When the ACK message arrives at the client, it computes an RTT sample and then immediately sends the next message.
|
|
- Shauna Montgomery
- 5 years ago
- Views:
Transcription
1 CPSC 3600 HW #2 s Fall 2017 Last update: 10/12/2017 Please submit your written answers as a PDF using canvas And your modified UDPEcho.tar.gz using handin Please work independently Name: 1 (10) Two nodes communicate over the following network. Link 1 Link 2 Link 3 Node Gbps Ethernet --Router Mbps Link---Router -1Gbps Ethernet ---Node 2 1 microsecond 30 millisecond 1 microsecond The link propagation delay: 1 us, 30 ms, 1 us The only active application is a file transfer application based on UDP. The client sends messages that contain 1472 bytes of application data. The first 4 octets of each message contains the sequence number (let s call this the application protocol header) followed by 1468 bytes of application data. The size of the frame that gets sent over each link (between the client and the server) is exactly 1520 bytes : Application data: 1468 bytes Application header (sequence number): 4 bytes UDP protocol header : 8 bytes IP protocol header: 20 bytes MAC header: 20 bytes The server simply sends a ACK message that contains only the sequence number of the message that just arrived. Therefore, each ACK is exactly 52 bytes large (4 bytes application header, 8 bytes UDP header, 20 bytes IP header, 20 bytes MAC header). When the ACK message arrives at the client, it computes an RTT sample and then immediately sends the next message. The application needs to transfer 5 GBytes of data (i.e., 5,000,000,000 bytes) of application data from Node 1 to Node 2. The application protocol is a simple stop and wait. A retransmission timeout of 2 seconds is used if an ACK does not arrive. At which time, the last message is retransmitted. The client protocol will attempt to transmit a message up to 5 times (the first transmission followed by up to 4 retransmissions). If 5 attempts fail, the client terminates. Please have your answers in units of seconds with microsecond precision. 1
2 1.1 Compute the best case RTT the client observes. Assume the best case implies no packet loss, no processing delays, and no other traffic competing for bandwidth. In the best case, every RTT sample computed by the client should be identical with the possible exception of the very last message which might not be the same size as all the others. Ignore the last RTT sample for all your answers to each part of Question 1 in the homework. : Identify the following: The transmission delays in the Node 1 to Node 2 direction for links 1, 2, 3 as T1-1, T2-1, T3-1 The transmission delays in the reverse direction for links 1,2,3 as T1-2, T2-2, T3-2. The propagation delays for each direction for links 1,2,3 as Tprop1, Tprop2, Tprop3. T1-1= 1520*8/ = 12 microseconds T2-1=1520*8/ = seconds = 8107 microseconds T3-1 = same as T1-1 T1-2 = 52*8/ = 0.4 microsecond T2-2 = 52*8/ = seconds = 277 microseconds T3-2= sames as T1-2 RTT = T1-1+Tprop1 + T2-1+Tprop2 + T3-1+Tprop3 + T1-2+Tprop1 + T2-2+Tprop2 + T3-3+Tprop3 = 12us+1us usecs +12 us +1us + 0.4us + 1us + 277us us = microseconds = seconds Note that the 30ms prop delay is by far the biggest component of the delay. 2
3 1.2 Exactly how long will it take before all 5 GBytes are successfully received and acknowledged? Assume the best case implies no packet loss, no processing delays, and no other traffic competing for bandwidth. Total frame size is 1520 bytes. But each frame can only hold 1468 bytes. Let s define Ni as the number of iterations that are required. Niters = ceil(5,000,000,000 / 1468 ) Niters= 3,405,995 transmissions, with the last holding only 808 bytes. The easiest way to do this is to use the previous result and to assume the error caused by assuming the final transmission is neglible. Ttransfer= Niters*RTT= * = 233, seconds. Is the error caused by the final transmission significant? The RTT of the last iteration would be different due to the Tx delay in the Node 1 to Node 2 direction. The frame size would be bytes = 560 bytes T1-1= 860*8/ = 6.88 microseconds or rounded up to 7 microseconds T2-1=860*8/ = seconds = 4587 microseconds T3-1 = same as T1-1 RTT(last)= = The difference is 3538 useconds which is significant. The Ttransfer result that accounts for the reduced RTT on the last iteration: Ttransfer= (Niters-1)*RTT= * = seconds. 1.3 Same problem as 1.2 except you now must consider a non-zero random packet loss process in effect. Assume the loss process can be modeled using a Bernoulli Loss Model with an average loss rate of 0.05 (or 5%). Find the total time it takes to successfully transfer the 5GBytes of data subject to a random 5% packet loss process. To simplify, assume the following: For the N transmissions, assume that exactly 0.05*N packets are dropped and consequently require retransmission. Further, assume that all retransmissions do NOT experience packet loss. : The assumption that retransmissions are not subject to packet loss greatly simplifies the problem. Let X be a random variable that represents the iteration time. 3
4 The domain (sample space or the set of all possible values of X), Sx : {RTT, TimeoutTime+RTT} Where the value is either the RTT time (the case of no loss) of RTT-time + Timeout (the case when loss occurs). Knowing that the retransmission timer starts just before the send, the recovery takes the duration of the timeout plus the time to transmit and receive the retransmitted message. We will further simplify by assuming the very last iteration will always be the same size as all other messages. Probability of P(X=RTT) = 0.95, P(X=RTT+Timeout) = 0.05 Expected value of X : E[X] = RTT* (RTT+2.0)*0.05 = 0.95* * E[X]= seconds= seconds Ttransfer= Niters*RTT= * = Another way to do the problem: we know that the Ttransfer will require the previous Ttransfer for successful iterations. And then 0.05* * 2.0 amount of additional time for each unsuccessful iteration. So the cost of errors: Terrors= 0.05* *2.0 = The modified transfer time (we use the Ttransfer that assumes the last message same size): Ttransfer time= = What is the probability that the session fails? Same problem as 1.3 except we now consider the possibility that retransmissions are dropped. Hint: This is where we make use of the Bernoulli Loss Model. Loss events are uncorrelated and therefore we can apply the Binomial Probability Law to solve the problem. Each time the client sends a message and waits for the ACK is an iteration. Each iteration can be viewed as a Bernoulli event- it either succeeds or fails. 4
5 : A session fails if 5 sequential iterations fail. We can model each iteration as a Bernoulli event. We can then use the Binomial probability model to obtain the probability of k successes in n trials (where we define a success as a iteration failure which occurs with probability p). To review, the binomial probability model offers a simple but very useful model appropriate for sequential experiments involving Bernoulli events. A Bernoulli event is an experiment that has an outcome of exactly two possibilities: SUCCESS or FAILURE where the probability of a success is p and the probability of a failure is (1-p). Suppose we have n Bernoulli trials and p is the probability of success of a trial. Then this is a binomial model if The Bernoulli trials are independent of one another. The probability of success, p, remains the same from trial to trial. We can model the protocol failure simply by finding the probability of 5 successes in 5 attempts. We can solve the probability model using the formula. It reduces to p to the 5 th. So a very small number! Prob(5 successes in 5 attempts) = pexp5 = 0.05 * 0.05 * 0.05 * 0.5 * 0.5 = 3 *10EXP-7 Question 2 Problem P1 from Chapter 2 Kurose a) F b) T c) F d) F e) F Question 3 Problem P4 from Chapter a) The document request was The Host : field indicates the server's name and /cs453/index.html indicates the file name. b) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> 5
6 pair. c) The browser is requesting a persistent connection, as indicated by the Connection: keep-alive. d) This is a trick question. This information is not contained in an HTTP message anywhere. So there is no way to tell this from looking at the exchange of HTTP messages alone. One would need information from the IP datagrams (that carried the TCP segment that carried the HTTP GET request) to answer this question. e) Mozilla/5.0. The browser type information is needed by the server to send different versions of the same object to different types of browsers. Question 4 Problem P5 from Chapter 2 a) The status code of 200 and the phrase OK indicate that the server was able to locate the document successfully. The reply was provided on Tuesday, 07 Mar :39:45 Greenwich Mean Time. b) The document index.html was last modified on Saturday 10 Dec :27:46 GMT. c) There are 3874 bytes in the document being returned. d) The first five bytes of the returned document are : <!doc. The server agreed to a persistent connection, as indicated by the Connection: Keep-Alive field Question 5 Problem P6 except examine the latest HTTP RFC 7230 (this has replaced RFC 2616). a) Persistent connections are discussed in section 8 of RFC 2616 (the real goal of this question was to get you to retrieve and read an RFC). Sections and of the RFC indicate that either the client or the server can indicate to the other that it is going to close the persistent connection. It does so by including the connection-token "close" in the Connection-header field of the http request/reply. b) HTTP does not provide any encryption services. 6
7 c) (From RFC 2616) Clients that use persistent connections should limit the number of simultaneous connections that they maintain to a given server. A single-user client SHOULD NOT maintain more than 2 connections with any server or proxy. d) Yes. (From RFC 2616) A client might have started to send a new request at the same time that the server has decided to close the "idle" connection. From the server's point of view, the connection is being closed while it was idle, but from the client's point of view, a request is in progress. Question 6 Problem P18 from Chapter 2 (Hint: I suggest using ). a) For a given input of domain name (such as ccn.com), IP address or network administrator name, the whois database can be used to locate the corresponding registrar, whois server, DNS server, and so on. b) NS4.YAHOO.COM from NS1.MSFT.NET from ww.register.com c) Local Domain: Web servers : , , , , , , , Mail Servers : mx1.mindspring.com ( ) mx2.mindspring.com ( ) mx3.mindspring.com ( ) mx4.mindspring.com ( ) Name Servers: itchy.earthlink.net ( ) scratchy.earthlink.net ( ) Web Servers: ( , ) Mail Servers: a.mx.mail.yahoo.com ( ) b.mx.mail.yahoo.com ( ) c.mx.mail.yahoo.com ( , ) d.mx.mail.yahoo.com ( ) e.mx.mail.yahoo.com ( ) f.mx.mail.yahoo.com ( , ) g.mx.mail.yahoo.com ( , ) Name Servers: ns1.yahoo.com ( ) ns2.yahoo.com ( ) ns3.yahoo.com ( ) ns4.yahoo.com ( ) ns5.yahoo.com ( ) 7
8 ns8.yahoo.com ( ) ns9.yahoo.com ( ) Web Servers: ( , ) Mail Servers: mx1.hotmail.com ( , , ) mx2.hotmail.com ( , , ) mx3.hotmail.com ( , , ) mx4.hotmail.com ( , , ) Name Servers: ns1.msft.net ( ) ns2.msft.net ( ) ns3.msft.net ( ) ns4.msft.net ( ) ns5.msft.net ( ) d) The yahoo web server has multiple IP addresses ( , ) e) The address range for Polytechnic University: f) An attacker can use the whois database and nslookup tool to determine the IP address ranges, DNS server addresses, etc., for the target institution. g) By analyzing the source address of attack packets, the victim can use whois to obtain information about domain from which the attack is coming and possibly inform the administrators of the origin domain. Question 7- programming question This will be a redo of part 2 of the program from HW1. You are to start with the UDPEcho posted as the partial solution from HW1. This incorporates the session manager code at the server. The client code for CBR mode has been added, however you are to make a trivial config parameter change. The CBR support has NOT been added at the server. The server parameters are the same as before: Server side port number Debug Flag - controls the amount of information displayed to standard out by the server. The parameter conveys two logging settings: 8
9 o The 8 th bit of the lowest octet specifies if the server is to log iteration samples to the file EchoServer.dat (a 1 is yes). o The lower 7 bits encodes the debuglevel which controls how much tracing information is displayed to standard out. A value of 0 displays errors, a value of 1 displays start and stop information, a value of 2 displays iteration results and a value of 3 displays debugging information. Note that the original code does not appear to correctly deal with a value of 2. If you want to see information related to each iteration (as perceived by the server), specify the debugflag to be 129. This will create EchoServer.dat file. This file format is based on the following fprintf in the server code: o fprintf(newfile,"%f %d %d %d %d %d\n", curtime,rxseqnumber,recvmsgsize,largestseqrecv, receivedcount,errorcount); The client parameters are to be slightly modified: Server IPv4 address as a domain name or in dotted quad format Server port : specifies the server port Message size: specifies the number of application bytes to place in each message. In order to ensure a message fits in one IP packet, you should assume a message size can not exceed 1472 bytes. Number iterations: specifies the number of iterations (i.e., data samples) to perform (or obtain). If 0, the client should run forever (or until a CNT-C). Debug flag - Same as the server parameter except the sample log file is RTT.dat. Mode : 0 is RTT_MODE (original ECHO mode), 1 is CBR mode. If Mode 0, o Iteration delay: Number of microseconds between iterations If Mode 1, o Target send rate: The target client sending rate in bits per seconds The client and server should operate in RTT_MODE as currently implemented in the starting code for the program, with the exception of the minor parameter change to the client as explained above. The starting code does include the server support for keeping track of individual client sessions. You are to add support for CBR_MODE in the server. In CBR mode, the client sends fixed size messages at a constant packet rate, approximating a constant bit rate (CBR) traffic generator. The server does NOT send anything back. The Message size and the Target send rate parameters determine the frequency at which packets are sent. Specifically, the delay between sequential client transmissions is: Tdelay= (M*8)/R seconds where M: message size; R: Target send rate Note that when the client operates in ECHO mode (mode 0), the delay between transmissions is specified by the Iteration Delay client program parameter. The client places the following fields in the first 6 octets of each message: Sequence number (32 bit unsigned int) Mode : 16 bit unsigned int 9
10 In mode 0, when the client terminates, it should display the statistics that the code currently displays. When the server terminates, it should display a summary of each session. The starting code correctly displays the end of program information so you do not need to modify the code for this function. When a client session terminates that had been using CBR mode, it should display For client sessions using CBR mode, the client should display the duration of the session, the number of packets sent and the actual sending rate (bits per second). The code to print the end of program statistics for both client and server has been incorporated in the starting code so you do not need to modify the code for this function. As an example, we run the client and server on a VM from two different terminal sessions. The following shows the client invocation and the results after a CNT-C. The client is configured to run forever at a target sending rate of 5Mbps. It achieves less than the target due to overhead of the system. In CBR mode, even if the debugflag 8 th bit is set, neither the client or server create the output trace file (the RTT.dat or EchoServer.dat)../client localhost UDPEchoClient(#args:9): debuglevel:1 debugflag:129 createflag:1 UDPEchoClient(./client): IP:port:localhost:5000 #params: ^CUDPEcho2Client:( ):CBR_MODE: SentMsgs:5599 TotalBytes: actualsendrate: The server invocation and result:./server UDPEchoServer(#args:3): port:5000 debuglevel:1 debugflag:129 createflag:1 ^CUDPEcho2Server: receivedcount:5599, numbersessions: The server learns the client session mode through the mode field in the messages. Note that the server must support multiple clients that might be in either mode. The server maintains the session statistics as described in the previous section and is to display a summary of each session at program termination (the latter code already exists in the server). Validation You are to conduct an analysis that includes the following activities. The writeup for this problem just needs to include your answers to the following activities. Client in Mode 0 on your VM, Server running on a department Linux machine. Use netem on your VM and set a latency of 10ms and a random loss rate of 5% for all outbound packets (destined for the campus network). Run the client for 30 minutes specifying a iteration delay of In a second terminal session on your VM, run ping (i.e., the standard ping application) to the same server concurrently. Show the summary statistics for the client and for ping. Summarize in a few sentences what you see. If there are significant differences between the 10
11 results from the two tools, try to explain what you see. Your answer can be based solely on the summary results displayed by each program when you issue a CNT- C. Copy and paste the results (after the CNT-C terminates the three programs) from the ping output and from the UDPEcho client and server to your writeup. Client in Mode 1 on your VM, server running on a department Linux machine. o Test 1: Without netem active, run the client with a message size of 1000 bytes, a target send rate of bps and for number of iterations of 0 (so until you issue a CNT-C). Compare the send rate at the client with the observed receiving rate at the server. o Test 2: Repeat test 1, but run for 1000 iterations. Prior to running, issue a tcpdump (or wireshark) on your VM (or the Host) to capture the packets associated with your UDPEcho CBR session. Analyze the output file. Write a program or script to obtain a data file containing the time between each CBR packet. Then plot the distribution of this time series. Explain what you see.is it what we expect? If not, try to explain what might be happening. o Test 3: Repeat test 1, but this time have netem setup to add a 10ms latency and a 5% packet loss. Compare the summary results between the send and receive sides. Try to explain any differences. Test1 - The client send about 2138 messages, ping sends slightly more probable because I did not attempt to start the two programs at exactly the same time. UDPEcho observes and avg RTT of 16.3 ms and ping observes This difference could be due to minor differences between a UDP and an ICMP application. The UDPEcho program observes an avg loss rate of 4.8%, while ping observes a loss rate of 5%. I would if we ran for multiple hours we would see the same loss rate to within a fraction of a percent. ^CUDPEcho2Client:( ):RTT_MODE: Sent:2138 meancurrtt: (avgping:16692) smoothedrtt: , avgloss: , actualsendrate: 7518./server UDPEchoServer(#args:3): port:5000 debuglevel:1 debugflag:129 createflag:1 ^CUDPEcho2Server: receivedcount:2036, numbersessions: koala4.cs.clemson.edu ping statistics packets transmitted, 2172 received, 5% packet loss, time ms rtt min/avg/max/mdev = /16.985/ / ms 11
Section 1 Short Answer Questions
CPSC 3600 section 002 HW #1 Fall 2017 Last revision: 9/7/2017 You must work on this homework individually!! Submission: You are to submit your written answers to turnitin. Also, you are to submit your
More informationCPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members)
CPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 (20 points) Solution: a) false b) false
More informationCPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members)
CPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 Q 2 Kurose chapter 3, review question R15 Q 3 Kurose
More informationShort answer (35 points)
CPSC 360 Fall 2017 Exam 1 Version 2 Solutions (last updated 10/19/2017) This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheet of paper with whatever you like
More informationCOMPUTER NETWORK. Homework #1. Due Date: March 29, 2017 in class
Computer Network Homework#1 COMPUTER NETWORK Homework #1 Due Date: March 29, 2017 in class Question 1 What is the role of HTTP in a network application? What other components are needed to complete a Web
More informationCPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017
CPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on your own or with
More informationCPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017
CPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on
More informationCPSC 441 Tutorial-1. Department of Computer Science University of Calgary
CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationProblem 7. Problem 8. Problem 9
Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More information1.2 The first Internet (i.e., one of the first packet switched networks) was referred to as the ARPANET.
CPSC 360 Spring 2011 Exam 1 Solutions This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheets of paper with whatever you like written on the front and back. You
More informationBusiness Data Networks and Security 10th Edition by Panko Test Bank
Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:
More informationQuestion Points Score total 100
CS457: Computer Networking Date: 3/21/2008 Name: Instructions: 1. Be sure that you have 8 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed
More informationa. (4pts) What general information is contained in a LSR-PDU update that A might send?
B1: Networks (25 points) Link State Routing (LSR). (Hint: flooding and Dijkstra s Algorithm). Assume Router A has physical links to Routers W, X, Y, Z. a. (4pts) What general information is contained in
More information15-441: Computer Networks Homework 3
15-441: Computer Networks Homework 3 Assigned: Oct 29, 2013 Due: Nov 12, 2013 1:30 PM in class Name: Andrew ID: 1 TCP 1. Suppose an established TCP connection exists between sockets A and B. A third party,
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10
EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No
More informationCPSC 424/624 Exam 1 Solutions Spring 2016
CPSC 424/624 Exam 1 Solutions Spring 2016 Name: You can use a single 8.5 by 11.0 sheet of paper (front and back) for notes. You can use a calculator. Please do not share your notes sheet or your calculator.
More informationPacketExpert PDF Report Details
PacketExpert PDF Report Details July 2013 GL Communications Inc. 818 West Diamond Avenue - Third Floor Gaithersburg, MD 20878 Phone: 301-670-4784 Fax: 301-670-9187 Web page: http://www.gl.com/ E-mail:
More informationb) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair.
Prblem a) F b) T c) F d) F e) F Prblem 3 Applicatin layer prtcls: DNS and HTTP Transprt layer prtcls: UDP fr DNS; TCP fr HTTP Prblem 4 a) The dcument request was http://gaia.cs.umass.edu/cs453/index.html.
More informationb) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair.
Prblem a) F b) T c) F d) F e) F Prblem 3 Applicatin layer prtcls: DNS and HTTP Transprt layer prtcls: UDP fr DNS; TCP fr HTTP Prblem 4 a) The dcument request was http://gaia.cs.umass.edu/cs453/index.html.
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationCS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationSchool of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks
School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,
More informationChapter 3 Review Questions
Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications
More informationCPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017
CPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on your
More informationLab Exercise UDP & TCP
Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
More informationCS 455/555 Spring 2011 Weigle
Homework 2 Application-Level Protocols Assigned: Tuesday, February 1, 2011 Due: Tuesday, February 15, 2011 at the beginning of class CS 455 100 points CS 555 112 points Note: All homework assignments must
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationName Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006
Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday November 14, 2006 Prohibited 1. You are not allowed to write down the
More informationCSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1
CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 Due 11:59pm Friday October 6 Instructions: 1. Please submit your homework using the on-line electronic submission system (via
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationComputer Network 2015 Mid-Term Exam.
Computer Network 2015 Mid-Term Exam. Question : ``Basic of Computer Networks and the Internet' Please fill into the blanks (15%) a) The amount of time required to push all of a packet s bits into a link
More informationTCP/IP Performance ITL
TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationReliable File Transfer
Due date Wednesday, Mar 14, 11:59pm Reliable File Transfer CS 5565 Spring 2012, Project 2 This project is worth 100 points. You may form teams of up to two students for this project. You are not required
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationECE 610: Homework 4 Problems are taken from Kurose and Ross.
ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose
More informationDepartment of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011
Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 15, 2011 Instructions: Examination time: 180 min.
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes
CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.
More informationTCP: Flow and Error Control
1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationCSE 473 Introduction to Computer Networks. Midterm Exam Review
CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination
More informationHyperText Transfer Protocol
Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which
More informationReview problems (for no credit): Transport and Network Layer
Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets
More information4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative
1. What is the IP address and TCP port number used by your client computer (source) to transfer the file to spinlab.wpi.edu? My computer is at 10.211.55.3. The source port is 49247. See screenshot below.
More informationEE 122: IP Forwarding and Transport Protocols
EE 1: IP Forwarding and Transport Protocols Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee1/ (Materials with thanks to Vern
More informationCNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems
Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...
More informationComputer Networks - Midterm
Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationMaterial for the Networking lab in EITF25 & EITF45
Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab
More informationCS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes
CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationAnnouncements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.
IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/
More informationTransport Layer TCP / UDP
Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC
More informationThere are 10 questions in total. Please write your SID on each page.
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationc) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.
Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationComputer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.
Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More informationc. If the sum contains a zero, the receiver knows there has been an error.
ENSC-37 Fall 27 Assignment#3 Due Date 6 Oct. 27 Problem-:[4] UDP and TCP use s complement for their checksums. Suppose you have the following three 8-bit bytes:,, and. a. [6] What is the s complement of
More informationTo see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.
Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationQ U E S T I O N 3 In the current version of IP (IPv4), the use of TCP and UDP headers differ in which of the following ways?
Preview Test: HW 2 Test Information Description Chapter 2 Instructions Due:Oct. 17 5 PM Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationLab - Using Wireshark to Examine TCP and UDP Captures
Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.
More informationPreview Test: HW3. Test Information Description Due:Nov. 3
Preview Test: HW3 Test Information Description Due:Nov. 3 Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question
More informationCS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:
CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all
More informationTCP/IP Transport Layer Protocols, TCP and UDP
TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Peer evaluations 2 Homework #5 Due Thursday, Nov 17 th Homework #6 Presentation on security/ privacy Project
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationTCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1
TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationExample questions for the Final Exam, part A
ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of
More informationComputer Networks. Homework #4: No Grading
Computer Networks Homework #4: No Grading Problem #1. Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would
More informationCOMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More information>>> SOLUTIONS <<< Answer the following questions regarding the basics principles and concepts of networks.
Midterm Exam for Computer Networks (CNT 625) Fall 24 >>> SOLUTIONS
More informationComputer Networks (Fall 2011) Homework 2
5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A
More informationBSc. (Hons) Web Technologies. Examinations for 2017 / Semester 1
BSc. (Hons) Web Technologies Cohort: BWT/17A/FT Examinations for 2017 / Semester 1 MODULE: NETWORK ESSENTIALS MODULE CODE: CAN 1104C Duration: 2 ½ hours Instructions to Candidates: 1. Answer ALL 4 (four)
More informationQuestion 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:
Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: (a) Reserving network resources ahead of data being sent: (2pts) In circuit-switching networks,
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More information