Solution _Assignment #2 for Computer Networks This assignment covers material from Unit 1, 2 and 3

Size: px
Start display at page:

Download "Solution _Assignment #2 for Computer Networks This assignment covers material from Unit 1, 2 and 3"

Transcription

1 Solution _Assignment #2 for Computer Networks This assignment covers material from Unit 1, 2 and 3 1. OSI Layer working 2. Difference between TCP/IP and OSI (At least 6 points) 3. Details of all Protocols form all layers. 4. Working of each Networking devices 5. Working of networking commands with Syntax 6. Difference between a. TCP, UDP and SCTP, b. HTTP & SMTP c. HTTP &FTP d. HTTP 1.0 & HTTP1.1 e. Persistant &Non-Persistant f. FTP & TFTP g. IMAP &POP3 h. SMTP & FTP i. Connectionless & Connection-Oriented j. IPV4 & IPV6 k. Distance Vector & Link State Routing l. RIP & OSPF m. Classful & Classless(CIDR) Addressing n. Switch & Hub o. Switch & Bridge p. Switch & Router 7. Header Formats and diagram of following a. HTTP request & response b. FTP c. SMTP d. MIME e. DHCP f. TELNET g. DNS h. TCP i. UDP & Pseudo UDP j. SCTP k. RTP l. TCP in wireless network m. RSVP n. Differentiated Services o. IPV4 p. IPV6 q. ARP & RARP r. RIP s. IP t. OSPF u. BGP 8. Prepare table for following: 1> IPV4 Classful addressing 2> IPV4 Private Address 9. Examples of all subnetting for Classful and Classless(CIDR) addressing

2 1. OSI Layer working OSI Layer Name Application Presentatio n Session Transport Network Data Link Physical Working of That Layer The application layer is responsible for providing services to the user. Resource sharing Provides a set of interfaces for sending and receiving applications to gain access to and use network services This layer is also responsible for certain protocol conversions, data encryption/decryption, or data compression/decompression. Manages data format, it converts data into a generic format Responsible for initiating, maintaining and terminating sessions Responsible for security and access control to session information (via session participant identification) Responsible for synchronization services, and for checkpoint services Manages the flow of data between parties by segmenting long data streams into smaller data chunks Reliable transmission (Provides Acks of successful transmissions and requests resends for packets which arrive with errors) Provides Congestion control and flow control Multiplexing and demultiplexing End-to-end data delivery Responsible for deciding how to route transmissions between computers Find best route to route the packet This layer also handles packet switching and network congestion control Handles special data frames (packets) between the Network layer and the Physical layer Error control, Flow control,framing Converts bits into electronic signals & Viceversa This layer manages the interface between the computer and the network medium Protocols work on that Layer HTTP, HTTPS, SMTP, MIME, PoP3,IMAP,FTP, TFTP, DHCP, DNS, Telnet TCP,UDP,SCTP,R TP IPV4,IPV6,IPSec, ARP,RARP,ICMP, OSPF,BGP,RIP,IG MP SLIP,PPP, Sliding window, Go back-n, Selective repeat N/W Devices work on that layer Application Gateway Transport Gateway Router Switch, Bridge Hub, Repeater

3 2. Difference between TCP/IP and OSI (At least 6 points) Basis for TCP/IP Model OSI Model Comparison Expands To TCP/IP- Transmission Control Protocol/ OSI- Open system Interconnect Internet Protocol Meaning It is a client server model used for transmission of data over the internet. It is a theoretical model which is used for computing system. No. Of Layers 4 Layers 7 Layers Developed by Department of Defense (DoD) ISO (International Standard Organization) Tangible Yes No Usage Mostly used Never used 3. Details of all Protocols form all layers. Protocol Name HTTP SMTP POP3 IMAP FTP TFTP Long form Port No Working Using TCP or UDP Hypertext 80 Used to browse Web Pages TCP Transfer Protocol Simple Mail 25 Internet standard for electronic mail TCP Transfer Protocol ( ) transmission Post Office version 110 is received and held for you by TCP 3 Internet Message Access Protocol File Transfer Protocol Trivial File Transfer Protocol your Internet server. 143 stores messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s). 20,21 used for the transfer of computer files from a server to a client using the Client server model 69 transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable. It is used where user TCP TCP UDP and TCP

4 authentication and directory visibility are not required. DHCP Dynamic Host Configuration Protocol (DHCP) 67,68 Automatically provides an IP address and other related configuration information such as the subnet mask and default gateway. DNS Domain Name 53 an Internet service that translates System domain names into IP addresses and vice versa Telnet Telnet 23 Using Telnet Client and Server, you can create a remote command console session on a host. You can run command line programs, shell commands, and scripts in a remote command console session just as though you were locally logged on to the host and using a local command prompt window. TCP UDP SCTP RTP IPV4 IPV6 ICMP ARP Transmission Control Protocol User Datagram Protocol Stream Control Transmission Protocol (SCTP) Real time Transport Protocol Internet Protocol Version 4 (IPv4) Internet Protocol Version 6 (IPv6) The Internet Control Message Protocol (ICMP) The address resolution 17 Defines how to establish and maintain a network conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. 6 Alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections between applications on the Internet. 132 SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network. Delivering audio and video over IP networks. It is the fourth revision of the IP and a widely used protocol in data communication over different kinds of networks Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. It is used by network devices, like routers, to send error messages and operational information indicating, for example, that a requested service is not available or that a host or router could not be reached. Used to map IP network addresses to the hardware addresses (Logical to Physical) UDP TCP and UDP TCP UDP

5 RARP RIP OSPF BGP SLIP PPP protocol (arp) Reverse address resolution protocol (rarp) The Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP) Serial Line Internet Protocol. Point-to-Point Protocol Used to map hardware addresses to IP network addresses (Physical to Logical) one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing limit on the number of hops allowed in a path from source to destination. A routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distancevector routing protocol. SLIP is the result of the integration of modem protocols prior to the suite of TCP/IP protocols. It is a simple Internet link protocol. In computer networking, Point-to-Point Protocol (PPP) is a data link (layer 2) protocol used to establish a direct connection between two nodes. 4. Working of each Networking devices Network Devices Modems ISDN Network Interface Cards (NICs) Gateways Brouters Working Modem is a device which converts the computer-generated digital signals of a computer into analog signals to enable their travelling via phone lines. The modulator-demodulator or modem can be used as a dial up for LAN or to connect to an ISP. ISDN (Integrated Services Digital Network) are used to send over graphic or audio data files. It is a WAN technology that can be used in place of a dial up link. Network Interface Cards (NICs) are hardware devices that connect a computer with the network. They are installed on the mother board. They are responsible for developing a physical connection between the network and the computer. Gateway is a device which is used to connect multiple networks and passes packets from one packet to the other network. Acting as the gateway between different networking systems or computer programs, a gateway is a device which forms a link between them Brouters are the combination of both the bridge and routers. They take up the functionality of the both networking devices serving as a bridge when forwarding data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network.

6 Routers Routers are network layer devices and are particularly identified as Layer- 3 devices of the OSI Model. They process logical addressing information in the Network header of a packet such as IP Addresses. Bridges Switches Hub Functionality: To connect different network segments. To connect different network protocols such as IP and IPX. To connect several smaller networks into a large network (known as internetwork) To break a large network in smaller networks (Known as subnet usually created to improve the performance or manageability) To connect two different media types such as UTP and fiber optical. To connect two different network architectures such as token ring and Ethernet. To connect LAN network with Telco company s office (Known as DTE device). To access DSL services (known as DSL Router). A bridge is a computer networking device that builds the connection with the other bridge networks which use the same protocol. It works at the Data Link layer of the OSI Model and connects the different networks together and develops communication between them. It connects two local-area networks; two physical LANs into larger logical LAN or two segments of the same LAN that use the same protocol. Types of Bridges: 1. Transparent Bridge 2. Source Route Bridge 3. Translational Bridge Switches are connected to them through twisted pair cabling. But the difference shows up in the manner both the devices; hub and a switch treat the data they receive. Hub works by sending the data to all the ports on the device whereas a switch transfers it only to that port which is connected to the destination device. A switch does so by having an in-built learning of the MAC address of the devices connected to it. The following method will explain further how data transmission takes place via switches: Cut-through transmission: It allows the packets to be forwarded as soon as they are received. Store and forward: In this switching environment the entire packet are received and checked before being forwarded ahead. Fragment Free: In a fragment free switching environment, a greater part of the packet is examined so that the switch can determine whether the packet has been caught up in a collision. Hubs are fundamentally used in networks that use twisted pair cabling to connect devices. They are designed to transmit the packets to the other appended devices without altering any of the transmitted packets received. Hub falls in two categories: Ethernet Hubs Active Hub: They are smarter than the passive hubs. They not only provide the path for the data signals infact they regenerate, concentrate and strengthen the signals before sending them to their destinations. Active hubs are also termed as repeaters. Passive Hub: They are more like point contact for the wires to built in the physical network. They have nothing to do with modifying the signals. It is a device connecting multiple Ethernet devices together and makes them perform the functions as a single unit. They vary in speed in terms of data

7 Repeater transfer rate. Ether utilizes Carrier Sense Multiple Access with Collision Detect (CSMA/CD) to control Media access. Ethernet hub communicates in half-duplex mode where the chances of data collision are inevitable at most of the times A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to be noted about repeaters is that they do no amplify the signal. 5. Working of at least 10 networking commands Networking Commands netstat tcpdump ping hostname traceroute ifconfig NSLOOKUP Command ROUTE Command HOST Command ARP Command HOSTNAME Command Working/Use Displays contents of /proc/net files. It works with the Linux Network Subsystem, it will tell you what the status of ports are ie. open, closed, waiting, masquerade connections. It will also display various other things. It has many different options This is a sniffer, a program that captures packets off a network interface and interprets them for you. It understands all basic internet protocols, and can be used to save entire packets for later inspection. The ping command (named after the sound of an active sonar system) sends echo requests to the host you specify on the command line, and lists the responses received their round trip time. Tells the user the host name of the computer they are logged into traceroute will show the route of a packet. It attempts to list the series of hosts through which your packets travel on their way to a given destination. Also have a look at xtraceroute (one of several graphical equivalents of this program). This command is used to configure network interfaces, or to display their current configuration. In addition to activating and deactivating interfaces with the up and down settings, this command is necessary for setting an interface's address information if you don't have the ifcfg script. nslookup command also use to find out DNS related query. The following examples shows A Record (IP Address) of tecmint.com. route command also shows and manipulate ip routing table. To see default routing table in Linux, type the following command. host command to find name to IP or IP to name in IPv4 or IPv6 and also query DNS records. ARP (Address Resolution Protocol) is useful to view / add the contents of the kernel s ARP tables. To see default table use the command as. hostname is to identify in a network. Execute hostname command to see the hostname of your box. netstat Syntax tcpdump ping ip_or_ host_name traceroute machine_nam e_ or_ip ifconfig NSLOOKUP hostname route HOST hostname arp -e HOSTNAME

8 6. Differentiate between following (at least 4 points for each difference) i. TCP, UDP and SCTP UDP TCP SCTP Message oriented protocol Byte oriented protocol Message oriented protocol Preserve message boundaries Does not Preserve message Preserve message boundaries boundaries Unreliable Reliable Reliable No congestion and flow control Have congestion and flow control Have congestion and flow control Each message follows different route so no sequencing Each message follows same route so have in sequence data delivery Port no 17 Port no 6 Port no 132 have in sequence data delivery ii. HTTP & SMTP SMTP HTTP Transfer files (eg; messages) from one m Transfers files from web server to web user age server to another mail server (ie. The browser) Push protocol: the sending mail server pushes t Pull protocol: someone loads information on a w file to the receiving mail server. In particular, t server and users use HTTP to pull the informati TCP connection is initiated by the machine th offthe server at their convenience. In particular, t wants to send the file. TCP connection is initiated by the machine th wants to receive the file. Requires each user message, including the body Do not impose this restriction each message to be in 7 bit ASCII format. If t message contains that are not 7-bit ASCII, then t message has to be encoded into 7-bit ASCII Uses TCP Protocol Uses TCP Protocol Port no is 25 Port no is 80 multiple objects sent in multipart message each object encapsulated in its own respon message iii. HTTP &FTP HTTP HTTP uses TCP Only one TCP connection between client and server Send its control information in-band HTTP is stateless FTP FTP uses TCP Two parallel TCP connection, one for data and one for control Send its control information out-of-order FTP maintains State

9 iv. Persistent & Non-Persistent (HTTP 1.0/1.1) Persistent Uses HTTP/1.0 Have only 16 status codes Provides only basic authentication Uses Non persistent connection RTT is more so bandwidth waste is vast Stateless Supports only GET POST and HEAD method Non-Persistent Uses HTTP/1.1 Have introduced new 24 status code Provides strong authentication Uses Persistent connection RTT is less so bandwidth utilization is good Uses cookies as state management mechanism Supports GET, POST, HEAD,PUT and DELETE v. FTP & TFTP Basis for FTP TFTP Comparison Abbreviation File Transfer Protocol. Trivial File Transfer Protocol. Authentication Authentication is required in FTP for No authentication is required in TFTP. communication between client and server. Service FTP uses TCP service which is a connection-oriented service. TFTP uses UDP service which is connection-less service. Software FTP software is larger than TFTP. TFTP software is smaller than FTP and fits into readonly memory of the diskless workstation. Connection FTP establishes two connections one for data(tcp port no. 21) and one for TFTP establishes a single connection for its file transfer (UDP port no. 69). control(tcp port no. 20). Commands/M FTP have many commands. TFTP have only five messages. essage Complexity FTP is more complex TFTP is less complex. vi. IMAP &POP3

10 vii. SMTP & FTP Feature FTP SMTP TCP port 20 and number RFC reference RFC959 RFC821, RFC822 and RFC974 documents Protocol function Used to transfer files from remote computer after connection is established Used to send messages between computers. This is done either using SMTP server or using mail function. viii. Connectionless & Connection-Oriented Connection oriented Connectionless 1> Connection Establishment use it and Release it. 1>No connection establishment 2> Reliable 2>Not Reliable 3>Information can be resent to receiver if data is missed or with error 4>Packets come in sequence 5>Each packet uses same route 6>If connection fails cannot sent data 3>It is not Possible 4>No sequencing 5>Different route 6>Can sent data using diff route ix. IPV4 & IPV6 Feature IPv4 IPv6 Address 32 bits 128 bits Address Format Dotted Decimal Hexadecimal Notation No of Address 2^32 2^128 IPSec Optional required Payload ID for QoS in the No identification Using Flow label field header Fragmentation Both router and the sending hosts Only supported at the sending hosts Header checksum included Not included Resolve IP address to a link layer address broadcast ARP request Multicast Neighbor Solicitation message

11 x. Distance Vector & Link State Routing (RIP & OSPF) Distance Vector Routing (RIP) Used in small networks It has a limited number of hops (only 16) High convergence time Periodically advertise updates It has loop problem Updates are broadcasted Advertises only the directly connected routers and full routing tables, Eg. RIP,IGRP, BGP. Link State Routing (OSPF) Used in larger networks It has unlimited number of hops Convergence time is low. Only new changes in a network. No loop problem Updates are multicasted Advertise the updates, and flood the advertisement. Eg. : OSPF, IS-IS xi. Classful & Classless(CIDR) Addressing Classful Addressing Classful addressing divides an IP address into the Network and Host portions along octet boundaries; this portion is fixed for each class. In the classful addressing system all the IP addresses that are available are divided into the five classes A,B,C,D and E. Each of the IP address belongs to a particular class that's why they are classful addresses Address of indicates it is Class C address and 24 bits are from N/W side and 8 bits are from Client side. Classless(CIDR) Addressing Classless addressing uses a variable number of bits for the network and host portions of the address. In the classless addressing IP addresses are not divided into classes. Classless addressing treats the IP address as a 32 bit stream of ones and zeroes, where the boundary between network and host portions can fall anywhere between bit 0 and bit 31. CIDR address of /29 defines a 29bits are from network side and remaining 3 bits are from client side xii. Switch & Hub Basis for Comparison Hub Switch Layer Physical layer. Layer 1 devices Data Link Layer. Layer 2 Function To connect a network of personal computers together, they can be joined through a central hub. security also can apply Allow to connect multiple device and port can be manage, Vlan can create Data Transmission form Electrical signal or bits Frame (L2 Switch) Frame & Packet (L3 switch) Ports 4/12 ports Switch is multi port Bridge. 24/48 ports Device Type Passive Device (Without Software) Active Device (With Software) & Networking device Used in (LAN, MAN, WAN) LAN LAN Transmission Mode Half duplex Half/Full duplex Broadcast Domain Hub has one Broadcast Domain. Switch has one broadcast domain Definition An electronic device that connects many network device together so that devices can exchange data A network switch is a computer networking device that is used to connect many devices together on a computer network. A switch is considered more advanced than a hub because a switch will on send msg to

12 device that needs or request it Speed 10Mbps 10/100 Mbps, 1 Gbps Collisions Collisions occur commonly in setups using hubs. No collisions occur in a full-duplex switch. Address used for data tramsmission Uses MAC address Uses MAC address xiii. Switch & Bridge Switch A switch when compared to bridge has multiple ports. Switches can perform error checking before forwarding data. Switches are very efficient by not forwarding packets that error-ed out or forwarding good packets selectively to correct devices only. Switches can support both layer 2 (based on MAC Address) and layer 3 (Based on IP address) depending on the type of switch. Usually large networks use switches instead of hubs to connect computers within the same subnet. Bridge A bridge is more complex than hub. A bridge maintains a MAC address table for both LAN segments it is connected to. Bridge has a single incoming and outgoing port. Bridge filters traffic on the LAN by looking at the MAC address. Bridge looks at the destination of the packet before forwarding unlike a hub.it restricts transmission on other LAN segment if destination is not found. Bridges are used to separate parts of a network that do not need to communicate regularly, but need to be connected. xiv. Bridge & Router

13 xv. Switch & Router Basis for Comparison Function Router Directs data in a network. Passes data between home computers, and between computers and the modem. Switch Allow to connect multiple device and port can be manage, Vlan can create security also can apply Layer Network Layer (Layer 3 devices) Data Link Layer. Layer 2 of the OSI model. Data Transmission Packet Frame Transmission Type At Initial Level Broadcast then Uni-cast & Multicast First broadcast; then unicast & multicast as needed. Ports 2/4/8 Switch is multi port Bridge. 24/48 ports Used in (LAN, MAN, WAN) LAN, WAN LAN Device Type Networking device Active Device (With Software) & Networking device Table Store IP address in Routing table and maintain address at its own. Switches use content accessible memory CAM table which is typically accessed by ASIC (Application Specific integrated chips). Transmission Mode Full duplex Half/Full duplex Broadcast Domain In Router, every port has its own Broadcast domain. Switch has one broadcast domain [unless VLAN implemented] Definition A router is a networking device that connects a local network to other local networks. At the Distribution Layer of the network, routers direct traffic and perform other functions critical to efficient network operation. A network switch is a computer networking device that is used to connect many devices together on a computer network. A switch is considered more advanced than a hub because a switch will on send msg to device that needs or request it Speed 1-10 Mbps (Wireless); 100 Mbps 10/100 Mbps, 1 Gbps (Wired) Used for Connecting two or more networks Connecting two or more nodes in the same network or different network Address used Uses IP address Uses MAC address Routing Decision Take faster routing decisions Take more time for complicated routing decisions NAT Routers can perform NAT Switches cannot perform NAT 7. Draw Header Formats of following: i. HTTP request Header

14 HTTP response Header i. FTP ii. SMTP iii. MIME

15 iv. DHCP Hardware address length (1 byte) Hardware type (2 bytes) Protocol address length (1 byte) Source hardware address* Source protocol address* Target hardware address* Target protocol address* Protocol type (2 bytes) Operation code (2 bytes) * Note: The length of the address fields is determined by the corresponding address length fields v. TELNET vi. DNS Iterative resolution example Recursive resolution example

16 DNS Header Format vii. TCP Header Format TCP Connection establishment using three-way handshaking

17 TCP Connection Establishment Scenario (3) Three protocol scenarios for establishing a connection using a three-way handshake. (a) Normal operation, (b) Old CONNECTION REQUEST appearing out of nowhere. (c) Duplicate CONNECTION REQUEST and duplicate ACK. TCP Connection Release- The two-army problem TCP Connection termination using three-way handshaking

18 TCP Connection Release Scenarios (4) Four protocol scenarios for releasing a connection. (a) Normal case of a three-way handshake. (b) final ACK lost. (c) Response lost. (d) Response lost and subsequent DRs lost. viii. TCP Congestion control

19 TCP Transmission Policy(Flow control) ix. TCP in wireless network Split TCP: Indirect TCP TCP-aware Link Layers: Snoop

20 x. UDP Header Pseudo UDP Header xi. SCTP Header xii. RTP Header

21 xvi. Silly window syndrome Problem The Leaky Bucket Algorithm

22 The Token Bucket Algorithm xiii. RSVP-The Resource ReSerVation Protocol (a) A network, (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.

23 (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1. xiv. Differentiated Services Expedited Forwarding Assured Forwarding

24 xv. IPV4 Header xvi. IPV6 xvii. ARP

25 xviii. RARP xix. RIP xx. OSPF

26 xxi. BGP 8. Prepare table for following: 1> IPV4 Classful addressing Name of Class Range Binary Representation No of Network bits No of Host (client)bits Default Mask A B C D Used for Multicasting - E Reserved for Scientific & Research purpose 2> IPV4 Private Address - Class Address Block A B TO C TO Examples of all subnetting for Classful and Classless(CIDR) addressing, taken in classrooms. a) Divide the network /26 into 8 sub networks. How many hosts can be connected in each network? Show their IP range, network address and broadcast address. [6] ANS: No of addresses for whole network are N= =2 6 =64 First Address in network is /26 Last address in network is /26 As 8 subnet has to design so we divide no of address with no of sub networks i.e. 64/8= 8. That means each network has 8 addresses. New subnet mask will be: For 8 network 3 bits are required (log 2 8 =3) to add to /26 mask, so new mask will be 26+3=29.

27 Sub Network range Network Address Broadcast Address network / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /29 b) A company is granted a site address The company needs six subnets. Design the subnets(subnet masks for each subnet, starting and ending address of each subnet. [5] Ans: Step 1) Determine the number of subnets and convert to binary - In this example, the binary representation of 6 = Step 2) Reserve required bits in subnet mask and find incremental value - The binary value of 6 subnets tells us that we need at least 3 network bits to satisfy this requirement - Our original subnet mask is (Class C subnet) - The full binary representation of the subnet mask is as follows: = We must convert 3 of the client bits (0) to network bits (1) in order to satisfy the requirements: New Mask = If we convert the mask back to decimal, we now have the subnet mask that will be used on all the new networks New subnet mask If you convert this bit to a decimal number, it becomes the number 32 that is every subnet is having 32 addresses allotted to it (from 0 to 31, then 32 to 63 etc) Step 3) Use increment to find network ranges You can now fill in your end ranges, which is the last possible IP address before you start the next range Subnet No Range Starting Address Ending Address The first and last address from each range (network / broadcast IP) are unusable C)Suppose a router has build up the routing table shown below. The router can deliver packets directly over interfaces 0 and 1, or it can frward packets to roputers R2,R3 or R4. Describe what the router does with a packet addressed to each of the following destinations. [8] i ii iii iv v

28 Routing Table SubnetNumber SubnetMask NextHop Interface Interface R R3 (Default) R4 Ans: i Applying the subnet mask , we get Use the interface 0 as the next hop. ii Applying the subnet mask , we get (next hop is Router R2) iii Applying all the subnet mask give , None of the subnet number entries match, hence use default Router R4. iv Applying subnet mask , we get Use Router R3 as next hop. v None of the subnet number entries match, hence use default Router R4 next hop.

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

SYED AMMAL ENGINEERING COLLEGE

SYED AMMAL ENGINEERING COLLEGE QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing

More information

Application Layer Network Layer

Application Layer Network Layer Application Layer 1. What is job of Application Layer? 2. Which protocol is used at Application Layer? 3. What is DNS? How is works? 4. What protocols used is email? 5. Where to use SMTP protocol? 6. Where

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks... Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21. Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK UNIT 1

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK UNIT 1 VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Year & Semester : II / IV Section : CSE Subject Code : CS6551 Subject Name

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out BVRIT HYDERABAD College of Engineering for Women Department of Information Technology Hand Out Subject Name: Prepared by: Computer Networks Dipali Pattanayak,Assistant Professor, IT Year and Sem, Department:

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

Chapter 5 TCP/IP SUITE

Chapter 5 TCP/IP SUITE Chapter 5 TCP/IP SUITE Objectives:- TCP/ IP Model Concept. Defining/functioning of different Layers of TCP / IP suite. 5.1 Introduction Addressing mechanism in the Internet An IP address is an address

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

Imi :... Data:... Nazwisko:... Stron:...

Imi :... Data:... Nazwisko:... Stron:... Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols Computer Networks Lecture 9 Network and transport layers, IP, TCP, UDP protocols Network layer The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017 5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?

More information

Chapter 19 Network Layer: Logical Addressing

Chapter 19 Network Layer: Logical Addressing Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model [Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy Primer IP Technology L2 Ethernet Switching versus L3 routing IP Protocol, IP Addressing, IP Forwarding ARP and ICMP IP Routing, OSPF Basics First Hop Redundancy (HSRP) Agenda L2 versus L3 Switching IP

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Introduction to internetworking, OSI, TCP/IP and Addressing.

Introduction to internetworking, OSI, TCP/IP and Addressing. Introduction to internetworking, OSI, TCP/IP and Addressing. Network Devices Repeater (Hub) Hubs don t break collision and broadcast domains. So any packet will be forwarded to all ports. Bridge (Switch)

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1 Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Solution of Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) They forward packets

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Domain 1.0 Network Technologies

Domain 1.0 Network Technologies ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 1.0 Network Technologies Chapter 1 1.1 Explain the function of common networking protocols TCP TCP is a connection oriented protocol that provides

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) 2. What is the purpose of Layer-3-Switches

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information