Device
NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationFinal Exam. Course Grade
7:20pm, May 12th Final Exam Location: To be announced Two pages of letter-size, double-sided cheating sheets, created by hand Calculator required No other equipments allowed Comprehensive; roughly 70%
More informationEXAM TCP/IP NETWORKING Duration: 3 hours
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to
More informationComputer Networks (Unit wise Questions)
Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationLab Assignment 3 for ECE374
Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you
More informationWeb Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery
Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers
More informationCS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.
CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More information01/17/08 TDC /17/08 TDC363-03
Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows
More informationSchool of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks
School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More informationHomework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15
ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can
More informationLab 1: Packet Sniffing and Wireshark
Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer
More informationNetworking Fundamentals
Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationNetwork Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015
Network Security Introduction to networks Radboud University, The Netherlands Autumn 2015 What is a (computer) network Definition A computer network is two or more computers that are connected, so that
More informationFinal Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou
Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How
More informationTo make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at
To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a
More informationData Communications and Networks Spring Syllabus and Reading Assignments
Data Communications and Networks Spring 2018 Syllabus and Assignments Revision Date: January 24, 2018 Course : This course teaches the design and implementation techniques essential for engineering robust
More informationExploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018
Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP Description Capturing a bulk TCP transfer from your computer to a remote server. In
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas
More informationInternet protocol stack
Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More information