Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking. Date: 10 January 2011 at 14:00 18:00

Size: px
Start display at page:

Download "Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking. Date: 10 January 2011 at 14:00 18:00"

Transcription

1 Examination DD2393 Protocols and Principles of the Internet EP2120 Internetworking Date: 10 January 2011 at 14:00 18:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or calculators! b) You may answer questions in English or in Swedish. c) Please answer each question on a separate page. d) Please write concise answers! e) Put a mark in the table on the cover page for each question you have addressed. f) The grading of the exam will be completed no later than 31 January g) After grading, EP2120 exams will be available for inspection at STEX (Q-building) and DD2393 exams will be available for inspection at Delfi (E-building). h) Deadline for written complaints is 21 February i) Course responsible DD2393 is Olof Hagsand, phone j) Course responsible EP2120 is György Dán, phone Important note! Your grade is F in any of these two cases: - if you do not reach at least 10 (ten) points out of 20 for problems 1-4 and - if you reach less than 30 points in total. We advise you to start with problems 1-4.

2 Part one (Problems 1-4) IP addressing and IP header (5p) You would like to set up two wireless LANs connected to the Internet at home. The DSL modem you received from the ISP has a single Ethernet port, and assigns public IP addresses obtained via DHCP from the ISP on that port. You also have two identical Wi-Fi (802.11) routers. Each Wi-Fi routers provides Network Address Translation (NAT), has 5 Ethernet interfaces (1 external and 4 internal) and one interface. Each WiFi router can be configured with a block of IP addresses, and it assigns IP addresses from the configured block on all of its internal interfaces (i.e., each WiFi router contains a DHCP server). You connect the external Ethernet interface of one Wi-Fi router to the Ethernet port of the DSL modem, and connect the external interface of the second Wi-Fi router to an internal Ethernet port of the first Wi-Fi router. You plan on using at most 13 computers simultaneously in the first wireless network and 31 computers in the second wireless network. DSL modem WiFi router 1 WiFi router 2 a) You have to assign an IP address block to WiFi router 1. Give the netmask of the smallest possible block of IP addresses. (1p) You need 13 IP addresses for the computers, 1 IP address for the second Wi-Fi router s public interface, 1 IP address for the first Wi-Fi router (gateway), plus 1 network and 1 broadcast address. That is a total of 17 IP addresses. Hence you need 5 bits at least. The longest netmask is The computers connected to the second WiFi router do not need to be considered. b) Choose an appropriate block of addresses from a private IP address block of your liking and give the network address of your subnet in CIDR notation! (1p) You can choose from the /8, the /8 or the /16 block. The simplest example is /27. c) What is the directed broadcast address of the subnet you choose? (1p) d) What is the purpose (function) of the checksum in the IPv4 header? Why is there no checksum in the IPv6 header? (1p) Its purpose is to detect bit errors in the IPv4 header. The checksum has to be recalculated at every router, which increases the router complexity and the processing time. Furthermore, it does not protect against errors introduced by the routers. e) Explain why most of the fields of the IPv4 header are aligned on 4 byte boundaries. (1p) In order to facilitate fast processing. Delivery and address resolution (5p) a) Explain the difference between direct and indirect delivery. How does a host decide how it should deliver a datagram? (1p)

3 Direct delivery is used when the destination is on the same link layer network. Indirect delivery when not. The host calculates its own net address and the destination net address by taking the bitwise AND of the addresses with its netmask. The delivery is direct if the net addresses match. b) There is a subnet with two servers (IP:MAC addresses A:a and B:b) and a router R:r. Datagrams are sent from a remote host to server A through the router, where they are processed. Server B is a replica of server A. Server B detects that server A has crashed. Is it possible to use the Address Resolution Protocol (ARP) to achieve that all datagrams destined to A would be sent to B by the router? If yes, how? (1p) Yes. You can use gratitous ARP to announce the A:b address binding to all hosts on the subnet. All datagrams destined to A will be sent to the MAC address b. Consider the following IPv4 network consisting of 2 bridges and 1 router. Hosts H 1 to H 6 have one interface each. B 1 and B 2 are learning bridges. R 1 is a router with an appropriate routing table. All ARP caches and the bridges learning tables are empty. Assume that ARP snooping is used. H 1 H 2 H 4 B 1 R 1 B 2 H 3 H 6 H 5 c) Add the necessary physical (MAC) and logical (IP) addresses, and identify the subnets! Use small letters to denote the MAC addresses and capital letters to denote the IP addresses (e.g., a-a). (1p) We use A:a to F:f for hosts 1-6, and G:g,H:h and I:i for the West, North and East interfaces of router R1, respectively. d) A process on Host H 3 sends 100 bytes via UDP to a process on host H 4. Show the contents of the learning tables and the ARP caches after the packet has been delivered. Assume that the process on Host H 3 knows the IP address of Host H 4. (1p) H1: C-c H3: G-g H4,H5,H6: I-i R1: C-c, D-d B1: g-east, c-south B2: d-north, i-west e) A process on Host H 5 sends 100 bytes via UDP to a process on host H 2. Assume that the process on Host H 5 knows the IP address of Host H 2. Show the new contents of the ARP caches and the learning tables. (1p) Only the new entries are shown: H2: H-h R1: E-e, B-b B2: e-east

4 IP forwarding (5p) a) Which fields of the IPv4 header have to be updated at every router? (1p) The TTL and the checksum. A router has the IPv4 forwarding table shown below. Determine the next-hop address and the outgoing interface for the packets arriving to the router with destination addresses as given in points (b)-(e). Destination Next hop Flags Interface /16 - U m /24 - U m /20 - U m / UG m / UG m / UGH m / UG m / UG m1 b) (1p) on m0 c) (1p) on m1 (default) d) (1p) Direct delivery on m2 e) (1p) on m0 UDP and fragmentation (5p) a) Describe the contents of the UDP pseudoheader used for UDP checksum calculation! What is the purpose of the UDP pseudo header when calculating the checksum? (1p) The pseudoheader contains the sender and receiver IP address, the protocol, and the total UDP payload length. It is used together with the UDP header to calculate the optional UDP, The goal is to avoid that a corrupted datagram (to different dst IP address, or protocol) would be delivered to the application by UDP. An application wants to transmit 2788 bytes of data via UDP from host A to host B via an IPv4 network. The UDP header is 8 bytes long. The path consists of two local area networks: the MTU of the first network is 3000 bytes, and the MTU of the second network is 1454 bytes. The path MTU is not known at host A. b) How many IPv4 fragments arrive at host B? Give the fragment sizes, the fragmentation offset and the more fragments (MF) bit of all fragments. (3p) In total =2796 bytes of payload have to be transmitted. The path MTU is 1454 bytes. The IPv4 base header is 20 bytes long. The IPv4 payload in every non-last fragment could be =1434 bytes, but this is not divisible by 8, so it will have to be 1432 bytes. The last fragment s length does not have to be divisible by 8, hence it can be up to 1434 bytes long. The payload, offset and MF values are (all in bytes): 1) 1432, 0, 1 2) 1364, 1432, 0 c) What would happen if host A sets the DF bit of the datagram? (1p) The datagram arrives to the router, the router discovers that the datagram is too big, and sends an ICMP Destination unreachable (packet too big) error message to Host A.

5 Part two (Problems 5-12) TCP (5p) a) What is the purpose of TCP flow control? Explain the use of the advertised receiver window in TCP flow control. (1p) The purpose of flow control is to avoid that the sender would overwhelm the receiver with data. In TCP the receiver tells the sender how many more bytes data it is able to receive. This is the advertised receiver window. The sender can never have more than the announced number of bytes unacknowledged data in the network. b) Consider a communication link with 200ms RTT and 50Mbps capacity. Calculate the bandwidth delay product of the link! What is the minimum TCP window size that has to be used in order to be able to fully utilize the link? (1p) BxD = 50Mbps * 0.2s = 10 Mbits=1250Kbytes. This is the minimum window size. c) Consider a long lived TCP flow (a number of segments have already been sent through the connection). A segment is sent at 4:30:40 from the sender to the receiver. The sender does not receive an acknowledgement. At 4:30:48, it retransmits the segment (this is the first retransmission of this segment). In lack of an acknowledgement it retransmits the segment a second time at 4:X:Y. It receives an acknowledgement at 4:31:10. It sends another segment at 4:31:10, and receives the corresponding acknowledgement at 4:31:16. The smoothed RTT (RTT smooth ) was 4 seconds when the first mentioned TCP segment was sent. (i) Give the values of X and Y in the text above. (0.5p) Give the values of the smoothed RTT (RTT smooth ), the variation (RTTvar) and the retransmission timeout (RTO) ii) after the transmission of the first segment (4:30:40), (1p) iii) after the first retransmission (4:30:48), (0.5p) iv) after the reception of the first acknowledgement (4:31:10), (0.5p) v) after the reception of the second acknowledgement (4:31:16) (0.5p) RTT artt (1 a) RTT ( a 7 /8) smooth smooth current RTTvar brttvar (1 b) RTTsmooth RTTcurrent ( b 3/ 4) RTO RTT 4RTT smooth Since the retransmission happened 8 seconds after the segment was sent at 4:30:40, we know that the RTO was 8s at 4:30:40. Given that RTT smooth was 4s at the same time, we can calculate that RTTvar=1s (Section 2.2. in RFC2988, see above). These are the initial values. At the retransmission (4:30:48) the value of RTT smooth and RTTvar do not change, but the RTO is doubled to 16s (RFC2988, Section 5.4 to 5.6). Hence the next retransmission happens at 4:31:04, and the RTO is doubled again.. When the acknowledgement arrives at 4:31:10 the sender does not know if the acknowledgment came in response to the original segment or the retransmitted one. Hence the srtt and the RTTvar are not updated (Karn s algorithm). Since no RTT smooth calculation is made the RTO remains unchanged. At 4:31:16 the acknowledgment for the last sent segment arrives and hence the RTT smooth and the RTTvar are updated (Section 2.3), and based on the new RTT smooth and RTTvar values the RTO is recalculated. The solution is then the following: X=31, Y=04 (4:31:04) RTT smooth RTTvar RTO Explanation 4:30:40 4s 1s 8s From the original values 4:30:48 4s 1s 16s Exponential back-off var

6 4:31:10 4s 1s 32s Karn s algorithm (no update) 4:31: s 1.25s 9.25s Update rule and collapse RTO Application layer (5p) a) Explain what network byte order means. Why is there a need for it? What is it? (1p) Network byte order is the order in which multi-byte words are to be transmitted over the network (e.g., the 32 bit IP address in the IPv4 header). It is needed because there are two commonly used byte orders (LSB and MSB). The network byte order is MSB. b). Consider the definition of an HTTP URL given in rfc1738 httpurl = " hostport [ "/" hpath [ "?" search ]] hpath = hsegment *[ "/" hsegment ] hsegment = *[ uchar ";" ":" "@" "&" "=" ] search = *[ uchar ";" ":" "@" "&" "=" ] hostport = host [ ":" port ] host = hostname hostnumber hostname = *[ domainlabel "." ] toplabel domainlabel = alphadigit alphadigit *[ alphadigit "-" ] alphadigit toplabel = alpha alpha *[ alphadigit "-" ] alphadigit alphadigit = alpha digit hostnumber = digits "." digits "." digits "." digits port = digits alpha = lowalpha hialpha digits = 1*digit lowalpha = "a" "b" "c" "d" "e" "f" "g" "h" "i" "j" "k" "l" "m" "n" "o" "p" "q" "r" "s" "t" "u" "v" "w" "x" "y" "z" hialpha = "A" "B" "C" "D" "E" "F" "G" "H" "I" "J" "K" "L" "M" "N" "O" "P" "Q" "R" "S" "T" "U" "V" "W" "X" "Y" "Z" digit = "0" "1" "2" "3" "4" "5" "6" "7" "8" "9" escape = "%" hex hex unreserved = alpha digit safe extra uchar = unreserved escape safe = "$" "-" "_" "." "+" extra = "!" "*" "'" "(" ")" "," hex = digit "A" "B" "C" "D" "E" "F" "a" "b" "c" "d" "e" "f" where 1*digit means at least one digit. Consider the following text: According to the above definition is the above text a valid HTTP URL? Motivate your answer! (2p) No, it is not, for several reasons: (i) a domain label is not allowed to finish with a hypen (ii) the top domain label must begin with a letter (iii) either the hsegment contains an invalid character (?) or the search contains an invalid character (/). c) What is a mail transfer agent (MTA)? Name an application layer protocol that a MTA must support! (1p) A MTA is an application process listening on port 25 that transfers mail messages between computers in order to deliver the mail to its destination. Every MTA must support SMTP. e) What is the purpose of the Real-time Streaming Protocol (RTSP)? What is the relationship between RTSP and the Real-time Transport Protocol (RTP)? (1p) RTSP is a control protocol used to control the delivery of, e.g., multimedia streams. It provides VCR like commands that a client can use to control the media server. RTSP does not deal with the delivery of the data. RTP is a protocol that can be used to deliver the data, for example.

7 DNS (5p) The following is an example of a zone file for bind similar to the one used in the lab course: $ORIGIN dd2393.edu. $TTL IN SOA dns.dd2393.edu. hostmaster.dd2393.edu. ( ) IN NS dns.dd2393.edu. a IN A a IN A b IN A dns IN A a IN AAAA 2001:6b01::56 b IN AAAA 2001:6b01::58 _http._tcp IN SRV www IN CNAME a ftp IN CNAME b Answer the following questions: a) Given the zone file above, assume a query is made to resolve Which IP address(es) may the query return? Give all possibilities, both IPv4 and IPv6. (1p) A query for 'www' resolves to 'a' according to the 'CNAME'/alias entry. 'a' in turn resolves to or if an 'A' record is requested (IPv4), and 2001:6b01::56 if an AAAA record is requested (IPv6). b) Suppose a stub resolver makes a query for the A record of b.dd2393.edu. Assume the stub resolver has a configured resolving nameserver at and that it in turn uses the root server The entry is not cached. Which messages are typically sent and between which servers in order to make a full DNS resolve from name to address using the zone file above? Indicate message type (query/response) and source and destination IP address for each DNS message. The purpose of the exercise is to show how resolving works and the role of the different servers. You do not need to provide details of the message contents. (3p) The typical resolving scenario is as follows: The stub resolver makes a recursive query to the resolving nameserver. The resolving nameserver then makes iterative queries to advertizing nameservers until an authorative reply is found via a series of delegations. The iterative queries first go to the root name-server, then to an authoritative nameserver for 'edu.' and then to dns.dd2393.edu(being the (only) authoritative nameserver for dd2393.edu. When an authoritative reply has been received by the resolving nameserver, it replies to the original query py a DNS update to the stub-resolver. The question demanded explicit messages and IP addresses. Assume that the address of the stub-resolver is 'S' and that the address of a nameserver of 'edu.' is 'E'. Then, the sequence of DNS messages could be as follows: 1. DNS query: S -> # recursive query: stub resolver -> resolving ns 2. DNS query: > # iterative query: resolving ns -> root nameserver. 3. DNS update: > # delegation to edu. 4. DNS query: > E # iterative query: resolving ns -> edu nameserver. 5. DNS update: E -> # delegation to dd2393.edu.

8 6. DNS query: > # iterative query: resolving ns -> dd2393.edu nameserver. 7. DNS update: > # authoritative update resolving b.dd23932.edu to the A record DNS update: > S # update resolving the original query and completing the recursive query. c) It is common to lower the TTL in the zone files when large changes will be made. What is the reason for this? (1p) When changes will be made in the zone file, the TTL is lowered in advance prior to the change. This has to be in sufficiently time in advance (approximately equal to the original TTL). When the change is made, all cached entries have the the lower TTL. Along with the change, the TTL is increased again to the original. Now, caches will timeout faster and will get the changed information within the lower TTL setting. That is, the TTL is lowered in advance of a change in order to make the change more synchronized in time. Routing I (5p) A / B / / / /24 C D / E In the IPv4 network depicted in the figure all routers A-E run RIPv2 and all link metrics are 1. The addresses of the IPv4 networks and the associated interface addresses are given in the figure. Note that the letters A-E do not denote addresses. Assume an initial state for all routers, where only the addresses of the directed connected networks are present in the routing tables. The destinations in the network are the /24 prefixes. Assume also that all RIP implementations support Equal-cost-multi-path (ECMP). All routers implement split-horizon and poison reverse. Express routes as 'destination, metric, next-hop'. If the destination is a directly connected network, the route is given as 'destination, metric, -'. a) What is the initial routing state of E? (1p) /24, 1, - # north interface /24, 1, - # west interface b) Assume that router B starts by sending a RIP response to its neighbors. What is the routing state of E after it has received the initial distance-vector from B? (1p)

9 /24, 1, - # north interface /24, 1, - # west interface /24, 2, /24, 2, /24, 2, c) Assume that the second event that happens in the network is that router E sends RIP responses to its neighbors. Which RIP response messages does E send, and which distance-vectors do they contain? You should indicate source and destination address of each RIP message, on which interface they are sent out (and to where) and which distancevector (destination, metric tuples) are contained in each message. (2p) On the north interface, E sends a RIP response message with src address and destination address Alternatively, if the link between D and E is point-to-point, the destination address may be The distance-vector of this message using split-horizon with poison reverse is: /24, /24, /24, /24, 3 ( /24, 16 # RIP implementations may announce this network but it is not necessary since all connected routers have this as a directly connected network: it is accepted both tohave this route and to omit it) On the south interface, E sends a RIP response message with src address and destination address The distance-vector of this message using split-horizon with poison reverse is: /24, /24, /24, /24, 16 ( /24, 16 # Same comment as above) d) Are there any ECMP routes in E after the routing state has converged? If so, which routes (destination, metric, nexthop)? (1p) Yes, the following two routes are ECMP routes from E: /24, 2, /24, 2, /24, 2, /24, 2, Routing II (5p) Regard again the network in exercise 8. Assume the routers instead run a link-state routing protocol. Assume also that the router-ids (A-E) are also destinations, that is, they indicate a host (/32) address. Show the steps of Dijkstra's algorithm for computing the shortest path to all destinations in the network from the perspective of router E. The first step is given below. Continue with the remaining steps until all destinations are in the permanent set. Permanent set Tentative set E / /24-1

10 Permanent set changes are indicated with a plus-sign: the complete set is the union of all entries in the left column. The tentative set is complete within each step. The steps below illustrates one sequence of steps, other alternatives are possible. Next-hops are given for ECMP routes. Step 2: /24 is added to the permanent set and it neighbors (B, C) are added to the tentative set /24, /24, 1 C, 1 Step 3: /24 is added to the permanent set /24, 1 B, 1 B, 1 # no extra cost since B is local address C, 1 D, 1 Step 4: B is added to the permanent set + B, 1 C, 1 D, /24, /24, /24, 2 Step 5: C is added to the permanent set + C, 1 D, /24, /24, 2, /24, 2, /24, /24, 2 Step 6: D is added to the permanent set + D, /24, /24, 2, /24, 2, /24, 2, /24, 2, /24, 2 Step 7: /24 is added to the permanent set /24, /24, 2, /24, 2, /24, 2, /24, 2, /24, 2 A, 2

11 Step 8: /24 is added to the permanent set /24, 2, /24, 2, /24, 2, /24, 2, /24, 2 A, 2 Step 9: /24 is added to the permanent set /24, 2, /24, /24, 2, A, 2 Step 9: /24 is added to the permanent set /24, 2 A, 2 Step 10: A is added to the permanent set A, 2 A, 2 The permanent set (the shortest path tree) is thus: A,2 B, 1 C, 1 D, 1 E, /24, /24, /24, 2, /24, 2, /24, 2, /24, 2, /24, /24, 1 Autoconfiguration (5p) An interface on a host using router advertisments (RA) has the following IPv6 addresses: 2002:82ed:deda:b:227:10ff:febf:7ea4/ :82e5:801a:b:227:10ff:febf:7ea4/64 fe80::227:10ff:febf:7ea4/64 Answer the following questions: a) Which is the MAC address of the interface and which addressing scope do the three addresses have, respectively? (1p) The implementation seems to use mac-derived addresses. The MAC addresses is therefore 02:27:10:bf:7e:a4. b) How do you ensure that two hosts on the same link do not use the same IPv6 address? (1p)

12 By probing for addresses. A self-constructed address is seen as tentative until it has been verified that no others use this address (this is called duplicate address detection). In IPv4 this is done by sending an ARP for the claimed address. In IPv6 it is done by the neighbor discovery protocol by sending a neighbor solicitation message. If no other host answers to such a query, the address can be used. c) Using router-advertisments (instead of DHCP) for obtaining IPv6 addresses is challenged by many. Provide the primary arguments for using the RA method and for not using RA, respectively. (3p) The advantage with RA is that it is lightweight and easy to configure. You can configure a router which you most porobably need to do anyway. You do not need to setup a separate DHCP server. The disadvantage is that the subnet-masks and nexthops provided by RA is not enough autoconfiguration for virtually any host. Most hosts need at least a nameserver, for example. Therefore you need to setup a DHCP server anyway. And once you have setup a DHCP server, you may just as well do all your autoconfiguration in the DHCP server instead of spreading this configuration between the DHCP server and the routers. Network Address Translation (5p) An IPv4 host H is connected to a private, internal network. The private network is connected to the global Internet via a NAT box N. N has an internal interface and an external interface. H has address and N has on the internal network. N has address on the external interface. a) Suppose H initiates a bit-torrent transfer where one external peer has global IP address Show the source and destination addresses and ports of the initial SYN segment and its reply as it passes through N. That is, show src and dst address and ports inside and outside N, for both outgoing and returning segments. Propose a dynamic NAT port binding. (2p) Inside outgoing: srcaddr/port: /X1 # X1 ephemeral port dstaddr: /12540 # is an example bittorrent destination port Outside outgoing: srcaddr/port: /X2 # NAT keeps a binding /X1 <-> /X2 dstaddr: /12540 Outside incoming: srcaddr/port: /12540 dstaddr: /X2 Inside incoming: srcaddr/port: /12540 dstaddr: /X1 b) Which IPv4 and TCP header fields change (are rewritten by N) in the outgoing and incoming segments respectively? Be precise!(1p) Outgoing: IP header: src ip address, header checksum TCP header: src port address, TCP checksum Incoming: IP header: dst ip address, header checksum TCP header: dst port address, TCP checksum c) Outline the differences between a symmetric and full-cone NAT with respect to NAT traversal. (2p)

13 Full-cone NAT has no filtering, that is, any external socket (address/port pair) may use the NAT bindings. A symmetrical NAT has strict filtering so that only the external socket accessed when establishing the binding may use it. For NAT traversal, it means that full-cone NATs are possible to use by external hosts others than the one involved when establishing the binding. This can be made by first sending a datagram to a well-known external host A. The source address/port of the datagram that reached A can be communicated to other external hosts which in turn can send datagrams with the address/port as destinations. The NAT will then let these datgrams traverse the NAT. For symmetrical NATs, this approach is not possible since no other external hosts will be allowed thorugh the NAT. Mobility (5p) AP1 Mobile host? Internet AP2 Assume a mobile host moves from one Wi-fi access point (AP1) to another (AP2) as illustrated in the figure. There is no Mobile-IP support. The access points are (on their 'wired' side) connected either via an L2 Ethernet bridge, or via an L3 IPv4 router. In the figure, the L2 or L3 box is indicated with a question mark. In both cases, the mobile host obtains its address by a DHCP server via the access points. In the exercises below, describe how the mobile node obtains its new IP address (if any) and how incoming and outgoing internet traffic (eg a connected web-browser running on the mobile) is affected during the hand-over. Note that you need only consider addressing and packet transfer, not security or other related issues. a) The access points are connected by a bridged L2 network and share the same IPv4 network.(1.5p) When the mobile node M moves from AP1 to AP2, the mac-address and IP-address of M stay the same. However, incoming traffic will continue to go to AP1 until the L2 bridge has learnt that M is reachable via AP2 instead. This traffic will be lost. The L2 bridge will learn M's new port (to AP2) when M sends its first packet via AP2. This means that in this scenario, applications will continue with the same connections, although there will most probably be an interval of lost incoming packets. If the applications are based on TCP, this will trigger retransmissions and fast retransmit with typically relatively small effects on the end-user. b) The access points are connected by an IPv4 L3 router which routes traffic between separate IPv4 sub-networks. (1.5p) When M moves from AP1 to AP2, the IP address must change (mac-address stay the same). The network supports DHCP, so it is probable that M can obtain a new address via DHCP. The retrieving of a new address is OS-dependent and may involve manual configuration by the user. When the new IP address, sub-mask, next-hop, etc, has been retrieved to M, the applications of M have to handle the new situation. Most modern applications will (such as web-browsers) detect that the old TCP connections are stale and will re-establish new connections using the new IP address. Other less flexible applications need to be restarted.

14 All packets sent to the old address will be lost. This means that the effects on users are relatively large involving re-establishment of new connections and loss of all traffic to the old address. c) Describe how the routed case (case b above) could be improved by using Mobile-IP (IP Mobility) as defined in RFC (2p) In the mobile-ip case, M has a home-address with which it communicates with the external hosts, while a new care-of address is obtained via DHCP (typically). This means that the applications may continue uninterrupted as in case (a). The mechanism of hand-over is different though, since M (or the router in the foreign-agent case) registers with the home agent, and the home agent re-establishes the data delivery tunnel to the new network (M or the router). During this interval, datagrams forwarded in the old tunnel (to the sub-network of AP1) will be lost. As in case (a) however, the effects of the applications are relatively small.

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4!

Important note! Please start with problems 1-4; because your grade is F if you do not reach at least 15 (fifteen) points out of 20 for problems 1-4! Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking Date: 10 March 2009 at 8:00 13:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or

More information

Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking. Date: 27 October 2015 at 14:00 18:00

Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking. Date: 27 October 2015 at 14:00 18:00 Examination IK2218 Protocols and Principles of the Internet EP2120 Internetworking Date: 27 October 2015 at 14:00 18:00 a) No help material is allowed - You are not allowed to use dictionaries, books,

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking. Date: 02 June 2009 at 14:00 19:00

Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking. Date: 02 June 2009 at 14:00 19:00 Examination DD2392 Protocols and Principles of the Internet EP2120 Internetworking Date: 02 June 2009 at 14:00 19:00 a) No help material is allowed - You are not allowed to use dictionaries, books, or

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking Date: March 9 th 2007 at 8:00 13:00 SOLUTIONS 1. IP Addressing? (5p) There are ten nodes connected to your network: a

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS 1. IP and addressing (5p) a) Your company would like to have all its 511

More information

Date: June 4 th a t 1 4:00 1 7:00

Date: June 4 th a t 1 4:00 1 7:00 Kommunika tionssyste m FK, Examina tion G 5 0 7 Date: June 4 th 0 0 3 a t 4:00 7:00 KTH/IMIT/LCN No help material is allowed. You may answer questions in English or Swedish. Please answer each question

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

cs144 Midterm Review Fall 2010

cs144 Midterm Review Fall 2010 cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination. THE HONG KONG POLYTECHNIC UNIVERSITY Department of Computing This is an open-book examination. () Internetworking Protocols and Software 7 January 2013 3 hours [Answer all ten questions.] 2 Please answer

More information

Your Name: Your student ID number:

Your Name: Your student ID number: CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Distance vector and RIP

Distance vector and RIP DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2016 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Application Layer Transport Layer Network Layer Link Layer Physical Layer 2 Application Layer HTTP DNS IMAP

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

CSCI Networking Name:

CSCI Networking Name: CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

The Netwok 15 Layer IPv4 and IPv6 Part 3

The Netwok 15 Layer IPv4 and IPv6 Part 3 1 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok 15 Layer IPv4 and IPv6 Part 3 Jean Yves Le Boudec 2015 Contents 1. Fragmentation 2. Interworking h4 h6 with NATs 3. Proxy ARP Textbook Chapter 5: The

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

The Netwok Layer IPv4 and IPv6 Part 2

The Netwok Layer IPv4 and IPv6 Part 2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok Layer IPv4 and IPv6 Part 2 Jean Yves Le Boudec 2014 1 Contents 6. ARP 7. Host configuration 8. IP packet format Textbook Chapter 5: The Network Layer

More information

EE 122: IP Forwarding and Transport Protocols

EE 122: IP Forwarding and Transport Protocols EE 1: IP Forwarding and Transport Protocols Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee1/ (Materials with thanks to Vern

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2010 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: B Calculator: Type 2 There are a total of 10 problems.

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

ECE 428 Internet Protocols (Network Layer: Layer 3)

ECE 428 Internet Protocols (Network Layer: Layer 3) ECE 428 Internet Protocols (Network Layer: Layer 3) 1 Done so far MAC protocols (with PHYsical layer) Transport bits from one node to another. Key element: Determine WHEN to transmit DLC protocol (running

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Lecture 11: IP routing, IP protocols

Lecture 11: IP routing, IP protocols Lecture 11: IP routing, IP protocols Contents Routing principles Local datagram delivery ICMP Protocol UDP Protocol TCP/IP Protocol Assuring requirements for streaming TPC Building and terminating TCP

More information

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6 Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between

More information

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes Internetworking Contents Overview Functions Issues Basic Delivery Unit Addressing Datagram Delivery ARP IPv4 Header Adapting Datagram Size Notes 2 Overview - Example 3 Direct Delivery 4 Indirect Delivery

More information

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1

More information

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER CHAPTER 3 This chapter describes how to configure Internet Protocol version 6 (IPv6), which includes addressing, Neighbor Discovery Protocol (ND), and Internet Control Message Protocol version 6 (ICMPv6),

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

The Network 15 Layer IPv4 and IPv6 Part 3

The Network 15 Layer IPv4 and IPv6 Part 3 1 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Network 15 Layer IPv4 and IPv6 Part 3 Jean Yves Le Boudec 2017 Contents 9. Proxy ARP 10. Fragmentation 11. Interworking h4 h6 with NATs Textbook Chapter 5:

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2010 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable calculators are permitted

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

1. (10 points): For each of the following, choose exactly one best answer.

1. (10 points): For each of the following, choose exactly one best answer. IS 450/650 Final Exam Martens 20 December 2010 Answer all twelve questions. Write your name on the first sheet. Short answers are better than long ones. No electronics. 1. (10 points): For each of the

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

EE-311 Data Communication & Networks

EE-311 Data Communication & Networks National University of Computer & Emerging Sciences, Islamabad, Pakistan Name: Roll No: EE-311 Data Communication & Networks Summer 2007 Final Thursday, 2 nd August 2007 Total Time: 3 Hours Total Marks:

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:

More information

C14a: Internetworks and The Internet

C14a: Internetworks and The Internet CISC 7332X T6 C14a: Internetworks and The Internet Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

CSE 461 Midterm Winter 2018

CSE 461 Midterm Winter 2018 CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at

More information

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing. IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Addressing and Routing

Addressing and Routing Addressing and Routing Andrew Scott a.scott@lancaster.ac.uk Physical/ Hardware Addresses Aka MAC* or link(-layer) address Can only talk to things on same link Unique ID given to every network interface

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Address Translation. Map IP addresses into physical addresses destination host next hop router

Address Translation. Map IP addresses into physical addresses destination host next hop router Address Translation Map IP addresses into physical addresses destination host next hop router Techniques encode physical address in host part of IP address table-based ARP table of IP to physical address

More information