Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS

Size: px
Start display at page:

Download "Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS"

Transcription

1 Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS

2 1. IP and addressing (5p) a) Your company would like to have all its 511 computers connected to the Internet. You are assigned the network address /23. How many of the computers can you connect to the network? (1p) /23 net gives 512 addresses, one reserved for directed broadcast, one the network address, you will have to use one for the router(unless it is one of your computers with two NICs), at most 509 can connect. b) What is the directed broadcast address of your network? (1p) c) After a year you decide to purchase 10 more computers and you would like to connect them to the Internet. You plan to install a private network with a NAT box. Propose a suitable network address. You would like to have one subnet only. (1p) Any correct /22 address is suitable (e.g., /22). e) One of the IP options provides a means to discover the path between two hosts on the Internet. Which IP option is it and how does it work? Name at least one reason why its use is limited! (2p) The RecordRoute IP option. Every router on the path inserts its IP address into the options field at the position indicated by a pointer. The address is the address on the outgoing interface. The IP options s size is at most 40 bytes, hence the number of entries is limited. 2. ARP and bridging (5p) Consider the following network consisting of 2 bridges and 1 router. Hosts H 1 to H 6 have one interface each. B 1 and B 2 are learning bridges. R 1 is a router with an appropriate routing table. All ARP caches and the bridges learning tables are empty. Assume that ARP snooping is used. H 1 B 1 H 2 B 2 H 3 H 4 H 5 H 6 a) Add the necessary physical (MAC) and logical (IP) addresses, and identify the subnets! Use symbols to denote the addresses. (1p) Host=Mac,IP : H 1 =a,a, H 2 =b,b, H 3 =c,c, H 4 =d,d, H 5 =e,e, H 6 =f,f, R 1,l =g,g, R 1,u =h,h, R 1,r =i,i b) Host H 6 sends a packet to host H 5. Show the contents of the learning tables and the ARP caches after the packet has been delivered. (1p) R 1 : F,f, E,e H 6 :I,i H 5 :G,g c) Host H 5 sends a packet to host H 2. Show the new contents of the ARP caches and the learning tables. (2p) R 1 : B,b H 1, H 2, H 3, H 4 : H,h B 2 : h-south,b-north B 1 :h-south,b-east R 1

3 d) Host H 3 sends a packet to host H 6. Show the contents of the learning tables and the ARP caches after the packet has been delivered. (1p) R 1 :C,c B 2 :c-west 3. IPv4 forwarding (5p) A router has the routing table shown below. Determine the next-hop address and the outgoing interface for the packets arriving to the router with destination addresses as given in points (a)-(e). Destination Next hop Flags Interface /16 - U m /18 - U m /24 - U m / UGH m / UG m / UG m / UG m / UGH m2 a) (1p) on m0 b) (1p) Direct delivery on m2 c) (1p) on m1 d) (1p) Discarded, no matching entry in FIB e) (1p) Direct delivery on m1 4. UDP and fragmentation (5p) a) An application wants to transmit 4097 bytes of data via UDP from host A to host B. The UDP header is 8 bytes long, there are no IP options used. The path consists of two networks: the MTU of the first network is 1500 bytes and the MTU of the second network is 1000 bytes. How many IP fragments arrive at host B? Give the segment sizes, the fragmentation offset and the more fragments (MF) bit of all fragments. (3p) Data to be transmitted including the UDP header 4105 bytes. Fragment 1: 976 bytes IP payload, offset=0, MF=1 Fragment 2: 504 bytes IP payload, offset=122, MF=1 Fragment 3: 976 bytes IP payload, offset=185, MF=1 Fragment 4: 504 bytes IP payload, offset=307, MF=1 Fragment 5: 976 bytes IP payload, offset=370, MF=1 Fragment 6: 169 bytes IP payload, offset=492, MF=0 b) Assume that one of the fragments gets delayed in the intermediate router. It arrives 1s before the reassembly timer expires. How does this affect the application? (1p) Reassembly occurs at the IP layer, so the application will only notice some delay in the delivery of the packet. c) In host B the UDP checksum of the packet is calculated. What value would indicate error free transmission? (1p) 0 indicates error free delivery.

4 5. TCP (5p) a) Describe the TCP silly window syndrome! How can it occur? (1p) Occurs if the sender sends data in small chunks (sender driven) or the receiver consumes data in small chunks (receiver driven). Causes TCP to send small packets, results in big overhead (packet header is 40 bytes at least). b) How does delay jitter affect TCP s performance? How do the update rules of the retransmission timeout (RTO) of TCP try to handle delay jitter? (2p) In TCP the RTO tells when to retransmit a segment. Due to delay jitter the acknowledgements do not arrive at regular time instants, but there is some variation even if the average RTT is constant. There are at least two consequences: (i) big jitter can lead to unnecessary retransmissions; (ii) the RTO has to be kept high compared to the smoothed average RTT in order to avoid such retransmissions, but this leads to increased waiting time in the case of an actual loss. Delay jitter is accounted for with the inclusion of RTTdev in the calculation of the RTO. c) Explain the difference between the operation of TCP congestion control and the equation based rate control (e.g., TCP friendly rate control, TFRC) employed in DCCP. (1p) In TCP loss events and acknowledgements influence the evolution of the CWND size. The influence depends on whether TCP is the slow-start or the CA phase. In the case of equation based rate control the feedback from the receiver is used to estimate the channel parameters (RTT, loss rate), and an equation is used to calculate the rate that TCP s congestion control would achieve under the measured channel conditions. This rate is then used to transmit the data. The latter leads to smoother transmission rate variations. d) You use TCP to transmit data over a satellite link with 100Mbps bandwidth and round trip time 600ms. You observe that the throughput is 10Mbps, even though the link is loss free. What could be the reason for the poor performance and how could you improve the throughput? Can you improve the throughput of an existing connection? (1p) The reason is most likely that the window size is too small. The way to improve the throughput is to increase the window size. The TCP window scale option can be used to increase the window size above bytes, but it can only be used during connection setup (handshake). 6. Application layer (5p) a) In order to compare the performance of TCP and TFTP we made a measurement on a link with a round trip time of 300ms. We transmitted bytes in 5s. How much time would TFTP need to transmit the same amount of data? (2p) The maximum payload is 512 bytes, that is, you need 133 data packets, plus the connection setup, total 134 packets. You use Stop-and-wait, so that the time it takes is 40.2 seconds. b) HTTP 1.1 includes two important changes that improve its performance (throughput, efficiency and TCP fairness) compared to HTTP 1.0. What are these changes and how do they improve the performance? (2p) Persistent connections and compression. Persistent connections allow HTTP to transfer multiple documents over the same TCP connection. This way there is no need for connection setup, teardown, and congestion control can operate better. Compression decreases the amount of data that has to be transferred. d) In Telnet option negotiation is performed among others using the DO and WILL control messages. What do these messages mean and how can the receiving party answer? (1p) The DO control message is used to instruct the other party to use some optional feature. The other party can respond with a WILL or a WONT control message. The WILL control message can as well be used to tell that the sending would like to use some feature. The receiver can then reply with a DO or a DONT message.

5 7. DNS (5p) a) What is the method called that is used to reduce the time it takes for a slave server to detect that a zone has changed at a master server. How does the method work? (2p) DNS NOTIFY. The master server advises the slave servers that the master's data has been changed and that a query should be initiated to discover the new data. This changes the traditional polling model with an interrupt model. b) If you have a large zone file and only make small modifications to it, there is a method to decrease the traffic at updates between the master server and the slave server. What is this method called and how does it work? (2p) Incremental zone transfer, IXFR. The traditional AXFR zone transfer has the drawback of always transferring the whole database from a server to a set of slaves which is inefficient if the database is large. The client can instead request incremental changes by sending an IXFR message. In this message, the SOA serial number is given which corresponds to its old data. The server keeps a record of changes between versions so that it can respond with the changes. The IXFR can be made by either UDP or TCP. TCP is used if the complete response does not fit within a single DNS packet. c) What is a glue record? In which situation is it required? What does it consist of?(1p) A glue record is a set of resource records for the parent zone to point out a subzone. It consists of at least one NS RR and typically one or more A records (for IPv4). This is necessary so that a zone has all data required tro setup communication with a subzone. If the A records are not present, the zone may not be able to contact the subzones nameservers. The glue record data is typically not authoritative. 8. Security (5p) a) Describe the four aspects of security that were defined in the course book and in the lecture slides. For each aspect describe which kind of security it addresses, and how it is usually implemented (by what mechanism)? (2p) Forouzan defines Privacy, Authentication, Integrity and Nonrepudiation as the four aspects of security. Other classifications are possible. Privacy means that only the sender and receiver can understand the message and is typically implemented by encryption. Authentication means that the receiver is certain of the sender's identity. Authentication is often implemented by digital signatures.digital signatures are also typically used for the remaining aspects. Integrity means that the message arrives at the receiver exactly as it was sent. Nonrepudiation means that it can be verified that the sender actually sent the message (and that the receiver actually received it). b) Secret-key and public-key encryption are two methods used for encrypting data in the Internet. Describe both methods and compare them. Describe their disadvantages and advantages. Describe some typical scenarios where they are deployed. (3p) In secret-key encryption the same key is used by both parties. In public-key encryption, there are two keys: a public and a secret key. In secret-key encryption, the sender uses a key to encrypt the data, and the receiver uses the same key to decrypt. Secret-key encryption uses symmetric algorithms because the same key is used in both directions. Secret-key encryption is more efficient (when encrypting/decrypting) than public-key encryption. Disadvantages involve the large numbers of keys involved if a large number of parties communicate N(N-1)/2. The distribution of keys can also be difficult, and typically requires the use of key-distribution centers. In public-key encryption, the private key is kept by the receiver, and the public key is announced publically. The sender uses the public key to encrypt data which can only be decrypted by the receiver knowing the secret key. Key handling is much easier in public-key

6 encryption, since keys may be re-used by everyone communicating with one user (2N). Also, key distribution is easier since the public key can be communicated publicly. However, to be certain that a public key is actually associated with an entity, some kind of verification must be provided, for example by certification authorities (CA:s). Another drawback is that asymmetrical public-key algorithms are more comples than secret-key algorithms and are therefore less efficient, and should be avoided for large data sets. Public-key and secret-key encryption are often combined. For example, public-key encryption can be used to exchange private keys. In this way, the advantages of both schemes can be used. 9. Multicast: IGMP (5p) IGMP is a protocol for relaying group membership information between hosts and routers. Describe how IGMP (v2) works: Which messages exist? Who sends which messages? What is the purpose of the messages? Describe the dynamics of the protocol, i.e., in what order are messages sent, how are messages sent in response to other messages, etc? Describe which methods in the protocol exist to make the protocol scale. That is, so that a large number of nodes or groups does not cause a large number of packets being sent. You should cover all membership cases (join, leave, etc) including the case of multiple routers. Discuss also some advantages and drawbacks with the IGMP design. Finally, you should describe which new functionality is added in IGMP version 3, and why. (5p) Membership query sent by multicast routers to query membership on a network. Two situations: general query sent to , or specific group queries to specified address. Membership report sent by hosts to multicast routers to report group membership, sent on group address. Leave group Sent by hosts to multicast routers when leaving a multicast group. Sent on General queries are sent by routers periodically, period ca 60s. Membership reports are sent by hosts when joining group, or as reply to membership queries. In the later case, hosts set a random timer and checks whether any other hosts reports membership of that group. If no other membership reports are detected within the timeout, the hosts sends its report. Leave group is sent by hosts when last process leaves a multyicast group. On reception, the multicast router sends a specific-query, and awaits membership reports from other hosts. If no-ones are received within a timeout, the router clears the state about the group on that interface. Several routers do leave-immediately which means that the specific query is not sent. Finally, several multicast routers attached to the same network resolve who is querier by choosing the router with the lowest address. New functionality in IGMPv3 is primarily the support for Source-specific multicast (SSM). Messages are extended with sender information, so that a (S,G) membership can be queried, reported and left, not only (*, G). 10. Dynamic Routing (5p) RIP, OSPF and BGP are three routing protocols that are used in the Internet today. Each protocol has its own characteristics and is therefore used in certain scenarios for different tasks. Describe and compare each of the three protocols with respect to the following criteria:

7 In what network scenario is it mainly used? Why is it used in that scenario? What are the mechanisms or properties that make it suitable for that scenario? Why is it not used in other scenarios? Also compare the protocols with respect to scalability and convergence. (5p) RIP is a distance-vector protocol sometimes used as IGP. RIP is very simple which is its main advantage: it is easy to configure and its availability is high. However, RIP has severe scaling and convergence problems, it cannot handle network diameters larger than 15 due to the limited metrics, which in turn is low to limit the effects of the count-to-infinity problem. RIP also uses a lot of bandwidth since it repeatibly sends its whole routing table to all of its neighbours. RIP can be used in conjunction with another IGP such as OSPF to take care of a limited part of the network. OSPF is a link-state protocol also used as IGP but has much better scaling properties. OSPF can handle large networks and has support for hierarchical domains using areas. OSPF is mainly used by enterprise organisations, network providers (operators) often use IS-IS as an alternate solution. Many operators think ISIS converges faster and is easier to configure. However, ISIS is not available on many regular computer platforms. A link-state protocol distributes changes much faster than distance-vector and therefore converges faster. An efficient flooding protocol ensures that it is (nearly) optimal in terms of bandwidth consumption. However, a link-state protocol may consume a lot of memory since all peers store the complete link-state databse in memory. Today, this is typically not a problem due to the advancement in memories, but forced many to use areas extensively in the past, which increases the complication in configuration and design. A drawback with OSPF (v2) is that it is tailor -made for IPv4. BGP is path-vector protocol, which is essentially distance-vector enhanced with AS-paths that ensures loop-detection. BGP is used as an inter-domain protocol mainly because of its ability to support routing policies using a wide set of attributes, and its extensibility in terms address families. BGP has several convergence and scaling problems that are mainly due in its distance-vector's origins, but is still considered good-enough as the inter-domain protocol in use today. 11. Mobile IP (5p) a) Describe the triangular delivery and two crossing problem that may appear in Mobile IP. What is it, how does it appear, what are the drawbacks? (2p) When the mobile and the remote system is close (in a network sense) to each other in relation to the home agent, then the messages go from the remote host, to the home agent, to the mobile, and back to the remote system, thus resembling a triangle. The drawbacks are an increased latency due to the extra distance the traffic must pass as well as home load on the home agent. Double crossing is just an extreme variant of triangular delivery when the remote host and the mobile are essentially on the same subnetwork but the traffic has to pass the network to the home agent twice (and thus cross itself). The problems are further highlighted by the fact that most communication is local, that is, there is a higher probability that two peers communicating are close to each other in a geographical sense. b) Discovery, Registration and Tunneling are three phases of the Mobile IP protocol. Describe each of them. What is the purpose of each phase? How are they implemented? Can you see any advantage/disadvantage with the solutions? (3p) Discovery: A mobile node uses a discovery procedure to identify home agents and foreign agents. Mobile discovery extends ICMP router advertisements and solicitations. Registration: A mobile node uses an authenticated registration procedure to inform its home agent of its care-of address. Registration uses a special application-level header and transports the registration information over UDP. The foreign agent may relay the registration to the home agent.

8 Tunneling: Used by the home agent to forward IP-datagrams to a care-of address. Tunneling can use IP-in-IP tunnelling, GRE tunnelling or IPSec tunnelling. 12. General (5p) A technique used today to increase the capacity of links is to group them into Link Aggregate Groups (LAGs) sometime called trunks. This is a way to increase the bandwidth of a link by bundling several physical links together, while they appear as one from the link- and network layer. Packets are then load-balanced between the two physical links. For example, an ISP can add two 1Gbps Ethernet links into a 2G LAG. This is a cheaper solution than to upgrade to 10Gbps, for example. However, if packets are just randomly load-balanced over the two links, the end-to-end performance of IP may suffer. For example, TCP is said to break. Explain in detail why TCP breaks if packets are load-balanced randomly over two links. Also, describe how this problem can (and is solved) by current bridges. (5p) LAGs consists of a set of links that are grouped into one common link. If two bridges (or routers) are connected by a LAG, the bridge (or router) will try to load-balance between the two links. Typically, the load balancing is made in such a way that the same TCP flows follow the same physical link by hashing of the L2 header (or other similar mechanism). But if packets are randomly sent on the different links, the links may have different properties causing a re-order of packets. For example, one link may have a queue (at the sender or receiver) causing one packet to be delayed. It is also possible that one link has a longer latency for some other reason (eg longer fiber connection). TCP packets that are reordered at the receiver may make the TCP implementation at the receiver side to signal congestion. For example, if the receiver receives segments in the following order: X, X+2, X+1, the receiver will issue ACKs in the following manner: X+1, X+1, X+3. This means that the sender may receive duplicate ACKs in a session even if there are no packet losses. But duplicate acks (actually three consequtive) is a trigger for fastretransmit/fast recovery which means that the congestion threshold is set to half the current congestion window and the congestion window starts at the threshold and linearly increases from there. If this happens repeatedly, TCP will not be able to reach its full capacity but will decrease its congestion window unnecessary. If SACK is enabled, the behaviour may be different.

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS 1. IP Addressing? (5p) There are ten nodes connected to your network: a

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4!

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4! Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking Date: 10 March 2009 at 8:00 13:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking. Date: 02 June 2009 at 14:00 19:00

Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking. Date: 02 June 2009 at 14:00 19:00 Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking Date: 02 June 2009 at 14:00 19:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking. Date: 27 October 2015 at 14:00 18:00

Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking. Date: 27 October 2015 at 14:00 18:00 Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking Date: 27 October 2015 at 14:00 18:00 a) No help material is allowed - You are not allowed to use dictionaries, books,

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer

More information

Date: June 4 th a t 1 4:00 1 7:00

Date: June 4 th a t 1 4:00 1 7:00 Kommunika tionssyste m FK, Examina tion G 5 0 7 Date: June 4 th 0 0 3 a t 4:00 7:00 KTH/IMIT/LCN No help material is allowed. You may answer questions in English or Swedish. Please answer each question

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP).

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Auxiliary protocols IP is helped by a number of protocols that perform specific tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Multicasting

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Answer to the written exam given on TDTS06 Computer networks, October 23,

Answer to the written exam given on TDTS06 Computer networks, October 23, Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

8. TCP Congestion Control

8. TCP Congestion Control 8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking. Date: 10 January 2011 at 14:00 18:00

Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking. Date: 10 January 2011 at 14:00 18:00 Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking Date: 10 January 2011 at 14:00 18:00 a) No help material is allowed - You are not allowed to use dictionaries, books,

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer

More information

Patch For AR450S Routers

Patch For AR450S Routers Patch Release Note For AR450S Routers Introduction This patch release note lists the issues addressed and enhancements made in patch 54264-01 for Software Release 2.6.4 on existing models of AR450S routers.

More information

Internetworking With TCP/IP

Internetworking With TCP/IP Internetworking With TCP/IP Vol II: Design, Implementation, and Internals SECOND EDITION DOUGLAS E. COMER and DAVID L. STEVENS Department of Computer Sciences Purdue University West Lafayette, IN 47907

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

EE-311 Data Communication & Networks

EE-311 Data Communication & Networks National University of Computer & Emerging Sciences, Islamabad, Pakistan Name: Roll No: EE-311 Data Communication & Networks Summer 2007 Final Thursday, 2 nd August 2007 Total Time: 3 Hours Total Marks:

More information

Closed book. Closed notes. No electronic device.

Closed book. Closed notes. No electronic device. 414-S17 (Shankar) Exam 3 PRACTICE PROBLEMS Page 1/6 Closed book. Closed notes. No electronic device. 1. Anonymity Sender k-anonymity Receiver k-anonymity Authoritative nameserver Autonomous system BGP

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013 Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information