Trp. Trp. Master Informatique 1 st year 1 st term. ARes/ComNet Transport layer (7 points) Anonymous ID: stick number HERE
|
|
- Lucinda Tate
- 6 years ago
- Views:
Transcription
1 Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. App The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the frames provided for that purpose. QUIT Bye 1. What is the application? What is the software used for this application? What is the user doing with this application? What is the protocol used at the application layer? 2. What are the protocol s commands that we can see in this exchange? 1 Applications (6 points) Analyze the following message exchange between a client and a server. The messages have been intercepted at the Application layer. 220 mail.etu5.plateforme.lan ESMTP Postfix (Debian/GNU) EHLO [ ] 250-mail.etu5.plateforme.lan 250-PIPELINING 250-SIZE VRFY 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN MAIL FROM:<etudiant@mail.etu5.plateforme.lan> Ok RCPT TO:<etudiant@mail.etu5.plateforme.lan> Ok DATA 354 End data with <CR><LF>.<CR><LF> Subject: Test From: etudiant on VM3 <etudiant@mail.etu5.plateforme.lan> To: etudiant@mail.etu5.plateforme.lan Content-Type: text/plain Date: Wed, 01 Oct :05: Message-ID: < camel@5vm1.etu5.plateforme.lan> Mime-Version: 1.0 X-Mailer: Evolution Content-Transfer-Encoding: 7bit Bonjour de Jussieu What is the IP address of the client? What is the DNS name of the mail server? What is the sender s address? What is the receiver s address? 4. What are the headers indicating that the follows the MIME format? What is the purpose of MIME? What is the encoding used to send the message content over the network? What is the header indicating this encoding type? 5. What is the message s subject? What is the message s content? 6. It is possible to connect to the server using Telnet to do the same thing that we have analyzed? Give the command line which allows the user to log on the server to do that. 7. If the user used web mail to send the message, what would be the Application layer protocol used between the client and the server? With this protocol, what would have been the commands used? Ok: queued as E6 RSET Ok 1/12 Version X en-vA-b 2/12 Version X en-vA-b
2 Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Trp ARes/ComNet Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. Trp The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the frames provided for that purpose. 2 Transport layer (7 points) 6. Two segments have a PUSH bit set (one at the beginning, the other at the end of the trace). What is their role (justify)? Client 8,7 8,9 9,1 9, Serveur On the basis of the TCP trace given in Appendix 2 (page 9), answer the following questions: 1. What is the server address, the client address (justify)? 9,5 9,7 7. At connection setup, MSS options with value of 1460 are exchanged, but in the trace that follows the maximum size of the payload is 1448 bytes. Why (justify)? 9,9 2. What action by the user will have initiated this trace (justify)? 10,1 10,3 10,5 3. Is the protocol analyser that has captured this trace close to the client or to the server (justify)? 8. What is the average throughput observed over the entire connection (justify)? 10,7 10,9 11,1 4. Four options (other than nop or eol) are exchanged during the connection setup. What is each one for? Explain how each one works. 5. What is the RTT that we can observe at the beginning of the connection (justify)? 9. Complete the following chronogram of exchanges, strictly respecting the provided time scale temps (s) 11,3 3/12 Version X en-vA-b 4/12 Version X en-vA-b
3 Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Frm ARes/ComNet Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. Frm The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the places provided for that purpose. 1. Is the frame above carrying a query or a request message? Give three arguments that justify your choice (from the frame). Type: (a) (b) (c) 2. How many IP addresses appear in the frame above? What is the significance of each address? 3 Multi-protocol analysis (7 points) Decode the following frame. Draw and write directly on it. Carefully delimit each protocol field and provide an accurate interpretation of its value. You may refer to the Appendix 1 (page 7) to help in the analysis f f3 fb fe f e ^..T..E. 3. The frame that you have decoded is part of an exchange. If the frame was sent in response to another frame, generate the corresponding query frame. If, on the other hand, the frame was a query frame, generate the corresponding response frame. Just write out the first 70 bytes of the frame, two hexadecimal digits to a box. (If you cannot deduce the value in a box, leave it blank.) a4 d f 11 2e e3 4a e3...?..)..j e d ed f T..5.d...h... Byte num c lequipe.f c0 0c r...d a0 5c 6c b2 c0 0c \l...Y e 03 6e f e ns3.atos.net. 4. The same application layer action that triggered the previous frames will be executed after 10 minutes. Explain what will be the result of this new action? Justify your answer c0 0c e Y...ns c0 3c c f eb c1 38.<.R.../ e f8 c f eb a0 5c /...\ 00a y. 5/12 Version X en-vA-b 6/12 Version X en-vA-b
4 Don t hand back this sheet! Don t hand back this sheet! Appendix 1 Ethernet Frame Layout without preamble/crc: bits bits--+16b Destination Source Type Data address address A few types: 0x0800 = DoD Internet (IPv4) 0x0806 = ARP 0x86DD = Internet Protocol Version 6 (IPv6) IPv4 Paquet Layout <-4b-> <--8bits--->< bits > Ver IHL TOS Total Length Identifier Fl FO TTL Protocol Header Checksum Source Address Destination Address... Options... Data TCP Segment Layout <-4b-> <-6bits->< bits > Source Port Destination Port Sequence Number Acknowledgement Number THL Flag Windows Size Segment Checksum Urgence Pointer... Options... Data THL = TCP header length on 4 bits (32 bits words) Flags on 6 bits (from most significant bit to less) = < URG, ACK, PSH, RST, SYN, FIN > Options = series of options encoded as: 1 byte 00 = end of options (if needed) 1 byte 01 = no operation L bytes with TLV fields (T one byte of type: 2 = negotiate MSS 3 = adaptation of window size 4 = selective acknowledgment 8 = timestamps... L one byte for the total size of the option V the value of the option on L-2 bytes) UDP Datagram Layout A querry: <-----N-Bytes-----><2-Bytes><2-Bytes> Name Type Classe An Answer/AutoritativeNS/AdditionalRecord: <M-Bytes>< 2B. >< 2B. ><4-Bytes>< 2B. ><--D-Bytes---> Name Type Classe T.T.L. Size Data * Name : each domain name is preceded by one byte showing the number of following ASCII characters (if the value is < 63 else the value 0xC0 show a reference to the offset value of the next byte (from the beginning of the message) Ending by 0x00. * A few types: 1 = A (IPv4 Address) 12 = PTR (Name Pointer) 2 = NS (Name Server) 15 = MX (Mail Server) 5 = CNAME (Alias) 28 = AAAA (IPv6 Address) 6 = SOA (Start Of Authority)... * Classe: 1 = Internet * T.T.L.: Cache Validity (seconds) * Size: Data length in Bytes * Data: - Name (Character string as for a query) for NS - Priority (2 bytes) and Name for MX - Address (4 bytes for A, 16 bytes for AAAA)... Ver = IP Version IHL = IP Header Length (32 bits words) TOS = Type of service Total Length of the IP paquet (in bytes) Fl (3 left bits) = fragmentation flags [Reserved Don t Fragment Next Fragment] FO (remaining 13 bits) = Fragment Offset * value to multiply by 8 bytes TTL = Time To Live (hop count) A few protocol fields: 1 = ICMP 33 = DCCP 2 = IGMP 41 = IPv6 Encapsulation 6 = TCP 89 = OSPF 8 = EGP 132 = SCTP 17 = UDP... ICMP Datagram Layout Source Port Destination Port Longueur UDP Datagram Checksum... Data A few ports associated services ftp-data 20/tcp domain 53/udp ftp 21/tcp tftp 69/udp ssh 22/tcp snmp 161/udp telnet 23/tcp snmp-trap 162/udp smtp 25/tcp www 80/tcp Type Code Datagram Checksum Variable... Original Datagram + 8 Bytes A few ICMP types: 0 = Echo response 3 = Destination Unreachable 5 = Redirection 8 = Echo request 11 = Time exceed DNS Messages Layout < 2B.>< 2B.><2B.><2B.><2B.><2B.>< qb.>< ab.>< nb.>< ib.> Ident Flags NbQu NbAn NbNS NbAR Quer. Ans. AutNS. AddR * Ident. = Request Identifier * Flags = DNS parameters (don t explain) * NbQu = Number of Queries * NbAn = Number of Answers * NbNS = Number of Autoritative Name Server * NbAR = Number of Additional Reccords 7/12 Version X en-vA-b 8/12 Version X en-vA-b
5 Don t hand back this sheet! Don t hand back this sheet! Appendix :2000 > :80 S 0(0) win <mss 1460,nop,wscale 3,nop,nop,timestamp 373 0,sackOK,eol> :80 > :2000 S 0(0) ack 0 win 5792 <mss 1460,sackOK,timestamp ,nop, wscale 7> :2000 > :80. ack 1 win <nop,nop,timestamp > :2000 > :80 P 1(586) ack 1 win <nop,nop,timestamp > :80 > :2000. ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack 2897 win <nop,nop,timestamp > :2000 > :80. ack 4345 win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack 5793 win <nop,nop,timestamp > :2000 > :80. ack 8689 win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > : (1448) ack 587 win 55 <nop,nop,timestamp > :80 > :2000 FP 56473(893) ack 587 win 55 <nop,nop,timestamp > :2000 > :80. ack win <nop,nop,timestamp > :2000 > :80 F 587(0) ack win <nop,nop,timestamp > :80 > :2000. ack 588 win 55 <nop,nop,timestamp > 9/12 Version X en-vA-b 10/12 Version X en-vA-b
6 Don t hand back this sheet! Don t hand back this sheet! 11/12 Version X en-vA-b 12/12 Version X en-vA-b
App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (6 points) Anonymous ID: stick number HERE
Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2014-2015 Midterm exam : Version A in English Duration: 2h00 Allowed: One
More informationApp. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE
Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One
More information3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet
Anonymous number: 3 Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1 AResComNet 20172018 Rou destination Final exam : Version A in English Rou
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationPacket Header Formats
A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationI TCP 1/2. Internet TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) TCP Connection-oriented
I TCP 1/2 TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) Internet TCP Connection-oriented UDP Connectionless IP + TCP (connection-oriented) (byte
More informationIntroduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁
II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:
More informationMaster Informatique ComNet Communication Network. ComNet - Lab n 1. Introduction to the networking testbed
ComNet - Lab n 1 Introduction to the networking testbed This first handout is meant to familiarize you with the testbed environment that we use for the course s laboratory exercises. Throughout the semester,
More informationProtocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS
Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationMaster Informatique NetArch Network Architecture. NetArch - Lab n 4. Transport Layer (1): TCP and UDP
NetArch - Lab n 4 Transport Layer (1): TCP and UDP 1 Review of the transport layer 0 0 1 1 1. A web client wishes to access a document for which it knows the URL. The IP address for the server is initially
More informationTSIN02 - Internetworking
Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer
More informationThe Transport Layer. Part 1
The Transport Layer Part 1 2 OVERVIEW Part 1 User Datagram Protocol Transmission Control Protocol ARQ protocols Part 2 TCP congestion control Mowgli XTP SCTP WAP 3 Transport Layer Protocols Connect applications
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationTransport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005
Transport Layer For a connection on a host (single IP address), there exist many entry points through which there may be many-to-many connections. These are called ports. A port is a 16-bit number used
More informationECE 358 Project 3 Encapsulation and Network Utilities
ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities
More informationTSIN02 - Internetworking
TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model
More informationIntroduction to Network. Topics
Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More information6. The Transport Layer and protocols
6. The Transport Layer and protocols 1 Dr.Z.Sun Outline Transport layer services Transmission Control Protocol Connection set-up and tear-down Ports and Well-know-ports Flow control and Congestion control
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More information! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+)
! "#! # $ %& #! '!!!( &!)'*+' '(,-. +) /,*+), 01/-*+) + 01/.*+) ) 05,-. +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+,3 4 +. 6*! ) ) ) ) 5 ) ) ) ) + 5 + + ) ) ) 5 9 + ) ) + 5 4 ) ) + ) 5, ) )
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationNetwork concepts introduction & wireshark
Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity
More informationThe Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.
The Transport Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW User Datagram Protocol Transmission Control
More informationInformation Network 1 TCP 1/2
Functions provided by the transport layer Information Network 1 TCP 1/2 Youki Kadobayashi NAIST! Communication between processes " designation of process " identification of inter-process channel! Interface
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16
CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm
More informationLecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)
Last Lecture Internet Protocol (1) This Lecture Internet Protocol (2) Lecture 18 Overview Source: chapters 19.1, 19.2, 22,1 22.2, 26.6 Next Lecture Transport Control Protocol (1) Source: chapters 24.1,
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationIntroduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis
Introduction to Internet Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis What about inter-networks communications? Between LANs? Ethernet?? Ethernet Example Similarities and Differences between
More informationCIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationDongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis
Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification
More informationCSCI Networking Name:
CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationHands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationCIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol
More informationA Commands CHAPTER. Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter.
CHAPTER 1 The commands shown in this chapter apply to the Catalyst 8540 MSR, Catalyst 8510 MSR, and LightStream 1010 ATM switch routers. Where an entire command or certain attributes of a command have
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationcs144 Midterm Review Fall 2010
cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)
More informationIP Services Commands. Network Protocols Command Reference, Part 1 P1R-95
IP Services Commands Use the commands in this chapter to configure various IP services. For configuration information and examples on IP services, refer to the Configuring IP Services chapter of the Network
More informationCIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationTCP/IP Networking. Part 4: Network and Transport Layer Protocols
TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationSoftware Engineering 4C03 Answer Key
Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used
More informationNetwork concepts introduction & wireshark. workshop
Network concepts introduction & workshop @KirilsSolovjovs ISO/OSI+DoD model Topics for our workshop Network layer models Ethernet, WiFi Layer3: ARP, ICMP, IPv4, IPv6 Layer4: UDP, TCP Routing Application
More informationD Commands. Send document comments to This chapter describes the Cisco NX-OS security commands that begin with D.
This chapter describes the Cisco NX-OS security commands that begin with D. SEC-141 deadtime deadtime To configure the dead-time interval for a RADIUS or TACACS+ server group, use the deadtime command.
More informationCS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly
More informationK2289: Using advanced tcpdump filters
K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationCourse Contents. The TCP/IP protocol Stack
Course Contents PART 1 Overview and Introduction PART 2 Communication Reference Models PART 3 Data Communication Fundamentals and Physical Layer PART 4 Datalink Layer and Emerging Network Technologies
More informationQUIZ: Longest Matching Prefix
QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationTCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.
Overview Formats, Data Transfer, etc. Connection Management (modified by Malathi Veeraraghavan) 1 Overview TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationProblem Max. Points Act. Points Grader
Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2007-12-12 Dr. Jürgen Schönwälder Duration: 90 minutes Final Examination The Jacobs University s Code of Academic Integrity applies
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More information> : S. timestamp > : (0) win <mss 1460,nop,wscale 0,nop,nop, 4 different options used
TCP Options Source Port Destination Port Sequence Number Acknowledgment Number HdrLen Reserved UA P RS F Window Size Checksum Urgent Pointer Options (optional...) Header Length Allows size of options to
More informationAccess List Commands
Access List Commands This module describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists. An access control list (ACL) consists of one or
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationNETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science
NETWORK PROGRAMMING CSC- 341 Instructor: Junaid Tariq, Lecturer, Department of Computer Science 6 Lecture CHAPTER 2: THE TRANSPORT LAYER : TCP AND UDP Contents Introduction UDP: User Datagram Protocol
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators
More informationITS323: Introduction to Data Communications
ITS323: Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 ITS323Y12S1L13, Steve/Courses/2012/s1/its323/lectures/transport.tex,
More informationnetwork security s642 computer security adam everspaugh
network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationTCP/IP Networking Basics
TCP/IP Networking Basics 1 A simple TCP/IP Example A user on host argon.tcpip-lab.edu ( Argon ) makes a web access to URL http://neon.tcpip-lab.edu/index.html. What actually happens in the network? 2 HTTP
More informationNetwork Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015
Network Security Introduction to networks Radboud University, The Netherlands Autumn 2015 What is a (computer) network Definition A computer network is two or more computers that are connected, so that
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationReview of Important Networking Concepts TCP/IP
Review of Important Networking Concepts / / Protocol Suite Assignment of Protocols to Layers Addressing / Layers in the Example Encapsulation and Demultiplexing Different Layers Views of Networking / Protocol
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationCIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1
Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationAnswer to the written exam given on TDTS06 Computer networks, October 23,
Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.
More informationNetwork Technology 1 5th - Transport Protocol. Mario Lombardo -
Network Technology 1 5th - Transport Protocol Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 overview Transport Protocol Layer realizes process to process communication data unit is called a
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationThe Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline
CPSC 360 Network Programming The Transport Layer Reliable data delivery & flow control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)
More informationAccess List Commands
Access List Commands This module describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists. An access control list (ACL) consists of one or
More information