Computer Networks - Midterm

Similar documents
Computer Networks - Midterm

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

CSCI 466 Midterm Networks Fall 2013

Computer Network 2015 Mid-Term Exam.

CPS 706 Computer Networks (Fall 2011)

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

COE 431 Computer Networks. Welcome to Exam I Thursday April 02, Instructor: Wissam F. Fawaz

Duke University CompSci 356 Midterm Spring 2016

CSE 3214: Computer Network Protocols and Applications. Midterm Examination

CMPE150 Midterm Solutions

Q U E S T I O N 3 In the current version of IP (IPv4), the use of TCP and UDP headers differ in which of the following ways?

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

15-441: Computer Networks Homework 3

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1

Computer Communication EDA344, EDA343, DIT 420

Expected Time: 90 min PART-A Max Marks: 42

===================================================================== Exercises =====================================================================

Midterm I of Computer Communication , Winter 2004 Electrical and Computer Engineering Department, University of Windsor

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: Fall 2003

Final Exam for ECE374 05/03/12 Solution!!

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology 3/2/2016

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Computer Network Midterm Explain Internet protocol stack (1% each layer s name, 1% each layer s functions, 10% total)

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Network Applications Principles of Network Applications

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

INSTRUCTIONS TO CANDIDATES

CS164 Final Exam Winter 2013

CS 455/555 Spring 2011 Weigle

There are 10 questions in total. Please write your SID on each page.

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

CSE 473 Introduction to Computer Networks. Midterm Exam Review

CS 640: Introduction to Computer Networks

Computer Science 461 Midterm Exam March 14, :00-10:50am

THE UNIVERSITY OF NEW SOUTH WALES

Question Points Score total 100

Carnegie Mellon Computer Science Department Spring 2005 Final

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

BSc. (Hons) Web Technologies. Examinations for 2017 / Semester 1

CMPSCI 453 Instructor V. Arun Fall Midterm 11/07/2007

CPSC 441 COMPUTER NETWORKS MIDTERM EXAM

PLEASE READ CAREFULLY BEFORE YOU START

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004

70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions

ICS 451: Today's plan. Sliding Window Reliable Transmission Acknowledgements Windows and Bandwidth-Delay Product Retransmission Timers Connections

Lab Assignment 3 for ECE374

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2007

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION

EECS 122: Introduction to Communication Networks Final Exam Solutions

CS454/654 Midterm Exam Fall 2004

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Closed book. Closed notes. No electronic device.

IT 341: Introduction to System

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Assignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points.

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Your Name: Your student ID number:

COM-208: Computer Networks - Homework 1

PLEASE WRITE NEATLY I need to be able to read your answers! (seemingly encrypted solutions can not be decrypted!)

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

Internet Technology 2/18/2016

CS457 Transport Protocols. CS 457 Fall 2014

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Computer Communication Networks Midterm Review

EE122 Spring 2001 Final

CS101 Lecture 7: Internetworking:

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

NWEN 243. Networked Applications. Layer 4 TCP and UDP

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018

Computer Networks. Wenzhong Li. Nanjing University

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013

Midterm Exam #3 Solutions November 30, 2016 CS162 Operating Systems

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

FINAL Wednesday, 30 th July 2008

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

BEng. (Hons) Telecommunications. Examinations for / Semester 2

Part ONE

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V.

ETSF10 Internet Protocols Transport Layer Protocols

ECE 650 Systems Programming & Engineering. Spring 2018

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Transcription:

Computer Networks - Midterm October 28, 2016 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if necessary (don t forget to put your name on them) The total number of points is 100 This document contains 16 pages Good luck! Full Name (Nom et Prénom): SCIPE No: Division: Communication Systems Other (mention it): Computer Science Year: Bachelor Year 2 Bachelor Year 3 Other (mention it):

1 Short questions (10 points) For each question, please circle a single best answer 1 The network performance requirements of a voice & video chat application are: (a) low latency, low throughput (b) low latency, high throughput (c) high latency, low throughput (d) high latency, high throughput 2 What is a major drawback of connection-switching versus packet-switching? (a) Network resources are not used efficiently (b) Queuing delays are substantially longer (c) They require the use of optical fibers (d) They do not support DNS resolution queries 3 All root DNS servers become unreachable This has the following effect: (a) No names can be resolved (b) All names can be resolved, but it takes longer (c) As time passes, fewer and fewer names can be resolved (d) Nothing 4 Distributed hash tables (DHTs) are typically used in peer-to-peer file sharing applications to: (a) store very large files that do not fit in the peers memory (b) segment content into pieces and distribute them among the peers (c) check the correctness of the shared content (d) locate the peers that store certain content 5 Which guarantees does TCP offer? (a) Guaranteed security (b) Guaranteed performance (c) eliable delivery (d) All of the above 2

6 A process can use the same socket to communicate with multiple remote processes in: (a) TCP (b) UDP (c) None of the above (d) Both TCP and UDP 7 A client application creates two TCP sockets and successfully connects them in parallel to a remote TCP server application that is listening to port 9000 All packets that the client application sends to the server application share the same source address and destination IP address Which of the following is true? (a) Both client sockets can generate packets with destination port 9000 (at the same time) (b) Both client sockets can generate packets with source port 9000 (at the same time) (c) Both the above are correct (d) Both of the above are false 8 Consider a link with a transmission rate of 10Mbps, which is shared between multiple users that want to transfer data at a rate of 1Mpbs How many concurrent transfers can be supported? (a) There is no limit (b) 10 (c) > 10 (d) It depends on whether we use connection switching or packet switching 9 Consider a switch that forwards packets of size 500bits over a link with transmission rate of 1Kbps, using a buffer size of 10Kbits What is the maximum queuing delay that the packets may experience? (a) 10 seconds (b) 95 seconds (c) (d) We cannot say It depends on the arrival pattern (burstiness) of the packets 10 A host has recently accessed wwwepflch, which contains two images The host knows the IP address of the web server How many round-trip-times (TTs) are necessary to retrieve the entire page again? (a) At most 5 TTs (b) At least 3 TTs (c) At most 3 TTs (d) At least 2 TTs 3

2 Web Browsing and DNS (38 points) Setup: Two users, Alice and Bob, are logged into the workstations aliceethzch and bobethzch, all located inside ETHZ s network ETHZ offers a web server wwwethzch, a local name server nsethzch and a web proxy proxyethzch EPFL offers a web server wwwepflch and a local name server nsepflch The setup is illustrated in Figure 1 Make the following assumptions: All DNS and HTTP caches are initially empty All web-browsing traffic originating in the ethzch domain goes through the web proxy All web browsers in the ethhzch domain know the IP address of the web proxy The DNS server nsethzch is also the authoritative DNS server for the ethzch domain The DNS server nsepflch is also the authoritative DNS server for the epflch domain Each HTTP message fits in a single packet The web browsers, proxies and servers use persistent HTTP connections The contents of the web server running on wwwepflch never change aliceethzch 1111 bobethzch 2222 ETHZ wwwethzch 3333 nsethzch 4444 proxyethzch 5555 Internet DNS root 8888 ch TLD 9999 EPFL wwwepflch 6666 nsepflch 7777 Figure 1: The setup for the exercise on Web browsing and DNS 4

Question 1 (10 points): Alice uses her web browser to access UL http://wwwepflch/indexhtml This page includes an image with UL http://wwwepflch/logopng List all packets that are exchanged in the entire network, including any connection-setup packets, by filling Table 1 For each packet, show the source and destination IP address, the application-layer protocol, the transport-layer protocol and the purpose of the packet, as in the two examples Packet Source IP Dest IP Application protocol Transport protocol Purpose ex1 1001 1002 HTTP UDP HTTP reply with imagepng ex2 2001 2002 DNS UDP What is the IP address of examplecom? 1 GET /indexhtml, host: wwwepflch 2 Table 1: Packets transmitted on the Internet, in Question 1 5

Question 2 (8 points): ight after Alice views http://wwwepflch/indexhtml, Bob uses his web browser to access UL http://wwwepflch/quizhtml This page includes an image with UL http://wwwepflch/logopng List all packets that are exchanged in the entire network, including any connection-setup packets, by filling Table 2 For each packet, show the source and destination IP address, the application-layer protocol, the transport-layer protocol and the purpose of the packet Packet Source IP Dest IP Application protocol Transport protocol Purpose 1 GET /indexhtml, host: examplecom 2 Table 2: Packets transmitted on the Internet, in Question 2 6

Question 3 (6 points): Now suppose that the web server at wwwepflch uses cookies Do you think that this might change your answer to Question 2? If so, briefly describe how (you do not need to list all the packets again, just explain what would be the difference, if any, in a couple of sentences) Clarification: we have not discussed cookies in detail, so you are not expected to immediately know the answer Just try to make a guess, based on your understanding of the role of cookies 7

Question 4 (8 points): Web caching and DNS caching use two different mechanisms for ensuring that the cached data is not stale a Why is that? b Would it make sense for web caching to use the mechanism used by DNS caching and vice versa? 8

Question 5 (6 points): Many ETHZ users often visit the UL http://wwwbankch Alice wants to launch an attack in order to redirect the traffic between all these users and wwwbankch to her own machine, which has IP address 1111 At some point, there is a power failure on the ETHZ campus, which causes all the servers to reboot and brings them back to their initial state (the one they had at the beginning of Problem 2) Alice uses this as an opportunity to launch her attack a Explain briefly how she will do it, ie, what traffic will she send out and what will that cause b Why is the server reboot necessary for Alice to launch her attack? 9

3 Traffic log (12 points) Consider a machine on the EPFL campus that hosts a web server The machine has two hostnames: moodleepflch and imagesepflch (in other words, both of these hostnames map to the same IP address) Suppose http://moodleepflch/indexhtml references http://imagesepflch/logojpg and http://imagesepflch/backgroundjpg The following log was captured at the web server: Index Time Source Destination Protocol Length Description 1 0 1234 5678 HTTP 76 TCP handshake request 2 0 5678 1234 HTTP 76 TCP handshake reply 3 01 1234 5678 HTTP 100 GET request for /indexhtml, Host: moodleepflch 4 01 5678 1234 HTTP 480 GET reply with /indexhtml 5 04 1234 5678 HTTP 76 TCP handshake request 6 04 5678 1234 HTTP 76 TCP handshake reply 7 05 1234 5678 HTTP 109 GET request for /logojpg, Host: imagesepflch 8 05 5678 1234 HTTP 960 GET reply with /logojpg 9 06 1234 5678 HTTP 76 TCP handshake request 10 06 5678 1234 HTTP 76 TCP handshake reply 11 07 1234 5678 HTTP 100 GET request for /backgroundjpg, Host: imagesepflch 12 07 5678 1234 HTTP 1250 GET reply with /backgroundjpg (packet 1 of 4) 13 071 5678 1234 HTTP 1250 GET reply with /backgroundjpg (packet 2 of 4) 14 072 5678 1234 HTTP 1250 GET reply with /backgroundjpg (packet 3 of 4) 15 073 5678 1234 HTTP 1250 GET reply with /backgroundjpg (packet 4 of 4) Table 3: Packet capture log Time is shown in seconds, with 2 decimal places; the packet length is shown in bytes Answer the following questions, briefly justifying your answers: a What is the IP address of the web server? b How many clients connect to the web server? What are their IP addresses? c Do the clients use persistent or non-persistent connections? 10

d Estimate the round-trip time between the client(s) and the web server e Estimate the time it took the client(s) to perform DNS resolution of imagesepflch f Estimate the rate of the link connecting the web server to the Internet (hint: from the transfer of /backgroundjpg) 11

4 File Distribution (40 points) The network in Figure 2 contains the following elements: - Server S, which stores a file of size F bits - Nodes 1, 2, N, where N 4 and N is even (4, 6, 8, ) - Packet switches S1 and S2, which perform store-and-forward packet switching and introduce insignificant processing delays - Each link has length l and propagation speed c - The transmission rate of the link between S1 and S2 is k in each direction, where k > 1 - The transmission rate of all the other links is in each direction - The end-systems communicate over UDP which means that, when you compute delays, you do not need to worry about connection setup - No other approximations/ simplifying assumptions can be made 2 4 6 N S1 S k server S2 1 3 5 N-1 Figure 2 12

Question 1 (3 points): Node 1 requests the file from Server S Suppose the request message fits in a single packet of size Q bits How long does it take for the request message to reach S? Question 2 (5 points): In response to the request of Node 1, Server S splits the file into P packets of equal length and sends them to Node 1, one after the other Ignore the processing time for splitting the file into packets How long does it take for the file to be fully delivered to Node 1? (Hint: Careful, there may be queuing delays!) 13

Question 3 (12 points): Instead of only Node 1, all nodes (1, 2, N) request the file from Server S a Suppose all nodes begin transmitting their requests at exactly the same time Which requests will arrive earlier at the server, the ones coming from the odd nodes (1, 3, 5, ) or the even nodes (2, 4, 6, )? Briefly explain why b After having received all N requests, Server S splits the file into P packets of equal length and sends them to the nodes using the client-server approach Suppose that the server handles the requests in the order in which they were received For example, if the first request to arrive at the server is from Node i, the server will transmit all P packets needed by Node i Based on your answer to (a), how long will it take for the file to be fully delivered to all nodes? 14

Question 4 (12 points): a Instead of using the client-server approach, the server S distributes the file using the following peer-to-peer (P2P) approach: The server S first splits the file into 2 equally sized packets (chunks) and sends them to Node 1; when S has sent both packets to Node 1, it stops distributing the file As soon as Node i receives a packet, it sends it to Node i + 1; when Node i has sent both packets to Node i + 1, it stops redistributing the file So, each of the two packets goes from S to Node 1, then Node 2, etc The underlying physical topology is still the one shown in Figure 2 How long will it take for the file to be fully delivered to all nodes? Justify your answer b Briefly describe a different P2P approach that could offer shorter file distribution time 15

Question 5 (8 points): a An even node wants to launch a denial-of-service flooding attack on the server, such that none of the other nodes (odd or even) can reach the server Is that possible? How would such an attack work? b Could an odd node launch such an attack? 16