REVIEW FOR CHAPTER 2

Size: px
Start display at page:

Download "REVIEW FOR CHAPTER 2"

Transcription

1 REVIEW FOR CHAPTER 2

2 R1. List five nonproprietary Internet applications and the application-layer protocols that they use. Answer: The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP. Video conference: RTP

3 R2. For a communication session between a pair of processes, which process is the client and which is the sever? Ans: The process which initiates the communication is the client; the process that waits to be contacted is the server.

4 R3: What is the different between network architecture and application architecture? Answer: Network architecture refers to the organization of the communication process into layers (e.g., the five-layer Internet architecture). Application architecture, on the other hand, is designed by an application developer and dictates the broad structure of the application (e.g., clientserver or P2P).

5 R4 What information is used by a process running on one host to identify a process running on another host? Answer: The IP address of the destination host and the port number of the destination socket.

6 R5 For a P2P file-sharing application, do you agree with the statement, There is no notion of client and server sides of a communication session? Why or why not? Answer: No. As stated in the text, all communication sessions have a client side and a server side. In a P2P file-sharing application, the peer that is receiving a file is typically the client and the peer that is sending the file is typically the server.

7 R6. Referring to Figure 2.4, we see that none of the applications listed in Figure 2.4 requires both no data loss and timing. Can you conceive of an application that requires no data loss and that is also highly timesensitive. Ans: network games network multimedia applications with high quality requirements

8 R9. Why do HTTP, FTP, SMTP, POP3 and IMAP run on top of TCP rather than UDP? Answer: The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not.

9 R10. Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer? If the application developer wants TCP to be enhanced with SSL, what does the developer have to do? Ans: SSL operates at the application layer. The SSL socket takes unencrypted data from the application layer, encrypts it and then passes it to the TCP socket. If the application developer wants TCP to be enhanced with SSL, he/she has to include the SSL code in the application.

10 R11 What is meant by a handshaking protocol? Answer: A protocol uses handshaking if the two communicating entities first exchange control packets before sending data to each other. SMTP uses handshaking at the application layer whereas HTTP does not.

11 R15 Suppose Alice, with a Web-based account (such as Hotmail or gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice s host to Bob s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts. Answer: Message is sent from Alice s host to her mail server over HTTP. Alice s mail server then sends the message to Bob s mail server over SMTP. Bob then transfers the message from his mail server to his host over POP3.

12 R16 Print out the header of an message you have recently received. How many Received: header lines are there? Analyze each of the header lines in the message.answer: skipped

13 R19. Why is it said that FTP sends control information outof-band? Ans: FTP uses two parallel TCP connections, one connection for sending control information (such as a request to transfer a file) and another connection for actually transferring the file. Because the control information is not sent over the same connection that the file is sent over, FTP sends control information out of band.

14 R20 Consider a new peer Alice who joins BitTorrent without possessing any chunks. Without any chunks, she cannot become a top-four uploader for any of the other peers, since she has nothing to upload. How then will Alice get her first chunk? Answer: Alice will get her first chunk as a result of she being selected by one of her neighbors as a result of an optimistic unchoke, for sending out chunks to her.

15 P1 True or false? A. A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. B. Two distinct Web pages (for example, and )can be sent over the same persistent connection. C. With nonpersistent connection between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. D. The Date: header in the HTTP response message indicates when the object in the response was last modified.

16 Answer: a) F b) T c) F d) F

17 P4. Obtain the HTTP/1.1 specification (RFC 2616). Answer the following questions: a. Explain the mechanism used for signaling between the client and server to indicate that a persistent connection is being closed. Can the client, the server, or both signal the close of a connection? b. What encryption services are provided by HTTP?

18 ANS.: A. Persistent connections are discussed in section 8 of RFC 2616 Sections and of the RFC indicate that either the client or the server can indicate to the other that it is going to close the persistent connection. It does so by including the including the connection-token "close" in the Connection-header field of the http request/reply. B. HTTP does not provide any encryption services

19 P7. Suppose within your web browser you click on a link to obtain a web page. Suppose that the IP address for the associated URL is not cached in your local host, so that a DNS look up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur a RTT of RTT1,..., RTTN. Further suppose that web page associated with the link contains exactly one object, a small amount of HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object

20 ANS.: The total amount of time to get the IP address is RTT1 +RTT2 + +RTTN. Once the IP address is known, RTT0 elapses to set up the TCP connection and another RTT0 elapses to request and receive the small object. The total response time is 2RTT0 +RTT1 +RTT2 + +RTTN

21 P8. Referring to question (7), suppose the page contains three very small objects. Neglecting transmission times, how much time elapses with (a) nonpersistent HTTP with no parallel TCP connections, (b) nonpersistent HTTP with parallel connections, (c) persistent HTTP with pipeline. (d) persistent HTTP without pipeline

22 Ans: a) RTT1 + + RTTN +2RTT0 +3*2RTT0 =8*RTT0 +RTT1 + + RTTN b) RTT1 + + RTTN +2RTT0 + 2RTT0 = 4*RTT0 + RTT1 + + RTTN c) RTT1 + + RTTN +2RTT0 +RTT0 =3*RTT0 +RTT1 + + RTT0

23

24 public Internet 15 Mbps access link origin servers a. Find the total average response time b. Now suppose a cache is installed in the institution LAN. Suppose the hit rate is 0.6. Find the total response time. institutional network 10 Mbps LAN institutional cache

25 a. Answer: The time to transmit an object of size L over a link or rate R is L/R. L R bits bps s 6 / 900,000 / 15* ( ) The arrival rate of objects to the access link is 10 objects/second. Thus the average access delay is 0.06/(1-0.06*10)=0.15 (S) The total average response time is =2.15 seconds b. Answer: Since the hit rate is 0.6, the traffic on access link is reduced to (1-0.6)=0.4. The arrival rate of objects to the access link is 4 objects/s. Thus the average access delay is 0.06/(1-0.06*4)=0.079 (s). The total average response time for the cache-missing objects is 2.079(s). Therefore we have the total average response time is 0.6*0+0.4*2.079=0.83(s)

26 P16 Consider distributing a file of F=5 Gbits to N peers. The server has an upload rate of us=20mbps, and each peer has a download rate of di=1mbps and an upload rate of u. For N=10,100, and 1,000 and u=100kbps, 250Kbps,and 500Kbps,prepare a chart giving the minimum distribution time for each of the combinations of N and u for both client-server distribution and P2P distribution.

27 Answer: For calculating the minimum distribution time for clientserver distribution, we use the following formula: Similarly, for calculating the minimum distribution time for P2P distribution, we use the following formula D max{ F / u, F / d, NF /( u u )} P2P s min s i i 1 F 5Gbits 5*1024Mbits u s 20 Mbits, d d 1Mbits min i N

28 CS N Kbps u 250 Kbps Kbps P2P N Kbps u 250 Kbps Kbps

29 P17 Consider distributing a file of F bits to N peers using a P2P architecture. Assume a fluid model. For simplicity assume that dmin is very large, so that peer download bandwidth is never a bottleneck. A. suppose that u Specify a s ( us u1... un)/ N. distribution scheme that has a distribution time of F/us B. suppose that u Specify a s ( us u1... un)/ N. distribution scheme that has a distribution time of F/(u s +u 1 + +un)

30 Ans: Assume that u= 1, Thus: A. DP2P max{ F / us, NF / u} By assumption: u u/ N s Divide the file into N parts, with the i th part having size (u i /(u-u s ))F. The server transmits the i th part to peer i at rate r i = (u i /(u-u s )) u s. Note that r 1 + r r N = u s, so that the aggregate server rate does not exceed the link rate of the server. Also have each peer I forward the bits it receives to each of the N-1 peers at rate r i. The aggregate forwarding rate by peer i is (N-1)r i. We have ui ( N 1) r ( N 1) u u u u i s i s

31 In this distribution scheme, peer i receives bits at an aggregate rate of r r u i j s j i Thus, each peer receives the file in F/u s.

32 B. By assumption: u u/ N s ui let : ri N 1 u us us r N 1 N 1 N In this distribution scheme, the file is broken into N+1 parts. The server sends bits from the i th part to the i th peer (i = 1,., N) at rate r i. Each peer i forwards the bits arriving at rate r i to each of the other N-1 peers. Additionally, the server sends bits from the (N+1) st part at rate r N+1 to each of the N peers. The peers do not forward the bits from the (N+1) st part.

33 N The aggregate send rate of the server is ri NrN 1 us i 1 Thus, the server s send rate does not exceed its link rate. The aggregate send rate of peer i is (N-1)r i =u i Thus, each peer s send rate does not exceed its link rate. In this distribution scheme, peer i receives bits at an aggregate rate of r r r u N i N 1 j / j i

34 Suppose you open a startup company starwar and want to set up your company network. Your network has the following serve rs: 1. DNS server: dns1.starwar.com with IP as Web server: starwar.com with two IP as a nd The web server also has a name as arwar.com. 3. server: galaxy.starwar.com with IP as Your company s address is 1). What resource records (RRs) do you need to provide to the u pper-level.com DNS server? (2 points) 2). What RRs do you need to put in your company s DNS server? (3 points)

35 1) (starwar.com, dns1.starwar.com, NS) (dns1.starwar.com, , A) 2) (galaxy.starwar.com, ,a) (starwar.com, galaxy.starwar.com, MX) (www.starwar.com,starwar.com,cname) (starwar.com, ,a) (starwar.com, ,a)

Solutions to the Sample Questions on Application Layer

Solutions to the Sample Questions on Application Layer Solutions to the Sample Questions on Application Layer 1) Why is SMTP not used for transferring e-mail messages from the recipient s mail server to the recipient s personal computer? Answer: Whereas SMTP

More information

Tutorial 3 1 WEB CACHING

Tutorial 3 1 WEB CACHING Tutorial 3 1 WEB CACHING Consider the following figure, for which there is an institutional network connected to the Internet. Suppose that the average object size is 850,000 bits and that the average

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

App-layer protocol defines

App-layer protocol defines App-layer protocol defines Types of messages exchanged, e.g., request, response Message syntax: what fields in messages & how fields are delineated Message semantics meaning of information in fields Rules

More information

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 1 Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 ote: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Last time NAT. Application layer. Intro. Web / HTTP 20-1

Last time NAT. Application layer. Intro. Web / HTTP 20-1 Last time NAT Application layer Intro Web / HTTP 20-1 This time Finish HTTP FTP 20-2 HTTP Modeling Assume Web page consists of: 1 base HTML page (of size O bits) M images (each of size O bits) Non-persistent

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

ECE 156: Computer Network Architecture Homework 2 (Fall 2009)

ECE 156: Computer Network Architecture Homework 2 (Fall 2009) ECE 156: Computer Network Architecture Homework 2 (Fall 2009) Instructions: You are required to work on the homework on your own. Please be legible and state all assumptions clearly. Show all work in order

More information

CS555, Spring /25/2005. Pop Quiz 1. WMU-CS, Dr. Gupta 1. Network applications: some jargon

CS555, Spring /25/2005. Pop Quiz 1. WMU-CS, Dr. Gupta 1. Network applications: some jargon Chapter 2 Network Applications Contd Application Layer Protocols http ftp, tftp telnet, rlogin snmp, dns Smtp, pop3, imap Unix Socket Interface Source: Guizani; Kurose and Ross textbooks, Unix manpages,

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in powerpoint form so you can add, modify, and

More information

ECE/CS 372 introduction to computer networks Lecture 4

ECE/CS 372 introduction to computer networks Lecture 4 ECE/CS 372 introduction to computer networks Lecture 4 Announcements: HW1 is due next Tuesday, April 16 th Extra credit due next Thursday, April 18 th h=p://wps.aw.com/ aw_kurose_network_3/21/5493/1406348.cw/index.html

More information

ECE5650: Network Services. Examples of Network Services

ECE5650: Network Services. Examples of Network Services ECE5650: Network Services Network Services 1 Examples of Network Services E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone

More information

Application Layer. Week 3-4

Application Layer. Week 3-4 Application Layer Week 3-4 Slides adapted from Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross, Addison-Wesley, April 2009. All material copyright 1996-2009 J.F Kurose and

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Introduction to the Application Layer. Computer Networks Term A15

Introduction to the Application Layer. Computer Networks Term A15 Introduction to the Application Layer Computer Networks Term A15 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

COE 431 Computer Networks. Welcome to Exam II Thursday May 15, Instructor: Dr. Wissam F. Fawaz

COE 431 Computer Networks. Welcome to Exam II Thursday May 15, Instructor: Dr. Wissam F. Fawaz 1 COE 1 Computer Networks elcome to Exam II Thursday May 15, 01 Instructor: Dr. issam F. Fawaz Name: Student ID: Instructions: 1. This exam is Closed Book. Please do not forget to write your name and ID

More information

Final Exam for ECE374 05/05/11 Solution!!

Final Exam for ECE374 05/05/11 Solution!! ECE374: Final Exam 1 Final Exam for ECE374 05/05/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. 1 2 Chapter 2: Application Layer Overview: Principles of network applications? Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS P2P applications Socket

More information

Lecture 5 Internet Core: Protocol layers

Lecture 5 Internet Core: Protocol layers Internet Core: Protocol layers Application Layer We will learn about protocols by examining popular application-level protocols HTTP FTP SMTP / POP3 / IMAP application transport network data link physical

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

CSCI-1680 Application Layer Chen Avin

CSCI-1680 Application Layer Chen Avin CSCI-1680 Application Layer Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Administrivia Next Week: HW3 Out TCP Milestone II Coming week: application layer Application layer

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Tutorial 1 Solutions (Week 5)

Tutorial 1 Solutions (Week 5) COMP 333/933 Computer Networks and Applications Tutorial Solutions (Week 5) Introduction Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose the propagation

More information

OSI Transport Layer. Chapter 4

OSI Transport Layer. Chapter 4 OSI Transport Layer Network Fundamentals Chapter 4 Objectives Explain the role of Transport Layer protocols and services in supporting communications across data networks. Analyze the application and operation

More information

Computer Networks I (spring 2008)

Computer Networks I (spring 2008) 521261A Computer Networks I (spring 2008) Problem set #5 Problem solving session #5 Time: Fri 25.4.2008 at 12:15-13:45 Location: TS101 Intermediate exam #5 Time: Mon 28.4.2008 2008 at 10:15-11:45 11:45

More information

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-24: INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS 1 Internet enabled embedded system Communication to other on the Internet. Use html (hyper text

More information

EEE3080F Communication Network and System Fundamentals

EEE3080F Communication Network and System Fundamentals EEE3080F Communication Network and System Fundamentals http://web.uct.ac.za/depts/commnetwork/eee3080 H Anthony Chan; Yang Li h.a.chan@ieee.org; yli@crg.ee.uct.ac.za http://web.uct.ac.za/depts/commnetwork/achan.html

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP. 2.1 principles of network applications

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP. 2.1 principles of network applications Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

CS312 Final Review. Chapters: Congestion Control, Network Security, Applications. Final Exam Format: Multiple choice Questions. Short Answer Questions

CS312 Final Review. Chapters: Congestion Control, Network Security, Applications. Final Exam Format: Multiple choice Questions. Short Answer Questions CS312 Final Review Chapters: Congestion Control, Network Security, Applications Final Exam Format: Multiple choice Questions Short Answer Questions Long Answer Questions Notes: Use printed class material

More information

First Midterm for ECE374 03/04/13 Solution!!

First Midterm for ECE374 03/04/13 Solution!! ECE374: First Midterm 1 First Midterm for ECE374 03/04/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the

More information

Networking Applications

Networking Applications Networking Applications Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport The Web and HTTP The Web and HTTP Dr. Ayman

More information

Computer Networks CS555

Computer Networks CS555 Computer Networks CS555 Ajay Gupta Department of Computer Science Western Michigan University Kalamazoo, MI 49008 ajay.gupta@wmich.edu www.cs.wmich.edu/gupta/teaching/cs555/spring05/ Source: Kurose and

More information

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1 The OSI Model and the TCP/IP Protocol Suite Pritee Parwekar ANITS 1 To study To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss

More information

Transport Layer, UDP, and TCP CSC 790 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Fall Application. Transport.

Transport Layer, UDP, and TCP CSC 790 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Fall Application. Transport. Transport Layer, UDP, and TCP CSC 790 WAKE FOREST U N I V E R S I T Y Department of Computer Science Fall 2015 TCP/IP Model HTTP, SSH, SMTP,... Application Application communications TCP or UDP Transport

More information

Reliable Transport. CS144 Review Session 1 October 2, 2008 Roger Liao Slides Credit: Ben Nham

Reliable Transport. CS144 Review Session 1 October 2, 2008 Roger Liao Slides Credit: Ben Nham Reliable Transport TCP Review CS144 Review Session 1 October 2, 2008 Roger Liao Slides Credit: Ben Nham Announcements Labs 1 and 2 are online Lab 1 due 10/8 @ beginning of class Come to lecture free extension

More information

Computer Networks HTTP. Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks HTTP. Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks HTTP Based on Computer Networking, 4 th Edition by Kurose and Ross Web and HTTP First some jargon Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio

More information

Lecture The Transport Layer

Lecture The Transport Layer Computer Communications Lecture 17-18 The Transport Layer Required Reading: Tanenbaum (chapter 6 and section 5.3) Transport Service Two types of service: connectionless and connection-oriented Implemented

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total

More information

Chapter 2. Networked Applications

Chapter 2. Networked Applications Chapter 2 Networked Applications Adapted from Computer Networking: A Top Down Approach, 6th edition, Jim Kurose, Keith Ross Addison-Wesley, March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

Chapter 6. The Transport Layer

Chapter 6. The Transport Layer Chapter 6 The Transport Layer Services Provided to the Upper Layers The network, transport, and application layers. Transport Service Primitives The primitives for a simple transport service: Example:

More information

Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview:

Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview: Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course approach: use Internet as example Overview: what s the Internet what s a protocol? network edge network core

More information

CS 337 Winter Layering. Network architecture Protocols Measuring network performance. Protocol. Example: web transaction

CS 337 Winter Layering. Network architecture Protocols Measuring network performance. Protocol. Example: web transaction CS 337 Winter 2004 architecture Protocols Layering Abstracting functionality to different parts (layers) of the network Each layer implements a protocol Each layer communicates with the layers above and

More information

Pemrograman Jaringan Introduction to Client-Server Networking

Pemrograman Jaringan Introduction to Client-Server Networking Pemrograman Jaringan Introduction to Client-Server Networking PTIIK - 2012 Course Contents 1 Understanding TCP Basics 2 Understanding User Datagram Protocol 3 Understanding Physical Transports and Ethernet

More information

3/6/12. System.out.println("FROM SERVER: " + modifiedsentence); clientsocket.close();

3/6/12. System.out.println(FROM SERVER:  + modifiedsentence); clientsocket.close(); Socket clientsocket = new Socket("10.20.47.246",6789); // Set up the necessary I/O pieces (Java) DataOutputStream outtoserver = new DataOutputStream (clientsocket.getoutputstream()); BufferedReader infromserver

More information

Chapter 7: Internet at Work

Chapter 7: Internet at Work Chapter 7: Internet at Work Silvia Giordano ICA-EPFL 7: Internet at work 1 1 Introduction Chapter goal: understand how s support the applications with an example: application data generation process-to-process

More information

IS 450/IS 650 Data Communications and Networks. Course Review Midterm Exam

IS 450/IS 650 Data Communications and Networks. Course Review Midterm Exam IS 450/IS 650 Data Communications and Networks Course Review Midterm Exam Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Midterm Exam When: Tuesday

More information

Computer Networks. Chapter 1 Reference models (OSI and TCP/IP)

Computer Networks. Chapter 1 Reference models (OSI and TCP/IP) Computer Networks Chapter 1 Reference models (OSI and TCP/IP) Network structure Reduce network design complexity organize networks as stacks of layers (levels) Network layers Use of layers data hiding,

More information

Understand the OSI Model

Understand the OSI Model Understand the OSI Model Part 2 Lesson Overview In this lesson, you will learn information about: Frames Packets Segments TCP TCP/IP Model Well-known ports for most-used purposes Anticipatory Set Review

More information

Tutorial 1 (Week 6) Introduction

Tutorial 1 (Week 6) Introduction COMP 333/933 Computer Networks and Applications Tutorial (Week 6) Introduction Problem Set, Question 7 Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose

More information

Summary: TCP Congestion Control. When CongWin is below Threshold, sender in slowstart phase, window grows exponentially.

Summary: TCP Congestion Control. When CongWin is below Threshold, sender in slowstart phase, window grows exponentially. ummary: TCP Congestion Control When CongWin is below Threshold, sender in slowstart phase, window grows exponentially. When CongWin is above Threshold, sender is in congestion-avoidance phase, window grows

More information

Transport Layer Notes. Performs a critical role in providing communication services directly to application processes running on different hosts.

Transport Layer Notes. Performs a critical role in providing communication services directly to application processes running on different hosts. Transport Layer Notes Performs a critical role in providing communication services directly to application processes running on different hosts. Critical function: Extending the network layer's delivery

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view Part I: Introduction Housekeeping Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP

More information

CHAPTER 26. Questions PRACTICE SET

CHAPTER 26. Questions PRACTICE SET CHAPTER 26 PRACTICE SET Questions Q26-. Probably Alice turned off her desktop, which stopped the FTP server, when she left the office. A server process should be running all the time, waiting for clients

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Informática y Comunicaciones. Chapter 2 Application Layer

Informática y Comunicaciones. Chapter 2 Application Layer Informática y Comunicaciones Chapter 2 Application Layer All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Application Layer 2-1 Chapter 2: outline 2.1 principles of network

More information

OSI Transport Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public ١

OSI Transport Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public ١ OSI Transport Layer Network Fundamentals Chapter 4 ١ Objectives Explain the role of Transport Layer protocols and services in supporting communications across data networks Analyze the application and

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Remote login (Telnet):

Remote login (Telnet): SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2016 Prof. Dola Saha 1 Instructions Put your name and student id on each sheet of paper! The exam is closed book. You cannot use any computer

More information

Chapter II: Application Layer

Chapter II: Application Layer Chapter II: Application Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross Processes communicating process: program running within

More information

Transport Protocols. Logical communication between processes. Transport services

Transport Protocols. Logical communication between processes. Transport services Transport Layer Transport Protocols Logical communication between processes Sender divides a message into segments Receiver reassembles segments into message Transport services (De)multiplexing packets

More information

CS 457 Lecture 20 Transport Layer: UDP and TCP. Fall 2011

CS 457 Lecture 20 Transport Layer: UDP and TCP. Fall 2011 CS 457 Lecture 20 Transport Layer: UDP and TCP Fall 2011 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols

More information

Select a wrong statement

Select a wrong statement Select a wrong statement A. TCP and UDP are in transport layer B. TCP provides reliable connec=ons while UDP is unreliable connec=ons C. HTTP uses TCP D. FTP uses UDP E. All network applica=ons rely on

More information

High Performance Communication Networks. Introduction, Part I

High Performance Communication Networks. Introduction, Part I High Performance Communication Networks Introduction, Part I Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet

More information

Streaming Audio and Video

Streaming Audio and Video Streaming Audio and Video CS 360 Internet Programming Daniel Zappala Brigham Young University Computer Science Department Streaming Audio and Video Daniel Zappala 1/27 Types of Streaming stored audio and

More information

CS413: Computer Networks

CS413: Computer Networks CS413: Computer Networks 2005 Fall Term Midterm Exam Solution Student ID: Name: Problem No. Marks Your Marks 1 16 2 5 3 5 4 7 5 4 6 7 7 3 8 3 Total 50 1 [Marking schemes are given in blue color and the

More information

Lecture 2-bis. 2. Internet Transport Protocols

Lecture 2-bis. 2. Internet Transport Protocols Lecture 2-bis. 2 Internet Transport Protocols As seen by the application developer point of view The primary (in principle unique) role of Internet transport protocols Extend IP's delivery service (between

More information

Part I: Introduction. What s the Internet: nuts and bolts view. COSC 4377, Spring /22/01

Part I: Introduction. What s the Internet: nuts and bolts view. COSC 4377, Spring /22/01 Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?

More information

In The Name of God, The Merciful, The Compassionate

In The Name of God, The Merciful, The Compassionate In The Name of God, The Merciful, The Compassionate Mini-Exam#1 Computer Networks 1, Department of Computer Engineering, Sharif University of Technology, Fall 2012 CE40443 Total Points: 110 / Time: 2 hours

More information

Lecture 2-bis. 2. role of Internet transport protocols. Internet Transport Protocols. Transport Layer Protocols. Internet

Lecture 2-bis. 2. role of Internet transport protocols. Internet Transport Protocols. Transport Layer Protocols. Internet Lecture 2-bis. 2 Internet Transport Protocols As seen by the application developer point of view The primary (in principle unique) role of Internet transport protocols!" # $ % "!"& Transport layer Internet

More information

The Web and HTTP. Dr. Philip Cannata

The Web and HTTP. Dr. Philip Cannata The Web and HTTP Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint

More information

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments INTERNET PROTOCOLS http://www.tutorialspoint.com/internet_technologies/internet_protocols.htm Copyright tutorialspoint.com Transmission Control Protocol TCP TCP is a connection oriented protocol and offers

More information

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

Course Review: Chapter 1

Course Review: Chapter 1 Course Review: Chapter 1 What s a protocol? Circuit Switching and Packet Switching Network Taxonomy Four Sources of Packet Delay Internet Protocol Stack Introduction 1-1 What is a Protocol? protocols define

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Slides are adopted from slides by J.F Kurose and K.W. Ross All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2016 A-term 1 Some slides are originally from the course materials of the textbook

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

CS 456 Computer Networks

CS 456 Computer Networks CS 456 Computer Networks Instructor: Ian Goldberg http://www.cs.uwaterloo.ca/~iang/ Classes: Tuesday and Thursday 8:30 9:50am MC 4063 (section 1) 2:30 3:50pm MC 2038 (section 2) You will need an account

More information

Network and Firewall Issues

Network and Firewall Issues Network and Firewall Issues Questions regarding network performance and security arise when installing the Niagara Framework in a facility that utilizes a firewall. The Niagara software suite functions

More information

Chapter 8 Communication Networks and Services Transport Layer Protocols: UDP and TCP

Chapter 8 Communication Networks and Services Transport Layer Protocols: UDP and TCP Chapter 8 Communication Networks and Services Transport Layer Protocols: UDP and TCP 1 Outline UDP Protocol TCP Quick Overview TCP Header TCP Connection Management TCP Congestion Control 2 UDP Best effort

More information

Application Layer Network Protocols

Application Layer Network Protocols Application Layer Network Protocols CS 475 Application Layer 1 Applications and application-layer protocols Application: communicating, distributed processes running in network hosts in space exchange

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

Computer Network Applications

Computer Network Applications Last Course Review Computer Network Applications Lecture 5 Fall 2008 Application architectures Client- Peer-to-peer (P2P) Hybrid of - and P2P Dr. Hui Xiong Rutgers University Introduction 1-1 Introduction

More information

4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP B. TCP C. IRQ D. LLC

4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP B. TCP C. IRQ D. LLC CCNA1 V3.0 Mod 11 (Ch 9) 1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly. Repeating your words can be compared

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 3: Transport Layer Overview: Basic introduction to transport layer Multiplexing and demultiplexing Connectionless transport: UDP Connection-oriented

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin 2008 Course Technology Learning Objectives Describe packets and packet filtering

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 2: The Transport Layer in the Internet January 27, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 1/26/04

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Solution. Assignment # 1. (Chapter 2) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department

Solution. Assignment # 1. (Chapter 2) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department The Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data Communications ECOM 4314 Assignment # 1 (Chapter 2) Solution Dr. Hasan Qunoo Eng. Wafaa Audah Eng. Waleed Mousa

More information

The Network Core! Small Review! Network Core: Circuit Switching!

The Network Core! Small Review! Network Core: Circuit Switching! Small Review! What is the difference between circuit switching and packet switching?! What is the difference between connection-oriented and connectionless services?! What is the difference between circuit

More information

CSCI-1680 HTTP & Web Chen Avin

CSCI-1680 HTTP & Web Chen Avin CSCI-1680 HTTP & Web Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Administrivia This Week: HW3 (delay to Thursday) TCP Milestone II Coming week: HTTP, E-mail, DNS First, a

More information