CS164 Final Exam Winter 2013

Similar documents
1. (10 points): For each of the following, choose exactly one best answer.

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

II. Principles of Computer Communications Network and Transport Layer

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

SE 4C03 Winter Sample Midterm Test. Instructor: Kartik Krishnan

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

PLEASE READ CAREFULLY BEFORE YOU START

SE 4C03 Winter Midterm Test Answer Key. Instructor: Kartik Krishnan

Preview Test: HW3. Test Information Description Due:Nov. 3

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Question Points Score total 100

CS1302 / Computer Networks

Network Protocols - Revision

===================================================================== Exercises =====================================================================

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Question Points Score total 100

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

CS 485/ECE 440/CS 585 Fall 2013 Midterm

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Your Name: Your student ID number:

Review problems (for no credit): Transport and Network Layer

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

First Exam for ECE671 Spring /22/18

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

EE122 - Midterm 1 Examination EECS-UC Berkeley October 2000

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIT IV -- TRANSPORT LAYER

CS3516 B10 Computer Networks Final Exam December 14, 2010

CS244a: An Introduction to Computer Networks

IT 341: Introduction to System

PLEASE WRITE NEATLY I need to be able to read your answers! (seemingly encrypted solutions can not be decrypted!)

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

There are 10 questions in total. Please write your SID on each page.

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

Lecture 3: The Transport Layer: UDP and TCP

CS244a: An Introduction to Computer Networks

BEng. (Hons) Telecommunications. Examinations for / Semester 2

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

Applied Networks & Security

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

UDP, TCP, IP multicast

MCS-377 Intra-term Exam 1 Serial #:

CS244a: An Introduction to Computer Networks

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

19: Networking. Networking Hardware. Mark Handley

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Lab - Using Wireshark to Examine a UDP DNS Capture

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

Chapter 7. Local Area Network Communications Protocols

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

Lab - Using Wireshark to Examine a UDP DNS Capture

EXAM TCP/IP NETWORKING Duration: 3 hours

Tutorial 2 : Networking

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Networks Fall This exam consists of 10 problems on the following 13 pages.

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

User Datagram Protocol

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

TCP /IP Fundamentals Mr. Cantu

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CCNA MCQS with Answers Set-1

Unit 2.

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

Intro to LAN/WAN. Transport Layer

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.

Solution to Question 1: ``Quickies'' (25 points, 15 minutes)

Note: This practice midterm only covers a subset of the topics you are required to know.

TDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

VALLIAMMAI ENGINEERING COLLEGE

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Vorlesung Kommunikationsnetze

THE UNIVERSITY OF NEW SOUTH WALES

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM

Transcription:

CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect answer.) A Local Area Network constructed from Layer-2 bridges connected by wired Ethernet links is allowed to deliver packets in the wrong order so it can guarantee that every packet will reach its destination. TCP connection establishment uses a three-way handshake so the TCP sender, the TCP receiver and the sender s Internet Service Provider can all agree on a common set of options to be used for this session. If Alice and Bob belong to different VLANs, they cannot establish a Layer-2 connection between themselves. Neither TCP nor UDP headers include any addresses, since they were designed to run on top of IP. Even though the world is running out of IPv4 addresses, the number of Internet users is still growing because Internet Service Providers don t need a separate IPv4 address for each residential customer. In TCP, the receiver (and only the receiver) has a timer, which it uses to ask the sender to retransmit a packet that fails to arrive on schedule. Three IP routers forming a triangle can send packets over all three links even though they form a cycle. In TCP congestion control, the sender is responsible for telling the receiver when to drop a packet. Transport layer protocols, such as TCP and UDP, can demultiplex network traffic belonging to different socket connections that enters the host through a single network interface. If a layer-2 bridge sends a PAUSE frame to one of its neighbors, that node cannot send any packets to the bridge for some period of time. The subnet mask is a network security feature, which is used to prevent private services from being accessed by computers in the rest of the Internet. A Transit AS belonging to the Internet Core needs much larger routing tables than a Stub AS because it cannot handle unrecognized addresses by forwarding the traffic to some higher-level service provider through a default route. If Alice has a valid IP address in which the last eight bits are all 1 s, we can conclude that Alice s networks uses at least nine bits for the host field. In networking, best effort service means the same thing as reliable service (as provided by TCP, for example), in contrast to reasonable effort service where there are no guarantees that the data will ever reach the destination. If Alice and Bob belong to different IP subnets, Alice s 48-bt MAC address will never reach Bob even if every hop along the path is an Ethernet link. 1

Problem 2. Suppose Alice lost the slip of paper that contained the information about setting up the network address for her computer. In each of the following situations briefly explain what happens. a Suppose Alice lost the 48-bit Ethernet (MAC) address for the network interface card in her computer. What happens if she randomly generates a different 48-bit value and instructs the device driver for her network card to use her bogus value instead of the correct value? (Assume Alice knows enough to skip the multicast address bit in her bogus MAC address.) If she sends Ethernet frames (with her bogus return address) to another host on the same Ethernet broadcast domain, will that host be able to receive them? If so, will she be able to receive the responses? b What happens to Alice s (improperly-addressed) Ethernet frames when they pass through a layer 2 bridge? Can the bridge tell that Alice is using a bogus address? Can it (or should it) do anything about this issue? c This time, suppose Alice uses the correct Ethernet MAC address but has lost the 32-bit IP address that was assigned to her computer. What happens if she randomly generates a different 32-bit value and configures the protocol stack to use her bogus value? Will she be able to send IP datagrams to another host? Will she be able to receive the responses? Does your answer depend on whether the other host is on the same IP subnet? d What happens to Alice s (improperly-addressed) IP datagrames when they pass through an IP router? Can the router tell that Alice is using a bogus address? Can it (or should it) do anything about this issue? 2

d Briefly explain the difference between class A, class B and class C IP addresses. Using the standard a.b.c.d notation for expressing IP addresses as a sequence of four numbers, explain how a subnet mask is used to partition an IP address into the network number and host number components. e Finally, suppose Alice uses the correct Ethernet MAC address and IP address, but lost her subnet mask. Briefly explain what sorts of problems she will experience if she decides to use a class B subnet mask when it should have been class C. What happens if she uses a class C subnet mask when it should have been class B? Problem 3. In TCP flow control, state which entity (the transmitter or the receiver) controls each of the following variables. Does its value need to be communicated to the other entity, and if so how? What is its purpose? a The initial sequence number. b The advertised window. c The congestion window. 3

d The next byte expected. e The number of out-of-order segments at the receiver. Problem 4. The HTTP protocol, which is used for Web pages, runs on top of TCP. Originally, HTTP required the web browser to establish a separate TCP connection with the web server to retrieve each object (URL) on the same page. However, the HTTP 1.1 standard changed the protocol to allow the web browser to retrieve all objects on the same web page through a single persistent TCP connection. For the purposes of this question, assume that Alice s web browser already knows the IP address of Bob s web server and the MAC address of her default gateway, that the RTT between Alice s web browser and Bob s web server is 100 milliseconds, and that the data rate on every link is so high that we can neglect the transmission time for data packets and/or ACKs. a Draw and label a space-time diagram to show the sequence of packets sent by Alice and Bob to establish new TCP session initiated by Alice. b Draw and label a space-time diagram to show the sequence of packets sent by Alice and Bob to close an existing TCP session. 4

c Now suppose it takes 10 TCP data segments to send a single web object from Bob to Alice. Draw and label a space-time diagram to show how long it takes to complete the transfer assuming Alice s advertized window is 4 segments and Bob uses slow start. How many RTTs are required to complet the transfer? d Finally, suppose the complete web page contains a total of 20 objects. How much time is saved and how many packets are eliminated by using a single persistent connection to retrieve the entire page? [HINT: remember that Bob only uses slow start during the transfer of the first object.] 5