Section 1 Short Answer Questions
|
|
- Clifford Holt
- 5 years ago
- Views:
Transcription
1 CPSC 3600 section 002 HW #1 Fall 2017 Last revision: 9/7/2017 You must work on this homework individually!! Submission: You are to submit your written answers to turnitin. Also, you are to submit your updated UDPEcho.tar.gz using handin. Section 1 Short Answer Questions Question 1.1 List the layers from the OSI seven layer network model that apply in a TCP/IP network. Provide a one sentence summary of each layer in a TCP/IP context. Question 1.2 Assume two nodes communicate directly over a physical layer. Explain the difference between the channel bandwidth and the baud rate in a context where the two nodes communicate directly over a physical layer. Question 1.3 New automobiles sold in the United States will soon be required to support wireless communications using a form of WiFi. There are seven channels available to support vehicle-to-vehicle communications. The bandwidth of each channel is 10Mhz. In the best conditions, it uses a modulation/demodulation based on QAM-64 which uses 64 signal levels per symbol. What is the maximum data rate in these best conditions? Please state any assumptions you might make for your answer. Hint: look up the Nyquist theorem. 1
2 Question 1.4 In a connected vehicle scenario as described in the previous question, applications running on vehicles can chose to use higher order modulation (64QAM) or lower order modulation (BPSK or QPSK). Why might a connected vehicle application transmit application messages using a lower order modulation such as QPSK rather than a higher order modulation (which offers higher data rates than lower modulations) such as 64 QAM? Question 1.5 When transmitting a 32-bit 2 s complement integer in big-endian order, when is the sign bit transmitted (relative to other bits in the 32bit Integer). Please state any assumptions you make. 2
3 Question 1.6 From the kurose text, Review question R12. In the 7 th edition, this question is on page 68 and begins What advantage does a circuit-switched network have Question 1.7 From the Kurose text, review question R13. In the 7 th edition, this question is on page 68 and begins Suppose users share a 2 Mbps link. 3
4 Section 2 Analyzing ping results Use the ping program on your VM with one of the following hosts: or You can use any other host as long as it is located outside of the US (or.to the best of your ability, you think it is located outside the US). Use traceroute or other tools to help estimate the physical location. I ll refer to the destination node as the server. Please do these two parts of this question. Question 2.1 Run ping between your VM and the server for at least 1 hour. Redirect standard output to a file. Do this twice. Once in the evening (normally the Internet s busy time) and once earlier in the day (or late at night). So you will collect two data files: ping1dat and ping2.dat. Ping invocation example (NOTE: this involves a very short path- you are to find/use a path that goes outside the US): ping -D > ping1.dat o Specify the destination address as an IPV4 address in dotted decimal notation. o Specify the D parameter so that a timestamp is appended to each sample Results: o Copy and paste the ping summary statistics to your homework submission. o Copy and paste the results from traceroute to your homework submission. Run traceroute server, if that does not appear to work, try sudo traceroute I server. Cut and paste your results to your homework submission. The purpose is simply to verify that the path between the ping program endpoints appears to be outside the US. Example result traceroute I (Running traceroute does not work- just see wildcards for 64 iterations before giving up). Noteyou can also ask traceroute to show the domain name of each router- this might give further clues as to if the path travels outside the US. traceroute to www1.csc.ncsu.edu ( ), 64 hops max o ms 0.003ms 0.002ms o ms ms ms o ms ms ms o ms ms ms o ms ms ms o ms ms ms o ms ms ms o ms ms ms o ms ms ms o ms ms ms o 11 * * * 4
5 o 12 * * * o ms ms ms We can interpret the traceroute result as follows o There are at least 13 hops between my VM and the server. o Each traceroute line shows the response from the next hop router. By default, traceroute contacts each router (hop by hop) three times. The three times in each line represent the RTT from the three contact attempts with the router. o We do see an increase in the avg RTT as we move further away from the client. Not that sometimes we might see a hop reflect a larger RTT than the next hop router. This usually is due to the fact that some routers handle packets that require special processing (such as when the traceroute client contacts the router) on a low priority basis. Routers typically give priority to forwarding traffic and then respond to IP control/signaling messages such as ICMP or IP options at a lower priority. o The asterisks at hops 11 and 12 are probably due to a firewall rule. Question 2.2. Plot the probability distribution of each data set. There are different ways to do this. You do not need to submit the scripts or tools you used- just document in your HW submission how you did this. Your submission should show each distribution separately (cut and paste the plot or figure of the distribution). One method is: Step 1: Using a script/program, process each ping output data file (ping1.dat and ping2.dat) and create two files that contain two fields: the timestamp and the RTT. Let s refer to these files as RTT1.dat and RTT2.dat. Step 2: We want to plot the distribution of the RTT from each of the reduced data files. You can do this with excel, matlab, R,. o The plotdatapdf.m matlab program will work (link is on our web page). Just make sure the line load RTT1.dat corresponds to the data file. Also make sure the data file is in the same directory as the matlab script. The version of plotdatapdf.m on our web site should be all set to plot the measurement-based distribution in the file RTT1.dat. In a matlab command window plotdatapdf(1,500000,.5) The parameters are: plotmode: value 1 is to plot PDF, maxxvalue sets the max RTT sample to microseconds, maxy sets scale of Y axis to [0,0.50] Results: Include the two plots in your HW submission. Very briefly, interpret the results. In your opinion, what conclusions can you draw from each figure? As best you can, explain any significant differences between the two data sets (based on the visualizations) 5
6 Section 3 Sockets Programming You should get familiar with the UDPEcho program (V1-2 in the code examples). You will be making two functional enhancements to this program. Also, you will be validating these changes. I refer to these two tasks as part 1 (the two functional enhancements) and part 2 (the validation) of this question. Summary of UDPEcho Download the code run the client and server with no parameters to get the usage information. Look over the source code to get familiar with the details. The program is a very is a simple UDP client/server program. It is similar to the ping program, except instead of ICMP it uses the UDP transport protocol. Example usage in the following diagram is the client runs on Host1 and the server runs on Host2. Let s assume the IPv4 address of Host2 is and the server is to use port The client is instructed to use a message size of 1000 bytes and to perform 10 iterations. Host network----- Host2 At Host2, issue:./server At Host1, issue:./client The server parameters: Server side port number Debug Flag - controls the amount of provided by the server. The parameter conveys two logging settings: The 8 th bit of the lowest octet specifies if the server is to log iteration samples to the file EchoServer.dat (a 1 is yes). The lower 7 bits encodes the debuglevel which controls how much tracing information is displayed to standard out. A value of 0 displays errors, a value of 1 displays start and stop information, a value of 2 displays iteration results, and a value of 3 displays debugging information. A setting of 1 or 129 would be typical. The client parameters: Server IPv4 address as a domain name or in dotted quad format Server port : specifies the server port Iteration delay: Number of microseconds between samples Message size: specifies the number of application bytes to place in each message. In order to ensure a message fits in one IP packet, you should assume a message size can not exceed 1472 bytes. Number iterations: specifies the number of iterations (i.e., data samples) to perform (or obtain). Debug Flag - Same as the server parameter except the sample log file is RTT.dat. 6
7 The client sends a message of the given size and then waits for a timeout amount of time for the echo ed message. The client places a sequence number (32 bit unsigned int) in each message, beginning with 0 and incrementing by 1 with each new iteration. The remaining data values are set to zero. If the iteration is successful, the echo ed packet is received by the client host and unblocks the client application with the received message placed in the applications receive buffer (that was passed on the recvfrom call). If the iteration is NOT successful, the client alarm (or timeout) pops which causes the next iteration. The client does not retransmit the data. The client terminates after it completes the desired number of iterations or when a CNT-C is issued. Summary statistics are displayed that include the mean, max, min of the data set. To avoid IP fragmentation, the client message size must be less than a network maximum transmission size (MTU). On an Ethernet or WiFi link, the MTU about 1500 bytes. Therefore, a message size of 1472 will ensure all of the message fits in a single frame. As an example of IP fragmentation, consider a message size of bytes. This produces an IP datagram of bytes (10000 application data but 28 bytes of overhead from IP and UDP). This datagram is broken up into 7 IP packets (which are also called IP fragments). The IP layer at the server Host is responsible for reassembling the IP datagram. If all IP packets arrive, the server side IP layer passes the byte IP datagram to the UDP layer, which then transfers the bytes of data from the datagram into the server application buffer and unblocks the application process (which was blocked on the recevfrom call). The server is very simple. It simply loops forever, receiving a packet and then transmitting the packet back to the sender (i.e., it echoes the received message back to the server). The server can support any number of clients concurrently. However the server currently does not correctly handle statistics when multiple clients are active. As an example, the server assumes packet loss occurs when the next packet that arrives contains a sequence number that is one larger than the sequence number of the previous message. If there is more than one client active at the same time, this method for detecting packet loss will not work. This homework question involves two separate functional changes to the current UDPEcho program. First, you are to modify the server so that it maintains a set of statistics for each client session that it handles. Second, you are to add a new mode of operation to the client and server. Part 1. Functional Enhancements Part 1.1 You are to extend the server so that it tracks maintaining statistics on a per session basis. Let s define a session as a unique combination of client IP address and client port number. Note that one client session might change its port if errors occur. We are 7
8 simplifying the function requirements by having the server not detect a session that involves a client port change. The client code does not change. The server code will maintain a data structure that contains a list of session status. Each session status should contain the following elements: Client IP Client port Creation time Session mode (value 0 is echo mode, value of 1 is CBR mode) Time last message received Total number of messages received Total bytes received Most recent sequence number Count of packets out of order Count of packets dropped When the server terminates, it should print a summary of each session in a file called serverresults.dat. Please use one line per session. Each summary line should include Client IP Client port Duration of session Total number of messages received Count of packets out of order Count of packets dropped Estimate of packet loss rate Throughput (bits per second) The value of the debugflag parameter determines if the client and server are to log samples in a log file (RTT.dat and EchoServer.dat respectively). This change does NOT affect the creation of RTT.dat. For the server, if the 8 th bit of the debugflag is set, it should continue to create entries in the EchoServer.dat file. However, modify the code so it adds the client s IP and port as the first and second fields of each sample logged to file. Part 1.2 You are to add a new operating mode to the tool which we call Constant Bit Rate (CBR) mode In this mode, the client sends fixed size messages at a constant packet rate, approximating a constant bit rate (CBR) traffic generator. The server does NOT send anything back. 8
9 The client program adds a parameter called mode. A value of 0 tells the client to operate in the original echo mode. A value of 1 tells the client to operate in this new mode. If in mode 1 (called CBR mode), there is another additional parameter, the target sending rate. For a message size parameter of M, and a target sending rate parameter or R, the client will send a new packet every R / (M*8) seconds. The client adds the following fields to each message: Sequence number (32 bit unsigned int) Mode : 16 bit unsigned int) In mode 0, when the client terminates, it should display the statistics as described above. In CBR mode, the client should display the duration of the session, the number of packets sent and the actual sending rate (bits per second). The server learns the client session mode through the mode field in the messages. The server maintains the session statistics as described in the previous section. At program termination, the server prints the session summary information in the output file serverresults.dat as previously described. For CBR mode sessions, the client and server should ignore the setting of the 8 th bit of the debugflag and NOT log samples to RTT.dat or EchoServer.dat. Note that the server must support multiple clients that might be in either mode. The client and server should log samples for mode 0 sessions (as described in the previous section). Part 2. Validation You are to conduct an analysis to prove that both added functions to the program works correctly. You should identify a set of test cases that thoroughly tests your design and implementation. Your analysis should include the use of tcpdump or wireshark. I am leaving the details of this up to you. Your writeup should fully document the design, implementation of your code. It should also document the test cases and results. 9
When the ACK message arrives at the client, it computes an RTT sample and then immediately sends the next message.
CPSC 3600 HW #2 s Fall 2017 Last update: 10/12/2017 Please submit your written answers as a PDF using canvas And your modified UDPEcho.tar.gz using handin Please work independently Name: 1 (10) Two nodes
More informationCPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members)
CPSC 3600 HW #4 Solutions Fall 2017 Last update: 12/10/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 (20 points) Solution: a) false b) false
More informationCPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members)
CPSC 3600 HW #4 Fall 2017 Last update: 11/9/2017 Please work together with your project group (3 members) Name: Q 1 Kurose chapter 3, review question R14 Q 2 Kurose chapter 3, review question R15 Q 3 Kurose
More informationCPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017
CPSC 4240/6240 Spring 2017 HW # 3 v1 Last update: 3/22/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on your own or with
More information1.2 The first Internet (i.e., one of the first packet switched networks) was referred to as the ARPANET.
CPSC 360 Spring 2011 Exam 1 Solutions This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheets of paper with whatever you like written on the front and back. You
More informationCPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017
CPSC 424/624 HW #2 version 1 Solution Spring 2017 Last revision: 3/4/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationShort answer (35 points)
CPSC 360 Fall 2017 Exam 1 Version 2 Solutions (last updated 10/19/2017) This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheet of paper with whatever you like
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationCPSC 424/624 Exam 1 Solutions Spring 2016
CPSC 424/624 Exam 1 Solutions Spring 2016 Name: You can use a single 8.5 by 11.0 sheet of paper (front and back) for notes. You can use a calculator. Please do not share your notes sheet or your calculator.
More informationComputer Networks A Simple Network Analyzer Decoding Ethernet and IP headers
Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Objectives The main objective of this assignment is to gain an understanding of network activities and network packet formats
More informationLecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage
Lecture 11: Fragmentation & Addressing CSE 123: Computer Networks Stefan Savage So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes, how to
More informationIntroduction to Computer Networks. CS 166: Introduction to Computer Systems Security
Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationLecture 9: Internetworking
Lecture 9: Internetworking CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes,
More informationComputer Networks Security: intro. CS Computer Systems Security
Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationInternet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1
Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More information( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture
CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationEach ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields.
IP address ICMP Each ICMP message contains three fields that define its purpose and provide a checksum. They are TYPE, CODE, and CHECKSUM fields. The TYPE field identifies the ICMP message, the CODE field
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More informationCPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017
CPSC 4240/6240 Spring 2017 HW # 3 v1 Solutions Last update: 4/20/2017 You can work individually or with a partner (we won t allow groups > 2). Note that the grading will be identical if you work on your
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationEP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer
EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2010 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable calculators are permitted
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationPacketExpert PDF Report Details
PacketExpert PDF Report Details July 2013 GL Communications Inc. 818 West Diamond Avenue - Third Floor Gaithersburg, MD 20878 Phone: 301-670-4784 Fax: 301-670-9187 Web page: http://www.gl.com/ E-mail:
More informationRef: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on
IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationNetwork Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:
Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless
More informationNetwork Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control
The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationDepartment of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011
Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 15, 2011 Instructions: Examination time: 180 min.
More informationComputer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am
15-744 Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am (please submit through e-mail to zhuoc@cs.cmu.edu and srini@cs.cmu.edu) Name: A Congestion Control 1. At time t, a TCP connection
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationCS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationDepartment of Computer Science and Engineering. COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005
Department of Computer Science and Engineering COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005 Midterm Examination Instructions: Examination time: 75 min. Print
More informationExample questions for the Final Exam, part A
ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationConfiguring Routes on the ACE
CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationTCP/IP and the OSI Model
TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationCSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 2
CSCI411: Introduction to Computer Networks Fall 017 Homework Assignment Due 11:59pm Friday November 17 Instructions: 1. Please submit your homework using the on-line electronic submission system (via Moodle)
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationEC441 Midterm Two Fall 2017
EC441 Midterm Two Fall 2017 This is an open-book, open-computer, open-notes exam. You may work with a partner, but you must submit one joint answer for each problem. You may not complete any exam with
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationCOMS3200/7201 Computer Networks 1 (Version 1.0)
COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationChapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University
Chapter 7 Internet Protocol Version 4 (IPv4) 1 7.1 Introduction The transmission mechanism used by the TCP/IP Unreliable and connectionless datagram protocol Best-effort delivery service IP packets can
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationReliable File Transfer
Due date Wednesday, Mar 14, 11:59pm Reliable File Transfer CS 5565 Spring 2012, Project 2 This project is worth 100 points. You may form teams of up to two students for this project. You are not required
More informationECE 610: Homework 4 Problems are taken from Kurose and Ross.
ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationDepartment of Computer Science and Engineering. CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016
Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016 Midterm Examination Instructions: Examination time: 75 min.
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationNote: This practice midterm only covers a subset of the topics you are required to know.
CS144 Practice Midterm Fall 2010 Note: This practice midterm only covers a subset of the topics you are required to know. Question 1: Suppose you are writing a file copy program in TCP. You send a TCP
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationNetwork Layer/IP Protocols
Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationCSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical
CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet
More informationECE 435 Network Engineering Lecture 12
ECE 435 Network Engineering Lecture 12 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 17 October 2016 Announcements HW#5 will be posted soon 1 1. OSI Layers Midterm Review (a)
More informationSingle Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking
1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationProblem 7. Problem 8. Problem 9
Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate
More informationComputer Communications and Networks (COMN), 2017/18, Semester 1
Computer Communications and Networks (COMN), 2017/18, Semester 1 Assignment Overview The overall goal of this assignment is to implement and evaluate different protocols for achieving end to end reliable
More information