The Norwegian text is authoritative, this translation is provided for your convenience.
|
|
- Jesse Wells
- 6 years ago
- Views:
Transcription
1 Contents 1 INF3190 Home exam 2 in English Formalities Exercise Details You shall deliver the following: Regarding the points allocation: Specific code requirements Oracle sessions and admin queries Deliverable Electronic delivery INF3190 Home exam 2 in English The Norwegian text is authoritative, this translation is provided for your convenience. 1.1 Formalities Graded assignment worth approx 20% of final grade. Must be completed individually. Evaluated according to how well the requirements listed under "Exercise" are fulfilled. 1.2 Exercise The goal of the exercise is to implement MIPTP, a transport protocol for reliable data transfer over MIP, and a simple application that uses MIPTP. MIPTP is based on the oblig; if you have implemented home exam 1, it should automatically be possible to send data between any pair of hosts using MIPTP. Without home exam 1 MIPTP only works between directly connected neighbours. That s fine, but perhaps a bit boring :) You shall write three programs: 1. A transport daemon, which runs permanently on all hosts. This daemon can: Receive data, a port number and a destination MIP address over IPC using a Unix-domain socket from an application running on the same physical host (using socket functions such as send/recv). The daemon adds a header to the data and sends the entire 1
2 MIPTP packet through its local MIP daemon to the MIPTP daemon running on the destination host. Receive MIPTP packets from the MIP daemon and pass data on to an application listening on a local Unix-domain socket via blocking recv (or similar). Packets are ignored ("dropped") if there is no application waiting for data from the network. The port numbers discriminate between several applications on the same host. For simplicity s sake we will assume that source and destination applications use the same port number for a given transfer. The transport daemon is given a timeout value in seconds as a command line argument. If the transport daemon is run in debug mode (also a CLI argument), each communication event is to be logged to the console along with relevant status information (packets sent/received, current window sizes, etc.) 2. A file transfer server, that receives files over IPC from its local MIPTP daemon and writes them to the filesystem with incremental filenames (e.g. receivedfile1, receivedfile2,... ). Each transfer starts with two bytes that contain the size of the file. One port number that the server will listen on is specified as a command line argument. NB: the port number used by the server must match that of the client. This means listening on two ports enables the reception of two files simultaneously. The file transfer server shall not communicate directly with the MIP daemon, only with the MIPTP daemon. 3. A file transfer client, that reads a file from the filesystem and sends the size of file in bytes (max ) as a two byte long message followed by the actual file (over IPC to the local MIPTP daemon, which sends it along). The filename, destination MIP address and port number are specified as command line arguments. The file transfer client shall not communicate directly with the MIP daemon, only with the MIPTP daemon. It must be possible to transfer to files from the same source host to the same destination host simulatenously using two clients and server instances Details The MIPTP daemon prepends the MIPTP header before data is sent over the network. The header contains two "Padding Length" (PL) bits, a port 2
3 number and a packet sequence number. The MIPTP header looks like so: The header is in big endian format, just like everything else in MIPTP (and MIP). If a MIPTP packet contains no data, then it is only an acknowledgement packet ("ACK"). It asserts having received all packets up to the specified sequence number. "Payload Length" in the MIP header of an ACK packet has the value 1. Since the largest possible packet that can be sent over Ethernet has the length 1500 bytes, the largest possible data payload that can be sent in a MIPTP packet is 1492 bytes (1500 minus the length of MIP and MIPTP headers). The length of the MIPTP payload in bytes can be computed using the value specified in the MIP "payload length" header field: it is (MIP payloadlength - 1) * 4. Example: a packet of total length 16 bytes (including 4 bytes MIP header and 4 bytes MIPTP header) has a MIP payload length value of 3, and contains (3-1) * 4 = 8 bytes of data after the MIPTP header. Since the length of all MIP packets must be divisible by 4, problems can arise if the length of the MIPTP payload does not result in such a packet. If the size of the payload is not divisible with 4, one must add 1, 2 or 3 bytes at the end of the packet that are not really part of the payload. These bytes are zeroed and are called "padding". The PL field (2 bits) contains the length of padding in the packet. For example, a 16 byte packet that contains only 5 bytes of payload data contains 8 bytes following the headers. Of these 8, the last three are "padding". They are to be zeroed, and the value of the PL field shall be 3 (binary 11). A MIPTP sender implements the Go-Back-N strategy using a fixed window size of 10 packets to transfer data. The sequence numbers represent packets, i.e. packet 1 is numbered 0, packet 2 is numbered 1 and so on. If no ACK packet is received within a given time out, all packets that have not previously been acknowledged are assumed to be lost and they are retransmitted. A MIPTP receiver passes on data in order to the application listening on the port specified in the packet header. If packets arrive at the MIPTP daemon in the wrong order, this signifies packet loss or reordering in the 3
4 network. The MIPTP receiver shall in such cases not acknowledge anyting and may discard these packets. NB: it is possible that the operating system may reorder packets when sending in rapid succession. This can be avoided by waiting a short while (e.g. 10ms) using sleep in between each packet transmission You shall deliver the following: 1. A design document containing: A cover page stating your candidate number, title of the exercise, course code and semester. We must not receive names or usernames. Detailed answers to the following questions: What problem occurs in case two files are sent simultaneously from two different sources to the same destination using port 30? Why? How can this problem be solved? How is the problem solved on the Internet, e.g. with respect to a web server which listens on the same port (80) irrespective of where connections are coming from? How can the time out value be computed automatically, so that it need not be specified as a command line argument? How the program is designed. Preferably a (flow) diagram demonstrating the order of execution. Documentation of how to run and stop the programs. A list of source files. Any other peculiarities. 2. The source code, commented as necessary, as well as a README file briefly documenting how to run the programs. Document all variables and definitions. For each function in the program, document the following: What the function does What in and out parameters mean and are used for Which global variables the function modifies What the function returns 4
5 1.2.3 Regarding the points allocation: No points will be awarded for oblig code that is to be reused as is (i.e. the ping applications). Bonus points: It is not very efficient that the receiver drops packets that arrive in the wrong order. Bonus points will be awarded if rather than dropping them, the receiver instead inserts such packets in the appropriate position within a receive buffe. Further bonus points will be awarded if this is combined with a Selective Repeat mechanism instead of Go-Back-N to improve the performance of the system Specific code requirements Your code shall be compiled and tested on the same VM as used in the oblig Oracle sessions and admin queries Check the FAQ, ask on Piazza and make good use of the oracles. Admin queries go to inf3190-admin@ifi.uio.no 1.3 Deliverable The design document shall be edited using some appropriate tools, e.g. L A TEX, OpenOffice, Word, etc. The document must contain all required details, as well as the cover page. Before delivery the document must be converted to PDF format. The document does not necessarily need to be long, but must contain sufficient information to fulfill the requirements described in the "exercise" section above. What matters is to document understanding of the themes the assignment touches on, in addition to the actual execution. We expect a clean and structured document. 1.4 Electronic delivery Exams are anonymous. Use the idchecker.sh script to scan for your name and username. The entire deliverable should be handed in electronically. Collect all files (Makefile, source code, README, design doc, etc) in a one directory named 5
6 after your candidate number. Compress the directory into a tarball and submit it on Devilry. We recommend you download your delivery and test that it contains the correct files and generally is functional. You should also deliver drafts in good time before the deadline in case of last minute technical issues or mistakes. Delivery deadline: Friday April 27Th, 23:59. This is a hard deadline, any delivery made later will be given the grade F, fail. Self-reported sick leave is not admissible. You are expected to read and understand the UiO exam rules. 6
INF3190 Mandatory Assignment:
INF3190 Mandatory Assignment: Formally: This assignment must be completed individually. The submission must be approved prior to submission of the Home Exam 1. To pass the submission must meet the requirements
More informationProject 1. 1 Introduction. October 4, Spec version: 0.1 Due Date: Friday, November 1st, General Instructions
Project 1 October 4, 2013 Spec version: 0.1 Due Date: Friday, November 1st, 2013 1 Introduction The sliding window protocol (SWP) is one of the most well-known algorithms in computer networking. SWP is
More informationCS 450 Introduction to Networking Spring 2014 Homework Assignment 1 File Transfer and Data Bandwidth Analysis Tool
CS 450 Introduction to Networking Spring 2014 Homework Assignment 1 File Transfer and Data Bandwidth Analysis Tool Due: Monday 17 February. Electronic copy due at 10:30 A.M., Optional paper copy may be
More informationBasic Reliable Transport Protocols
Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they
More informationTHE UNIVERSITY OF NEW SOUTH WALES
Name of Candidate: Student ID: Signature: THE UNIVERSITY OF NEW SOUTH WALES COMP3331/93331 Computer Networks and Applications Sample Mid-session Examination INSTRUCTIONS TO CANDIDATES: (1) Time allowed:
More informationTransport Protocols. Raj Jain. Washington University in St. Louis
Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features
More informationLab 1 - Reliable Data Transport Protocol
Lab 1 - Reliable Data Transport Protocol Handout: March 8, 2018 Deadline: March 18 23:00, 2018 (No extension) Assignment overview: In this assignment, you will be implementing the sending and receiving
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communications & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationComputer Communications and Networks (COMN), 2017/18, Semester 1
Computer Communications and Networks (COMN), 2017/18, Semester 1 Assignment Overview The overall goal of this assignment is to implement and evaluate different protocols for achieving end to end reliable
More informationProblem 7. Problem 8. Problem 9
Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate
More informationProject Introduction
Project 1 Assigned date: 10/01/2018 Due Date: 6pm, 10/29/2018 1. Introduction The sliding window protocol (SWP) is one of the most well-known algorithms in computer networking. SWP is used to ensure the
More informationELEC/TELE/PHTN Networked Communications Design Topic. Networked Communications Elective Topic, S Context and Objectives
ELEC/TELE/PHTN 4123 Networked Communications Elective Topic, S1 2017 created by Prof. D. Taubman updated 21 May 2018 Networked Communications Design Topic Context and Objectives The objective of this design
More informationc. If the sum contains a zero, the receiver knows there has been an error.
ENSC-37 Fall 27 Assignment#3 Due Date 6 Oct. 27 Problem-:[4] UDP and TCP use s complement for their checksums. Suppose you have the following three 8-bit bytes:,, and. a. [6] What is the s complement of
More informationProgramming Assignment 3
UNIVERSITY OF NEBRASKA AT OMAHA Computer Science 3550 Section 002 Communication Networks Spring 2018 Programming Assignment 3 Introduction Having created a TCP client in programming assignment 2, it s
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationETS110: Internet Protocol Routing Lab Assignment
Dept of Electrical and Information Technology 2010-10-13 Jens A Andersson vers 3.1 ETS110: Internet Protocol Routing Lab Assignment 1 Purpose and Goals This lab assignment will give a hands-on experience
More informationLab 2: Threads and Processes
CS333: Operating Systems Lab Lab 2: Threads and Processes Goal The goal of this lab is to get you comfortable with writing basic multi-process / multi-threaded applications, and understanding their performance.
More informationCS 640 Introduction to Computer Networks Spring 2009
CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,
More informationCMSC 417 Project Implementation of ATM Network Layer and Reliable ATM Adaptation Layer
CMSC 417 Project Implementation of ATM Network Layer and Reliable ATM Adaptation Layer 1. Introduction In this project you are required to implement an Asynchronous Transfer Mode (ATM) network layer and
More informationTelecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes
Internetworking Contents Overview Functions Issues Basic Delivery Unit Addressing Datagram Delivery ARP IPv4 Header Adapting Datagram Size Notes 2 Overview - Example 3 Direct Delivery 4 Indirect Delivery
More informationComputer Networks A Simple Network Analyzer Decoding Ethernet and IP headers
Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Objectives The main objective of this assignment is to gain an understanding of network activities and network packet formats
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationCOMP/ELEC 429/556 Project 2: Reliable File Transfer Protocol
COMP/ELEC 429/556 Project 2: Reliable File Transfer Protocol Assigned: Thu, 28 September Due: 11:55pm, Tue, 24 October 1 Description The objective of this project is to give you hands-on experience with
More informationPosition of IP and other network-layer protocols in TCP/IP protocol suite
Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,
More informationProject 2 Reliable Transport
Project 2 Reliable Transport UC Berkeley CS 168, Fall 2014 Version 1.0 Due: 11:59am (noon), November 2nd, 2014 In this project, you will build a simple reliable transport protocol, BEARS TP (BTP). Your
More informationCOMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B
More informationNetwork Model: Each layer has a specific function.
OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.
More informationfile:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...
1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
More informationDuke University CompSci 356 Midterm Spring 2016
Duke University CompSci 356 Midterm Spring 2016 Name (Print):, (Family name) (Given name) Student ID Number: Date of Exam: Feb 25, 2016 Time Period: 11:45am-1pm Number of Exam Pages: 15 (including this
More informationCS 421: Computer Networks SPRING MIDTERM I April 7, minutes
CS 421: Computer Networks SPRING 24 MIDTERM I April 7, 24 12 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 1 msec one-way propagation delay. We want to transfer a file of size 8
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationTFTP and FTP Basics BUPT/QMUL
TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer
More informationCS155: Computer Security Spring Project #1
CS155: Computer Security Spring 2018 Project #1 Due: Part 1: Thursday, April 12-11:59pm, Parts 2 and 3: Thursday, April 19-11:59pm. The goal of this assignment is to gain hands-on experience finding vulnerabilities
More informationOperating Systems and Networks Project 1: Reliable Transport
Spring Term 2016 Operating Systems and Networks Project 1: Reliable Transport Assigned on: 22 April 2016 Due by: 13 May 2016 1 Introduction In this project, your task is to implement a reliable sliding
More informationCS519: Computer Networks. Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing
: Computer Networks Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing Recall our protocol layers... ... and our protocol graph IP gets the packet to the host Really
More informationPROBLEMSAND EXERCISES
Departamento de Tecnología Electrónica Computer Networking Unit 3: Transport layer PROBLEMSAND EXERCISES Transport Layer 95 Pr1: port numbers Suppose that the client A initiates a TCP connection to a Web
More informationSpring 2006: Project # 3 Reliable Sliding-Window Transport
15-441 Spring 2006: Project # 3 Reliable Sliding-Window Transport Out: Monday, Mar 27th, 2006 Due: Friday, April 28, 2006, 11:59 pm Lead TA: Mike Cui 1 Introduction In the previous projects, you implemented
More informationProgramming Assignment 3: Transmission Control Protocol
CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationSchahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet?
Schahin Rajab sr2@kth.se 2016 04 20 TCP or QUIC Which protocol is most promising for the future of the internet? Table of contents 1 Introduction 3 2 Background 4 2.1 TCP 4 2.2 UDP 4 2.3 QUIC 4 2.4 HTTP
More information9th Slide Set Computer Networks
Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences
More informationSoupBinTCP for Nasdaq Nordic. Version August 21, 2015
SoupBinTCP for Nasdaq Nordic Version 3.00.2 August 21, 2015 Overview Confidentiality/Disclaimer Confidentiality/Disclaimer This specification is being forwarded to you strictly for informational purposes
More informationCSE 461: Computer Networks John Zahorjan Justin Chan Rajalakshmi Nandkumar CJ Park
CSE 461: Computer Networks John Zahorjan zahorjan@cs Justin Chan jucha@cs Rajalakshmi Nandkumar rajaln@cs CJ Park cjparkuw@cs Course Staff Grading Assignments/Projects/Homeworks: 55% Midterm: 15% Final:
More informationOpenLCB Technical Note. Datagram Transport. 1 Introduction. 2 Annotations to the Standard. 2.1 Introduction. 2.2 Intended Use
OpenLCB Technical Note Datagram Transport Feb 6, 2016 Adopted 5 10 15 20 25 1 Introduction This Technical Note contains informative discussion and background for the corresponding OpenLCB Datagram Transport
More informationPractical 2: Ray Tracing
2017/2018, 4th quarter INFOGR: Graphics Practical 2: Ray Tracing Author: Jacco Bikker The assignment: The purpose of this assignment is to create a small Whitted-style ray tracer. The renderer should be
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationComputer Networks - Midterm
Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if
More informationData Transport over IP Networks
Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA
More informationCCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer
CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities
More informationCOM-208: Computer Networks - Homework 3
COM-208: Computer Networks - Homework 3 1 Application Layer 1. (P22) Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of u s = 30 Mbps, and each peer has a download
More informationLab - Using Wireshark to Examine TCP and UDP Captures
Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.
More informationChapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University
Chapter 7 Internet Protocol Version 4 (IPv4) 1 7.1 Introduction The transmission mechanism used by the TCP/IP Unreliable and connectionless datagram protocol Best-effort delivery service IP packets can
More informationTCP and Concurrency. The third assignment at DA
TCP and Concurrency The third assignment at DA2402 2009-03-05 Jonas Lundberg/Ola Flygt adapted to Java by Marcus Edvinsson maintained by Marcus Edvinsson Matematiska och systemtekniska institutionen, MSI
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationFigure 1: Graphical representation of a client-server application
CS/EE 145a : Networking Lab #1 http://www.its.caltech.edu/ eecs145/ Due: October 24, 2007 1 Introduction The development of network-based software has been around for many years. Since its conception,
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationTotal Points 100 (One Hundred)
Project 2: Implementing Reliable Data Transfer Protocol (CS3516 A18) Due: Sep 28, 2018 F, 11:59 PM Total Points 100 (One Hundred) 1. Overview In this programming assignment, you will be writing the sending
More informationTransport Layer Marcos Vieira
Transport Layer 2014 Marcos Vieira Transport Layer Transport protocols sit on top of network layer and provide Application-level multiplexing ( ports ) Error detection, reliability, etc. UDP User Datagram
More informationSection 1 Short Answer Questions
CPSC 3600 section 002 HW #1 Fall 2017 Last revision: 9/7/2017 You must work on this homework individually!! Submission: You are to submit your written answers to turnitin. Also, you are to submit your
More informationCS-461 Internetworking. Dr. Mohamed Aboutabl
CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationRequest for Comments: 783. June, TFTP is a very simple protocol used to transfer files. It is from
Network Working Group Request for Comments: 783 Updates: IEN 133 K. R. Sollins MIT June, 1981 THE TFTP PROTOCOL (REVISION 2) Summary TFTP is a very simple protocol used to transfer files. It is from this
More information19: Networking. Networking Hardware. Mark Handley
19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright
More informationCS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy
More informationOverview. Exercise 0: Implementing a Client. Setup and Preparation
Overview This Lab assignment is similar to the previous one, in that you will be implementing a simple clientserver protocol. There are several differences, however. This time you will use the SOCK_DGRAM
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationPreview Test: HW3. Test Information Description Due:Nov. 3
Preview Test: HW3 Test Information Description Due:Nov. 3 Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question
More informationProgramming Assignment 1
CMSC 417 Computer Networks Spring 2017 Programming Assignment 1 Assigned: February 3 Due: February 10, 11:59:59 PM. 1 Description In this assignment, you will write a UDP client and server to run a simplified
More informationNetworked Systems and Services, Fall 2018 Chapter 3
Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other
More informationProcess-to-Process Delivery:
CHAPTER 23 Process-to-Process Delivery: Solutions to Review Questions and Exercises Review Questions 1. Reliability is not of primary importance in applications such as echo, daytime, BOOTP, TFTP and SNMP.
More information6.824 Lab 2: A concurrent web proxy
Page 1 of 6 6.824 - Fall 2002 6.824 Lab 2: A concurrent web proxy Introduction In this lab assignment you will write an event-driven web proxy to learn how to build servers that support concurrency. For
More informationFall CSEE W4119 Computer Networks Programming Assignment 1 - Simple Online Bidding System
Fall 2012 - CSEE W4119 Computer Networks Programming Assignment 1 - Simple Online Bidding System Prof. Gil Zussman due: Wed. 10/24/2012, 23:55 EST 1 Introduction In this programming assignment, you are
More informationNetworked Systems and Services, Fall 2017 Reliability with TCP
Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery
More informationProgramming Standards: You must conform to good programming/documentation standards. Some specifics:
CS3114 (Spring 2011) PROGRAMMING ASSIGNMENT #3 Due Thursday, April 7 @ 11:00 PM for 100 points Early bonus date: Wednesday, April 6 @ 11:00 PM for a 10 point bonus Initial Schedule due Thursday, March
More informationTelematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19540 - Telematics 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Matthias Wa hlisch Department of Mathematics and Computer Science Institute of Computer Science 19. November, 2009 Institute
More informationEthereal Exercise 2 (Part A): Link Control Protocol
Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol
More informationCS168 Programming Assignment 2: IP over UDP
Programming Assignment 2: Assignment Out: February 17, 2011 Milestone: February 25, 2011 Assignment Due: March 4, 2011, 10pm 1 Introduction In this assignment you will be constructing a Virtual IP Network
More informationMULTICAST ROUTING PROTOCOL COMMUNICATION NETWORKS 2. Draft Document version 0.3
MULTICAST ROUTING PROTOCOL COMMUNICATION NETWORKS 2 Draft Document version 0.3 Table of Contents 1 INTRODUCTION:... 3 1.1 Overview... 3 1.2 Terms and Definitions... 3 1.3 Conventions... 4 1.4 Assumptions...
More informationPage 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011
More informationCS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 Time: 1hour May 2nd, 2013
CS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 : 1hour May 2nd, 2013 Total Points: 25 Attempt all problems. Problem #1: (5 points, ½ point each) Choose only one answer. You will not receive
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationES623 Networked Embedded Systems
ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationIntro to LAN/WAN. Transport Layer
Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface
More informationDr. Mohammad Nassiri
Bu-Ali Sina University Faculty of Engineering Computer Department Title: Internet Engineering Course Socket Programming Project Instructor: Dr. Mohammad Nassiri Adapted from: Mr. Raja Venkatraman P R s
More informationCOMS3200/7201 Computer Networks 1 (Version 1.0)
COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationVERSION Lab 3: Link Layer
Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and
More informationSchool of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks
School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,
More informationSocket Programming Assignment 6: Video Streaming with RTSP and RTP
Socket Programming Assignment 6: Video Streaming with RTSP and RTP In this lab you will implement a streaming video server and client that communicate using the Real-Time Streaming Protocol (RTSP) and
More informationCIS 505: Software Systems
CIS 505: Software Systems Fall 2017 Assignment 3: Chat server Due on November 3rd, 2017, at 10:00pm EDT 1 Overview For this assignment, you will implement a simple replicated chat server that uses multicast
More informationCS 344/444 Spring 2008 Project 2 A simple P2P file sharing system April 3, 2008 V0.2
CS 344/444 Spring 2008 Project 2 A simple P2P file sharing system April 3, 2008 V0.2 1 Introduction For this project you will write a P2P file sharing application named HiP2P running on the N800 Tablet.
More informationTransport Protocols and TCP: Review
Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment
More informationESE250: Digital Audio Basics. Week 13: April 2nd, 2013 Networking
1 ESE250: Digital Audio Basics Week 13: April 2nd, 2013 Networking 2 Teaser 2006 Debate Former Senator Stevens Jon Stewart Reporting 2010 Ruling U.S. Court of Appeals for the District of Columbia Decision
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More information