NAPIER UNIVERSITY SCHOOL OF COMPUTING

Size: px
Start display at page:

Download "NAPIER UNIVERSITY SCHOOL OF COMPUTING"

Transcription

1 NAPIER UNIVERSITY SCHOOL OF COMPUTING Level III SESSION 2000/2001 Duration: 2 hours Computer Networks and Distributed Systems MODULE NO: CO32006 (MM32021) There are SIX questions in this paper Attempt THREE questions. There are 4 pages in this paper. Examiners: W.Buchanan G.Russell A.Scott

2 Student Workload Lectures/Tutorials Practicals/Project Work Examination Module Organiser 24 hours 12 hours 2 hours Assessment Examination 40% (Any 3 from 6) Project 60% Aims The main learning outcomes are: A1. To provide an understanding of importance of the OSI model, and how standard protocols and networking types fit into this model. A2. To describe the advantages and disadvantages of differing network topology types, and how topology affects the performance of a network. A3. To outline the operation of typical networking technologies, especially Ethernet and ATM. A4. To describe methods of routing used on the Internet and with ATM networks. A5. To understand the architecture of the Internet, and how data is routed from one node to another, over interconnected networks. A6. To understand how data travels from one application to another, over a network. Module content The areas covered are: C1. Network fundamentals. OSI model. Data encapsulation. Network Topologies. Network elements: hubs, bridges, routers and switches. Peer-to-peer and client/server networks. C2. LAN/WAN network types. Practical network types, especially Ethernet and ATM. C3. Network protocols. TCP/IP. IP: Functions, IP addressing, IP routing, IP header, IP addressing, subnetting. TCP: Functions, TCP header, UDP header, three-way handshake. C4. Network security. Security: IP spoofing, session hi-jacking, and so on. Firewalls/Proxy servers. C5. Higher-level protocols. WWW: HTTP, architecture. Electronic Mail: Components, SMTP and MIME. Exam coverage The following table outlines how the examination covers the aims and content of the module. Aims Content Q A1 A2 A3 A4 A5 A6 C1 C2 C3 C4 C

3 Timetable Week Lecture/Tutorial 1 Lecture/Tutorial 2 Practical/Project Number 1 Unit 1 (Introduction) AS Unit 1 (OSI Model) WB Worksheet 1 (Network 2 Unit 2 (Networking Fundamentals) AS Tutorial 1 (Introduction) AS Introduction and Introduction to the WWW) 3 Tutorial 2 (Networking Worksheet 2 (ping) 4 Unit 3 (Ethernet) AS Fundamentals) Tutorial 3 (Ethernet) AS Worksheet 3 (tracert) 5 Unit 4 (ATM) AS Tutorial 4 (ATM) AS Worksheet 4 (netstat/ipconfig) 6 Unit 5 (TCP/IP) WB 7 Unit 6 (TCP/UDP) Tutorial 5 (TCP/IP) WB 8 WB Tutorial 6 (TCP/UDP) WB 9 Unit 7 (WWW) GR Tutorial 7 (WWW) GR Project 10 Unit 8 (Security) GR Tutorial 8 (Security) GR 11 Unit 9 (Firewalls) GR Tutorial 9 (Firewalls) GR 12 Unit 10 (Electronic Mail) GR Tutorial 10 (Electronic Mail) GR

4 1. (a) Give examples of real-time and non-real-time traffic and explain how ATM copes with the transmission of both types of profile. Explain why ATM does not provide reactive end-to-end flow control? Answer (b) (b) Explain the structure of an ATM cell header and the importance of each part. Using an example show how ATM cells are routed and explain how the VCI virtual paths and circuits route cells. (6) (6) (13) Total Marks [25] Coverage of aims: Content coverage: A3 (To outline the operation of typical networking technologies, especially Ethernet and ATM) A4 (To describe methods of routing used on the Internet and with ATM networks). C2 (LAN/WAN network types. Practical network types, especially Ethernet and ATM). Sting-in-the-tail : Related documents: The coverage of the importance of each of the parts of the ATM header. Sample answer (a) The following are a number of examples for the definition of real-time and non-real-time traffic: Delay sensitive Transmission type Data type Real-time control system Yes Short bursts Telephone/hi-fi music Yes Continuous/repeat File transfer/application progs. No High transfer rate (bursts) Teletex information No Slow transfer rate (bursts) Marking: 1 per example, [2] ATM overcomes the problems of transporting both computer type data and sampled real-time data by:

5 Analysing the type of connection to be made. For example, computer data requires a reliable connection, whereas real-time sampled data requires a connection with a low propagation time. [1] Analysing the type of data to be transmitted and knowing its traffic profile. Computer data tends to create bursts of traffic whereas real-time data will be constant traffic. [1] Reserving a virtual path for the data to allow the data profile to be transmitted within the required quality of service. [1] Splitting the data into small packets which have the minimum overhead in the number of extra bits. [1] (b) ATM Cell Header ATM cells (small fast packets ) Cell header ) VCI Label VCI (24 bits) (24 Control Checksum Contro Checksu (8 (8bits) (8 (8bits) Optional Option (32 bits) (32 Data Data (44 or 48 bytes) (44 or 48 The The virtual identifier (VCI) identifies the the route the the data. data. by by a fixed network time time Simple checksum for for detection. It It is is the the complement of of the the sum sum of of bytes in in the the Adaptation Layer fragmentation & assembly of of cells cells large large packets at at & The The control field field also also contains bits bits specify whether this this is is a flow flow control an an ordinary data data cell, cell, a bit bit to to whether this this packet can can be be congested network, and and Also, Also, a bit bit sets sets if if the the data data is is bytes Marking schedule: Diagram [2] Explanation of each Term in Header 1mark each [4]

6 (c) Routing example/ Virtual Paths ATM cell routing VCI labels between nodes in Routing IN OUT VCI=06 Routing IN OUT VCI= VCI=22 User 1 11 VCI=10 55 VCI=15 Transmissio: node UNI & negotiates destination, traffic type, peak 77 traffic needs, delay & cell requirement. Networkcomputes a route to determine best link for stage (to support requested service quality). The sends a connection set request to all 66 User 3 44 User 2 Virtual Channels and Virtual Paths A virtual is set-up between two users on a Cellstravel over this fixed path & through the reserved Oftenseveral virtual circuits travel through the same VC2 VC5 VC1 VC3 VC4 VC6 Virtual path Virtual path Transmission channel VP VP VC1 VC3 VC2 VC8 VC7 VC9 Virtual path VP Severalvirtual channels together(same start start end end points) to to create virtual path path Virtual Networkuser groups or or interconnected can can be be mapped to to virtual virtual paths paths and and are are thus thus administered Simplernetwork architecture which which consists groups (virtual paths) paths) with with individual (virtual Lessnetwork administration and and shorter times times arise arise from from fewer fewer set-up set-up Marking schedule: Routing example [7] Virtual channels and paths [6]

7 2. (a) Describe the structure of an IEEE Ethernet data frame and identify the usage of each field. (12) (b) What advantages do switches have over conventional hubs? Discuss both cut-through and store-and-forward switches. Explain their differences and incorporate the advantages and disadvantages of each. (13) Total Marks [25] Answer Coverage of aims: A1 (To describe the advantages and disadvantages of differing network topology types, and how topology affects the performance of a network) A3 (To outline the operation of typical networking technologies, especially Ethernet and ATM) Content coverage: C2 (LAN/WAN network types. Practical network types, especially Ethernet and ATM). Sting-in-the-tail : Related documents: To be able to contrast the methods used with different types of switches. Sample answer (a) 7 bytes 1 byte 6 bytes 6 bytes 2 bytes 4 bytes 96 bits Preamble Start delimiter Destination address Source address Length FCS Delay to 1500 bytes Data field (Logical Link Control) The preamble and delay components define the start and end of the frame. Preamble (seven bytes) precedes the Ethernet frame. Each byte of the preamble has a fixed binary pattern of and each node on the network uses it to synchronise their clock and transmission timings. It also informs nodes that a frame is to be sent and for them to check the destination address in the frame.

8 Start delimiter field (SDF) is a single byte (or octet) of It follows the preamble and identifies that there is a valid frame being transmitted. Source/destination addresses (2 or 6 bytes, Most Ethernet systems use a 48-bit MAC address for the sending and receiving node. Each Ethernet node has a unique MAC address, which is normally defined as hexadecimal digits. CRC (32 bits) 4 bytes for error checking, correct sequencing of bytes and multiple frames. LLC length (16 bits) 2 bytes. The LLC part may be up to 1500 bytes long and minimum 46 bytes long. Delay. The end of the frame there is a 96-bit delay period, which provides the minimum delay between two frames. This slot time delay allows for the worst-case network propagation delay. Marking Diagram [6] Description (1) mark for each field [7] (b) A network can be set up using segment switching and network hubs. [1] The store-and-forward switching technique reads the entire Ethernet frame before forwarding it, with the required protocol and at the correct speed, to the destination port. [2] The advantages of this are: Improved error check. Bad frames are blocked from the entering a network segment.[1] Protocol filtering. Allows the switch to convert from one protocol to another. [1] Speed matching. Ethernet 10Mbps or 100Mbps, ATM 155Mbps, FDDI 100Mbps. [1] The main disadvantage of this is: System delay. As the frame must be totally read before it is transmitted thus is a delay in transmission. [2] In the cut-through switching technique the data frame is forwarded to the destination before it is fully received. [2] The advantages of this are: Less delay (latency) between the reception and transmission of a data packet [1] The disadvantage of this technique is: Poor error checking. It does not have a chance to detect any errors, before it has started to transmit the received data frame. [2]

9 3. (a) With reference to the functions of the transport layer of the OSI model, discuss why the transport layer can be described as implementing a reliable, connection-oriented protocol. (9) (b) Explain, with reference to TCP and UDP headers, why TCP fits the description of being a reliable, connection-oriented protocol, but UDP does not. (9) (c) How does a TCP connection know when a remote connection has crashed, and why is it not possible for a previous connection to be confused with a current connection? (7) Total Marks [25] Answer Coverage of aims: Content coverage: Sting-in-the-tail : Related documents: A1 (To provide an understanding of importance of the OSI model, and how standard protocols and networking types fit into this model) A6 (To understand how data travels from one application to another, over a network) C1 (Network fundamentals. OSI model. Data encapsulation. Network Topologies. Network elements: hubs, bridges, routers and switches. Peerto-peer and client/server networks) C3 (Network protocols. TCP/IP. IP: Functions, IP addressing, IP routing, IP header, IP addressing, subnetting. TCP: Functions, TCP header, UDP header, three-way handshake). To be able to explain how a connection cannot be confused with a previous connection, and when a connection has crashed. Sample answer (a) With reference to the functions of the transport layer of the OSI model, discuss why the transport layer can be described as implementing a reliable, connection-oriented protocol. The main functions of the transport layer are: Synchronization and acknowledgement. Initially, when the transmitter makes contact with the receiver it makes a unique connection. The transmitter thus knows that the receiver is on-line, and willing to receive data. [2]

10 Acknowledgements and retransmissions. This allows the receiver to send back acknowledgements which tell the transmitter that the data segments have been received correctly. If no acknowledgements have been received, the transmitter can either resend the data, or can assume that the receiver has crashed and that the connection is to be terminated. [2] Flow control. This allows the receiver to tell the transmitter that it cannot receive any more data at present. This typically happens when the receiver has filled-up its receiving buffer. [2] Windowing. This is where the transmitter and the receiver agree on a window size when the connection is initially made. The window then defines the number of data segments that can be sent before the transmitter must wait for an acknowledgement from the receiver. [1] Multiple connections onto a single data stream. The transport layer takes data from one or more applications; it then marks them with a unique connection number and segment number. At the receiver these can be demultiplexed to the correct application program. [1] Reordering of data segments. All the data segments that are transmitted are marked with a sequence number. Thus if any are delivered in the incorrect order, or if any of them are missing, the receiver can easily reorder them or discard segments if one or more are missing. [1] (b) Explain, with reference to TCP and UDP headers, why TCP fits the description of being a reliable, connection-oriented protocol, but UDP does not. The TCP header contains: Source and destination port. This allows the source and destination to create a unique connection. [2] Sequence number. The allows data segments to be given unique value, thus data segments that are lost can be traced. [2] Acknowledgement number. This allows for data segments to be acknowledged. [2] Window. Allows for the negotiation of the window size which defines the number of data segments that can be sent before an acknowledgment is required. [2] UDP only defines a source and destination port [1]. (c) How does a TCP connection know when a remote connection has crashed, and why is it not possible for a previous connection to be confused with a current connection? The initial segment number [ISN] is generated from a 32-bit clock [1] which is incremented many times a second [1]. The clock has a rollover measured in days [1], data segments will not have the same data segment numbers from previous connections, as the each data segment identifies each of the bytes which are sent [2]. A connection will time-out before the 32-bit clock will rollover [2].

11 4. (a) Outline the difference between a static IP address and a dynamically-allocated IP address. How might a network manager use dynamically-allocated IP addresses to access to a network and/or the Internet? (7) (b) For a Class B address, derive the maximum number of hosts and the maximum number of subnets for a subnet mask of State all the assumption made. (8) (c) When a computer is to be connected a network and to the Internet, what networking parameters need to be set for it to communicate using TCP/IP? Also, briefly outline how a node is able to determine the MAC addresses of the hosts on a network, and how data packets are able to get passed a router and onto the Internet? (10) Total Marks [25] Answer Coverage of aims: Content coverage: Sting-in-the-tail : Related documents: A1 (To provide an understanding of importance of the OSI model, and how standard protocols and networking types fit into this model) A4 (To describe methods of routing used on the Internet and with ATM networks) A5 (To understand the architecture of the Internet, and how data is routed from one node to another, over interconnected networks) C3 (Network protocols. TCP/IP. IP: Functions, IP addressing, IP routing, IP header, IP addressing, subnetting. TCP: Functions, TCP header, UDP header, three-way handshake) To be able to explain who a computer can connect to a LAN and determine all the networking parameters, after being told the basic parameters, such as its own IP address, the IP address of the gateway, and so on. Many Internet experts would struggle to properly explain this. Sample answer (a) Outline the difference between a static IP address and a dynamicallyallocated IP address. How might a network manager use dynamicallyallocated IP addresses to access to a network and/or the Internet?

12 A static IP address is permanently assigned to a host, and is unique to that host [2], a dynamically-allocated IP address is granted by a server, such as a DHCP server [2]. A network manager may set up a table which maps MAC addresses to IP addresses [2], and only allow certain hosts to be granted an IP address[1]. (b) For a Class B address, derive the maximum number of subnets and the maximum number of hosts of each subnet for a subnet mask of State all the assumption made. Subnet mask is which gives a binary mask of [3]. Thus, as it is a Class B address the last two fields identifies the subnet and host part [1], there will thus be six bits for the subnet (64), and 10 bits for the hosts (1024) [2]. There are two addresses which are used for broadcast (all 1 s), and for the network (all 0 s). Thus there will only be 62 subnets, and 1022 hosts [2]. (c) When a computer is to be connected a network and to the Internet, what basic networking parameters need to be manually set up for it to communicate using TCP/IP? Also, briefly outline how a node is able to determine the MAC addresses of the hosts on a network, and how data packets are able to get passed a router and onto the Internet? Typical manual settings: Host IP address or DHCP server address [2]. Gateway IP address [1]. Domain name server IP address [1]. Subnet mask [1]. If a host does not know the IP address of a host on the network it sends out an ARP request with the required IP address, and the host with the correct IP address replies back with an ARP reply [3]. It then updates its ARP table. For the gateway, the host determines the MAC address of the router port with an ARP request/reply [1], it can then use the destination IP address with the MAC address of the router to send data packets over the router [1].

13 5. (a) Outline a set of best practices for creating a high-security network. (b) Explain how a firewall could be used to create a secure network, and outline the parameters in TCP data segments and in IP data packets which the firewall would filter with. (c) Explain the operation of an encryption tunnel using public-key encryption to create a secure connection. (8) (10) (7) Answer Coverage of aims: Content coverage: Sting-in-the-tail : Related documents: Total Marks [25] A1 (To provide an understanding of importance of the OSI model, and how standard protocols and networking types fit into this model) A5 (To understand the architecture of the Internet, and how data is routed from one node to another, over interconnected networks) A6 (To understand how data travels from one application to another, over a network) C3 (Network protocols. TCP/IP. IP: Functions, IP addressing, IP routing, IP header, IP addressing, subnetting. TCP: Functions, TCP header, UDP header, three-way handshake) C4 (Network security. Security: IP spoofing, session hi-jacking, and so on. Firewalls/Proxy servers) To be able to explain how a public key is passed between two parties, and how they use their private key to decode the data. Sample answer (a) Outline a set of best practices for creating a high-security network. Examples include (student should give eight): 1. BAN EXTERNAL CONNECTIONS. In a highly secure network, all external traffic should go through a strong firewall. There should be no other external connections on the network. If possible, telephone lines should be monitored to stop data being transferred over without going through firewall. [1] 2. BAN FLOPPY DISKS AND DATA STORAGE DEVICES. Employees should not be able to enter or leave the organization with any data on disk. Some organizations remove floppy disk drives from their computers to try and limit the possibility of transferring data. [1] 3. NO USER CAN INSTALL SOFTWARE. Viruses can be easily spread if users are allowed to install their own software. [1] 4. SECURE ACCESS TO RESOURCES. Typically users must use swipe cards, or some biometric technique to gain access to a restricted domain. [1]

14 5. LIMIT INTERNET ACCESS. Only key personnel should be given rights to access the external Internet. If possible the computers which access the Internet should be well protected against malicious programs. [1] 6. FIREWALLS USED BETWEEN DOMAINS. Internal hackers can be as big a problem as external hackers. Thus firewalls should be used between domains to limit access. [1] 7. BASE AUTHENTICATION ON MAC ADDRESSES. Network addresses do not offer good authentication of a user, as they can be easily spoofed. An improved method is to check the MAC address of the computer (as no two computers have the same MAC address). [1] 8. EVERY FILE AND OBJECT SHOULD HAVE UNIQUELY DEFINED PRIVILEDGES. Every file and resource should be uniquely setup for user privileges which can limit access. [1] Others might include: 9. EMPLOY SECURITY MANAGER. The security manager will be responsible for the design of the initial security model, and any changes to it. [1] 10. LOG EVERY EVENT. All the important security related events should be monitored within each domain. If possible they should be recorded over a long period of time. Software should be used to try and determine incorrect usage. (b) Explain how a firewall could be used to create a secure network, and outline the parameters in TCP data segments and in IP data packets which the firewall would filter with. Which ports are typically barred in a secure network? A firewall can be used to create secure networks by examining the TCP and IP parts of the TCP segment, and the IP data packet [1]. Typical tests are: Protocol. Typically either TCP, UDP or ICMP. [2] Source IP address. The firewall will grant and bar various source IP addresses either entering or leaving the firewall [1]. Destination IP address. The firewall will grant and bar various destination IP addresses either entering or leaving the firewall [1]. Source port. This will allow or bar certain TCP ports from entering or leaving the network for the source port [1] Destination port. This will allow or bar certain TCP ports from entering or leaving the network for a destination port [1]. Rules. Using one or more of the above [1]. Ports barred a typically FTP (because of the risk of transfer of files), and TELNET (because of the risk of remote log-in). [2] (c) Explain the operation of an encryption tunnel using public-key encryption to create a secure connection. Initially the two hosts each create two keys: a private one and a public one [2]. Each host then sends their public key to the other [2]. The data at one end is encrypted with the public key of the other, and sent. Only the private key of the other host can then decrypt the encrypted message [2]. When the connection is complete the keys are erased [1].

15 6. (a) Illustrate the different layers of the OSI 7-layered model, and provide an example of each layer. Also, with reference to the OSI model, identify the function of the three lower layers and discuss the function of the repeaters, bridges and routers. (b) Outline the operation of the HTTP protocol and how WWW caches are used in the transfer of WWW pages. What advantages does a cache-based system have over one without caches? Also explain why a WWW client knows that the file has been received correctly, or not. (13) (12) Answer Coverage of aims: Content coverage: Sting-in-the-tail : Related documents: Total Marks [25] A1 (To provide an understanding of importance of the OSI model, and how standard protocols and networking types fit into this model) A6 (To understand how data travels from one application to another, over a network) C1 (Network fundamentals. OSI model. Data encapsulation. Network Topologies. Network elements: hubs, bridges, routers and switches. Peer-to-peer and client/server networks. C5 (Higher-level protocols. WWW: HTTP, architecture. Electronic Mail: Components, SMTP and MIME). To be able to identify that the reliability is built into the TCP level and not at the session level. Sample answer (a) Illustrate the different layers of the OSI 7-layered model, and provide an example of each layer. Also, with reference to the OSI model, identify the function of the three lower layers and discuss the function of the repeaters, bridges and routers. Marking: Draw OSI model [2], with examples [2].

16 Functions of Physical: Electrical and Mechanical [2], Data link: Error detection, Framing and Physical Addressing [2] and Network: Addressing and Routing [2]. Repeaters operate at the physical layer and boost signals and clean digital pulses [1]. Bridges operate at the data link layer and operate on MAC addresses [1] Routers operate at the network layer on IP addresses [1]. (b) Describe the operation of the HTTP protocol and how caches in the transfer of WWW pages. Also explain why a WWW client knows that the file has been received correctly, or not. Marking: Basic operation of HTTP: Uses a TCP/IP connection [1]. Client issues a GET with the require name, and content-type [2]. Server returns back an integer response code (such as Okay), and the file [2]. With cache: 1. Client requests page, with date last modified. [1] 2. Request made to server for page with date last modified. [1] 3. Client receives a message that page has not changed. [1] 4. WWW client uses local or networked cache version if not modified since the previously loaded version. [1] A WWW cache reduces the time to download a file, it the file is unchanged [1]. The reliability is built into the TCP level, and not the session level, thus once the page is fully received, it can be assumed free of error [2].

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge. Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Cisco Interconnecting Cisco Networking Devices Part 1.

Cisco Interconnecting Cisco Networking Devices Part 1. Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS

More information

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

CCNA 1 Final Exam Answers UPDATE 2012 eg.1 CCNA 1 Final Exam Answers UPDATE 2012 eg.1 January 12th, 2012AdminLeave a commentgo to comments Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1 Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Communicating over the Network Network Fundamentals 1 Network Structure Define e the components of a network Network components hardware software 2 Network Structure End Devices and their Role in the Network

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Prof. Bill Buchanan Room: C.63

Prof. Bill Buchanan Room: C.63 Wireless LAN CO72047 Unit 7: Filtering Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill http://buchananweb.co.uk

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta) 70-742 Number: 70-742 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Microsoft 70-742 Exam Name: Identity with Windows Server 2016 (beta) Sections 1. Understanding Local Area Networks 2. Defining

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security TCP/IP Networks with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 Critical

More information

University of Southern California EE450: Introduction to Computer Networks

University of Southern California EE450: Introduction to Computer Networks University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Computer Networks (16MC811) Year & Sem: II-MCA & I-Sem Course : MCA

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2017 18 Coordinator

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D. ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Cisco 1: Networking Fundamentals

Cisco 1: Networking Fundamentals Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course

More information

KINGS COLLEGE OF ENGINEERING

KINGS COLLEGE OF ENGINEERING KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR 2011-2012 / ODD SEMESTER QUESTION BANK SUB.CODE / NAME YEAR / SEM : CS1302 COMPUTER NETWORKS : III / V UNIT I DATA COMMUNICATION

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy Primer IP Technology L2 Ethernet Switching versus L3 routing IP Protocol, IP Addressing, IP Forwarding ARP and ICMP IP Routing, OSPF Basics First Hop Redundancy (HSRP) Agenda L2 versus L3 Switching IP

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

QUESTION BANK UNIT-I

QUESTION BANK UNIT-I DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?

More information