COMS3200/7201 Computer Networks 1 (Version 1.0)

Size: px
Start display at page:

Download "COMS3200/7201 Computer Networks 1 (Version 1.0)"

Transcription

1 COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total marks are 100 marks. You only need to do two of these parts. For most students, Part A & Part B are the simplest and most useful to complete. Some students have explicitly requested an additional programming exercise, which is Part C. I expect only a small proportion of students will wish to attempt part C. If all three parts are submitted, the best two parts will count (with no extra credit for completing the third part). You should hand in these parts separately 100 marks total (worth 15% of course marks). For Part A This is in the form of a blackboard MCQ quiz, which is automatically marked. You may attempt the quiz a maximum of two times, and complete all the answers for one attempt in a single sitting, where possible. You should determine the answers (the questions are given below) before doing the submission. The topic will be some theory questions around the course material up to Wireless Networking. For Part B This is in the form of a blackboard quiz, which is automatically marked. You may attempt the quiz a maximum of two times, and complete all the answers for one attempt in a single sitting, where possible. You should determine the answers (the questions are given below) before doing the submission. The topic will be the analysis of a Wireshark trace. For Part C This is a programming assignment, which extends the programming assignment from Assignment 2, to allow webget to also download files from an FTP server 1

2 Part A. Answer the following questions on networking theory. 1. Which of the following are layers in the Internet Protocol Stack? (Select all correct answers) Application Layer Presentation Layer Session Layer Transport Layer Network Layer IP Layer Link Layer MAC Layer Data-Link Layer Physical Layer 2. HTTP with persistent connections is different from non-persistent connections because: It is always faster than non-persistent connections. It allows files from a single host to be pipelined without re-establishing the connection. It allows segments from multiple files from a server to be interleaved. It can use multiple client-side ports to improve throughput. It reduces the RTT (Round Trip Time). 3. In HTTP, a Conditional GET request is used to check the validity of an item in the cache by sending which of the following header fields in a request to the server? Last-Modified: 304 Not Modified: If-modified-since: Date: Time-to-live: 4. Which of the following application layer protocols are typically used to download messages from a mail server provided at enterprise level and a mail agent running on a user desktop, including web-based clients? (Select all correct answers)" HTTP SMTP POP3 IMAP Telnet 5. Which of the following application layer protocols are typically used to upload messages from a mail agent running on a user desktop, including web-based clients, and a mail server provided at enterprise level? (Select all correct answers) HTTP SMTP POP3 IMAP Telnet 2

3 6. ARP (Address Resolution Protocol) is used to map from an IP address into a hostname. to map from an IP address into a MAC address. to map from a MAC address into a hostname to map from a MAC address into an IP address. to map from a hostname into an IP address. to map from a hostname into a MAC address. 7. DNS (Domain Name System) is used to map from an IP address into a hostname. to map from an IP address into a MAC address. to map from a MAC address into a hostname to map from a MAC address into an IP address. to map from a hostname into an IP address. to map from a hostname into a MAC address. 8. TCP Flow Control ensures in-order packet delivery. identifies routers which are congested. ensures that the receiver buffer does not overflow. typically halves the congestion window size on packet loss indicated by a triple duplicate- ACK event sets the minimum transfer unit to prevent fragmentation. 9. TCP Congestion Control ensures in-order packet delivery. identifies routers which are congested. ensures that the receiver buffer does not overflow. typically halves the congestion window size on packet loss indicated by a triple duplicate- ACK event sets the minimum transfer unit to prevent fragmentation. 10. A server receives packets on port 80 from multiple clients, all on different hosts. How are these packets usually demultiplexed by UDP and TCP, assuming that TCP connections have already been established? In UDP data goes to one process listening on one socket, and in TCP data goes to one process listening on one socket. In UDP data goes to one process listening on one socket, and in TCP data from different clients go to different processes listening on separate sockets. In UDP data from different clients go to different processes listening on separate sockets, and in TCP data from different clients go to different processes listening on separate sockets In UDP data from different clients go to different processes listening on separate sockets, and In TCP data goes to one process listening on one socket. Different clients cannot send data to the same port on the server. 3

4 11. Which of the following possible network services are provided by the Internet s datagram-based network layer? Choose all correct answers or "None of the above" if none are correct. Guaranteed delivery. Guaranteed delivery with bounded delay. In-order packet delivery. Guaranteed minimum bandwidth. Guaranteed maximum jitter. None of the above. 12. Consider a TCP segment carried inside an IP datagram which is sent through a NAT gateway. Which of the following checksums would need to be recomputed (assume TTL isn't changed): The IP and TCP checksum are the same, so only one needs to be recomputed by the NAT gateway. The IP checksum needs to be recomputed by the NAT gateway, but the TCP checksum is unchanged. The TCP checksum needs to be recomputed by the NAT gateway, but the IP checksum is unchanged. The IP checksum and the TCP checksum are both unchanged. Both the IP checksum and the TCP checksum need to be recomputed by the NAT gateway. 13. The key difference between RIP and OSPF routing protocols is that RIP is a distance-vector protocol and OSPF is a link-state protocol. OSPF is a distance-vector protocol and RIP is a link-state protocol. RIP is an IETF standard and OSPF is an ISO/IEC standard. RIP is an intra-as routing protocol and OSPF is an inter-as routing protocol. OSPF is an intra-as routing protocol and RIP is an inter-as routing protocol 14. The key difference between RIP and BGP routing protocols is that RIP is a distance-vector protocol and BGP is a link-state protocol. BGP is a distance-vector protocol and RIP is a link-state protocol. RIP is an IETF standard and BGP is an ISO/IEC standard. RIP is an intra-as routing protocol and BGP is an inter-as routing protocol. BGP is an intra-as routing protocol and RIP is an inter-as routing protocol. 15. Ethernet and Link Layer protocols both use Carrier Sense Multiple Access, but a significant difference is that: Both use Collision Detection (CSMA/CD) but Ethernet uses a much longer backoff time. Ethernet uses Collision Detection (CSMA/CD) but uses Collision Avoidance (CSMA/CA). Ethernet uses Collision Avoidance (CSMA/CA) but uses Collision Detection (CSMA/CD). Ethernet uses Collision Detection (CSMA/CD) but does not generate collisions Both use Collision Avoidance (CSMA/CA) but Ethernet uses a much shorter backoff time. 4

5 16 Match the protocols with the statement about it which is most appropriate. QUIC RARP ICMP DASH DCCP A. Type=9 means a router discovery message B. Provides a low-overhead, message-oriented, UDP-like service with congestion control C. An experimental transport protocol used in Google Chrome D. Provides adaptive bit-rate streaming E. An obsolete protocol replaced by DHCP 5

6 PartB. Wireshark Trace (50 marks) The following 25 questions relate to the Wireshark Trace AS3.pcapng ( 2marks each) The trace was recorded on my Windows home computer (referred to below as PC-host) which is connected to a cable modem via Ethernet. Segment numbers below are the Wireshark numbers for the captured segments. Near the start of the trace, windows commands ipconfig/release and then ipconfig/renew are used to initiate renewal of a DHCP lease, and to initiate some ARP messages. You will need to answer the following 25 questions on Blackboard, but they are also given here so you can work through them at your own pace, and look up the reference materials that you need. IMPORTANT: When you enter answers in Blackboard, you will need to be precise when entering numbers since the answers will be auto-marked. IP addresses should be added in dotted decimal with no leading spaces, and no leading zeros, eg NOT MAC addresses should be entered as hexadecimal bytes with a colon between each digit, and with the digits (a,b,c,d,e) in lower case. Such addresses should be exactly 17 characters long. eg. d0:03:4b:07:89:55 Other hexadecimal values (eg. question 5) should just be listed as hexadecimal digits (lower case, without any leading 0x.). For one byte should have two characters, include leading zeros. 0c Answers which are not in the correct format will be automatically marked incorrect by BB. You will be able to me after results are released and I can check the answers if there is a minor formatting error (eg. if you put a space in the wrong place, O instead of 0, etc. ) and give extra marks, but it is obviously easiest if these are correct to start with. DHCP Questions. There are 5 DHCP messages in segments 3 (Release), 69 (Discover), 70 (Offer), 71 (Request), 73 (ACK). Q1. In the DHCP request message (segment 71), what is the source IP address in the IP datagram Q2. In the DHCP request message (segment 71), what is the destination IP address in the IP datagram 6

7 Q3. In the DHCP request message (segment 71), what is the source MAC address in the Ethernet Q4. In the DHCP request message (segment 71), what is the destination MAC address in the Ethernet Q5. In the DHCP request message (segment 71), the message indicates the IP address of the DHCP server that the PC-host is accepting an offer from. What is the value, in hexadecimal, of the onebyte option code that indicates the DHCP Server Identifier option. Q6. In the DHCP request message (segment 71), the message indicates the IP address of the DHCP server that the PC-host is accepting an offer from. What is the IP address of this DHCP server? Q7. In the DHCP request message (segment 71), the DHCP request indicates the Host Name (in ASCII) that will be used for PC Host. Give, as 10 characters, the value of this host name (e.g. home-comp1) Q8. In the DHCP ACK message (segment 73), what is the source IP address in the IP datagram Q9. In the DHCP ACK message (segment 73), what is the destination IP address in the IP datagram Q10. In the DHCP ACK message (segment 73), what is the source MAC address in the Ethernet Q11. In the DHCP ACK message (segment 73), what is the destination MAC address in the Ethernet Q12. In the DHCP ACK message (segment 73), what is the IP address of the Router that PC-host should use to forward messages beyond its subnet. Q13. In the DHCP ACK message (segment 73), what is the IP address of the first DNS server (out of the 3 given) that PC-host should use to resolve domain names. Q14. In the DHCP ACK message (segment 73), what is the four-byte value, in hexadecimal, of the IP Address Lease Time? Q15. In the DHCP ACK message (segment 73), which one of the following protocols is indicated by the two-byte Type field in the Ethernet Header: Ethernet, ARP, IP, IPv4, IPv6, UDP, TCP, DHCP, Bootstrap Protocol, or Boot Reply Q16. In the DHCP ACK message (segment 73), which of the following protocols is indicated by the one-byte Protocol field in the IP Datagram Header. Ethernet, ARP, IP, IPv4, IPv6, UDP, TCP, DHCP, Bootstrap Protocol, or Boot Reply 7

8 ARP Questions The following questions relate to ARP requests and answers that are in packets 78 and 93. Q17. In the ARP message in segment 78, which of the following protocols is indicated by the twobyte Type field in the Ethernet Header: Ethernet, DHCP, IP, IPv4, IPv6, UDP, TCP, ARP, ARP request, or ARP reply Q18. In the ARP message in segment 78, what is the destination MAC address in the Ethernet Q19. In the ARP message in segment 78, the sender requests the MAC address corresponding to which IP address? Q20. In the ARP message in segment 93, the sender answers the request in segment 78. What is this answer (i.e. what is the MAC address corresponding to the requested IP address in the request in segment 78.)? DNS Questions My home PC was originally set up to run in ITEE at UQ, so it sometimes thinks it is still at UQ due to its setup scripts, so it requests a lot of UQ hostnames with DNS. These next questions refer to DNS messages a query in segment 111, and its response (somewhere between 112 and 140). Q21: For the IP datagram in the Ethernet segment 111, what is the destination IP address? Q22: For the DNS request in segment 111, what is the host name whose IP address is being requested? Q23: What is the hexadecimal value of the two-byte Transaction ID in the DNS request in segment 111? Q24: By finding the response packet with the same Transaction ID (somewhere between segment 112 and 140), what is the IP address of the hostname that was requested in segment 111? Q25: In this response packet with the same Transaction ID as the request in segment 111, the source MAC address is 08:bd:43:9a:59:98. This is the MAC address corresponding to which IP address? 8

9 Part C Programming assignment. (50 marks) Enhance webget from Assignment 2 to also retrieve files using ftp. It should also still work for http. You can program webget in a language of your choice using (almost) any libraries of your choice, including ftp libraries such as Python s ftplib. It is also fine to implement the FTP protocol yourself with socket libraries. You can also use libraries to assist with parsing command lines. (You can also use other libraries for the http part if you wish to rewrite that part) You CANNOT write a program that simply calls the existing wget program, and you CANNOt use the python wget package or similar packages in other languages. The webget utility should work as a command line program with command line parameters as follows: webget PROTOCOL://HOST/FILENAME for example (not a real URL): webget ftp://ftp.someuni.edu.au/toplevel/welcome.msg will use the FTP protocol (as per RFC959) to retrieve the file welcome.msg in the subdirectory toplevel on the server ftp.someuni.edu.au on the usual FTP welcome port and store it in the file welcome.msg in the current directory. If your program uses python or another interpreted language and needs a slightly different format that is fine. You can either call the program from the command line, or from the console within the interpreter. Your program should login as anonymous on the FTP server, give coms3200@uq.edu.au as the password. Your program must use PASSIVE mode (PASV command) to open the data connection most firewalls won t allow an external host to open a TCP data connection. (Microsoft console FTP client can t do this, but most web browsers use this passive mode for FTP files.) Your program should echo any unexpected responses from the server. 9

10 Assessment: Hand-in: Your code via Blackboard in one or more files, as **.c, **.py, etc. Demonstration: 50 marks During your regularly scheduled lab session in the week 30 May 2 Juney, provide a short (5 minute) demonstration of the capabilities of your software. You should first log into the internet management system to be able to fetch URLs outside UQ. Your program should run in one of these modes: Running on your laptop connected via a wireless connection (WiFi or 3G) in the lab, OR Running directly on one of the lab computers, OR Running on moss, accessed from one of the lap computers or your laptop. 1. Code compiles (or is interpreted without errors) and runs and is able to retieve a HTTP file as per assignment 2. Code will be briefly examined to confirm that your code doesn t simply exec wget. 5 marks 2. File is able to retrieve the following file: 10 marks ftp://ftp.uq.edu.au/welcome.msg (First delete any existing copy of the file from your directory, run your program, and show the contents of the downloaded file. 3. Program is able to retrieve the following file: (10 marks) ftp://ftp.marine.csiro.au/pub/spencer_gulf/met/readme 4. Program gives appropriate error message when trying to retrieve the following file: 10 marks ftp://ftp.uq.edu.au/welcome.txt 5. Program gives appropriate error message which identifies incorrect directory rather than incorrect filename when trying to retrieve: (5 marks) ftp://ftp.uq.edu.au/toplevel/welcome.msg 6. Program gives appropriate error message which identifies incorrect host when trying to retrieve: (5 marks) ftp://ftp.itee.uq.edu.au/welcome.msg 7. Program gives appropriate error message which identifies unimplemented protocol when trying to retrieve: (5 marks) ftps://ftp.uq.edu.au/welcome.msg 10

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

CSCI Networking Name:

CSCI Networking Name: CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Faculty of Science and IT Course title. Pre-requisite/corequisite

Faculty of Science and IT Course title. Pre-requisite/corequisite Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

CSCI 466 Midterm Networks Fall 2013

CSCI 466 Midterm Networks Fall 2013 CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course

More information

VERSION Lab 3: Link Layer

VERSION Lab 3: Link Layer Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Application Layer Transport Layer Network Layer Link Layer Physical Layer 2 Application Layer HTTP DNS IMAP

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Table of Contents. Computer Networks and the Internet

Table of Contents. Computer Networks and the Internet Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1

More information

CISCO SYSTEM ADMINISTRATION (41)

CISCO SYSTEM ADMINISTRATION (41) CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:

More information

cs144 Midterm Review Fall 2010

cs144 Midterm Review Fall 2010 cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)

More information

15-441: Computer Networks Homework 3

15-441: Computer Networks Homework 3 15-441: Computer Networks Homework 3 Assigned: Oct 29, 2013 Due: Nov 12, 2013 1:30 PM in class Name: Andrew ID: 1 TCP 1. Suppose an established TCP connection exists between sockets A and B. A third party,

More information

CS3516 B10 Computer Networks Final Exam December 14, 2010

CS3516 B10 Computer Networks Final Exam December 14, 2010 Name CS3516 B10 Computer Networks Final Exam December 14, 2010 Question Points Score 0 1 1 27 2 8 3 12 4 7 5 2 6 6 7 3 8 6 9 3 10 9 11 3 12 2 13 8 14 2 15 2 Total 100 Trivia Question (1 extra credit point)

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Student ID: CS457: Computer Networking Date: 3/20/2007 Name:

Student ID: CS457: Computer Networking Date: 3/20/2007 Name: CS457: Computer Networking Date: 3/20/2007 Name: Instructions: 1. Be sure that you have 9 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed

More information

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

9th Slide Set Computer Networks

9th Slide Set Computer Networks Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

TCP/IP Networking Basics

TCP/IP Networking Basics TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP

More information

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer Midterm Study Sheet Below is a list of topics that will be covered on the midterm exam. Some topics may have summaries to clarify the coverage of the topic during the lecture. Disclaimer: the list may

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Final Exam. Course Grade

Final Exam. Course Grade 7:20pm, May 12th Final Exam Location: To be announced Two pages of letter-size, double-sided cheating sheets, created by hand Calculator required No other equipments allowed Comprehensive; roughly 70%

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Lab Assignment 3 for ECE374

Lab Assignment 3 for ECE374 Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

01/17/08 TDC /17/08 TDC363-03

01/17/08 TDC /17/08 TDC363-03 Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows

More information

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015 Network Security Introduction to networks Radboud University, The Netherlands Autumn 2015 What is a (computer) network Definition A computer network is two or more computers that are connected, so that

More information

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How

More information

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a

More information

Data Communications and Networks Spring Syllabus and Reading Assignments

Data Communications and Networks Spring Syllabus and Reading Assignments Data Communications and Networks Spring 2018 Syllabus and Assignments Revision Date: January 24, 2018 Course : This course teaches the design and implementation techniques essential for engineering robust

More information

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP Description Capturing a bulk TCP transfer from your computer to a remote server. In

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

Internet protocol stack

Internet protocol stack Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information