When the ACK message arrives at the client, it computes an RTT sample and then immediately sends the next message.

Size: px
Start display at page:

Download "When the ACK message arrives at the client, it computes an RTT sample and then immediately sends the next message."

Transcription

1 CPSC 3600 HW #2 s Fall 2017 Last update: 10/12/2017 Please submit your written answers as a PDF using canvas And your modified UDPEcho.tar.gz using handin Please work independently Name: 1 (10) Two nodes communicate over the following network. Link 1 Link 2 Link 3 Node Gbps Ethernet --Router Mbps Link---Router -1Gbps Ethernet ---Node 2 1 microsecond 30 millisecond 1 microsecond The link propagation delay: 1 us, 30 ms, 1 us The only active application is a file transfer application based on UDP. The client sends messages that contain 1472 bytes of application data. The first 4 octets of each message contains the sequence number (let s call this the application protocol header) followed by 1468 bytes of application data. The size of the frame that gets sent over each link (between the client and the server) is exactly 1520 bytes : Application data: 1468 bytes Application header (sequence number): 4 bytes UDP protocol header : 8 bytes IP protocol header: 20 bytes MAC header: 20 bytes The server simply sends a ACK message that contains only the sequence number of the message that just arrived. Therefore, each ACK is exactly 52 bytes large (4 bytes application header, 8 bytes UDP header, 20 bytes IP header, 20 bytes MAC header). When the ACK message arrives at the client, it computes an RTT sample and then immediately sends the next message. The application needs to transfer 5 GBytes of data (i.e., 5,000,000,000 bytes) of application data from Node 1 to Node 2. The application protocol is a simple stop and wait. A retransmission timeout of 2 seconds is used if an ACK does not arrive. At which time, the last message is retransmitted. The client protocol will attempt to transmit a message up to 5 times (the first transmission followed by up to 4 retransmissions). If 5 attempts fail, the client terminates. Please have your answers in units of seconds with microsecond precision. 1

2 1.1 Compute the best case RTT the client observes. Assume the best case implies no packet loss, no processing delays, and no other traffic competing for bandwidth. In the best case, every RTT sample computed by the client should be identical with the possible exception of the very last message which might not be the same size as all the others. Ignore the last RTT sample for all your answers to each part of Question 1 in the homework. : Identify the following: The transmission delays in the Node 1 to Node 2 direction for links 1, 2, 3 as T1-1, T2-1, T3-1 The transmission delays in the reverse direction for links 1,2,3 as T1-2, T2-2, T3-2. The propagation delays for each direction for links 1,2,3 as Tprop1, Tprop2, Tprop3. T1-1= 1520*8/ = 12 microseconds T2-1=1520*8/ = seconds = 8107 microseconds T3-1 = same as T1-1 T1-2 = 52*8/ = 0.4 microsecond T2-2 = 52*8/ = seconds = 277 microseconds T3-2= sames as T1-2 RTT = T1-1+Tprop1 + T2-1+Tprop2 + T3-1+Tprop3 + T1-2+Tprop1 + T2-2+Tprop2 + T3-3+Tprop3 = 12us+1us usecs +12 us +1us + 0.4us + 1us + 277us us = microseconds = seconds Note that the 30ms prop delay is by far the biggest component of the delay. 2

3 1.2 Exactly how long will it take before all 5 GBytes are successfully received and acknowledged? Assume the best case implies no packet loss, no processing delays, and no other traffic competing for bandwidth. Total frame size is 1520 bytes. But each frame can only hold 1468 bytes. Let s define Ni as the number of iterations that are required. Niters = ceil(5,000,000,000 / 1468 ) Niters= 3,405,995 transmissions, with the last holding only 808 bytes. The easiest way to do this is to use the previous result and to assume the error caused by assuming the final transmission is neglible. Ttransfer= Niters*RTT= * = 233, seconds. Is the error caused by the final transmission significant? The RTT of the last iteration would be different due to the Tx delay in the Node 1 to Node 2 direction. The frame size would be bytes = 560 bytes T1-1= 860*8/ = 6.88 microseconds or rounded up to 7 microseconds T2-1=860*8/ = seconds = 4587 microseconds T3-1 = same as T1-1 RTT(last)= = The difference is 3538 useconds which is significant. The Ttransfer result that accounts for the reduced RTT on the last iteration: Ttransfer= (Niters-1)*RTT= * = seconds. 1.3 Same problem as 1.2 except you now must consider a non-zero random packet loss process in effect. Assume the loss process can be modeled using a Bernoulli Loss Model with an average loss rate of 0.05 (or 5%). Find the total time it takes to successfully transfer the 5GBytes of data subject to a random 5% packet loss process. To simplify, assume the following: For the N transmissions, assume that exactly 0.05*N packets are dropped and consequently require retransmission. Further, assume that all retransmissions do NOT experience packet loss. : The assumption that retransmissions are not subject to packet loss greatly simplifies the problem. Let X be a random variable that represents the iteration time. 3

4 The domain (sample space or the set of all possible values of X), Sx : {RTT, TimeoutTime+RTT} Where the value is either the RTT time (the case of no loss) of RTT-time + Timeout (the case when loss occurs). Knowing that the retransmission timer starts just before the send, the recovery takes the duration of the timeout plus the time to transmit and receive the retransmitted message. We will further simplify by assuming the very last iteration will always be the same size as all other messages. Probability of P(X=RTT) = 0.95, P(X=RTT+Timeout) = 0.05 Expected value of X : E[X] = RTT* (RTT+2.0)*0.05 = 0.95* * E[X]= seconds= seconds Ttransfer= Niters*RTT= * = Another way to do the problem: we know that the Ttransfer will require the previous Ttransfer for successful iterations. And then 0.05* * 2.0 amount of additional time for each unsuccessful iteration. So the cost of errors: Terrors= 0.05* *2.0 = The modified transfer time (we use the Ttransfer that assumes the last message same size): Ttransfer time= = What is the probability that the session fails? Same problem as 1.3 except we now consider the possibility that retransmissions are dropped. Hint: This is where we make use of the Bernoulli Loss Model. Loss events are uncorrelated and therefore we can apply the Binomial Probability Law to solve the problem. Each time the client sends a message and waits for the ACK is an iteration. Each iteration can be viewed as a Bernoulli event- it either succeeds or fails. 4

5 : A session fails if 5 sequential iterations fail. We can model each iteration as a Bernoulli event. We can then use the Binomial probability model to obtain the probability of k successes in n trials (where we define a success as a iteration failure which occurs with probability p). To review, the binomial probability model offers a simple but very useful model appropriate for sequential experiments involving Bernoulli events. A Bernoulli event is an experiment that has an outcome of exactly two possibilities: SUCCESS or FAILURE where the probability of a success is p and the probability of a failure is (1-p). Suppose we have n Bernoulli trials and p is the probability of success of a trial. Then this is a binomial model if The Bernoulli trials are independent of one another. The probability of success, p, remains the same from trial to trial. We can model the protocol failure simply by finding the probability of 5 successes in 5 attempts. We can solve the probability model using the formula. It reduces to p to the 5 th. So a very small number! Prob(5 successes in 5 attempts) = pexp5 = 0.05 * 0.05 * 0.05 * 0.5 * 0.5 = 3 *10EXP-7 Question 2 Problem P1 from Chapter 2 Kurose a) F b) T c) F d) F e) F Question 3 Problem P4 from Chapter a) The document request was The Host : field indicates the server's name and /cs453/index.html indicates the file name. b) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> 5

6 pair. c) The browser is requesting a persistent connection, as indicated by the Connection: keep-alive. d) This is a trick question. This information is not contained in an HTTP message anywhere. So there is no way to tell this from looking at the exchange of HTTP messages alone. One would need information from the IP datagrams (that carried the TCP segment that carried the HTTP GET request) to answer this question. e) Mozilla/5.0. The browser type information is needed by the server to send different versions of the same object to different types of browsers. Question 4 Problem P5 from Chapter 2 a) The status code of 200 and the phrase OK indicate that the server was able to locate the document successfully. The reply was provided on Tuesday, 07 Mar :39:45 Greenwich Mean Time. b) The document index.html was last modified on Saturday 10 Dec :27:46 GMT. c) There are 3874 bytes in the document being returned. d) The first five bytes of the returned document are : <!doc. The server agreed to a persistent connection, as indicated by the Connection: Keep-Alive field Question 5 Problem P6 except examine the latest HTTP RFC 7230 (this has replaced RFC 2616). a) Persistent connections are discussed in section 8 of RFC 2616 (the real goal of this question was to get you to retrieve and read an RFC). Sections and of the RFC indicate that either the client or the server can indicate to the other that it is going to close the persistent connection. It does so by including the connection-token "close" in the Connection-header field of the http request/reply. b) HTTP does not provide any encryption services. 6

7 c) (From RFC 2616) Clients that use persistent connections should limit the number of simultaneous connections that they maintain to a given server. A single-user client SHOULD NOT maintain more than 2 connections with any server or proxy. d) Yes. (From RFC 2616) A client might have started to send a new request at the same time that the server has decided to close the "idle" connection. From the server's point of view, the connection is being closed while it was idle, but from the client's point of view, a request is in progress. Question 6 Problem P18 from Chapter 2 (Hint: I suggest using ). a) For a given input of domain name (such as ccn.com), IP address or network administrator name, the whois database can be used to locate the corresponding registrar, whois server, DNS server, and so on. b) NS4.YAHOO.COM from NS1.MSFT.NET from ww.register.com c) Local Domain: Web servers : , , , , , , , Mail Servers : mx1.mindspring.com ( ) mx2.mindspring.com ( ) mx3.mindspring.com ( ) mx4.mindspring.com ( ) Name Servers: itchy.earthlink.net ( ) scratchy.earthlink.net ( ) Web Servers: ( , ) Mail Servers: a.mx.mail.yahoo.com ( ) b.mx.mail.yahoo.com ( ) c.mx.mail.yahoo.com ( , ) d.mx.mail.yahoo.com ( ) e.mx.mail.yahoo.com ( ) f.mx.mail.yahoo.com ( , ) g.mx.mail.yahoo.com ( , ) Name Servers: ns1.yahoo.com ( ) ns2.yahoo.com ( ) ns3.yahoo.com ( ) ns4.yahoo.com ( ) ns5.yahoo.com ( ) 7

8 ns8.yahoo.com ( ) ns9.yahoo.com ( ) Web Servers: ( , ) Mail Servers: mx1.hotmail.com ( , , ) mx2.hotmail.com ( , , ) mx3.hotmail.com ( , , ) mx4.hotmail.com ( , , ) Name Servers: ns1.msft.net ( ) ns2.msft.net ( ) ns3.msft.net ( ) ns4.msft.net ( ) ns5.msft.net ( ) d) The yahoo web server has multiple IP addresses ( , ) e) The address range for Polytechnic University: f) An attacker can use the whois database and nslookup tool to determine the IP address ranges, DNS server addresses, etc., for the target institution. g) By analyzing the source address of attack packets, the victim can use whois to obtain information about domain from which the attack is coming and possibly inform the administrators of the origin domain. Question 7- programming question This will be a redo of part 2 of the program from HW1. You are to start with the UDPEcho posted as the partial solution from HW1. This incorporates the session manager code at the server. The client code for CBR mode has been added, however you are to make a trivial config parameter change. The CBR support has NOT been added at the server. The server parameters are the same as before: Server side port number Debug Flag - controls the amount of information displayed to standard out by the server. The parameter conveys two logging settings: 8

9 o The 8 th bit of the lowest octet specifies if the server is to log iteration samples to the file EchoServer.dat (a 1 is yes). o The lower 7 bits encodes the debuglevel which controls how much tracing information is displayed to standard out. A value of 0 displays errors, a value of 1 displays start and stop information, a value of 2 displays iteration results and a value of 3 displays debugging information. Note that the original code does not appear to correctly deal with a value of 2. If you want to see information related to each iteration (as perceived by the server), specify the debugflag to be 129. This will create EchoServer.dat file. This file format is based on the following fprintf in the server code: o fprintf(newfile,"%f %d %d %d %d %d\n", curtime,rxseqnumber,recvmsgsize,largestseqrecv, receivedcount,errorcount); The client parameters are to be slightly modified: Server IPv4 address as a domain name or in dotted quad format Server port : specifies the server port Message size: specifies the number of application bytes to place in each message. In order to ensure a message fits in one IP packet, you should assume a message size can not exceed 1472 bytes. Number iterations: specifies the number of iterations (i.e., data samples) to perform (or obtain). If 0, the client should run forever (or until a CNT-C). Debug flag - Same as the server parameter except the sample log file is RTT.dat. Mode : 0 is RTT_MODE (original ECHO mode), 1 is CBR mode. If Mode 0, o Iteration delay: Number of microseconds between iterations If Mode 1, o Target send rate: The target client sending rate in bits per seconds The client and server should operate in RTT_MODE as currently implemented in the starting code for the program, with the exception of the minor parameter change to the client as explained above. The starting code does include the server support for keeping track of individual client sessions. You are to add support for CBR_MODE in the server. In CBR mode, the client sends fixed size messages at a constant packet rate, approximating a constant bit rate (CBR) traffic generator. The server does NOT send anything back. The Message size and the Target send rate parameters determine the frequency at which packets are sent. Specifically, the delay between sequential client transmissions is: Tdelay= (M*8)/R seconds where M: message size; R: Target send rate Note that when the client operates in ECHO mode (mode 0), the delay between transmissions is specified by the Iteration Delay client program parameter. The client places the following fields in the first 6 octets of each message: Sequence number (32 bit unsigned int) Mode : 16 bit unsigned int 9

10 In mode 0, when the client terminates, it should display the statistics that the code currently displays. When the server terminates, it should display a summary of each session. The starting code correctly displays the end of program information so you do not need to modify the code for this function. When a client session terminates that had been using CBR mode, it should display For client sessions using CBR mode, the client should display the duration of the session, the number of packets sent and the actual sending rate (bits per second). The code to print the end of program statistics for both client and server has been incorporated in the starting code so you do not need to modify the code for this function. As an example, we run the client and server on a VM from two different terminal sessions. The following shows the client invocation and the results after a CNT-C. The client is configured to run forever at a target sending rate of 5Mbps. It achieves less than the target due to overhead of the system. In CBR mode, even if the debugflag 8 th bit is set, neither the client or server create the output trace file (the RTT.dat or EchoServer.dat)../client localhost UDPEchoClient(#args:9): debuglevel:1 debugflag:129 createflag:1 UDPEchoClient(./client): IP:port:localhost:5000 #params: ^CUDPEcho2Client:( ):CBR_MODE: SentMsgs:5599 TotalBytes: actualsendrate: The server invocation and result:./server UDPEchoServer(#args:3): port:5000 debuglevel:1 debugflag:129 createflag:1 ^CUDPEcho2Server: receivedcount:5599, numbersessions: The server learns the client session mode through the mode field in the messages. Note that the server must support multiple clients that might be in either mode. The server maintains the session statistics as described in the previous section and is to display a summary of each session at program termination (the latter code already exists in the server). Validation You are to conduct an analysis that includes the following activities. The writeup for this problem just needs to include your answers to the following activities. Client in Mode 0 on your VM, Server running on a department Linux machine. Use netem on your VM and set a latency of 10ms and a random loss rate of 5% for all outbound packets (destined for the campus network). Run the client for 30 minutes specifying a iteration delay of In a second terminal session on your VM, run ping (i.e., the standard ping application) to the same server concurrently. Show the summary statistics for the client and for ping. Summarize in a few sentences what you see. If there are significant differences between the 10

11 results from the two tools, try to explain what you see. Your answer can be based solely on the summary results displayed by each program when you issue a CNT- C. Copy and paste the results (after the CNT-C terminates the three programs) from the ping output and from the UDPEcho client and server to your writeup. Client in Mode 1 on your VM, server running on a department Linux machine. o Test 1: Without netem active, run the client with a message size of 1000 bytes, a target send rate of bps and for number of iterations of 0 (so until you issue a CNT-C). Compare the send rate at the client with the observed receiving rate at the server. o Test 2: Repeat test 1, but run for 1000 iterations. Prior to running, issue a tcpdump (or wireshark) on your VM (or the Host) to capture the packets associated with your UDPEcho CBR session. Analyze the output file. Write a program or script to obtain a data file containing the time between each CBR packet. Then plot the distribution of this time series. Explain what you see.is it what we expect? If not, try to explain what might be happening. o Test 3: Repeat test 1, but this time have netem setup to add a 10ms latency and a 5% packet loss. Compare the summary results between the send and receive sides. Try to explain any differences. Test1 - The client send about 2138 messages, ping sends slightly more probable because I did not attempt to start the two programs at exactly the same time. UDPEcho observes and avg RTT of 16.3 ms and ping observes This difference could be due to minor differences between a UDP and an ICMP application. The UDPEcho program observes an avg loss rate of 4.8%, while ping observes a loss rate of 5%. I would if we ran for multiple hours we would see the same loss rate to within a fraction of a percent. ^CUDPEcho2Client:( ):RTT_MODE: Sent:2138 meancurrtt: (avgping:16692) smoothedrtt: , avgloss: , actualsendrate: 7518./server UDPEchoServer(#args:3): port:5000 debuglevel:1 debugflag:129 createflag:1 ^CUDPEcho2Server: receivedcount:2036, numbersessions: koala4.cs.clemson.edu ping statistics packets transmitted, 2172 received, 5% packet loss, time ms rtt min/avg/max/mdev = /16.985/ / ms 11

Section 1 Short Answer Questions

Section 1 Short Answer Questions CPSC 3600 section 002 HW #1 Fall 2017 Last revision: 9/7/2017 You must work on this homework individually!! Submission: You are to submit your written answers to turnitin. Also, you are to submit your

More information

CPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members)

CPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members) CPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 (20 points) Solution: a) false b) false

More information

CPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members)

CPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members) CPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 Q 2 Kurose chapter 3, review question R15 Q 3 Kurose

More information

Short answer (35 points)

Short answer (35 points) CPSC 360 Fall 2017 Exam 1 Version 2 Solutions (last updated 10/19/2017) This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheet of paper with whatever you like

More information

COMPUTER NETWORK. Homework #1. Due Date: March 29, 2017 in class

COMPUTER NETWORK. Homework #1. Due Date: March 29, 2017 in class Computer Network Homework#1 COMPUTER NETWORK Homework #1 Due Date: March 29, 2017 in class Question 1 What is the role of HTTP in a network application? What other components are needed to complete a Web

More information

CPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017

CPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017 CPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on your own or with

More information

CPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017

CPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017 CPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on

More information

CPSC 441 Tutorial-1. Department of Computer Science University of Calgary

CPSC 441 Tutorial-1. Department of Computer Science University of Calgary CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Problem Set 7 Due: Start of Class, November 2

Problem Set 7 Due: Start of Class, November 2 CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these

More information

1.2 The first Internet (i.e., one of the first packet switched networks) was referred to as the ARPANET.

1.2 The first Internet (i.e., one of the first packet switched networks) was referred to as the ARPANET. CPSC 360 Spring 2011 Exam 1 Solutions This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheets of paper with whatever you like written on the front and back. You

More information

Business Data Networks and Security 10th Edition by Panko Test Bank

Business Data Networks and Security 10th Edition by Panko Test Bank Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:

More information

Question Points Score total 100

Question Points Score total 100 CS457: Computer Networking Date: 3/21/2008 Name: Instructions: 1. Be sure that you have 8 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed

More information

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

a. (4pts) What general information is contained in a LSR-PDU update that A might send? B1: Networks (25 points) Link State Routing (LSR). (Hint: flooding and Dijkstra s Algorithm). Assume Router A has physical links to Routers W, X, Y, Z. a. (4pts) What general information is contained in

More information

15-441: Computer Networks Homework 3

15-441: Computer Networks Homework 3 15-441: Computer Networks Homework 3 Assigned: Oct 29, 2013 Due: Nov 12, 2013 1:30 PM in class Name: Andrew ID: 1 TCP 1. Suppose an established TCP connection exists between sockets A and B. A third party,

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

CPSC 424/624 Exam 1 Solutions Spring 2016

CPSC 424/624 Exam 1 Solutions Spring 2016 CPSC 424/624 Exam 1 Solutions Spring 2016 Name: You can use a single 8.5 by 11.0 sheet of paper (front and back) for notes. You can use a calculator. Please do not share your notes sheet or your calculator.

More information

PacketExpert PDF Report Details

PacketExpert PDF Report Details PacketExpert PDF Report Details July 2013 GL Communications Inc. 818 West Diamond Avenue - Third Floor Gaithersburg, MD 20878 Phone: 301-670-4784 Fax: 301-670-9187 Web page: http://www.gl.com/ E-mail:

More information

b) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair.

b) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair. Prblem a) F b) T c) F d) F e) F Prblem 3 Applicatin layer prtcls: DNS and HTTP Transprt layer prtcls: UDP fr DNS; TCP fr HTTP Prblem 4 a) The dcument request was http://gaia.cs.umass.edu/cs453/index.html.

More information

b) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair.

b) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair. Prblem a) F b) T c) F d) F e) F Prblem 3 Applicatin layer prtcls: DNS and HTTP Transprt layer prtcls: UDP fr DNS; TCP fr HTTP Prblem 4 a) The dcument request was http://gaia.cs.umass.edu/cs453/index.html.

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,

More information

Chapter 3 Review Questions

Chapter 3 Review Questions Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications

More information

CPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017

CPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017 CPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on your

More information

Lab Exercise UDP & TCP

Lab Exercise UDP & TCP Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating

More information

CS 455/555 Spring 2011 Weigle

CS 455/555 Spring 2011 Weigle Homework 2 Application-Level Protocols Assigned: Tuesday, February 1, 2011 Due: Tuesday, February 15, 2011 at the beginning of class CS 455 100 points CS 555 112 points Note: All homework assignments must

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006 Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday November 14, 2006 Prohibited 1. You are not allowed to write down the

More information

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 Due 11:59pm Friday October 6 Instructions: 1. Please submit your homework using the on-line electronic submission system (via

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Computer Network 2015 Mid-Term Exam.

Computer Network 2015 Mid-Term Exam. Computer Network 2015 Mid-Term Exam. Question : ``Basic of Computer Networks and the Internet' Please fill into the blanks (15%) a) The amount of time required to push all of a packet s bits into a link

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Reliable File Transfer

Reliable File Transfer Due date Wednesday, Mar 14, 11:59pm Reliable File Transfer CS 5565 Spring 2012, Project 2 This project is worth 100 points. You may form teams of up to two students for this project. You are not required

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011 Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 15, 2011 Instructions: Examination time: 180 min.

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

CSE 473 Introduction to Computer Networks. Midterm Exam Review

CSE 473 Introduction to Computer Networks. Midterm Exam Review CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

HyperText Transfer Protocol

HyperText Transfer Protocol Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which

More information

Review problems (for no credit): Transport and Network Layer

Review problems (for no credit): Transport and Network Layer Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets

More information

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative 1. What is the IP address and TCP port number used by your client computer (source) to transfer the file to spinlab.wpi.edu? My computer is at 10.211.55.3. The source port is 49247. See screenshot below.

More information

EE 122: IP Forwarding and Transport Protocols

EE 122: IP Forwarding and Transport Protocols EE 1: IP Forwarding and Transport Protocols Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee1/ (Materials with thanks to Vern

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

Computer Networks - Midterm

Computer Networks - Midterm Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing. IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/

More information

Transport Layer TCP / UDP

Transport Layer TCP / UDP Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC

More information

There are 10 questions in total. Please write your SID on each page.

There are 10 questions in total. Please write your SID on each page. Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window. Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

c. If the sum contains a zero, the receiver knows there has been an error.

c. If the sum contains a zero, the receiver knows there has been an error. ENSC-37 Fall 27 Assignment#3 Due Date 6 Oct. 27 Problem-:[4] UDP and TCP use s complement for their checksums. Suppose you have the following three 8-bit bytes:,, and. a. [6] What is the s complement of

More information

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Q U E S T I O N 3 In the current version of IP (IPv4), the use of TCP and UDP headers differ in which of the following ways?

Q U E S T I O N 3 In the current version of IP (IPv4), the use of TCP and UDP headers differ in which of the following ways? Preview Test: HW 2 Test Information Description Chapter 2 Instructions Due:Oct. 17 5 PM Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

Preview Test: HW3. Test Information Description Due:Nov. 3

Preview Test: HW3. Test Information Description Due:Nov. 3 Preview Test: HW3 Test Information Description Due:Nov. 3 Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question

More information

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Peer evaluations 2 Homework #5 Due Thursday, Nov 17 th Homework #6 Presentation on security/ privacy Project

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

Computer Networks. Homework #4: No Grading

Computer Networks. Homework #4: No Grading Computer Networks Homework #4: No Grading Problem #1. Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle

More information

Computer Networks (Fall 2011) Homework 2

Computer Networks (Fall 2011) Homework 2 5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A

More information

BSc. (Hons) Web Technologies. Examinations for 2017 / Semester 1

BSc. (Hons) Web Technologies. Examinations for 2017 / Semester 1 BSc. (Hons) Web Technologies Cohort: BWT/17A/FT Examinations for 2017 / Semester 1 MODULE: NETWORK ESSENTIALS MODULE CODE: CAN 1104C Duration: 2 ½ hours Instructions to Candidates: 1. Answer ALL 4 (four)

More information

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: (a) Reserving network resources ahead of data being sent: (2pts) In circuit-switching networks,

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information