Trp. Trp. Master Informatique 1 st year 1 st term. ARes/ComNet Transport layer (7 points) Anonymous ID: stick number HERE

Size: px
Start display at page:

Download "Trp. Trp. Master Informatique 1 st year 1 st term. ARes/ComNet Transport layer (7 points) Anonymous ID: stick number HERE"

Transcription

1 Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. App The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the frames provided for that purpose. QUIT Bye 1. What is the application? What is the software used for this application? What is the user doing with this application? What is the protocol used at the application layer? 2. What are the protocol s commands that we can see in this exchange? 1 Applications (6 points) Analyze the following message exchange between a client and a server. The messages have been intercepted at the Application layer. 220 mail.etu5.plateforme.lan ESMTP Postfix (Debian/GNU) EHLO [ ] 250-mail.etu5.plateforme.lan 250-PIPELINING 250-SIZE VRFY 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN MAIL FROM:<etudiant@mail.etu5.plateforme.lan> Ok RCPT TO:<etudiant@mail.etu5.plateforme.lan> Ok DATA 354 End data with <CR><LF>.<CR><LF> Subject: Test From: etudiant on VM3 <etudiant@mail.etu5.plateforme.lan> To: etudiant@mail.etu5.plateforme.lan Content-Type: text/plain Date: Wed, 01 Oct :05: Message-ID: < camel@5vm1.etu5.plateforme.lan> Mime-Version: 1.0 X-Mailer: Evolution Content-Transfer-Encoding: 7bit Bonjour de Jussieu What is the IP address of the client? What is the DNS name of the mail server? What is the sender s address? What is the receiver s address? 4. What are the headers indicating that the follows the MIME format? What is the purpose of MIME? What is the encoding used to send the message content over the network? What is the header indicating this encoding type? 5. What is the message s subject? What is the message s content? 6. It is possible to connect to the server using Telnet to do the same thing that we have analyzed? Give the command line which allows the user to log on the server to do that. 7. If the user used web mail to send the message, what would be the Application layer protocol used between the client and the server? With this protocol, what would have been the commands used? Ok: queued as E6 RSET Ok 1/12 Version X en-vA-b 2/12 Version X en-vA-b

2 Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Trp ARes/ComNet Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. Trp The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the frames provided for that purpose. 2 Transport layer (7 points) 6. Two segments have a PUSH bit set (one at the beginning, the other at the end of the trace). What is their role (justify)? Client 8,7 8,9 9,1 9, Serveur On the basis of the TCP trace given in Appendix 2 (page 9), answer the following questions: 1. What is the server address, the client address (justify)? 9,5 9,7 7. At connection setup, MSS options with value of 1460 are exchanged, but in the trace that follows the maximum size of the payload is 1448 bytes. Why (justify)? 9,9 2. What action by the user will have initiated this trace (justify)? 10,1 10,3 10,5 3. Is the protocol analyser that has captured this trace close to the client or to the server (justify)? 8. What is the average throughput observed over the entire connection (justify)? 10,7 10,9 11,1 4. Four options (other than nop or eol) are exchanged during the connection setup. What is each one for? Explain how each one works. 5. What is the RTT that we can observe at the beginning of the connection (justify)? 9. Complete the following chronogram of exchanges, strictly respecting the provided time scale temps (s) 11,3 3/12 Version X en-vA-b 4/12 Version X en-vA-b

3 Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Frm ARes/ComNet Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. Frm The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the places provided for that purpose. 1. Is the frame above carrying a query or a request message? Give three arguments that justify your choice (from the frame). Type: (a) (b) (c) 2. How many IP addresses appear in the frame above? What is the significance of each address? 3 Multi-protocol analysis (7 points) Decode the following frame. Draw and write directly on it. Carefully delimit each protocol field and provide an accurate interpretation of its value. You may refer to the Appendix 1 (page 7) to help in the analysis f f3 fb fe f e ^..T..E. 3. The frame that you have decoded is part of an exchange. If the frame was sent in response to another frame, generate the corresponding query frame. If, on the other hand, the frame was a query frame, generate the corresponding response frame. Just write out the first 70 bytes of the frame, two hexadecimal digits to a box. (If you cannot deduce the value in a box, leave it blank.) a4 d f 11 2e e3 4a e3...?..)..j e d ed f T..5.d...h... Byte num c lequipe.f c0 0c r...d a0 5c 6c b2 c0 0c \l...Y e 03 6e f e ns3.atos.net. 4. The same application layer action that triggered the previous frames will be executed after 10 minutes. Explain what will be the result of this new action? Justify your answer c0 0c e Y...ns c0 3c c f eb c1 38.<.R.../ e f8 c f eb a0 5c /...\ 00a y. 5/12 Version X en-vA-b 6/12 Version X en-vA-b

4 Don t hand back this sheet! Don t hand back this sheet! Appendix 1 Ethernet Frame Layout without preamble/crc: bits bits--+16b Destination Source Type Data address address A few types: 0x0800 = DoD Internet (IPv4) 0x0806 = ARP 0x86DD = Internet Protocol Version 6 (IPv6) IPv4 Paquet Layout <-4b-> <--8bits--->< bits > Ver IHL TOS Total Length Identifier Fl FO TTL Protocol Header Checksum Source Address Destination Address... Options... Data TCP Segment Layout <-4b-> <-6bits->< bits > Source Port Destination Port Sequence Number Acknowledgement Number THL Flag Windows Size Segment Checksum Urgence Pointer... Options... Data THL = TCP header length on 4 bits (32 bits words) Flags on 6 bits (from most significant bit to less) = < URG, ACK, PSH, RST, SYN, FIN > Options = series of options encoded as: 1 byte 00 = end of options (if needed) 1 byte 01 = no operation L bytes with TLV fields (T one byte of type: 2 = negotiate MSS 3 = adaptation of window size 4 = selective acknowledgment 8 = timestamps... L one byte for the total size of the option V the value of the option on L-2 bytes) UDP Datagram Layout A querry: <-----N-Bytes-----><2-Bytes><2-Bytes> Name Type Classe An Answer/AutoritativeNS/AdditionalRecord: <M-Bytes>< 2B. >< 2B. ><4-Bytes>< 2B. ><--D-Bytes---> Name Type Classe T.T.L. Size Data * Name : each domain name is preceded by one byte showing the number of following ASCII characters (if the value is < 63 else the value 0xC0 show a reference to the offset value of the next byte (from the beginning of the message) Ending by 0x00. * A few types: 1 = A (IPv4 Address) 12 = PTR (Name Pointer) 2 = NS (Name Server) 15 = MX (Mail Server) 5 = CNAME (Alias) 28 = AAAA (IPv6 Address) 6 = SOA (Start Of Authority)... * Classe: 1 = Internet * T.T.L.: Cache Validity (seconds) * Size: Data length in Bytes * Data: - Name (Character string as for a query) for NS - Priority (2 bytes) and Name for MX - Address (4 bytes for A, 16 bytes for AAAA)... Ver = IP Version IHL = IP Header Length (32 bits words) TOS = Type of service Total Length of the IP paquet (in bytes) Fl (3 left bits) = fragmentation flags [Reserved Don t Fragment Next Fragment] FO (remaining 13 bits) = Fragment Offset * value to multiply by 8 bytes TTL = Time To Live (hop count) A few protocol fields: 1 = ICMP 33 = DCCP 2 = IGMP 41 = IPv6 Encapsulation 6 = TCP 89 = OSPF 8 = EGP 132 = SCTP 17 = UDP... ICMP Datagram Layout Source Port Destination Port Longueur UDP Datagram Checksum... Data A few ports associated services ftp-data 20/tcp domain 53/udp ftp 21/tcp tftp 69/udp ssh 22/tcp snmp 161/udp telnet 23/tcp snmp-trap 162/udp smtp 25/tcp www 80/tcp Type Code Datagram Checksum Variable... Original Datagram + 8 Bytes A few ICMP types: 0 = Echo response 3 = Destination Unreachable 5 = Redirection 8 = Echo request 11 = Time exceed DNS Messages Layout < 2B.>< 2B.><2B.><2B.><2B.><2B.>< qb.>< ab.>< nb.>< ib.> Ident Flags NbQu NbAn NbNS NbAR Quer. Ans. AutNS. AddR * Ident. = Request Identifier * Flags = DNS parameters (don t explain) * NbQu = Number of Queries * NbAn = Number of Answers * NbNS = Number of Autoritative Name Server * NbAR = Number of Additional Reccords 7/12 Version X en-vA-b 8/12 Version X en-vA-b

5 Don t hand back this sheet! Don t hand back this sheet! Appendix :2000 > :80 S 0(0) win <mss 1460,nop,wscale 3,nop,nop,timestamp 373 0,sackOK,eol> :80 > :2000 S 0(0) ack 0 win 5792 <mss 1460,sackOK,timestamp ,nop, wscale 7> :2000 > :80. ack 1 win <nop,nop,timestamp > :2000 > :80 P 1(586) ack 1 win <nop,nop,timestamp > :80 > :2000. ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack 2897 win <nop,nop,timestamp > :2000 > :80. ack 4345 win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack 5793 win <nop,nop,timestamp > :2000 > :80. ack 8689 win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > :2000 FP 56473(893) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80 F 587(0) ack win <nop,nop,timestamp > :80 > :2000. ack 588 win 55 <nop,nop,timestamp > 9/12 Version X en-vA-b 10/12 Version X en-vA-b

6 Don t hand back this sheet! Don t hand back this sheet! 11/12 Version X en-vA-b 12/12 Version X en-vA-b

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (6 points) Anonymous ID: stick number HERE

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (6 points) Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2014-2015 Midterm exam : Version A in English Duration: 2h00 Allowed: One

More information

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One

More information

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet Anonymous number: 3 Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1 AResComNet 20172018 Rou destination Final exam : Version A in English Rou

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

I TCP 1/2. Internet TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) TCP Connection-oriented

I TCP 1/2. Internet TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) TCP Connection-oriented I TCP 1/2 TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) Internet TCP Connection-oriented UDP Connectionless IP + TCP (connection-oriented) (byte

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

Master Informatique ComNet Communication Network. ComNet - Lab n 1. Introduction to the networking testbed

Master Informatique ComNet Communication Network. ComNet - Lab n 1. Introduction to the networking testbed ComNet - Lab n 1 Introduction to the networking testbed This first handout is meant to familiarize you with the testbed environment that we use for the course s laboratory exercises. Throughout the semester,

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Master Informatique NetArch Network Architecture. NetArch - Lab n 4. Transport Layer (1): TCP and UDP

Master Informatique NetArch Network Architecture. NetArch - Lab n 4. Transport Layer (1): TCP and UDP NetArch - Lab n 4 Transport Layer (1): TCP and UDP 1 Review of the transport layer 0 0 1 1 1. A web client wishes to access a document for which it knows the URL. The IP address for the server is initially

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer

More information

The Transport Layer. Part 1

The Transport Layer. Part 1 The Transport Layer Part 1 2 OVERVIEW Part 1 User Datagram Protocol Transmission Control Protocol ARQ protocols Part 2 TCP congestion control Mowgli XTP SCTP WAP 3 Transport Layer Protocols Connect applications

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005 Transport Layer For a connection on a host (single IP address), there exist many entry points through which there may be many-to-many connections. These are called ports. A port is a 16-bit number used

More information

ECE 358 Project 3 Encapsulation and Network Utilities

ECE 358 Project 3 Encapsulation and Network Utilities ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

6. The Transport Layer and protocols

6. The Transport Layer and protocols 6. The Transport Layer and protocols 1 Dr.Z.Sun Outline Transport layer services Transmission Control Protocol Connection set-up and tear-down Ports and Well-know-ports Flow control and Congestion control

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+)

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+) ! "#! # $ %& #! '!!!( &!)'*+' '(,-. +) /,*+), 01/-*+) + 01/.*+) ) 05,-. +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+,3 4 +. 6*! ) ) ) ) 5 ) ) ) ) + 5 + + ) ) ) 5 9 + ) ) + 5 4 ) ) + ) 5, ) )

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Network concepts introduction & wireshark

Network concepts introduction & wireshark Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity

More information

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Transport Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW User Datagram Protocol Transmission Control

More information

Information Network 1 TCP 1/2

Information Network 1 TCP 1/2 Functions provided by the transport layer Information Network 1 TCP 1/2 Youki Kadobayashi NAIST! Communication between processes " designation of process " identification of inter-process channel! Interface

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16 CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm

More information

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2) Last Lecture Internet Protocol (1) This Lecture Internet Protocol (2) Lecture 18 Overview Source: chapters 19.1, 19.2, 22,1 22.2, 26.6 Next Lecture Transport Control Protocol (1) Source: chapters 24.1,

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis Introduction to Internet Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis What about inter-networks communications? Between LANs? Ethernet?? Ethernet Example Similarities and Differences between

More information

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

CSCI Networking Name:

CSCI Networking Name: CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol

More information

A Commands CHAPTER. Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter.

A Commands CHAPTER. Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter. CHAPTER 1 The commands shown in this chapter apply to the Catalyst 8540 MSR, Catalyst 8510 MSR, and LightStream 1010 ATM switch routers. Where an entire command or certain attributes of a command have

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

cs144 Midterm Review Fall 2010

cs144 Midterm Review Fall 2010 cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)

More information

IP Services Commands. Network Protocols Command Reference, Part 1 P1R-95

IP Services Commands. Network Protocols Command Reference, Part 1 P1R-95 IP Services Commands Use the commands in this chapter to configure various IP services. For configuration information and examples on IP services, refer to the Configuring IP Services chapter of the Network

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Network concepts introduction & wireshark. workshop

Network concepts introduction & wireshark. workshop Network concepts introduction & workshop @KirilsSolovjovs ISO/OSI+DoD model Topics for our workshop Network layer models Ethernet, WiFi Layer3: ARP, ICMP, IPv4, IPv6 Layer4: UDP, TCP Routing Application

More information

D Commands. Send document comments to This chapter describes the Cisco NX-OS security commands that begin with D.

D Commands. Send document comments to This chapter describes the Cisco NX-OS security commands that begin with D. This chapter describes the Cisco NX-OS security commands that begin with D. SEC-141 deadtime deadtime To configure the dead-time interval for a RADIUS or TACACS+ server group, use the deadtime command.

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

Course Contents. The TCP/IP protocol Stack

Course Contents. The TCP/IP protocol Stack Course Contents PART 1 Overview and Introduction PART 2 Communication Reference Models PART 3 Data Communication Fundamentals and Physical Layer PART 4 Datalink Layer and Emerging Network Technologies

More information

QUIZ: Longest Matching Prefix

QUIZ: Longest Matching Prefix QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.

TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork. Overview Formats, Data Transfer, etc. Connection Management (modified by Malathi Veeraraghavan) 1 Overview TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

Problem Max. Points Act. Points Grader

Problem Max. Points Act. Points Grader Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2007-12-12 Dr. Jürgen Schönwälder Duration: 90 minutes Final Examination The Jacobs University s Code of Academic Integrity applies

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

> : S. timestamp > : (0) win <mss 1460,nop,wscale 0,nop,nop, 4 different options used

> : S. timestamp > : (0) win <mss 1460,nop,wscale 0,nop,nop, 4 different options used TCP Options Source Port Destination Port Sequence Number Acknowledgment Number HdrLen Reserved UA P RS F Window Size Checksum Urgent Pointer Options (optional...) Header Length Allows size of options to

More information

Access List Commands

Access List Commands Access List Commands This module describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists. An access control list (ACL) consists of one or

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science NETWORK PROGRAMMING CSC- 341 Instructor: Junaid Tariq, Lecturer, Department of Computer Science 6 Lecture CHAPTER 2: THE TRANSPORT LAYER : TCP AND UDP Contents Introduction UDP: User Datagram Protocol

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

ITS323: Introduction to Data Communications

ITS323: Introduction to Data Communications ITS323: Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 ITS323Y12S1L13, Steve/Courses/2012/s1/its323/lectures/transport.tex,

More information

network security s642 computer security adam everspaugh

network security s642 computer security adam everspaugh network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

TCP/IP Networking Basics

TCP/IP Networking Basics TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP

More information

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015 Network Security Introduction to networks Radboud University, The Netherlands Autumn 2015 What is a (computer) network Definition A computer network is two or more computers that are connected, so that

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Review of Important Networking Concepts TCP/IP

Review of Important Networking Concepts TCP/IP Review of Important Networking Concepts / / Protocol Suite Assignment of Protocols to Layers Addressing / Layers in the Example Encapsulation and Demultiplexing Different Layers Views of Networking / Protocol

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

Answer to the written exam given on TDTS06 Computer networks, October 23,

Answer to the written exam given on TDTS06 Computer networks, October 23, Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.

More information

Network Technology 1 5th - Transport Protocol. Mario Lombardo -

Network Technology 1 5th - Transport Protocol. Mario Lombardo - Network Technology 1 5th - Transport Protocol Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 overview Transport Protocol Layer realizes process to process communication data unit is called a

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

The Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline

The Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline CPSC 360 Network Programming The Transport Layer Reliable data delivery & flow control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)

More information

Access List Commands

Access List Commands Access List Commands This module describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists. An access control list (ACL) consists of one or

More information