Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking. Date: 02 June 2009 at 14:00 19:00

Size: px
Start display at page:

Download "Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking. Date: 02 June 2009 at 14:00 19:00"

Transcription

1 Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking Date: 02 June 2009 at 14:00 19:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or calculators! b) You may answer questions in English or in Swedish. c) Please answer each question on a separate page. d) Please write concise answers! e) Put a mark in the table on the cover page for each question you have addressed. f) The grading of the exam will be completed no later than 24 June g) After grading, the exams will be available for inspection at STEX (Q-building, for EP2120) and at the CSC student expedition (for DD2392). h) Deadline for written complaints is 28 August 2009 i) Course responsible DD2392 is Olof Hagsand, phone j) Course responsible EP2120 is György Dán, phone Important note! Your grade is F in any of these two cases: - You do not obtain at least 15 (fifteen) points out of 20 for problems You do not obtain at least 30 (thirty) points in total. We advise you to start with problems 1-4.

2 Part one (Problems 1-4) 1. IP addressing and IP header (5p) You would like to connect to a public WiFi hotspot, but for some reason DHCP does not seem to work, so you can not obtain IP address, netmask, etc. You start WireShark to capture the traffic on the WLAN. The lowest IP address you observe in any packet is and the highest IP address is Based on this information you try to manually configure an IP address, default gateway, and netmask for the wireless network interface. a) What is the longest prefix length that you should consider? What is the corresponding netmask? (1p) The prefix length should be /22 or shorter, the corresponding netmask is b) Give the network address of the subnet in CIDR notation! What could be a reasonable guess for the default gateway? (1p) The network address is /22. The default gateway could be , but you cannot be sure of this. c) What is the directed broadcast address of the subnet? (1p) d) Assume that you have configured the netmask and the default gateway, and by pure luck you configured your computer to use an IP address that is not in use by any other computer. You start your favorite browser, and try to access Will your browser be able to download the requested page? Almost certainly not. You do not have a name server configured. e) In IPv4 there is a header checksum field in the base header. Why was this field not included in the IPv6 based header? (1p) Since the checksum covers the TTL field in IPv4, the checksum has to be recalculated at every router. Apart from this, layer 2 protocols provide frame level error checking and correction, so the layer 3 error checking is to some extent redundant. 2. Delivery and address resolution (5p) a) How does a host determine whether a destination (given with its IP address) is located on the local subnet? (1p) The host performs a bitwise AND of its IP address and its netmask, then a bitwise and of the destination IP address and its netmask. If the two results are equal, then the destination host is on the local subnet. b) Consider that a router attempts to forward a datagram to the next hop based on the destination address , but can not find a matching entry. What does the router do? Would it make a difference if the destination address of the packet was ? (1p) The router will send an ICMP destination network unreachable message to the sender. The second datagram is destined to a multicast address, so no ICMP message will be sent. The datagram will be discarded in both cases. Consider the following IPv4 network consisting of 2 bridges and 1 router. Hosts H 1 to H 6 have one interface each. B 1 and B 2 are learning bridges. R 1 is a router with an appropriate routing table. Host H 3, bridges B 1 and B 2 and the North interface of R 1 are in the same Ethernet collision domain. All ARP caches and the bridges learning tables are empty. Assume that ARP snooping is used. Logical (IP) addresses are represented by capital letters, physical (MAC) addresses are represented by small letters. Please refer to these letters in your solutions.

3 H A B 1 a B 1 b H 2 H 3 C c H h B 2 D d H E G I F 5 H e g R 6 1 i f c) A process on Host H 5 sends 100 bytes via UDP to a process on host H 1. Show the contents of the learning tables and the ARP caches after the packet has been delivered. Assume that the process on Host H 5 knows the IP address of Host H 1. (1p) H5: g-g H1,H2,H4:h-H H3:h-H R1: e-e, a-a B2: h-west, a- West B1:h-South, a-west d) A process on Host H 1 sends 100 bytes via UDP to a process on host H 3. Assume that the process on Host H 1 knows the IP address of Host H 3. Show the new contents of the ARP caches and the learning tables. (1p) H1: c-c H3: a-a B2:c-West B1:c-South H2,H4: a-a e) A process on Host H 1 sends 100 bytes via UDP to a process on host H 6. Assume that the process on Host H 1 knows the IP address of Host H 6. Show the new contents of the ARP caches and the learning tables. (1p) R1:f-F H6:i-I 3. IP forwarding (5p) a) Which fields of the IPv6 base header have to be updated by a router upon forwarding a datagram? (1p) The Hop Limit field. H 4

4 A router has the IPv4 forwarding table shown below. Determine the next-hop address and the outgoing interface for the packets arriving to the router with destination addresses as given in points (b)-(e). Destination Next hop Flags Interface /19 - U m /21 - U m /23 - U m /24 - U m / UG m / UG m / UG m / UG m0 b) (1p) on m0 (default route) c) (1p) on m3 d) (1p) on m1 e) (1p) on m3 (direct delivery) 4. TCP (5p) a) What is the purpose of flow control in TCP? (1p) The purpose of TCP flow control is to make sure that the sender does not overwhelm the receiver with data... b) What is the silly window syndrome? How can it occur? What mechanisms does TCP have to combat the silly window syndrome? (2p) In general: small amounts of data (tinygrams) are sent. There are two kinds: receiver driven and sender driven. Receiver driven: slow receiver application, and hence receiver TCP announces very small rcwnd sizes. Solution: Clarke s solution (do not announce less than rcwnd/2) Sender driven: sender application generates data in small chunks, and hence sender TCP sends small amounts of data in the segments. Solution: Nagle s algorithm (there cannot be more than one outstanding tinygram in the network) c) Explain the role of the TIME_WAIT timer in TCP connection teardown. (1p) Consider two TCP sockets A and B. During connection termination A sends a FIN segment to B, which is acknowledged by B. The acknowledgement can however get lost, in which case A will resend the FIN segment after the RTO. The retransmitted FIN segment should be acknowledged by B again. Hence, after acknowledging the FIN segment, B has to keep on listening (is in a TIME_WAIT state). In case the FIN segment is resent by A, it has to acknowledge the segment again. B will stay in TIME_WAIT state until the TIME_WAIT timer exceeds, then it closes the socket. The TIME_WAIT timer expires after some OS dependent amount of time, typically in the order of minutes. d) The original TCP congestion control decreases the congestion window size to 1 MSS whenever a retransmission timeout occurred and it enters slow start. How did this change with the introduction of fast recovery? When is fast recovery applicable and how does it relate to fast retransmit? (1p) With fast recovery congestion control does not enter slow start if the sender receives 3 duplicates ACKs, but it retransmits the missing segments (it assumes that the missing segment was not lost due to congestion because three subsequent packets arrived) and then sets the

5 congestion window to half the original congestion window size + the number of duplicate ACKs x MSS this is the inflation. The CWND is deinflated once the missing segment is ACKed.This should happen before the RTO elapses: if the timeout occurs then congestion control enters slow start (fast recovery is not used). Fast retransmit is the act of retransmitting the missing segment after three duplicate ACKs, so the two are tightly coupled. Part two (Problems 5-12) 5. UDP and fragmentation (5p) a) What is the purpose of the IPv6 fragmentation extension header? What fields does it contain and what for? Is there an IPv4 option header that serves the same purpose? (1p) The base IPv6 does not contain fields for fragmentation. If the sender would like to fragment a datagram it inserts the FEH. The FEH will carry the fragment offset, the MF bit and the fragment identification. There is no option header in IPv4 for this purpose, because in IPv4 fragmentation information is carried in the base header (fragmentation offset, DF, MF) b) Why do routers not perform reassembly in IPv4? Give two reasons! (1p) (i) The fragments of a datagram do not have to traverse the same path, hence a router might not receive all fragments.(ii) the datagram might need to be fragmented again upon arriving to another link with a small MTU. (iii) reassembly is resource intensive (memory + timers), it would load the routers. c) An application wants to transmit 2940 bytes of data via UDP from host A to host B. Path MTU recovery reports a path MTU of 1700 bytes. The UDP header is 8 bytes long. The MTU of the first link is 2500 bytes, the MTU of the second link is 1700 bytes, the MTU of the third link is 3000 bytes. The network layer protocol is IPv6. How many IP fragments will be sent by host A? Give the segment sizes, the fragmentation offset and the more fragments (MF) bit of all fragments. (The IPv6 fragmentation extension header is 8 bytes long.) (2p) Total amount of data to be sent is =2948 bytes. 40 bytes IPv6 base header, 8 bytes FEH = 48 bytes of IP header in every packet. The maximum amount of payload is 1652 bytes, not divisible by 8 bytes. Host A sends two segments: (payload size, MF, offset in bytes) 1, 1648, 1, 0 2, 1300, 0, 1648 c) Name one transport layer protocol besides UDP and TCP, and briefly describe how it differs from UDP and TCP in terms of the services it provides. (1p).DCCP: provides congestion control but no flow control and reliability.. SCTP: packet based, provides congestion control and reliability, allows multiple streams to exist in the same connection, and supports multiple end-points on the same host (for multihomed hosts). 6. Application layer (5p) a) Describe the difference between the purpose of data encoding and the definition of data structures. Name one method of data encoding and one way of (standardized or de facto standard) data structure definition. (1p) Data encoding specifies the way data is represented for storage or transmission. One example is TLV encoding. The definition of a data structure describes the types of the data and the high level structuring. One example is ABNF.

6 b) FTP can operate in passive or in active mode to transfer a file. What are these two modes, and in which case is one preferred over the other? (1p) Active mode is when it is the server that establishes the data connection (i.e., the server issues an active open). Passive mode is when it is the client that establishes the data connection (i.e., the server issues a passive open).passive mode is preferred if the client is behind a NAT box or a firewall. c) What is the purpose of a mail transfer agent (MTA)? What entities (related to mail delivery) does an MTA communicate with? What application layer protocols does an MTA typically implement? What do these protocols serve for? (1p) An MTA should support SMTP to receive mail from a UA, and to communicate with other MTAs. It should also support a mail access protocol (MAP) such as IMAP or POPv4 so that the UA can access the mail. d) What is the purpose of the real-time streaming protocol (RTSP)? Name one command used by RTSP. (1p) RTSP is used to control the transmission of streaming data. It enables interactivity, as it allows for starting, pausing, seeking, and resuming the streaming of the data from a server. The most important messages are SETUP, PLAY, PAUSE, TEARDOWN. e) What is delay jitter? How does delay jitter affect the performance of TCP? (1p) Delay jitter is the variation of the one way transmission delay between two hosts. The one way delay influences the arrival process of the acknowledgements from the receiver to the sender. If the delay jitter is high, the RTO will be increased (because of the increase of RTTvar). In case of a packet loss, it will take more time for a retransmission to happen. If jitter happens in spikes then jitter can lead to unnecessary retransmissions (i.e., RTO is too small,expires even though an acknowledgement is already on the way.) 7. DNS (5p) The following is an example of a zone file for bind used in the lab course: $ORIGIN example.com $TTL IN SOA dns1.example.com. hostmaster.example.com. ( ) IN NS dns.example.com. IN MX 20 mail1.example.com. IN A server IN A dns IN A ftp IN CNAME server mail IN CNAME server mail2 IN CNAME server www IN CNAME server Answer the following questions: a) Explain all resource record types appearing in the zone file. (2p) SOA - Start of Authority: Describes a zone

7 NS - Name of nameserver for name/ zone MX - name of mail-server for name /zone A - Gives IPv4 address of name. CNAME - Provides an alias to a (canonical) name. Above, server is canonical name with many aliases. b) Propose an extra record enabling IPv6 access of example.com's web service. (1p) http IN AAAA 2001::1, for example. c) What is the difference between a DNS zone and a DNS domain? Use example.com as an example. (1p) DNS uses a hierarchical name space, where all names are organized in a tree structure. A domain is a sub-tree in the domain space, i.e., all nodes under a given point in the domain structure. A zone is a unit of delegation in the name space, a contiguous part of the tree. If no further delegations are made, a zone and a domain is the same thing. But if further delegations within a domain has been made, the zone is the domain minus the sub-zone within it. A zone can therefore be seen as a sub-tree with pruned branches. d) What is the difference between an authoritative ( advertizing ) nameserver and a resolving nameserver? (1p) A resolving nameserver performs recursive lookups on behalf of clients. It caches results that can be re-used by other client lookups. An authoritative nameserver s authoritative for a zone and answers on iterative requests from resolving nameservers. 8. Routing 1 (10p) A newstarted operator in the Internet business has 40 small customers and 5 large customers. It buys transit access with two upstream providers. It runs a link-state routing protocol as IGP (Interior Gateway Protocol) and BGP (Border Gateway Protocol) toward its upstream providers. The operator has obtained the prefix block /19 from a local internet registry. It uses a separate block /24 for its own core addressing. a) The 40 small customers require 50 addresses each, and the 5 large customers require 200 addresses each. Propose an address assignment that is both minimal (not larger address block than necessary) and has potential for future growth. (Every block should be possible to expand without renumbering: it should be possible to assign to any customer a single new block that contains twice as many addresses as the original block. The old block should be a subset of the new block.) (3p) The address block is: For the small customers a /26 is minimal since it has 64 addresses. Every small customer can have one such block each, and a /26 block is left as a hole between each to be extendible: /26, /26, /26, /26,..., /26, /26. Every large customer will get a /24 since it corresponds to 256 addresses. Leaving a block for extensibility gives: /24, /24, /24, /24, and /24. b) The operator aggregates its prefixes and announces the single aggregated route /19 to its both transit providers. What benefits does route aggregation have? (1p) Fewer routes leads to smaller routing and forwarding tables which leads to less control traffic, faster table lookups and faster convergence. And sometimes faster forwarding (if in sw)..

8 c) The announcement of the aggregated route causes black-holing of some prefixes (prefixes not allocated). In your example from exercise (a), which prefixes are black-holed, and what happens to traffic sent from a remote source to such a destination? (1p) In this example, the prefixes /26, /26,..., /26, /26., /24, /24, /24, /24, /24, /24 are black-holed. Traffic to these destinations are dropped (ICMP unreachables can be sent). d) The operator uses equal-cost multipath in its network. What is equal cost multipath? Does OSPF, for example, support it? (1p) Equal-cost multipath is when more than one route is computed to a destination with equal metrics. Yes, OSPF supports equal-cost multipath, so do most routing protocols. e) The operator connects to an Internet exchange point to peer with similar operators? How does this differ from a transit or customer relation and why is this common among operators? (1p) Peering is usually done without charges (except for equipment) and the two peers exchange customer traffic only. That is, no transit traffic passes through the peering. f) May asymmetric routing appear in the operator network shown? Why/why not? (1p) Yes. Asymmetric routing can appear in many places. For example, since the operator is multihomed (it uses two backbone providers) a packet sent to a destination via one transit operator may in its return path (the answer to the original packet) choose the other operator. And thus the path to a destination differs from the path from the destination. Asymmetric routing may also appear internally in the operator, or between the operator and one of its customers/peering partners/transit operators if they have nore than one peering point. g) The operator decides to load balance its incoming traffic from its two transit providers for economic reasons. More specifically, it wants to receive more traffic from one than the other. Propose a method with which the provider can do this. Point out any potential disadvantage with your method.(2p) Most common method is to announce different prefixes to the different transit operators. But the drawback is that the aggregation is destroyed. 9. VPNs, security, NAT(5p) a) What is the difference between a private network and a virtual private network (VPN)? Name one significant reason (from a technological perspective) why it is more difficult to construct a VPN than a private network. A VPN uses a common network infrastructure (such as the Internet or a provider network) which it shares with other networks. A Private network on the other hand is completely isolated. Technological challenges include addressing (separating private addressing), security (eg privacy). b) Name two examples of address spoofing in two different protocols and its potential effects? (1p) Rewriting of protocol header fields, typically (source) addresses. Examples: arp spoofing - causes redirection of IP traffic, DNS spoofing may cause cache poisoning. Many other examples available. c) Give two examples of how denial of service attacks may be caused using two different (IPbased) protocols? (1p) Many examples. Including TCP syn flood.

9 d) Explain why NAT (Network Address Translation) causes many IP based services and applications to stop working? (2p) Difficult to communicate between two computers behind different NATs. Also difficult to access computers behind a NAT. Port forwarding can be used by manual configuration, but port forwarding can only be done to one computer (per port). Also NAT rewrites header fields but may not change inner headers or payload fields making third-party references invalid. 10. Multicast (5p) Please answer the following questions: a) How are IPv4 multicast packets mapped to Ethernet multicast frames?(1p) IPv4 packets are mapped to Ethernet frames by prepending the first 25 bits of the well-known 01:00:5E:00:00:00 MAC IP multicast address prefix with the 23 least significant bits of the IPv4 multicast address. b) What is the limitation of this mapping and what consequences does this limitation have (on end-hosts)? (1p) IPv4 multicast addresses are class D addresses with 28 significant bits. But since only 23 bits are used in the Ethernet frame, the mapping is not one-to-one, so that all IPv4 multicast addresses differing in their five most significant bits maps into a single Ethernet address. This means that if a host joins a single multicast group, traffic to other groups mapping to the same Ethernet address may be delivered to the host IP stack. The host must therefore filter this itself in upper layers (IP layers) most often in software. c) What is RPF (Reverse Path Forwarding) and why is it often used in multicast forwarding?(1p) RPF makes a regular unicast lookup but uses the source address instead of the destination. Multicast forwarding uses RPF in its flooding algorithm: only packets received on the interface matching the RPF lookup are forwarded. d) What are the differences between a group shared tree and source based tree in multicast protocols such as PIM-SM (Protocol-Independent Multicast - Sparse Mode)? Compare advantages and disadvantages.(1p) A group-shared tree is a single tree (in a domain) built for delivery of multicast traffic from a single point in the network to the set of receivers of a group. A source-based tree is a separate tree for every sender (and group). Source-based trees are more efficient in terms of forwarding metric, while group-shared tree are more efficient in terms of forwarding state. A drawback with group-shared trees are that senders need amechanism to send their traffic to the tree. A drawback with source-based trees is usually that senders and receivers need a way to synchronize. e) What is a rendezvous point (RP) in PIM-SM? What is its role from a protocol perspective? (1p) It is a central point in the network for all or a set of multicast groups from where the groupshared trees are built. Its role is to act as a synchronization point where receivers and senders meet : Senders (or actually the DR of the sender) register with the RP, while receivers (their DR) sends a JOIN towards the RP. As soon as multicast packets from a new sender reaches the DR of a receiver, they are synchronized and a source-based tree may be built. 11. Mobile IP(5p) IP mobility is a proposed solution where a mobile node can visit other (foreign) networks and continue communicating with remote applications. Explain how mobile IP works, its architecture, protocol phases when a mobile node moves, and performance issues.

10 In mobile IP, the home agent is the router (or server) hosting the home address of the mobile node. When the mobile changes location, it registers its secondary addresses with the home agent, so that the home agent can forward datagrams using tunneling and the secondary address. Discovery: A mobile node uses a discovery procedure to identify home agents and foreign agents. Mobile discovery extends ICMP router advertisements and solicitations. Registration: A mobile node uses an authenticated registration procedure to inform its home agent of its care-of address. Registration uses a special application-level header and transports the registration information over UDP. The foreign agent may relay the registration to the home agent. Tunneling: Used by the home agent to forward IP-datagrams to a care-of address. Tunneling can use IP-in-IP tunnelling, GRE tunnelling or IPSec tunnelling. Two common performance inefficiencies in mobile IP are triangular delivery and dual crossing. In triangular delivery, packet delivery is done between three points: from the remote host (R) to the home agent (H) to the mobile node (M) and back to the remote host (R). Dual crossing is an extreme case of riangular delivery when M and R are close (network-wise) but H is far away: Packets will then travel twice over the same network path to the remote place H.

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4!

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4! Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking Date: 10 March 2009 at 8:00 13:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or

More information

Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking. Date: 10 January 2011 at 14:00 18:00

Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking. Date: 10 January 2011 at 14:00 18:00 Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking Date: 10 January 2011 at 14:00 18:00 a) No help material is allowed - You are not allowed to use dictionaries, books,

More information

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS 1. IP and addressing (5p) a) Your company would like to have all its 511

More information

Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking. Date: 27 October 2015 at 14:00 18:00

Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking. Date: 27 October 2015 at 14:00 18:00 Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking Date: 27 October 2015 at 14:00 18:00 a) No help material is allowed - You are not allowed to use dictionaries, books,

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Examination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC. Date: 20 May :00 19:00 SOLUTIONS

Examination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC. Date: 20 May :00 19:00 SOLUTIONS Examination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC Date: 20 May 2009 14:00 19:00 SOLUTIONS a) No help material is allowed - You are not allowed to use books

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS 1. IP Addressing? (5p) There are ten nodes connected to your network: a

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Date: June 4 th a t 1 4:00 1 7:00

Date: June 4 th a t 1 4:00 1 7:00 Kommunika tionssyste m FK, Examina tion G 5 0 7 Date: June 4 th 0 0 3 a t 4:00 7:00 KTH/IMIT/LCN No help material is allowed. You may answer questions in English or Swedish. Please answer each question

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management CSE/EE 461 Lecture 13 Connections and Fragmentation Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2 TCP Connection Management Setup assymetric 3-way handshake Transfer sliding window; data and

More information

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

CSCI-1680 Network Layer: IP & Forwarding John Jannotti CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

Acknowledgments. Part One - Introduction to the TCP/IP Protocol

Acknowledgments. Part One - Introduction to the TCP/IP Protocol Illustrated TCP/IP by Matthew G. Naugle Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471196568 Pub Date: 11/01/98 Acknowledgments Part One - Introduction to the TCP/IP Protocol Chapter 1 -

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:

More information

Internet Technology 3/23/2016

Internet Technology 3/23/2016 Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks... Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

9th Slide Set Computer Networks

9th Slide Set Computer Networks Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

Closed book. Closed notes. No electronic device.

Closed book. Closed notes. No electronic device. 414-S17 (Shankar) Exam 3 PRACTICE PROBLEMS Page 1/6 Closed book. Closed notes. No electronic device. 1. Anonymity Sender k-anonymity Receiver k-anonymity Authoritative nameserver Autonomous system BGP

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

SYED AMMAL ENGINEERING COLLEGE

SYED AMMAL ENGINEERING COLLEGE QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

L10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L10: Simple Internetworking Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

QUIZ: Longest Matching Prefix

QUIZ: Longest Matching Prefix QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22

More information

C14a: Internetworks and The Internet

C14a: Internetworks and The Internet CISC 7332X T6 C14a: Internetworks and The Internet Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

ipv6 mobile home-agent (global configuration)

ipv6 mobile home-agent (global configuration) ipv6 mobile home-agent (global configuration) ipv6 mobile home-agent (global configuration) To enter home agent configuration mode, use the ipv6 mobile home-agent command in global configuration mode.

More information

cs144 Midterm Review Fall 2010

cs144 Midterm Review Fall 2010 cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)

More information

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Instructor: Nicholas DeMarinis

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Instructor: Nicholas DeMarinis CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Instructor: Nicholas DeMarinis Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia IP out today. Your job:

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray CS 457 Networking and the Internet Fall 2016 Indrajit Ray Problems Earlier we saw how to connect one node to another, or to an existing network. How do we build networks of global scale? How do we interconnect

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Lecture 11: IP routing, IP protocols

Lecture 11: IP routing, IP protocols Lecture 11: IP routing, IP protocols Contents Routing principles Local datagram delivery ICMP Protocol UDP Protocol TCP/IP Protocol Assuring requirements for streaming TPC Building and terminating TCP

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

IPv6 Bootcamp Course (5 Days)

IPv6 Bootcamp Course (5 Days) IPv6 Bootcamp Course (5 Days) Course Description: This intermediate - advanced, hands-on course covers pertinent topics needed for IPv6 migration and deployment strategies. IPv6 novices can expect to gain

More information