Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Similar documents
TCP /IP Fundamentals Mr. Cantu

13. Internet Applications 최양희서울대학교컴퓨터공학부

II. Principles of Computer Communications Network and Transport Layer

Networking: Network layer

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

CS164 Final Exam Winter 2013

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Sirindhorn International Institute of Technology Thammasat University

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

ICS 351: Networking Protocols

ECE4110 Internetwork Programming. Introduction and Overview

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Computer Networks (Unit wise Questions)

Information Network Systems The network layer. Stephan Sigg

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Chapter 09 Network Protocols

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CHAPTER-2 IP CONCEPTS

Introduction to TCP/IP networking

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

EEC-682/782 Computer Networks I

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Chapter 7. The Transport Layer

NT1210 Introduction to Networking. Unit 10

The Internetworking Problem. Internetworking. A Translation-based Solution

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

Interconnecting Networks with TCP/IP

EEC-684/584 Computer Networks

Chapter 7. Local Area Network Communications Protocols

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Application Layer Network Layer

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Network Layer (4): ICMP

COMS3200/7201 Computer Networks 1 (Version 1.0)

Different Layers Lecture 20

TCP/IP THE TCP/IP ARCHITECTURE

IP Protocols. ALTTC/Oct

CSCI-GA Operating Systems. Networking. Hubertus Franke

Chapter 5 OSI Network Layer

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

===================================================================== Exercises =====================================================================

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Hands-On Ethical Hacking and Network Defense

TSIN02 - Internetworking

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.

OSI Transport Layer. objectives

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and

The Internet Protocol (IP)

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

Chapter 12 Network Protocols

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889

BEng. (Hons) Telecommunications. Examinations for / Semester 2

HP Load Balancing Module

Your Name: Your student ID number:

Packet Header Formats

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

internet technologies and standards

Computer Communication Networks Midterm Review

CSCI 466 Midterm Networks Fall 2013

Example questions for the Final Exam, part A

4.0.1 CHAPTER INTRODUCTION

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Table of Contents 1 System Maintaining and Debugging 1-1

CS 457 Lecture 11 More IP Networking. Fall 2011

Position of IP and other network-layer protocols in TCP/IP protocol suite

4 rd class Department of Network College of IT- University of Babylon

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Troubleshooting Tools

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Common Protocols. The grand finale. Telephone network protocols. Traditional digital transmission

Need For Protocol Architecture

TCP/IP Networking Basics

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

Vorlesung Kommunikationsnetze

Need For Protocol Architecture

Lecture 3: The Transport Layer: UDP and TCP

SYED AMMAL ENGINEERING COLLEGE

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Chapter 5 Network Layer

Transcription:

Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6] Ans: Difference between Persistent and Persistent HTTP is as follows: Non persistent HTTP Persistent HTTP Server closes connection after sendin Server leaves connection open after sendin response response Requires 2 RTTs per object One RTT for all the referenced objects New connection must be established an maintained for each requested object There are two HTTP messages 1. HTTP Request message 2. HTTP Response Message HTTP Message formats are given below client sends requests as soon as encounters a referenced object OS overhead for each TCP connection No overhead for each TCP connection Slow response Faster in response At most one object is sent over a TC Multiple objects can be sent over sing connection. TCP connection between client and server Figure: HTTP Request Message format HTTP request message contains request line and header line. Request line has 3 fields- 1. Method- The request method indicates the method to be performed on the resource identified by the given Request-URI. It includes GET,POST,HEAD

2. URL- It is a unique address for a file that is accessible on the internet. 3. Version- HTTP version either 1.0 or 1.1 Header line has 2 fields, header field name and its value. HTTP Message formats are given below Figure: HTTP Response Message format HTTP response message contains status line and header line and entity body.a Status-Line consists of the protocol version followed by a numeric status code and its associated textual phrase. The response-header fields allow the server to pass additional information about the response which cannot be placed in the Status- Line. Q1 b) Compare IMAP and POP3. [4]

Q2 a) Compare file transfer using SMTP and HTTP. [7] SMTP HTTP Transfer files (eg;email messages) from ontransfers files from web server to web us mail server to another mail server agent (ie. The browser) Push protocol: the sending mail server push Pull protocol: someone loads information on the file to the receiving mail server. web server and users use HTTP to pull th particular, the TCP connection is initiated binformation offthe server at their convenienc the machine that wants to send the file. In particular, the TCP connection is initiate by the machine that wants to receive the file. Requires each user message, including thdo not impose this restriction body of each message to be in 7 bit ASC format. If the message contains that are not bit ASCII, then the message has to be encode into 7-bit ASCII Uses TCP Protocol Uses TCP Protocol Port no is 25 Port no is 80 multiple objects sent in multipart message each object encapsulated in its own respon message Q2 b)state which transport layer protocol is used by following application layer protocol. HTTP,FTP,DHCP,DNS,SMTP,TELNET Application Layer Protocol Transport layer Protocol TCP/UDP HTTP TCP SMTP TCP DNS UDP/TCP TELNET TCP DHCP UDP FTP TCP Q3 a) What is QOS? Explain various parameters for QOS in a network [6] Quality of service (QoS) is the overall performance of a telephony or computer network, particularly the performance seen by the users of the network. There are 4 requirements for achieving QoS in a network: 1>Reliability- Reliability is concerned with the ability of a network to carry out a desired operation according to its specifications 2>Jitter- Jitter is defined as a variation in the delay of received packets. 3>Delay- is the amount of time required to transmit packets.

4>Bandwidth- amount of information that can be transmitted over a network in a given amount of time Q3 b) List TCP congestion control approaches? Explain any one. [4] TCP congestion control algorithms are: 1. slow start, 2. congestion avoidance, 3. fast retransmit, and 4. fast recovery Slow Start: When connection is established, the sender initializes the congestion window to the size of the maximum segment in use on the connection. It then sends the one maximum segment. If this segment is acknowledged before timeout occurs then it doubles the segment size.this is continued until the timeout occurs or receivers window size is reached Congestion avoidance : When the size of congestion window reaches the slow start threshold, the slow start phase stops and the additive phase begins. Congestion detection : If congestion occurs the congestion window size must be decreased. That means when a timer time outs or when 3 Acks are received the size of the threshold is dropped to ½ (multiplicative decrease) Q4 a) Explain in detail RTP with packet header format. [7] RTP is an Internet standard for real-time data like interactive audio, video, and simulation data. It is primarily designed for multi-user multimedia conference like session management and scalability considerations. It also provides end-to-end transport functions

for real-time applications such as payload type identification, sequence numbering,time stamping,delivery monitoring. Version (V, 2bits): =2 Padding(P, 1bit): If set, last byte of payload is padding size Extension(X, 1bit): If set, variable size header extension exists Figure : RTP packet header format CSRC count (4 bits): number of Contributors, max 16 can be possible Marker (1 bit): defined in profile, mark end of data Payload type (7 bits): Audio/Video encoding scheme Sequence number: random initial value, increase by one for each RTP packet; for loss detection and seq. restoration SSRC: identify source; chosen randomly and locally; collision needs to be resolved CSRC list: id. Of contributing sources, inserted by mixer Q4 b) Draw TCP header format [3] Figure : TCP Header format

Q5 a) Explain distance vector routing? What are the advantages & disadvantages of DV routing?[6] ANS : Distance Vector Routing: When this algorithm is used by a routing protocol, each router advertises its routing table to its adjacent neighbors. Each advertisement contains the following information about each route in that routing table: The hop count for the route (the distance) The direction in which the route is located (the vector) These advertisements are performed independently by all routers. In addition, routers receiving advertisements do not generate acknowledgments, which reduces the overhead of routing protocol traffic. Routers select the route with the lowest cost to each possible destination and add this to their own routing tables. These neighbors propagate the information to their neighbors hop by hop until information from all routers has spread throughout the entire internetwork. In Distance Vector routing, routers update their record based on these events: When routers are started When routers have changes to their routing tables On a periodic basis Advantages of Distance Vector routing: It is simpler to configure than Link State It is simpler to maintain than Link State Disadvantages of Distance Vector routing: It is slower to converge than Link State It is at risk from the count-to-infinity problem It creates more traffic than Link State since a hop count change must be propagated to all routers and processed on each router. Q5 b) Draw and explain IPV4 header format[4]

Figure: IPV4 Header format Version: IP Version: 4 for IPv4 and 6 for IPv6 HLen: Header Length- 32-bit words (typically 5) TOS: Type of Service -Priority information Identifier, flags, fragment offset used primarily for fragmentation Time to live -Must be decremented at each router, Packets with TTL=0 are thrown away. Ensure packets exit the network. Protocol - Demultiplexing to higher layer protocols TCP = 6, ICMP = 1, UDP = 17 Header checksum- Ensures some degree of header integrity Options-E.g. Source routing, record route, etc. Source Address- 32-bit IP address of sender Destination Address-32-bit IP address of destination Q6 a) Divide the network 220.125.5.192/26 into 8 sub networks. How many hosts can be connected in each network? Show their IP range, network address and broadcast address. [6] No of addresses for whole network are N= 2 32-26 =2 6 =64 First Address in network is- 220.125.2.192/26 Last address in network is- 220.125.5.255/26 As 8 subnet has to design so we divide no of address with no of sub networks i.e. 64/8= 8. That means each network has 8 addresses. New subnet mask will be: For 8 network 3 bits are required (log2 8 =3) to add to /26 mask, so new mask will be 26+3=29.

Sub network Network range Network Address Broadcast Address 1 220.125.5.192/29-220.125.5.199/29 220.125.5.192/29 220.125.5.199/29 2 220.125.5.200/29-220.125.5.207/29 220.125.5.200/29 220.125.5.207/29 3 220.125.5.208/29-220.125.5.215/29 220.125.5.208/29 220.125.5.215/29 4 220.125.5.216/29-220.125.5.223/29 220.125.5.216/29 220.125.5.223/29 5 220.125.5.224/29-220.125.5.231/29 220.125.5.224/29 220.125.5.231/29 6 220.125.5.232/29-220.125.5.239/29 220.125.5.232/29 220.125.5.239/29 7 220.125.5.240/29-220.125.5.247/29 220.125.5.240/29 220.125.5.247/29 8 220.125.5.248/29-220.125.5.255/29 220.125.5.248/29 220.125.5.255/29 Q6 b) Describe in short the importance and working of following commands Ping IP config Trace route netstat [4] 1. Ping: Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times. Ping is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution. 2. IP Config: Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This command is most useful on computers that are configured to obtain an IP address automatically. This enables users to determine which TCP/IP configuration values have been configured by DHCP, Automatic Private IP Addressing (APIPA), or an alternate configuration. 3. Trace route: Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values. The path displayed is the list of near-side router interfaces of the routers in the path between a source host and a destination. 4. Netstat: Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Netstat provides statistics for the following: Proto - The name of the protocol (TCP or UDP). Local Address - The IP address of the local computer and the port number being used. Foreign Address - The IP address and port number of the remote computer to which the socket is connected.