interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

Similar documents
Answer to the written exam given on TDTS06 Computer networks, October 23,

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Written examination in TDTS06 Computer Networks at 8 12

Example questions for the Final Exam, part A

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

UNIT IV -- TRANSPORT LAYER

Final Exam. Course Grade

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS164 Final Exam Winter 2013

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

TSIN02 - Internetworking

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Introduction to Networks and the Internet

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

ECE4110 Internetwork Programming. Introduction and Overview

Tutorial 2 Solutions

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Networking interview questions

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

TSIN02 - Internetworking

EE-311 Data Communication & Networks

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

User Datagram Protocol

Networking: Network layer

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

II. Principles of Computer Communications Network and Transport Layer

Review problems (for no credit): Transport and Network Layer

EECS 122: Introduction to Communication Networks Final Exam Solutions

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Vorlesung Kommunikationsnetze

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

PLEASE READ CAREFULLY BEFORE YOU START

Worksheet #2 EE122 Fall 2011

cs144 Midterm Review Fall 2010

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Written examination in TDTS06 Computer Networks at 8 12

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Chapter 3 Review Questions

NT1210 Introduction to Networking. Unit 10

CS 3516: Advanced Computer Networks

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

===================================================================== Exercises =====================================================================

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

TCP /IP Fundamentals Mr. Cantu

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

INSTRUCTIONS TO CANDIDATES

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

TSIN02 - Internetworking

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Sirindhorn International Institute of Technology Thammasat University

CSCI 1800 Cybersecurity and Interna4onal Rela4ons. Design and Opera-on of the Internet John E. Savage Brown University

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Chapter 24. Transport-Layer Protocols

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

TCP/IP Performance ITL

PLEASE READ CAREFULLY BEFORE YOU START

ELEC5616 COMPUTER & NETWORK SECURITY

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga

IP - The Internet Protocol

Stream Control Transmission Protocol

Final Exam for ECE374 05/03/12 Solution!!

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Examination 2D1392 Protocols and Principles of the Internet 2E1605 Internetworking. Date: June 1 st 2007 at 14:00 19:00 SOLUTIONS

EE122 Spring 2001 Final

Position of IP and other network-layer protocols in TCP/IP protocol suite

CSCI 466 Midterm Networks Fall 2013

Transport Protocols and TCP

Reliable Transport I: Concepts and TCP Protocol

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences

SYED AMMAL ENGINEERING COLLEGE

Your Name: Your student ID number:

UDP, TCP, IP multicast

Computer Communication Networks Midterm Review

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Midterm Review. EECS 489 Computer Networks Z. Morley Mao Monday Feb 19, 2007

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

TSIN02 - Internetworking

Transcription:

TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need to show your calculations, assumptions and justifications.) Question 1. Applications E-mail nslookup/dig Web Application layer SIP DNS SMTP HTTP BGP RIP Transport layer UDP TCP Network layer ICMP IP OSPF The rest of the net Network interface Describe one of the protocols not in use in the figure: For example, SIP (Session Initiation Protocol) is a protocl for managing connections for multimedia. More specifically, SIP provides mechanisms for establishing calls over an IP network and negotiating encodings and other protocols to be used for the call; it can determine the current IP address of the recipient; and it can add new media streams during calls, change the encoding, invite new participants, transfer calls, and hold calls. The event/action pair in the second leg of the three-way handshake is the SYN+ACK sent by the server to the client, which is interpreted as the ACK for client s initial SYN packet and the server s own SYN request to the client. The second leg also contains the 20 October 2008 1

sequence number that the server wants to use for the upcoming data channel communication. Question 2. call setup time: the CS network requires time to set up the circuit, before data can be transferred, while the PS network can start sending data immediately. potentially wasted bw: the CS network can waste bandwidth when a connection has been established and the user is not using the connection, because the bw used by the connection will not be made available to other users until the connection is closed. In PS networks bw is allocated on demand, as long as the aggregated bw is not larger than the link s capacity. handling of node failures: in a CS network the connection has to be re-established if a node breaks down, while in a PS network the connection will be re-routed on-thefly to another path past the node that failed. packets arrive in order: in a CS network packets arrive in order because of the network design, while in a PS network the packets can arrive out-of-order because the packets have been routed different paths and delayed along the way. The size of the ring is determined by the size of the packet in microsecs when put into the ring. The packet is 250 B = 2000 bits, which corresponds to 2000 / 100 Mbps = 20 microsecs of delay if the packet should fit into the ring. The propagation delay of the ring determines how far the bits will travel in the ring, which should be equal to the circumference of the ring determined by the size of the packet, that is, x meters / (2 x 10 8 m/s) = 20 microsecs, where x is the circumference in meters. This gives us x = 4000 meters. This is without the nodes. The number of nodes that physically can fit the ring is 4000 meters / 100 meters = 40 nodes. However, each node introduces 10 bits of delay = 10 bits / 100 Mbps = 0.1 microsecs. For the 2000-bit packet of 20 microsecs in delay to fit exactly into the ring of 40 nodes, each introducing a delay of 0.1 microsecs, the ring has to be 40 x 0.1 microsecs = 4 microsecs shorter in circumference. 4 microsecs in meters is 4 x the propagation delay of the ring (2 x 10 8 m/s) = 800 meters. Answer: the circumference of the ring is 4000 800 = 3200 meters. The two types of delay in a router are processing delay and queueing delay. See textbook for explanations. 20 October 2008 2

Question 3. In a push protocol the sender sends data without a previous request from the receiver, while in a pull protocol the receiver first sends a request for data, which is then sent by the sender HTTP is mainly a pull protocol because its main function is to request web pages from a server via the GET method. However, in HTTP/1.1 it is also possible to push data by using PUT and POST. SMTP is a push protocol because an e-mail message is delivered to the receiver s SMTP server, from where she then can download it to her e-mail client via other protocols (that are pull-based). i) False ii) True iii) False iv) True Question 4. MSS = 1500 bytes, ssthresh = 32 KB = 32,768 bytes Round no. Congestion window (bytes) Phase 1 1500 Slow start 2 3000 Slow start 3 6000 Slow start 4 12,000 Slow start 5 24,000 Slow start 6 48,000 Congestion avoidance (AIMD) 7 49,500 Congestion avoidance The slowstart phase goes on for 5 rounds until the threshold is reached, after which the congestion-avoidance phase begins. The TCP retransmission timer is updated approximately each round, based on the ACK received for an original transmission of a segment. The value is set to the EstimatedRTT + 4 x DevRTT, where both the EstimatedRTT and DevRTT are EWMAs of collected sample values. 20 October 2008 3

For example, UDP data packets do not have sequence numbers, so duplicates and lost packets cannot be detected. UDP is also lacking the ACK bit, so data cannot be acknowledged as having been received by a receiver. Question 5. i) Packet fragmentation is done by either the sender or an intermediate router (in IPv4) when the MTU of the next hop (network) is too small for the whole packet. Every fragment becomes a new IP packet and is sent separately, indistinguishable from an ordinary IP packet. The fragments are reassembled at the receiver before delivered to the upper layer. ii) Address aggregation is the technique based on netmasks that enables a router to represent a range of network addresses with only one entry in the forwarding table. Longest-prefix matching is then used to distinguish between several hits in the table on a certain destination IP address. iii) IPv6 is the next-generation IP protocol, developed as a solution to the limited address space of IPv4. In addition to an extended address space (128 bits are used instead of 32 bits), IPv6 has a header that is faster to process by routers, because it is fixed in size, among other things. The statement is False because although a router retransmits IP packets, it does not use or need DNS to find the destination address because IP packets already have the IP address. Furthermore, DNS, which is used to find mappings between hostnames and IP addresses, is also an application layer protocol ans as such it is not visible to routers, which work in the network layer and below. Question 6. Station A will select a K randomly from {0, 1, 2, 3 4, 5, 6, 7} and multiply it with 512 bit times of the network bandwidth to set the value of the backoff timer. Station B will select K from {0, 1} x 512 bit times. Step Description 4 Every host and router receives the frame. All machines except the one targeted drop the frame. The target recognizes its IP address. 2 IP asks ARP to create an ARP request message, containing the sender MAC address, the sender IP address, and the target IP address, with the target MAC address filled with zeros. 20 October 2008 4

Step Description 7 The IP datagram with data for the target is now encapsulated in a frame and is unicast to the destination. 5 The target replies with an ARP reply message containing its MAC address, which is unicast. 3 The message is passed to the link layer and put into a frame with the MAC address of the sender as the source address and the LAN broadcast address as the destination address. 6 The sender receives the reply message. It knows the MAC address of the target. 1 The sender knows the IP address of the target. The BSS consists of at least a station and an access point, plus the MAC protocol. It can also consist of the ad-hoc mode, that is, two stations and the MAC protocol. Question 7. The links B C and B E will not be used. S N D(, p( D(, p( D(d), p(d) D(e), p(e) 0 a 5, b 2, c 3, d - 1 ac 5, x done 3, d 4, c 2 acd 5, x done 4, c 3 acde 5, x done 4 acdeb done A 5 B 3 2 C D 4 E 20 October 2008 5

LS avoids loops in the routing information thanks to the centralized Dijkstra s algorithm, while DV can cause loops because of its distributed nature. The amount of control information sent in the network when a new link is discovered is larger in LS than in DV because the new information must be flooded to all nodes by the new node s neighbours. In DV, information is exchanged only between neighbours. All routers will use BGP because they all must know either what other networks are reachable (boundary router) or where the closest boundary router is (all other routers in the current network), so that hot-potatoe routing can be employed on packets that do not belong in the current network. Question 8. Term playback attack chosen-plaintext attack known-plaintext attack packet sniffing ip spoofing Explanation The method of retransmitting an old message, typically with a forged source address, to fool a receiver. The technique of using some knowledge about the contents of the message being sent to crack the ciphertext, for example, language statistics or certain text patterns ( alice and bob for example) The technique of making a sender to transmit a known plaintext so that the ciphertext can be cracked. The technique of eavesdropping on a communication channel and reading its raw contents (as done with wireshark). The technique of forging the source address of one s IP packets so that it looks like the packets are coming from someone else. In the upper left corner, a hash is created of the e-mail message. The hash is a checksum of the message, ensuring that the content has not been altered after being sent. The hash is then encrypted with the secret key of Alice and attached to the message itself. The encryption of the hash with the private key creates an authentication code that shows that the message was created by Alice. AES, Advanced encryption standard, is a symmetric key algorithm, typically used for encrypting large portions of text, because symmetric encryption is tenfold faster than asymmetric encryption. 20 October 2008 6