Homework 4 assignment for ECE671 Posted: 03/20/18 Due: 03/27/18
|
|
- John Stanley
- 5 years ago
- Views:
Transcription
1 ECE671: Homework 4 1 Homework 4 assignment for ECE671 Posted: 03/20/18 Due: 03/27/18 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your work. If you make a mistake, it will also help the grader show you where you made a mistake. Problem 1 (20 Points): Consider the network setup shown in Figure 1. Suppose that the ISP instead assigns the router the address and that the network address of the home network is /24. a. Assign addresses to all interfaces in the home network. b. Suppose each host has two ongoing TCP connections, all to port 80 at host Provide the six corresponding entries in the NAT translation table. Figure 1 a) Home addresses: , , with the router interface being b) NAT Translation Table WAN Side LAN Side , , , , , , , , 3446
2 , , , , 3546 Problem 2 (25 Points): QUIC a. What is QUIC s underlying transport layer protocol? Why did Google decide to make use of this transport protocol? b. How many RTTs does it take in the case of HTTP over TCP until the first bit of a get request reaches the server? How many does it take in the case of HTTP over QUIC? c. Which protocols does QUIC replace? d. Both SPDY and QUIC support multiplexing of multiple flows into one TCP session. Why is there still head of line blocking in the case of SPDY? e. Describe in detail how QUIC achieves reliable transmission. f. QUIC makes use of an UUID. What s the benefit of employing this UUID? a. UDP. Required changes like multipath, congestion control different from the standard TCP, and FEC are much easier to implement b. 1.5;.5 c. Replaces part of TCP, TLS 1.2 (completely), and part of HTTP(/2) d. SPDY still uses TCP and thus packets need to be processed in correct order. That s not the case for QUIC. Packet loss impacts only individual flows, there is HOL blocking. e. Reliable transport in QIUC is achieved through forward error correction (FEC). Currently, there is a 10% overhead, meaning that for every 10 packets sent 1 can be lost. f. In TCP a 5-tupel (Src IP, dest. IP, source port, dest port, proto) is required to identify a session. These parameters partly change if a mobile client, e.g., changes from WiFi to LTE and the session cannot be easily identified. This is different if a UUID is used. The flow can still be identified even if the client s IP address has changes. Problem 3 (20 Points): Consider the following network. With the indicated link costs, use Djikstra s shortest-path algorithm to compute the shortest path from A to all network nodes. Show how the algorithm works by computing a table below.
3 ECE671: Homework 4 3 Figure 2 St ep N D(A),p(A) D(B),p(B) D(C),p(C) D(D),p(D) D(E),p(E) D(F),p(F) D(G),p(G) D(H),p(H) A B C D E F G H St N D(A),p(A) D(B),p(B) D(C),p(C) D(D),p(D) D(E),p(E) D(F),p(F) D(G),p(G) D(H),p(H) ep 0 0, -
4 1 A - A, 1 A, 4 A, 8 2 AB - - B, 3 A, 4 B, 7 B, 7 3 ABC - - B, 3 C, 4 A, 4 B, 7 C, 5 4 ABCD C, 4 A, 4 B, 7 C, 5 D, 4 5 ABCDE A, 4 B, 7 C, 5 D, 4 6 ABCDEH B, 7 C, 5 D, 4 7 ABCDEH B, 7 C, 5 - G 8 ABCDEH GF B, Problem 4 (20 Points): MultiPath TCP a. Explain why there has been a recent effort to split a TCP session in one or more subflows that are routed over different paths? Why was this not considered in TCP s original design? b. Figure 3 illustrates the session setup for two subflows of a multipath TCP session. In the blank parts of this figure fill out the messages that are exchanged between the two end nodes. Also, briefly explain why this method for linking subflows is required. c. Fill out the blanks in Figure 4 and explain why multipath TCP makes use of two levels of sequence numbers. d. What is the shortcoming of multipath TCP in comparison to QUIC when it comes to packet losses? e. Explain what happens in the case of i) a fast retransmit, ii) timeout expiration, and iii) of loss of a subflow. SYN, Port src =1234,Port dst =80 MyToken=5678 YourToken=6543 ACK MyToken=6543 Figure 3
5 ECE671: Homework 4 5 Dseq=0,seq=123,"a" Dack=,ack= Dseq=, seq=,"c" Dack=, ack= DSeq=1, seq=456,"b" Dack=,ack= Figure 4 a. Mobile devices and servers in data centers have more than one network interface (multi-homing) and data can be routed via different path. In addition, ISPs tend to route data over multiple paths. This was not the case in the beginning of the Internet where the only devices with more than one interface were routers. b. End nodes need a way to identify to which multipath TCP session subflows belong. This is achieved by the usage of tokens. The token information is exchanged via options in the SYN messages.
6 SYN, Port src =1234,Port dst =80 SYN+ACK+Option[Token=6543] +Option[Token=5678] ACK MyToken=5678 YourToken=6543 SYN, Port src =1235,Port dst =80 +Option[Token=6543] c. Gaps in sequence numbers are often not tolerated by middle boxes. Therefore, each subflow uses two sequence numbers. Dseq is used as the subflow sequence number and Seq as the regular sequence number of the multipath TCP flow. Dseq=0,seq=123,"a" DAck=1,ack=124 DSeq=2, seq=124,"c" DAck=3, ack=125 MyToken=6543 YourToken=5678 DSeq=1, seq=456,"b" DAck=2,ack=457 d. Even multipath TCP has to deal with the head of line blocking issue. Data can only be passed to the application if all lost segments have been retransmitted. This is not the case for QUIC. In addition, multipath TCP does not provide a
7 ECE671: Homework 4 7 forward error correction mechanism, which is beneficial for video and audio transmissions. e. i) Fast retransmit is performed on the same subflow as the original transmission ; ii) upon timeout expiration, reevaluate whether the segment could be retransmitted over another subflow, iii) Upon loss of a subflow, all the unacknowledged data are retransmitted on other subflows. Problem 5 (15 Points): Firewall (P25) Complete the filter and connection table shown below for a stateful firewall that is as restrictive as possible but accomplishes the following: (Keep in mind that rules higher up in the table have higher priority! The first row shows an example for a rule that allows all internal users to establish http sessions with external hosts.) a. Allow all internal users to establish an smtp session to a mail server at b. Allow external users to surf the company s website at and access another server at via ssh c. Otherwise all inbound and outbound traffic should be blocked Action Source Address Dest address Protocol Source port Dest port allow * * TCP * 80 Filter table: Action Source Address Dest address Protocol Source port Dest port Flag bit allow * * TCP * 80 any allow * * TCP 22 > 1023 ACK Allow * TCP * 80 Any Allow * TCP 80 * Any Allow * TCP * 22 All
8 Allow * TCP 22 * All Deny All All All All All All
Homework 4 assignment for ECE671 Posted: 11/01/16 Due: 11/08/16
ECE67: Homework 4 Homework 4 assignment for ECE67 Posted: //6 Due: /8/6 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial
More informationFinal Exam for ECE671 Spring /29/18
ECE67: Eam II Final Eam for ECE67 Spring 28 3/29/8 Instructions: Put our name and student number on each sheet of paper! The eam is closed book. You have 75 minutes to complete the eam. Be a smart eam
More informationMultipath TCP: Overview, Design, and Use-Cases
Multipath TCP: Overview, Design, and Use-Cases Benno Overeinder FOR MULTIPATH TCP MPTCP slides by courtesy of Olivier Bonaventure (UCL) The TCP Byte Stream Model Client ABCDEF...111232 0988989... XYZZ
More informationHomework #4. Due: December 2, 4PM. CWND (#pkts)
Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationCS 349/449 Internet Protocols Midterm Exam Winter /21/2003
CS 349/449 Internet Protocols Midterm Exam Winter 2003 10/21/2003 Question 349 Points 449 Points Score 1 10 10 2 20 10 3 20 20 4 20 20 5 30 20 6 (449 only) - 20 Total: 100 100 Name: Instructions: 1. You
More informationTCP. The TCP Protocol. TCP Header Format. TCP Flow Control. TCP Congestion Control Datacenter TCP
The TCP Protocol TCP TCP Congestion Control Datacenter TCP Frame format Connection management Flow control TCP reliable data transfer Congestion control TCP Header Format TCP Flow Control HL 32 bits Source
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern
More informationHomework 3 assignment for ECE374 Posted: 03/15/13 Due: 03/29/13
ECE74: Homework 1 Homework assignment for ECE74 Posted: 0/1/1 Due: 0/9/1 Note: In all written assignments, please show as much of our work as ou can. Even if ou get a wrong answer, ou can get partial credit
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationSummary of last time!
Summary of last time Part1: Lecture 2 More TCP and beyond TCP TCP congestion control Multiplexing TCP header TCP flags TCP flow control End-to-end principle Sequence numbers and acks Establish and terminate
More informationCSE 473 Introduction to Computer Networks. Midterm Exam Review
CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)
More informationPart1: Lecture 2! Beyond TCP!
Part1: Lecture 2 Beyond TCP Summary of last time TCP congestion control - Sender side that avoid loss of packets - State machine Cwnd increase and relation to ACKs and RTT TCP flow control Congestion signals
More informationSummary of last time!
Summary of last time Part1: Lecture 2 Beyond TCP TCP congestion control - Sender side that avoid loss of packets - State machine TCP flow control Cwnd increase and relation to ACKs and RTT Congestion signals
More informationCCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer
CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationOutline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP
Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer
More informationHomework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15
ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationFinal Exam for ECE374 05/03/12 Solution!!
ECE374: Second Midterm 1 Final Exam for ECE374 05/03/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam.
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationSecond Midterm Exam Solution CMPSCI 591 and 453: Computer Networks Spring 2005 Prof. Jim Kurose
Second Midterm Exam Solution CMPSCI 591 and 53: Computer Networks Spring 2005 Prof. Jim Kurose Question 1. (5 points) In network assisted congestion control, a router actively informs an end system about
More informationQuickly Starting Media Streams Using QUIC
Quickly Starting Media Streams Using QUIC Packet Video Workshop 2018 Şevket Arısu and Ali C. Begen Agenda Motivation and our goal Previous work and our contributions Approach, setup and evaluation Results
More informationIPv4 Firewall Rule configuration on Cisco SA540 Security Appliance
IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance Objective The objective of this document to explain how to configure IPv4 firewall rules on Cisco SA540 Security Appliance. Firewall provide
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT
CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationfile:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...
1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
More informationRouter and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface
CCNA4 Chapter 5 * Router and ACL By default, a router does not have any ACLs configured and therefore does not filter traffic. Traffic that enters the router is routed according to the routing table. *
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 8 Announcements Plan for Today: Networks: TCP Firewalls Midterm 1: One week from Today! 2/17/2009 In class, short answer, multiple choice,
More informationwhile the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter
When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationTutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.
Tutorial 9 1 Router Architecture Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for
More informationNWEN 243. Networked Applications. Transport layer and application layer
NWEN 243 Networked Applications Transport layer and application layer 1 Topic TCP flow control TCP congestion control The Application Layer 2 Fast Retransmit Time-out period often relatively long: long
More informationThe Transport Layer: TCP & Reliable Data Transfer
The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationNetwork Security: Firewalls. Tuomas Aura T Network security Aalto University, Nov-Dec 2013
Network Security: Firewalls Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 2 Firewalls: Stateless packet filter Firewall Perimeter defence: Divide the world into the good/safe inside
More informationChapter 8 roadmap. Network Security
Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing
More informationa. the physical layer, b. and the data-link layer. a. three physical layers, b. three data-link layers, c. and only one network layer.
CHAPTER PRACTICE SET Questions Q-. Q-. To make the communication bidirectional, each layer needs to be able to provide two opposite tasks, one in each direction. The link-layer switch is normally involved
More informationOutline Computer Networking. Functionality Split. Transport Protocols
Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment
More informationStream Control Transmission Protocol
Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationFirst Exam for ECE671 Spring /22/18
ECE67: First Exam First Exam for ECE67 Spring 208 02/22/8 Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 75 minutes to complete the exam. Be a
More informationECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006
Email Address ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Name (Print) Prof. John A. Copeland Practice for April 11, 2006 Tel.: 404-894-5177 E-Mail: copeland@ece.gatech.edu RULES.
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationb. Suppose the two packets are to be forwarded to two different output ports. Is it
Problem-1:[15] Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other packets anywhere in the router. a. Suppose the two packets are
More informationIntroduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.
More informationAdvanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific QUIC
CYBR 230 Jeff Shafer University of the Pacific QUIC 2 It s a Google thing. (Originally) 3 Google Engineering Motivations Goal: Decrease end-user latency on web To increase user engagement So they see more
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationMidterm Exam II CMPSCI 453: Computer Networks Fall 2010 Prof. Jim Kurose
Midterm Exam II CMPSCI 453: Computer Networks Fall 200 Prof. Jim Kurose Instructions: Please use two exam blue books answer questions, 2 in one book, and the remaining two questions in the second blue
More informationSchahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet?
Schahin Rajab sr2@kth.se 2016 04 20 TCP or QUIC Which protocol is most promising for the future of the internet? Table of contents 1 Introduction 3 2 Background 4 2.1 TCP 4 2.2 UDP 4 2.3 QUIC 4 2.4 HTTP
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationAnnouncements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.
IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/
More informationNT1210 Introduction to Networking. Unit 10
NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI
More informationCCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer
CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities
More informationEE 122: IP Forwarding and Transport Protocols
EE 1: IP Forwarding and Transport Protocols Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee1/ (Materials with thanks to Vern
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationMCS-377 Intra-term Exam 1 Serial #:
MCS-377 Intra-term Exam 1 Serial #: This exam is closed-book and mostly closed-notes. You may, however, use a single 8 1/2 by 11 sheet of paper with hand-written notes for reference. (Both sides of the
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationMPTCP: Design and Deployment. Day 11
MPTCP: Design and Deployment Day 11 Use of Multipath TCP in ios 7 Multipath TCP in ios 7 Primary TCP connection over WiFi Backup TCP connection over cellular data Enables fail-over Improves performance
More informationFinal Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou
Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More information1. (10 points): For each of the following, choose exactly one best answer.
IS 450/650 Final Exam Martens 20 December 2010 Answer all twelve questions. Write your name on the first sheet. Short answers are better than long ones. No electronics. 1. (10 points): For each of the
More informationSolution to Question 1: ``Quickies'' (25 points, 15 minutes)
Solution to Question : ``Quickies'' (25 points, 5 minutes) What is meant by the term statistical multiplexing? Answer: In statistical multiplexing, data from multiple users (senders) is sent over a link.
More informationPacket Tracer Simulation - TCP and UDP Communications
Topology Objectives Part 1: Generate Network Traffic in Simulation Mode Part 2: Examine the Functionality of the TCP and UDP Protocols Background This simulation activity is intended to provide a foundation
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationName Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006
Name Student ID Department/Year Final Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday January 16, 2007 Prohibited 1. You are not allowed to write down the
More informationOperating Systems and. Computer Networks. Introduction to Computer Networks. Operating Systems and
Computer Networks Introduction to Computer Networks Linux System Structure Corbet et al, Linux Device Drivers, O Reilly, 2005 Categories of System Calls Process Control load, execute, end, abort, create
More informationRecommended Network Configurations
Recommended Network Configurations The following configurations are the supported types of connections from the customer s site to Mitel s hosted data center. It is important that the WAN connectivity
More informationToken Rate Bucket Size
1 TCP 15-441 Computer Networks Homework #4 Out: 04/12/05 Due: 1:30 PM 04/26/05 Lead TA: Debabrata Dash (ddash+@cs.cmu.edu) 1. In the class we saw the relationship between bandwidth achieved by TCP and
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationReview problems (for no credit): Transport and Network Layer
Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets
More informationCS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 Time: 1hour May 2nd, 2013
CS132/EECS148 - Instructor: Karim El Defrawy Midterm Spring 2013 : 1hour May 2nd, 2013 Total Points: 25 Attempt all problems. Problem #1: (5 points, ½ point each) Choose only one answer. You will not receive
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationName Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2012
Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2012 9:30-11:10 Thursday November 8, 2012 Prohibited 1. You are not allowed to write down the
More informationARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1
ARP, IP, TCP, UDP CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1 IP and MAC Addresses Devices on a local area network have IP addresses (network layer) MAC addresses (data
More informationCSE 461 Midterm Winter 2018
CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationHomework 3 assignment for ECE671 Posted: 03/01/18 Due: 03/08/18
ECE67: Homework Homework assignment for ECE67 Posted: //8 Due: /8/8 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
More informationECE 435 Network Engineering Lecture 15
ECE 435 Network Engineering Lecture 15 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 October 2016 Announcements HW#5 due HW#6 posted Broadcasts on the MBONE 1 The Transport
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationCS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes
CS 4: COMPUTER NETWORKS FALL 00 FINAL January 0, 0 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationNetwork Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture
Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction
More informationFirewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense
FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall
More informationHomework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15
ECE374: Homework 2 1 Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 ote: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationIntroduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis
Introduction to Internet Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis What about inter-networks communications? Between LANs? Ethernet?? Ethernet Example Similarities and Differences between
More informationConfiguring TCP State Bypass
CHAPTER 51 This chapter describes how to configure TCP state bypass, which lets outbound and inbound flows go through separate ASAs. This chapter includes the following sections: Information About TCP
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationECE697AA Lecture 3. Today s lecture
ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer
More informationLecture 11: Middleboxes and NAT (Duct tape for IPv4)
CSCI-351 Data communication and Networks Lecture 11: Middleboxes and NAT (Duct tape for IPv4) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and David Choffnes's class Middleboxes
More informationECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005
ECS 152A Computer Networks Instructor: Liu Name: Student ID #: Final Exam: March 17, 2005 Duration: 120 Minutes 1. The exam is closed book. However, you may refer to one sheet of A4 paper (double sided)
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More information