REVIEW FOR CHAPTER 2

Size: px
Start display at page:

Download "REVIEW FOR CHAPTER 2"

Transcription

1 REVIEW FOR CHAPTER 2

2 R1. List five nonproprietary Internet applications and the application-layer protocols that they use. Answer: The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP. Video conference: RTP

3 R2. For a communication session between a pair of processes, which process is the client and which is the sever? Ans: The process which initiates the communication is the client; the process that waits to be contacted is the server.

4 R3: What is the different between network architecture and application architecture? Answer: Network architecture refers to the organization of the communication process into layers (e.g., the five-layer Internet architecture). Application architecture, on the other hand, is designed by an application developer and dictates the broad structure of the application (e.g., clientserver or P2P).

5 R4 What information is used by a process running on one host to identify a process running on another host? Answer: The IP address of the destination host and the port number of the destination socket.

6 R5 For a P2P file-sharing application, do you agree with the statement, There is no notion of client and server sides of a communication session? Why or why not? Answer: No. As stated in the text, all communication sessions have a client side and a server side. In a P2P file-sharing application, the peer that is receiving a file is typically the client and the peer that is sending the file is typically the server.

7 R6. Referring to Figure 2.4, we see that none of the applications listed in Figure 2.4 requires both no data loss and timing. Can you conceive of an application that requires no data loss and that is also highly timesensitive. Ans: network games network multimedia applications with high quality requirements

8 R9. Why do HTTP, FTP, SMTP, POP3 and IMAP run on top of TCP rather than UDP? Answer: The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not.

9 R10. Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer? If the application developer wants TCP to be enhanced with SSL, what does the developer have to do? Ans: SSL operates at the application layer. The SSL socket takes unencrypted data from the application layer, encrypts it and then passes it to the TCP socket. If the application developer wants TCP to be enhanced with SSL, he/she has to include the SSL code in the application.

10 R11 What is meant by a handshaking protocol? Answer: A protocol uses handshaking if the two communicating entities first exchange control packets before sending data to each other. SMTP uses handshaking at the application layer whereas HTTP does not.

11 R15 Suppose Alice, with a Web-based account (such as Hotmail or gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice s host to Bob s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts. Answer: Message is sent from Alice s host to her mail server over HTTP. Alice s mail server then sends the message to Bob s mail server over SMTP. Bob then transfers the message from his mail server to his host over POP3.

12 R16 Print out the header of an message you have recently received. How many Received: header lines are there? Analyze each of the header lines in the message.answer: skipped

13 R19. Why is it said that FTP sends control information outof-band? Ans: FTP uses two parallel TCP connections, one connection for sending control information (such as a request to transfer a file) and another connection for actually transferring the file. Because the control information is not sent over the same connection that the file is sent over, FTP sends control information out of band.

14 R20 Consider a new peer Alice who joins BitTorrent without possessing any chunks. Without any chunks, she cannot become a top-four uploader for any of the other peers, since she has nothing to upload. How then will Alice get her first chunk? Answer: Alice will get her first chunk as a result of she being selected by one of her neighbors as a result of an optimistic unchoke, for sending out chunks to her.

15 P1 True or false? A. A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. B. Two distinct Web pages (for example, and )can be sent over the same persistent connection. C. With nonpersistent connection between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. D. The Date: header in the HTTP response message indicates when the object in the response was last modified.

16 Answer: a) F b) T c) F d) F

17 P4. Obtain the HTTP/1.1 specification (RFC 2616). Answer the following questions: a. Explain the mechanism used for signaling between the client and server to indicate that a persistent connection is being closed. Can the client, the server, or both signal the close of a connection? b. What encryption services are provided by HTTP?

18 ANS.: A. Persistent connections are discussed in section 8 of RFC 2616 Sections and of the RFC indicate that either the client or the server can indicate to the other that it is going to close the persistent connection. It does so by including the including the connection-token "close" in the Connection-header field of the http request/reply. B. HTTP does not provide any encryption services

19 P7. Suppose within your web browser you click on a link to obtain a web page. Suppose that the IP address for the associated URL is not cached in your local host, so that a DNS look up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur a RTT of RTT1,..., RTTN. Further suppose that web page associated with the link contains exactly one object, a small amount of HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object

20 ANS.: The total amount of time to get the IP address is RTT1 +RTT2 + +RTTN. Once the IP address is known, RTT0 elapses to set up the TCP connection and another RTT0 elapses to request and receive the small object. The total response time is 2RTT0 +RTT1 +RTT2 + +RTTN

21 P8. Referring to question (7), suppose the page contains three very small objects. Neglecting transmission times, how much time elapses with (a) nonpersistent HTTP with no parallel TCP connections, (b) nonpersistent HTTP with parallel connections, (c) persistent HTTP with pipeline. (d) persistent HTTP without pipeline

22 Ans: a) RTT1 + + RTTN +2RTT0 +3*2RTT0 =8*RTT0 +RTT1 + + RTTN b) RTT1 + + RTTN +2RTT0 + 2RTT0 = 4*RTT0 + RTT1 + + RTTN c) RTT1 + + RTTN +2RTT0 +RTT0 =3*RTT0 +RTT1 + + RTT0

23

24 public Internet 15 Mbps access link origin servers a. Find the total average response time b. Now suppose a cache is installed in the institution LAN. Suppose the hit rate is 0.6. Find the total response time. institutional network 10 Mbps LAN institutional cache

25 a. Answer: The time to transmit an object of size L over a link or rate R is L/R. L R bits bps s 6 / 900,000 / 15* ( ) The arrival rate of objects to the access link is 10 objects/second. Thus the average access delay is 0.06/(1-0.06*10)=0.15 (S) The total average response time is =2.15 seconds b. Answer: Since the hit rate is 0.6, the traffic on access link is reduced to (1-0.6)=0.4. The arrival rate of objects to the access link is 4 objects/s. Thus the average access delay is 0.06/(1-0.06*4)=0.079 (s). The total average response time for the cache-missing objects is 2.079(s). Therefore we have the total average response time is 0.6*0+0.4*2.079=0.83(s)

26 P16 Consider distributing a file of F=5 Gbits to N peers. The server has an upload rate of us=20mbps, and each peer has a download rate of di=1mbps and an upload rate of u. For N=10,100, and 1,000 and u=100kbps, 250Kbps,and 500Kbps,prepare a chart giving the minimum distribution time for each of the combinations of N and u for both client-server distribution and P2P distribution.

27 Answer: For calculating the minimum distribution time for clientserver distribution, we use the following formula: Similarly, for calculating the minimum distribution time for P2P distribution, we use the following formula D max{ F / u, F / d, NF /( u u )} P2P s min s i i 1 F 5Gbits 5*1024Mbits u s 20 Mbits, d d 1Mbits min i N

28 CS N Kbps u 250 Kbps Kbps P2P N Kbps u 250 Kbps Kbps

29 P17 Consider distributing a file of F bits to N peers using a P2P architecture. Assume a fluid model. For simplicity assume that dmin is very large, so that peer download bandwidth is never a bottleneck. A. suppose that u Specify a s ( us u1... un)/ N. distribution scheme that has a distribution time of F/us B. suppose that u Specify a s ( us u1... un)/ N. distribution scheme that has a distribution time of F/(u s +u 1 + +un)

30 Ans: Assume that u= 1, Thus: A. DP2P max{ F / us, NF / u} By assumption: u u/ N s Divide the file into N parts, with the i th part having size (u i /(u-u s ))F. The server transmits the i th part to peer i at rate r i = (u i /(u-u s )) u s. Note that r 1 + r r N = u s, so that the aggregate server rate does not exceed the link rate of the server. Also have each peer I forward the bits it receives to each of the N-1 peers at rate r i. The aggregate forwarding rate by peer i is (N-1)r i. We have ui ( N 1) r ( N 1) u u u u i s i s

31 In this distribution scheme, peer i receives bits at an aggregate rate of r r u i j s j i Thus, each peer receives the file in F/u s.

32 B. By assumption: u u/ N s ui let : ri N 1 u us us r N 1 N 1 N In this distribution scheme, the file is broken into N+1 parts. The server sends bits from the i th part to the i th peer (i = 1,., N) at rate r i. Each peer i forwards the bits arriving at rate r i to each of the other N-1 peers. Additionally, the server sends bits from the (N+1) st part at rate r N+1 to each of the N peers. The peers do not forward the bits from the (N+1) st part.

33 N The aggregate send rate of the server is ri NrN 1 us i 1 Thus, the server s send rate does not exceed its link rate. The aggregate send rate of peer i is (N-1)r i =u i Thus, each peer s send rate does not exceed its link rate. In this distribution scheme, peer i receives bits at an aggregate rate of r r r u N i N 1 j / j i

34 Suppose you open a startup company starwar and want to set up your company network. Your network has the following serve rs: 1. DNS server: dns1.starwar.com with IP as Web server: starwar.com with two IP as a nd The web server also has a name as arwar.com. 3. server: galaxy.starwar.com with IP as Your company s address is 1). What resource records (RRs) do you need to provide to the u pper-level.com DNS server? (2 points) 2). What RRs do you need to put in your company s DNS server? (3 points)

35 1) (starwar.com, dns1.starwar.com, NS) (dns1.starwar.com, , A) 2) (galaxy.starwar.com, ,a) (starwar.com, galaxy.starwar.com, MX) (www.starwar.com,starwar.com,cname) (starwar.com, ,a) (starwar.com, ,a)

Solutions to the Sample Questions on Application Layer

Solutions to the Sample Questions on Application Layer Solutions to the Sample Questions on Application Layer 1) Why is SMTP not used for transferring e-mail messages from the recipient s mail server to the recipient s personal computer? Answer: Whereas SMTP

More information

Tutorial 3 1 WEB CACHING

Tutorial 3 1 WEB CACHING Tutorial 3 1 WEB CACHING Consider the following figure, for which there is an institutional network connected to the Internet. Suppose that the average object size is 850,000 bits and that the average

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 1 Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 ote: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

ECE 156: Computer Network Architecture Homework 2 (Fall 2009)

ECE 156: Computer Network Architecture Homework 2 (Fall 2009) ECE 156: Computer Network Architecture Homework 2 (Fall 2009) Instructions: You are required to work on the homework on your own. Please be legible and state all assumptions clearly. Show all work in order

More information

Introduction to the Application Layer. Computer Networks Term A15

Introduction to the Application Layer. Computer Networks Term A15 Introduction to the Application Layer Computer Networks Term A15 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Final Exam for ECE374 05/05/11 Solution!!

Final Exam for ECE374 05/05/11 Solution!! ECE374: Final Exam 1 Final Exam for ECE374 05/05/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Tutorial 1 Solutions (Week 5)

Tutorial 1 Solutions (Week 5) COMP 333/933 Computer Networks and Applications Tutorial Solutions (Week 5) Introduction Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose the propagation

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

OSI Transport Layer. Chapter 4

OSI Transport Layer. Chapter 4 OSI Transport Layer Network Fundamentals Chapter 4 Objectives Explain the role of Transport Layer protocols and services in supporting communications across data networks. Analyze the application and operation

More information

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-24: INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS 1 Internet enabled embedded system Communication to other on the Internet. Use html (hyper text

More information

Computer Networks I (spring 2008)

Computer Networks I (spring 2008) 521261A Computer Networks I (spring 2008) Problem set #5 Problem solving session #5 Time: Fri 25.4.2008 at 12:15-13:45 Location: TS101 Intermediate exam #5 Time: Mon 28.4.2008 2008 at 10:15-11:45 11:45

More information

Chapter 6. The Transport Layer

Chapter 6. The Transport Layer Chapter 6 The Transport Layer Services Provided to the Upper Layers The network, transport, and application layers. Transport Service Primitives The primitives for a simple transport service: Example:

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total

More information

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1 The OSI Model and the TCP/IP Protocol Suite Pritee Parwekar ANITS 1 To study To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss

More information

Chapter 2. Networked Applications

Chapter 2. Networked Applications Chapter 2 Networked Applications Adapted from Computer Networking: A Top Down Approach, 6th edition, Jim Kurose, Keith Ross Addison-Wesley, March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

Reliable Transport. CS144 Review Session 1 October 2, 2008 Roger Liao Slides Credit: Ben Nham

Reliable Transport. CS144 Review Session 1 October 2, 2008 Roger Liao Slides Credit: Ben Nham Reliable Transport TCP Review CS144 Review Session 1 October 2, 2008 Roger Liao Slides Credit: Ben Nham Announcements Labs 1 and 2 are online Lab 1 due 10/8 @ beginning of class Come to lecture free extension

More information

Transport Layer, UDP, and TCP CSC 790 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Fall Application. Transport.

Transport Layer, UDP, and TCP CSC 790 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Fall Application. Transport. Transport Layer, UDP, and TCP CSC 790 WAKE FOREST U N I V E R S I T Y Department of Computer Science Fall 2015 TCP/IP Model HTTP, SSH, SMTP,... Application Application communications TCP or UDP Transport

More information

3/6/12. System.out.println("FROM SERVER: " + modifiedsentence); clientsocket.close();

3/6/12. System.out.println(FROM SERVER:  + modifiedsentence); clientsocket.close(); Socket clientsocket = new Socket("10.20.47.246",6789); // Set up the necessary I/O pieces (Java) DataOutputStream outtoserver = new DataOutputStream (clientsocket.getoutputstream()); BufferedReader infromserver

More information

Computer Networks HTTP. Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks HTTP. Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks HTTP Based on Computer Networking, 4 th Edition by Kurose and Ross Web and HTTP First some jargon Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview:

Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview: Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course approach: use Internet as example Overview: what s the Internet what s a protocol? network edge network core

More information

Understand the OSI Model

Understand the OSI Model Understand the OSI Model Part 2 Lesson Overview In this lesson, you will learn information about: Frames Packets Segments TCP TCP/IP Model Well-known ports for most-used purposes Anticipatory Set Review

More information

Tutorial 1 (Week 6) Introduction

Tutorial 1 (Week 6) Introduction COMP 333/933 Computer Networks and Applications Tutorial (Week 6) Introduction Problem Set, Question 7 Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Select a wrong statement

Select a wrong statement Select a wrong statement A. TCP and UDP are in transport layer B. TCP provides reliable connec=ons while UDP is unreliable connec=ons C. HTTP uses TCP D. FTP uses UDP E. All network applica=ons rely on

More information

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view Part I: Introduction Housekeeping Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet

More information

CHAPTER 26. Questions PRACTICE SET

CHAPTER 26. Questions PRACTICE SET CHAPTER 26 PRACTICE SET Questions Q26-. Probably Alice turned off her desktop, which stopped the FTP server, when she left the office. A server process should be running all the time, waiting for clients

More information

Lecture 2-bis. 2. Internet Transport Protocols

Lecture 2-bis. 2. Internet Transport Protocols Lecture 2-bis. 2 Internet Transport Protocols As seen by the application developer point of view The primary (in principle unique) role of Internet transport protocols Extend IP's delivery service (between

More information

OSI Transport Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public ١

OSI Transport Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public ١ OSI Transport Layer Network Fundamentals Chapter 4 ١ Objectives Explain the role of Transport Layer protocols and services in supporting communications across data networks Analyze the application and

More information

In The Name of God, The Merciful, The Compassionate

In The Name of God, The Merciful, The Compassionate In The Name of God, The Merciful, The Compassionate Mini-Exam#1 Computer Networks 1, Department of Computer Engineering, Sharif University of Technology, Fall 2012 CE40443 Total Points: 110 / Time: 2 hours

More information

Lecture 2-bis. 2. role of Internet transport protocols. Internet Transport Protocols. Transport Layer Protocols. Internet

Lecture 2-bis. 2. role of Internet transport protocols. Internet Transport Protocols. Transport Layer Protocols. Internet Lecture 2-bis. 2 Internet Transport Protocols As seen by the application developer point of view The primary (in principle unique) role of Internet transport protocols!" # $ % "!"& Transport layer Internet

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Summary: TCP Congestion Control. When CongWin is below Threshold, sender in slowstart phase, window grows exponentially.

Summary: TCP Congestion Control. When CongWin is below Threshold, sender in slowstart phase, window grows exponentially. ummary: TCP Congestion Control When CongWin is below Threshold, sender in slowstart phase, window grows exponentially. When CongWin is above Threshold, sender is in congestion-avoidance phase, window grows

More information

Transport Protocols. Logical communication between processes. Transport services

Transport Protocols. Logical communication between processes. Transport services Transport Layer Transport Protocols Logical communication between processes Sender divides a message into segments Receiver reassembles segments into message Transport services (De)multiplexing packets

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

Remote login (Telnet):

Remote login (Telnet): SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client

More information

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

CS 457 Lecture 20 Transport Layer: UDP and TCP. Fall 2011

CS 457 Lecture 20 Transport Layer: UDP and TCP. Fall 2011 CS 457 Lecture 20 Transport Layer: UDP and TCP Fall 2011 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Streaming Audio and Video

Streaming Audio and Video Streaming Audio and Video CS 360 Internet Programming Daniel Zappala Brigham Young University Computer Science Department Streaming Audio and Video Daniel Zappala 1/27 Types of Streaming stored audio and

More information

High Performance Communication Networks. Introduction, Part I

High Performance Communication Networks. Introduction, Part I High Performance Communication Networks Introduction, Part I Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

CS 456 Computer Networks

CS 456 Computer Networks CS 456 Computer Networks Instructor: Ian Goldberg http://www.cs.uwaterloo.ca/~iang/ Classes: Tuesday and Thursday 8:30 9:50am MC 4063 (section 1) 2:30 3:50pm MC 2038 (section 2) You will need an account

More information

Part I: Introduction. What s the Internet: nuts and bolts view. COSC 4377, Spring /22/01

Part I: Introduction. What s the Internet: nuts and bolts view. COSC 4377, Spring /22/01 Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?

More information

Chapter 8 Communication Networks and Services Transport Layer Protocols: UDP and TCP

Chapter 8 Communication Networks and Services Transport Layer Protocols: UDP and TCP Chapter 8 Communication Networks and Services Transport Layer Protocols: UDP and TCP 1 Outline UDP Protocol TCP Quick Overview TCP Header TCP Connection Management TCP Congestion Control 2 UDP Best effort

More information

Network and Firewall Issues

Network and Firewall Issues Network and Firewall Issues Questions regarding network performance and security arise when installing the Niagara Framework in a facility that utilizes a firewall. The Niagara software suite functions

More information

CS413: Computer Networks

CS413: Computer Networks CS413: Computer Networks 2005 Fall Term Midterm Exam Solution Student ID: Name: Problem No. Marks Your Marks 1 16 2 5 3 5 4 7 5 4 6 7 7 3 8 3 Total 50 1 [Marking schemes are given in blue color and the

More information

Computer Network A network is a combination of hardware and software that sends data from one location to another

Computer Network A network is a combination of hardware and software that sends data from one location to another Computer Network A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point in

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin 2008 Course Technology Learning Objectives Describe packets and packet filtering

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 3: Transport Layer Overview: Basic introduction to transport layer Multiplexing and demultiplexing Connectionless transport: UDP Connection-oriented

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 2: The Transport Layer in the Internet January 27, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 1/26/04

More information

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive CS326e Quiz 5 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID The transfer of an html file from one host

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Solution. Assignment # 1. (Chapter 2) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department

Solution. Assignment # 1. (Chapter 2) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department The Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data Communications ECOM 4314 Assignment # 1 (Chapter 2) Solution Dr. Hasan Qunoo Eng. Wafaa Audah Eng. Waleed Mousa

More information

What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view. What s the Internet: a service view

What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view. What s the Internet: a service view What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end-systems pc s workstations, servers PDA s phones, toasters running network apps communication links fiber, copper,

More information

http example WWW: the http protocol Internet apps: their protocols and transport protocols Transport service requirements of common apps

http example WWW: the http protocol Internet apps: their protocols and transport protocols Transport service requirements of common apps Transport service requirements of common apps Internet apps: their protocols and transport protocols Data loss Bandwidth Time Sensitive layer protocol Underlying transport protocol file transfer e- Web

More information

The Network Core! Small Review! Network Core: Circuit Switching!

The Network Core! Small Review! Network Core: Circuit Switching! Small Review! What is the difference between circuit switching and packet switching?! What is the difference between connection-oriented and connectionless services?! What is the difference between circuit

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

TCP/IP Protocol Suite (Internet Model)

TCP/IP Protocol Suite (Internet Model) The Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4314: Data Communication Instructor: Dr. Aiman Abu Samra T.A.: Eng. Alaa O. Shama Discussion Chapter#2 TCP/IP

More information

CSCI-1680 HTTP & Web Chen Avin

CSCI-1680 HTTP & Web Chen Avin CSCI-1680 HTTP & Web Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Administrivia This Week: HW3 (delay to Thursday) TCP Milestone II Coming week: HTTP, E-mail, DNS First, a

More information

3.1 Application Layer Protocol: What is it and what is it not?

3.1 Application Layer Protocol: What is it and what is it not? Chapter 3 Application Layer In this chapter, the fundamental issues addressed by application layer protocols, their service models and their architectural styles are defined. The service models that are

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

CS 421: Computer Networks SPRING MIDTERM April 7, minutes

CS 421: Computer Networks SPRING MIDTERM April 7, minutes CS 421: Computer Networks SPRING 2011 MIDTERM April 7, 2011 120 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments INTERNET PROTOCOLS http://www.tutorialspoint.com/internet_technologies/internet_protocols.htm Copyright tutorialspoint.com Transmission Control Protocol TCP TCP is a connection oriented protocol and offers

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.6 P2P applications 2.7 Socket programming

More information

Network Applications

Network Applications Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing

More information

HTTP response status codes

HTTP response status codes HTTP response status codes In first line in ->client response message. A few sample codes: 200 OK request succeeded, requested object later in this message 301 Moved Permanently requested object moved,

More information

Outline: Introduction

Outline: Introduction Outline: Introduction Last class recap a. Internet is made up of hosts (end systems), communication links, and packet switches). Hosts and packet switches run various networking protocols and work together

More information

OSI Transport Layer 01/27/2009. Network Fundamentals Chapter 4 Modified by Tony Chen Cisco Systems, Inc. All rights reserved.

OSI Transport Layer 01/27/2009. Network Fundamentals Chapter 4 Modified by Tony Chen Cisco Systems, Inc. All rights reserved. OSI Transport Layer Network Fundamentals Chapter 4 Modified by Tony Chen 01/27/2009 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives In this chapter, we examine the role of the Transport

More information

CS555, Spring /8/2005. Chapter 2 outline. WMU-CS, Dr. Gupta 1. DNS: Domain Name System. DNS name servers

CS555, Spring /8/2005. Chapter 2 outline. WMU-CS, Dr. Gupta 1. DNS: Domain Name System. DNS name servers Chapter 2 outline 2. Principles of app layer protocols clients and s app requirements 2.2 Web and HTTP 2.3. FTP 2.3.2 telnet, rlogin, snmp 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 Socket programming

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP B. TCP C. IRQ D. LLC

4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP B. TCP C. IRQ D. LLC CCNA1 V3.0 Mod 11 (Ch 9) 1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly. Repeating your words can be compared

More information

Midterm stats. Internet Protocol Stack. application: supporting network applications. transport: endhost-endhost data transfer

Midterm stats. Internet Protocol Stack. application: supporting network applications. transport: endhost-endhost data transfer Midterm stats Mean: 63.66 (out of 80) Standard deviation: 11.34 Internet Protocol Stack application: supporting network applications HTTP, SMTP, FTP, etc. transport: endhost-endhost data transfer TCP,

More information

Principles of Network Applications. Dr. Philip Cannata

Principles of Network Applications. Dr. Philip Cannata Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Architecture Models (Week 2, Thursday 1/18/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model

More information

The recommended guided learning hours for this unit are 60 hours.

The recommended guided learning hours for this unit are 60 hours. Unit 391 The Technology of the internet Level 3 Credit value 9 Rationale The aim of this unit is to enable candidates to understand the principles and the technologies that allow the internet to function

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

EKSAMEN / EXAM TTM

EKSAMEN / EXAM TTM EKSAMEN / EXAM TTM4 3 5 2 6 2 7 3 8 4 9 5 2 2 26 22 27 23 28 24 29 25 2 3 3 36 32 37 33 38 34 39 35 3 4 4 46 42 47 43 48 44 49 45 4 5 5 56 52 57 53 58 54 59 55 5 Kontroller: Studentnr på alle sider Samme

More information

2. Describe why an application developer may choose to run an application over UDP rather than TCP.

2. Describe why an application developer may choose to run an application over UDP rather than TCP. Chapter 3 - eview Questions Homework Problems and Questions Sections 3.1-3.3 1. Consider a TCP connection between host A and host B. Suppose that the TCP segments traveling from host A to host B have source

More information

Computer Networks OBJECTIVES 6.1 NETWORKS, LARGE AND SMALL 6.2 OSI MODEL. Chapter 6. Note:

Computer Networks OBJECTIVES 6.1 NETWORKS, LARGE AND SMALL 6.2 OSI MODEL. Chapter 6. Note: Chapter 6 OBJECTIVES Computer Networks Understand the rationale for the existence of networks. Distinguish between the three types of networks: LANs, MANs, and WANs. Understand the OSI model and TCP/IP.

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Lecture 25. Secure Transaction with SSL

Lecture 25. Secure Transaction with SSL Lecture 25. Secure Transaction with SSL 1. What is SSL? Secured Sockets Layer is a protocol that transmits data over the Internet in an encrypted form. SSL ensures that the information is sent, unchanged,

More information

Figure 4.2: The position of the transport layer in the Internet protocol stack. (Figure by Forouzan)

Figure 4.2: The position of the transport layer in the Internet protocol stack. (Figure by Forouzan) Chapter 4 Transport Layer The main responsibility of the transport layer is process-to-process data delivery. Some other requirements of example applications from the transport layer are listed in Figure

More information

Chapter 3: Transport Layer

Chapter 3: Transport Layer Chapter 3: Transport Layer Our goals: understand principles behind layer services: multiplexing/demultipl exing reliable data transfer flow control congestion control learn about layer protocols in the

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Homework 2 Solutions

Homework 2 Solutions Homework 2 Solutions 1. P25: a. In the second segment from Host A to B, the sequence number is 197, source port number is 302 and destination port number is 80. b. If the first segment arrives before the

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015 CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,

More information