Internet and Web Technologies. Sample Solutions 2013

Similar documents
Birkbeck (University of London)

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network Layer Functions

IP Addressing and Subnetting

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer/IP Protocols

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

ECE 4450:427/527 - Computer Networks Spring 2017

Network Protocols - Revision

Router Architecture Overview

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

Internet Protocols (chapter 18)

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

EEC-684/584 Computer Networks

TCP /IP Fundamentals Mr. Cantu

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Internet Protocol (IP)

Chapter Motivation For Internetworking

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

IP Address Assignment

EE-311 Data Communication & Networks

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Chapter 4: Network Layer

TCP/IP Protocol Suite and IP Addressing

End-to-End Communication

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

SEN366 (SEN374) (Introduction to) Computer Networks

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

ICS 351: Networking Protocols

Chapter 18. Introduction to Network Layer

CS 457 Lecture 11 More IP Networking. Fall 2011

b. Suppose the two packets are to be forwarded to two different output ports. Is it

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Vorlesung Kommunikationsnetze

ET4254 Communications and Networking 1

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Data Communication & Computer Networks Week # 13

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

II. Principles of Computer Communications Network and Transport Layer

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

ECE 461 Internetworking Fall Quiz 1

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

TSIN02 - Internetworking

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

NETWORK LAYER: IP Addressing

CSCI Networking Name:

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CS164 Final Exam Winter 2013

Position of IP and other network-layer protocols in TCP/IP protocol suite

internet technologies and standards

Question 7: What are Asynchronous links?

Birkbeck (University of London)

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

Communication and Networks. Problems

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Network Layer: Internet Protocol

Business Data Communications and Networking

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

The Internet. The Internet is an interconnected collection of netw orks.

1. (10 points): For each of the following, choose exactly one best answer.

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Copyright 2011 Sakun Sharma

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

INSTRUCTIONS TO CANDIDATES

CHAPTER-2 IP CONCEPTS

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

EEC-484/584 Computer Networks

Birkbeck (University of London)

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

CSC 4900 Computer Networks: Network Layer

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

CMPE 80N: Introduction to Networking and the Internet

Enterprise Data Communication Products. Feature Description - IP Service. Issue 05 Date HUAWEI TECHNOLOGIES CO., LTD.

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

TCP/IP and the OSI Model

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Expected Time: 90 min PART-A Max Marks: 42

Transcription:

Internet and Web Technologies Sample Solutions 2013 1. (a) stream paradigm connection-oriented one-to-one communication sequence of individual bytes arbitrary length transfer used by most applications built on TCP protocol (i) (name EMPTY) and (ii) (name, name*) message paradigm connectionless many-to-many communication sequence of individual messages each message limited to 64 Kbytes used mainly for multimedia applications built on UDP protocol (10 marks) Unicode and UTF-8. Such characters can be included by using character entity references which refer to the numeric value of the character in the Unicode encoding. The syntax is &#value; or &#xvalue;, where value is the numeric value in decimal or hexadecimal, respectively. 2. (a) Base64 encoding is used to encode 8-bit binary data as ASCII characters. (2 marks) Form input data is sent to the server as name=value pairs, where name is the value of the name attribute of a form input control, and value is the value of the corresponding value attribute or is entered by the user. The name=value pairs are separated by & characters. For GET, the name=value pairs form the URI query string, while for POST, the name=value pairs form the message body. With CGI, the data is made available through environment variables such as QUERY_STRING, while in PHP built-in associative arrays such as $_GET are used. TCP implements a congestion control algorithm based on the perceived congestion by the sender: if it perceives little congestion, it increases its send rate; if it perceives there is congestion, it reduces its send rate. (Page 1 of 5)

(d) DHCP enables a computer to obtain an IP address automatically when it connects to a network. DHCP also allows a host to learn additional information, such as its subnet mask, the address of its first-hop router (often called the default gateway), and its local DNS server. The four steps are: the client sends a discover message to find a server. A server sends an offer message with an IP address. The client sends a request message with the IP address. The server replies with an ACK. 3. (a) The Address Resolution Protocol (ARP) translates between addresses on LANs, which are MAC addresses, to addresses at the network layer, which are, e.g., IP addresses. ARP takes an IP address on the same LAN and returns the corresponding MAC address. Each node (host or router) has an ARP table in memory, containing mappings between IP addresses and MAC addresses. If an IP address is not in the table, it sends an ARP query packet to the broadcast MAC address FF-FF-FF-FF- FF-FF. The packet contains the desired IP address and the MAC address of the sender. The one node with the matching IP address sends a response ARP packet with its MAC address. <xsl:template match="recipes"> <h1>recipes with chocolate</h1> <xsl:for-each select="recipe[ingredient[description= chocolate ]]"> <h2><xsl:value-of select="name"/></h2> <table> <xsl:for-each select="ingredient"> <tr> <td><xsl:value-of select="quantity"/></td> <td><xsl:value-of select="description"/></td> </tr> </xsl:for-each> </table> <p><xsl:value-of select="method"/></p> </xsl:for-each> </xsl:template> (12 marks) (Page 2 of 5)

4. (a) i. <!ELEMENT results (event)* > <!ELEMENT event (name, athlete+) > <!ELEMENT athlete (name, country, position? > <!ELEMENT name (#PCDATA) > <!ELEMENT country (#PCDATA) > <!ELEMENT position (#PCDATA) > <!ATTLIST position medal (gold silver bronze) #IMPLIED > ii. count(//athlete[country= Great Britain ]/position[@medal= gold ]) (5 marks) The Maximum Transmission Unit (MTU) specifies the maximum amount of data that a frame can carry. Different networks may have different MTUs, so that a datagram arriving at a router may have to be fragmented before being forwarded. The fragments of a datagram are routed independently of one another but all have the same identification field so that IP can reassemble the original datagram. (7 marks) 5. (a) Namespace definitions can be overridden by associating a different namespace with the same prefix or default within the scope of an existing definition, i.e, in one of the descendant elements of the element where the namespace was defined. Overriding namespaces makes it more difficult for a human reader to work out which namespaces elements belong to. (7 marks) Network Address Translation (NAT) addresses the problem that every IP-capable device needs an IP address but these cannot all be allocated statically or contiguously for subnets. NAT uses the blocks of IP addresses reserved for private networks. A NAT router replaces the IP address and port number used by a local machine in outgoing datagrams by its own address and an arbitrary port number. The association between the port number and address of the local machine and the port number used by the NAT router is recorded in a table. This is also used to translate and correctly forward incoming datagrams. Criticisms of NAT include: (1) port numbers should be used for addressing processes, not hosts, (2) routers are supposed to process packets only up to layer 3, (3) NAT violates end-to-end principle: hosts should be communicating directly, (4) IPv6 should be used to solve problem of shortage of addresses. (13 marks) (Page 3 of 5)

6. (a) HTML is an SGML vocabulary where a DTD can specify that start and/or end tags are optional, whereas XHTML is an XML vocabulary where every element is required to have a start and end tag. One could send the requests via a server which is in the same domain as the page containing the Javascript code. The requested URL could be sent to a PHP script running on the server which simply retrieves the resource and passes it back to the page. RAC parity arranges the bits of each dataword conceptually into rows and columns, and then adds a parity bit for each row and column. For example, a 12-bit word might be arranged into 3 rows and 4 columns as shown below, where the parity bits for each row are in the last column and the parity bits for each column are in the last row (assuming even parity). 1 0 1 1 1 0 0 1 0 1 1 0 1 0 0 0 0 1 1 0 Now assume that the bit shown below is flipped: 1 0 1 1 1 0 1 1 0 1 1 0 1 0 0 0 0 1 1 0 RAC parity determines the row and column of the flipped bit by seeing where the parity is odd rather than even. RAC parity cannot correct all two-bit errors. If the errors occur in the same row or same column, the parity of that row or column will be unchanged. (10 marks) 7. (a) Using an internal DTD requires the same DTD to be included in each document of the given type. If the DTD needs to be modified, every copy would need to be updated. An external DTD allows there to be only one copy of the DTD, making for smaller documents and updates that are less likely to be inconsistent. The element to be deleted would have to be identified, perhaps by using the getelementbyid method if the element had an id attribute. Then the removechild method could be invoked on the parent of the identified element, with a reference to the element passed as an argument. (Page 4 of 5)

The notation /12 means that 12 bits are used for the network prefix and therefore 20 bits are used for the host suffix. Since only 4 bits of the second byte are used for host addresses, these range from 1000 (16) to 1111 (31). Hence the smallest and largest addresses are 172.16.0.0 and 172.31.255.255. Not all addresses can be allocated to individual machines because 172.16.0.0 is used to identify the network, while 172.31.255.255 is used for broadcast on the network. (Page 5 of 5)