Sirindhorn International Institute of Technology Thammasat University

Size: px
Start display at page:

Download "Sirindhorn International Institute of Technology Thammasat University"

Transcription

1 Name ID Section Seat No Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon Date/Time: Monday 4 December 205; 3:30 6:30 Instructions: This examination paper has 20 pages (including this page). Conditions of Examination: Closed book; No dictionary; Non-programmable calculator is allowed Students are not allowed to be out of the exam room during examination. Going to the restroom may result in score deduction. Turn off all communication devices (mobile phone etc.) and leave them at the front of the examination room. The examination paper is not allowed to be taken out of the examination room. A violation may result in score deduction. Write your name, student ID, section, and seat number clearly on the front page of the exam, and on any separate sheets (if they exist). Assume bits are ordered from left to right. For example, for the data 0000, the first (st) bit is 0 and the last (8th) bit is. Assume the speed of transmission is m/s Reference material included at the end of the exam may be used.

2 Question [22 marks] This question contains multiple choice sub-questions. You must write your answers for all sub-questions in the table below. E.g. if you think the answer for sub-question (a) is option 3 then write 3 in the table below. Select only one answer (even if you think there are multiple correct answers; selecting two or more answers automatically gets 0 marks). Correct answers are worth mark. 0 marks for an incorrect answer or no answer. Question Answer Question Answer (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) (m) (n) (o) (p) (q) (r) (s) (t) (u) (v) Table : Answers for multiple choice questions (a) What is the length of the address assigned to a wireless LAN device (e.g. USB adapter, or chip on the motherboard) by the device manufacturer?. 2 bits 2. 6 bits bits bits bits bits bits bits 9. Wireless LAN devices do not have addresses assigned by the manufacturer (b) Which of the following statements about internetworking is true?. A subnet has only one router attached 2. A router always has two network interfaces 3. A router cannot be a source of IP datagrams 4. A host can have only one network interface 5. A host may forward IP datagrams 6. A host may send a packet with a router as destination 7. None of the above Introduction to Data Communications 2

3 (c) Which command causes the computer to send multiple UDP packets to a computer with address...?. iperf -c... -t iperf -c... -u 3. iperf -s -w iperf -s -u 5. ping -c Both. and Both. and Both. and Both 2. and Both 2. and 5.. Both 4. and 5. (d) What is the special IP with all binary s used for?. a source address if a device is sending to itself 2. a source address when a device doesn t yet have an IP address 3. a destination address to send to all devices on the same subnet 4. a destination address to send to all devices on another subnet 5. a destination address if a device is sending to itself 6. an address of a subnet 7. an address of a router (e) To deliver s from clients to server, SMTP is used. For clients to download s from an server IMAP or POP are commonly used. Which layer of the TCP/IP layered model do these protocols belong to?. Application 2. Data Link OSI 5. Physical 6. TCP/IP 7. Transmission 8. Transport (f) With some adaptive routing protocols information about the network (e.g. topology, link costs) comes from all nodes and is updated on a periodic basis. For normal flooding, where does the information come from and how is it updated?. All nodes, periodic updates 2. All nodes, continuous updates 3. All nodes, no updates 4. No nodes, periodic updates 5. No nodes, continuous updates 6. No nodes, no updates 7. Neighbour nodes, periodic updates 8. Neighbour nodes, continuous updates Introduction to Data Communications 3

4 (g) Which layer(s) of the TCP/IP layered model do the standards for Ethernet and WiFi focus on?. Physical only 2. Data link only 3. Network only 4. Physical and data link 5. Data link and network 6. Physical, data link and network 7. None of the above (h) The process of finding a path through a network is called:. congestion control 2. connection-oriented 3. forwarding 4. fragmentation 5. routing 6. None of the above (i) Normally TCP would be implemented as:. Software in the operating system 2. An application installed by users that want to use UDP 3. Part of a user application, such as web browser or 4. Hardware on the LAN/WAN interface cards 5. Device drivers that control the LAN/WAN interface cards (j) A transport protocol is identified by:. Ethernet address 2. address 3. IP address 4. domain name 5. port number 6. protocol number (k) Which protocol provides flow control, error control and connection management:. ARP 2. DNS 3. ICMP 4. HTTP 5. TCP 6. UDP (l) The type of switching used in IP networks is:. Circuit switching 2. Datagram packet switching 3. Ethernet switching 4. Virtual circuit packet switching 5. None of the above Introduction to Data Communications 4

5 (m) Which of the following is a network layer protocol?. Ethernet 2. HTTP 3. DHCP 4. IP 5. TCP 6. UDP 7. WiFi (n) The standards for Ethernet are developed and maintained by:. IEC 2. IEEE 3. IETF 4. ISO 5. ITU 6. OSI 7. W3C (o) Which technique is described by transmitting data from multiple users across a single link but at different times?. ADSL 2. ARQ 3. CDMA 4. PCM 5. TCP 6. TDM 7. QoS (p) Select the correct set of features provided by IP:. Addressing, error control, security 2. Connection-less, addressing, data delivery 3. Addressing, flow control, quality of service 4. Addressing, error control, connection-less 5. Connection-oriented, data delivery, flow control 6. Flow control, addressing, data delivery (q) Which transport protocol allows real-time applications (e.g. video streaming) to send packets without waiting for ACKs?. ARQ 2. DHCP 3. DNS 4. HTTP 5. IP 6. NIC 7. TCP 8. UDP Introduction to Data Communications 5

6 (r) What is the shortest time it takes an Ethernet interface on a new laptop to transmit one bit?. 0. ns 2. ns ns 4. 0 ns ns ns ns ns (s) Compared to other common topologies in LANs (such as bus, mesh, ring), which of the following is a disadvantage of using a star topology for LAN?. Failure of a special node results in no stations being able to communicate 2. Poor performance due to sharing of point-to-multipoint links between users 3. Each station requires many network interfaces 4. Too many links needed in the network 5. Failure of a single station results in no stations being able to communicate 6. Failure of a single link results in no stations being able to communicate (t) If IP software on a computer creates and then sends an IP datagram with destination address , then the datagram will be:. Delivered to all devices on the same subnet as the source 2. Delivered to all devices on subnet Delivered to device with address Delivered to the source 5. Delivered to the switch 6. Delivered to the router on the same subnet as the source 7. Not delivered to any destination it will cause an error (u) A disadvantage of circuit switching (versus datagram packet switching) is:. Switches are complex because they must process every piece of data 2. It is difficult to guarantee performance for delivery of data 3. Data is likely to be dropped at switches 4. As new connections are requested they may be blocked 5. A larger delay (than datagram packet switching) will always occur when transferring the same amount of data (v) Which of the following is true?. All subnets in an internet must have the same network portion in their IP address. 2. The host portion of an IP address must be the same length across different subnets. 3. The network portion of an IP address must be the same length across different subnets. 4. All hosts in the same subnet must have the same host portion in their IP address. 5. All hosts in the same subnet must have unique network portion in their IP address 6. All hosts in the same subnet must have unique host portion in their IP address. Introduction to Data Communications 6

7 Question 2 [6 marks] Consider the network in Figure. The nodes/circles are datagram packet switches. Link 2 Link 2 5 Link 3 3 Link 4 4 Link 5 Figure : Network Topology The link characteristics are: delay to send one packet; throughput; and number of gigabytes that can be sent for Baht. The values of these three characteristics for each link are: Link : 20 ms, 300 Mb/s, 5 GB Link 2: 50 ms, 300 Mb/s, 4 GB Link 3: 0 ms, 600 Mb/s, 2 GB Link 4: 30 ms, 200 Mb/s, 3 GB Link 5: 0 ms, 400 Mb/s, 4 GB Least cost routing must be used in the network. The metric used depends on the objectives of the nodes. (a) If node wants to transfer a very large amount of data (00 s of GB) to node 5, but wants to pay as little as possible and does not care about performance, what is the path and what is the cost of that path? Explain or show how you calculated the path cost. [2 marks] Introduction to Data Communications 7

8 (b) If node wants to transfer a very large amount of data to node 5, and the cost doesn t matter, which path from to 5 is the best path to use? Explain why. [2 marks] (c) Explain how a cost can be assigned to each link so that least cost routing can be used, that would automatically select the path you chose in part (b). Your method for assigning a cost should only use the link characteristics available in this question. What would the path cost be? [2 marks] Introduction to Data Communications 8

9 Question 3 [0 marks] Consider the network in Figure 2. The nodes/circles are packet switches. E G B F K L M A C I O D H J N Figure 2: Network Topology 2 Assume flooding is to be used in the network to deliver a data packet from node D to node L. (a) What is the optimal value of the hop limit that source node D should use? Explain your answer. [3 marks] Introduction to Data Communications 9

10 Assume instead of flooding, adaptive routing is to be used in the network to deliver data packets. The routing metric is not hops. The cost of a link is identical in both directions. The following least-cost paths have already been determined: M L K G E B B E F C H I N O J H C F E B B A D G F C A D M L K F (b) Draw the optimal routing tables for nodes B and F. An optimal routing table is one with the least number of rows. Each row must contain only one value for the destination and next router, with the exception that you can use * in the destination column to indicate any value. In forwarding, assume the table is processed rowby-row: if one row matches, then the subsequent rows are ignored. [4 marks] Consider datagram packet switching being used to deliver packets on the path A B E G K. All packets must contain a 20 Byte header. They may contain a varying amount of data. The source A has 4,000 Bytes of data to send to K. (c) Explain three (3) factors that are important in node A selecting the amount of data that should be carried in each packet. [3 marks] Introduction to Data Communications 0

11 Question 4 [6 marks] Assume a 4-bit sequence number is used in a sliding window flow control protocol (that is, maximum window size is 5). The current state of a source node is: Last frame ACKed = 3 Current window size = 9 frames Then the node transmits 5 DATA frames, and then receives an ACK (Receive Ready) frame with number. After these frames have been transmitted/received, what is the new value of: (a) Last frame ACKed: (b) Last frame transmitted: (c) Current window size: Introduction to Data Communications

12 Question 5 [ marks] Consider the network topology in Figure 3. There are four IP routers, RA, RB, RC and RD. There are three hosts on the left subnet and three hosts on the right subnet. All subnets use Ethernet, with both the left subnet and right subnet containing switches (S and S2). Assume there are no hosts on any other subnets (that is, there are currently only six hosts in total). H RB 2 H4 H2 S RA 2 RD 3 S2 H5 H3 3 RC 2 2 H6 Figure 3: Network Topology 2 The numbers next to each link into a device in Figure 3 are interface numbers. For example, RA has three interfaces: interface connects to the switch, interface 2 connects to RB, and interface 3 connects to RC. Table 2 lists the MAC and IP addresses currently assigned to a selection of the interfaces. Table 2: Interface Addresses Device Interface MAC IP H :22:33:aa:bb:cc /24 H2 22:33:44:bb:cc:dd /24 H3 33:44:55:cc:dd:ee? RA 2:34:56:78:90:ab /24 RA 2 cd:ef:2:34:56: /6 RA 3 90:ab:cd:ef:2: /6 RB aa:bb:cc::22: /6 RB 2 bb:cc:dd:22:33: /20 RC cc:dd:ee:33:44: /6 RC 2 dd:ee:ff:44:55: /8 RD 56:78:90:ab:cd:ef /20 RD 2 ef:cd:ab:90:78: /8 RD 3 34:2:ef:cd:ab: /2 H4 99:a:b2:c3:d4:e /2 H5 88:f6:a7:b8:c9:d /2 H6 77:e:f2:a3:b4:c /2 The following sub-questions give a scenario of one device sending data to others. For that given scenario, you need to fill in the details of the packet (Ethernet frame and/or IP datagram), that is, the packet header field values and other information about the packet. Assume the default/typical headers are used (see the Reference Material). Introduction to Data Communications 2

13 (a) H2 has TCP data to send to H4. The entire TCP segment (including header) is 500 Bytes long. The path that the IP datagram takes is H2 RA RB RD H4. The initial time to live set by H2 is 0. Fill in the table below for the packet received by H4. [4 marks] Field Ethernet Source Value Ethernet Destination IP Source IP Destination IP Protocol IP Total Length (b) The same as for part (a) (that is, the same packet sent on path H2 RA RB RD H4), but fill in the table below for the packet sent by RB. [3 marks] Field Ethernet Source Value Ethernet Destination IP Source IP Destination IP TTL H2 wants to have data sent to all devices on the subnet that H4 is attached to. H2 has two approaches to do this: use unicast or use broadcast. (c) What is the value of the broadcast address H2 should use? [2 marks] (d) Explain two advantages of using broadcast, compared to using unicast. [2 marks] Introduction to Data Communications 3

14 Question 6 [3 marks] WiFi uses a stop-and-wait ARQ mechanism for data transfer between client (e.g. laptop) and Access Point (AP). However before each DATA frame is sent, the sender must wait w µs, and during that time, check that no other device is transmitting. For example, the client waits w µs, transmits the DATA frame, and upon receipt, the AP immediately transmits an ACK frame in reply. Then before transmitting the next DATA frame, the client waits w µs. The waiting time is to give opportunity for other devices to transmit, and it cannot be removed. A WiFi DATA frame contains a 66 Byte header and d Bytes of payload (where 00 d 500). An ACK frame is 4 Bytes of header (no payload). Apart from the waiting time w, assume no processing delays. The link propagation delay is p µs from client to AP, and p µs from AP to client. In WiFi the DATA frames and ACK frames may be transmitted at different data rates. Let r data be the data rate of DATA frames, and r ack be the data rate of ACK frames. Assume the following values: r data = 54 Mb/s, r ack = 2 Mb/s, p = µs, w = 70 µs. (a) If client has a large amount of data to send to the AP, and there are no other devices nearby transmitting (e.g. no interference) and no frame loss, then what is the maximum throughput that can be achieved? [4 marks] Introduction to Data Communications 4

15 Now consider a DATA frame with payload of d = 04. If a DATA frame is lost (or received in error at the AP), then after a timeout, the client waits w µs, and then retransmits the DATA frame. The client uses a timeout value of x µs, where the timer starts immediately after the transmission of an entire DATA Frame (i.e. after the last bit is transmitted). (b) What the smallest value of T O that the client should use? [2 marks] Assume instead of using the smallest value of T O, the client uses T O = 200 µs. Also, assume you determine that 85% of new frames transmitted will be delivered successfully to the AP, 0% of new frames transmitted will be lost and require a single retransmission, and 5% of new frames transmitted will be lost and the first retransmission will also be lost (but the second retransmission will not be lost). (c) If the client has a large amount of data to send to the AP, and there are no other devices nearby transmitting (e.g. no interference), then what is the maximum throughput that can be achieved? [4 marks] Introduction to Data Communications 5

16 Now consider a path from the client (e.g. laptop) to a web server, that goes via the AP, and then via several other links. The ARQ mechanisms on the links often ensure data is eventually successfully delivered across each link. Assume that after applying the ARQ scheme on each link in the path, every DATA frame is successfully delivered across each link. TCP is used on the client and server, and uses a Go-Back-N ARQ mechanism. (d) Explain why, even if the link ARQ mechanisms are successful, it is still important to use ARQ in TCP. [ marks] (e) Explain how Go-Back-N and Selective-Reject operate differently when after the source sends a window of frames, one of those frames is lost. [ marks] (f) What is an advantage of Go-Back-N (when compared to Selective-Reject)? [ mark] Introduction to Data Communications 6

17 Question 7 [6 marks] A sliding window protocol is used over an error free link, with a window size of 5 data frames. Each data frame has a transmission delay of 000 µs, and the header is 0% of the total size (the remaining 90% of the data frame is payload, i.e. real user data). ACK transmission time is 0 µs, while the link propagation delay is 8 ms (that is, milliseconds). Assuming the source always has data to send, what is the maximum efficiency, expressed as a percentage, that can be achieved in delivering user data across the link? Introduction to Data Communications 7

18 Question 8 [6 marks] You are testing the performance of an Ethernet link using a web browser on computer A (IP...) and a web server on computer B (IP...2). Computer A and B are connected directly via the single Ethernet link, which is configured to only use data rate of 00 Mb/s. The web server has a set of files on it for testing purposes: K.html, 2K.html, 00K.html and 00G.html. The contents of the files are not important, however the size of the file is given in the name. For example, K.html is exactly 000 Bytes in length. Every HTTP request sent by the browser is 00 Bytes of header only (no data). Every HTTP response sent by the server is 00 Bytes of header plus the requested file as data. Assume the processing, queueing and propagation delays are 0. (a) If you use the URL in the browser on computer A, what is the round trip time (also called application response time)? [3 marks] (b) If you use the URL in the browser on computer A, what is the application throughput for the download from server to browser? You may ignore any overhead due to TCP error or flow control (e.g. ACKs). [3 marks] Introduction to Data Communications 8

19 Reference Material Selected well-known ports: FTP 20 and 2 SSH 22 Telnet 23 SMTP 25 DNS 53 HTTP 80 HTTPS Bytes Version HLength DiffServ ECN Total Length Identification Flags Fragment Offset Time To Live Protocol Header Checksum Source IP Address Destination IP Address Options + Padding (optional) Data Figure 4: IP Datagram Format. Flags: Reserved, Don t Fragment, More Fragments 20 Bytes Source Port Destination Port Sequence Number Acknowledgement Number HLength Reserved Flags Advertised Window Checksum Urgent Pointer Options + Padding (optional) Data Figure 5: TCP Segment Format. Flags: CWR, ECE, URG, ACK, PSH, RST, SYN, FIN Introduction to Data Communications 9

20 Bytes Source Port Total Length Destination Port Checksum Data Figure 6: UDP Datagram Format 46 to 6 Bytes 6 Bytes 2 Bytes 500 Bytes 4 Bytes Destination Address Source Address Ether Type Data CRC Checksum Figure 7: Ethernet Frame Format Selected Protocol numbers: ICMP 6 TCP 7 UDP Introduction to Data Communications 20

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2006 Course Title : ITS 413 Internet Technologies and Applications

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

ITS323: Introduction to Data Communications

ITS323: Introduction to Data Communications ITS323: Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 ITS323Y12S1L13, Steve/Courses/2012/s1/its323/lectures/transport.tex,

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

ECE 358 Project 3 Encapsulation and Network Utilities

ECE 358 Project 3 Encapsulation and Network Utilities ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities

More information

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

05 Transmission Control Protocol (TCP)

05 Transmission Control Protocol (TCP) SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis Introduction to Internet Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis What about inter-networks communications? Between LANs? Ethernet?? Ethernet Example Similarities and Differences between

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

Network Technology 1 5th - Transport Protocol. Mario Lombardo -

Network Technology 1 5th - Transport Protocol. Mario Lombardo - Network Technology 1 5th - Transport Protocol Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 overview Transport Protocol Layer realizes process to process communication data unit is called a

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

The Transport Layer. Part 1

The Transport Layer. Part 1 The Transport Layer Part 1 2 OVERVIEW Part 1 User Datagram Protocol Transmission Control Protocol ARQ protocols Part 2 TCP congestion control Mowgli XTP SCTP WAP 3 Transport Layer Protocols Connect applications

More information

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security TCP/IP Networks with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 Critical

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

1. (10 points): For each of the following, choose exactly one best answer.

1. (10 points): For each of the following, choose exactly one best answer. IS 450/650 Final Exam Martens 20 December 2010 Answer all twelve questions. Write your name on the first sheet. Short answers are better than long ones. No electronics. 1. (10 points): For each of the

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Networking Background

Networking Background Networking Background CMSC 414 October 30, 2017 General Overview We are going to take a quick look at What a network protocol is The abstract design of the network The 7-Layer network stack Protocols We

More information

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005 Transport Layer For a connection on a host (single IP address), there exist many entry points through which there may be many-to-many connections. These are called ports. A port is a 16-bit number used

More information

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

TCP/IP Networking Basics

TCP/IP Networking Basics TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP

More information

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Computer Networks 19 December 2014 This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points. Mark every page with name and student number. Use of books, additional course

More information

CSC 634: Networks Programming

CSC 634: Networks Programming CSC 634: Networks Programming Lecture 03: Review of Basic Networking Concepts (TCP/UDP) Instructor: Haidar M. Harmanani Recap 7-Layer OSI Model 7 6 5 4 3 2 1 Application Presentation (kinds of compression)

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2010 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: B Calculator: Type 2 There are a total of 10 problems.

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2017 18 Coordinator

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 5 TCP/IP suite, TCP and UDP Protocols 1 TCP/IP Suite: Application layer protocols TCP/IP Suite set of protocols with layers for the Internet TCP/IP communication 5 layers: L7, L4, L3, L2 and L1

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions Network+ Guide to Networks, 6 th Edition Solutions 2 1 Network+ Guide to Networks, 6 th Edition Chapter 2 Solutions Review Questions 1. Your supervisor has asked you to correct several cable management

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2016 17 Coordinator

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

CSCI Networking Name:

CSCI Networking Name: CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

FINAL Tuesday, 20 th May 2008

FINAL Tuesday, 20 th May 2008 Data Communication & Networks FINAL Exam (Spring 2008) Page 1 / 23 Data Communication & Networks Spring 2008 Semester FINAL Tuesday, 20 th May 2008 Total Time: 180 Minutes Total Marks: 100 Roll Number

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information