Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567.
|
|
- Silvester Lucas
- 7 years ago
- Views:
Transcription
1 The tutorial questions illustrate the style of examination questions for EG/ES The paper will be of 3 hours duration, and each student should attempt four questions during this time. You should aim to spend the initial part of an exam reading the questions. Make sure that you understand where the marks are allocated. You are expected to have an understanding of the material which was presented in the lectures, to have done some personal reading based on the syllabus, and to have completed the set of practical exercises and questions located on the course world wide web pages. Ensure that your answers provide sufficient detail to justify the allocated marks. As a guideline, a question part worth ten marks is expected to take minutes to complete. Do draw diagrams which you may feel appropriate to support your answer, ensuring that each diagram is clearly labelled and that you write an explanation underneath describing what the diagram shows. An answer consisting of one or two diagrams and three or four paragraphs describing what the diagrams show and touching on additional details is likely to score a high mark. A full set of notes summarising the answers to these questions will be provided in the final weeks of the course. The class demonstrator(s) will help work out your answers and check the results do ask. TUTORIAL 1: Ethernet Link and Physical Layers 1.1 (a) The IEEE 802.x family of LAN specifications support many physical media, explain with the aid of diagrams the differences between 10BT and 10B5 media. (b) Suggest two situations where optical fibre is preferable to copper cabling. [2 marks ] (c) (i) Explain the function of the Ethernet Preamble. (ii) Explain the function of the Ethernet Cyclic Redundancy Check (CRC). (d) The Ethernet standard states that each frame should carry two addresses. (i) What is the Ethernet destination address used for? [1 marks ] (ii) How does a manufacturer decide which address to use? [3 marks ] (iii) Why is the first bit never set in an Ethernet source address? [2 marks ] 1.2 (a) Sketch the format of an Ethernet frame carrying 1000 B of data. Your answer should show all the protocol fields (headers) present in the frame. [3 marks ] (b) Sketch an outline block diagram of the process by which a byte is encoded by an Ethernet processor prior to transmission by the physical layer. [5 marks ] (c) Plot the waveform which you would observe on an oscilloscope when a byte with the hexadecimal value of 0x57 is transmitted along an Ethernet coaxial cable. [3 marks] (d) The Ethernet Local Area Network (LAN) uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to share the transmission medium. Define the following terms: (i) Carrier Sense (ii) Collision Detection (iii)collision Domain (e) Describe how Ethernet Capture allows a single computer to dominate the use of the medium when it has excessive amounts of data to transmit. [ 3 marks ] (c) G. Fairhurst, 2011 v 12 page 1
2 TUTORIAL 2: LAN Interconnection 2.2 (a) Explain in detail the operation of an Ethernet bridge, and describe how the bridge filters frames which need not be forwarded between Ethernet segments. [10 marks] (b) When considering repeaters, bridges and routers, which type of equipment is most suited for the connection of a LAN to the Internet? Why? (c) What is the role of the Ethernet Source Address? (d) Explain the concept of a collision domain (provide appropriate diagrams in your answer) TUTORIAL 3: Calculating the Utilisation of LANs 3.1 (a) A small Local Area Network (LAN) is shown in the figure: Bridge LAN X LAN Y Computer A Computer B Computer C Computer D Four computers, A, B, C and D connected to a LAN. The LAN is formed from two shared Ethernet segments joined via a bridge. The computer A sends three simultaneous Unicast file transfer packets. each to computers B, C, and D. Calculate the size of a frame, given that it carries 1032 B of IP network payload data. Using this information, calculate the Utilisation of LAN X, assuming that the transmission continues at 50 packets per second to each of the three destinations. (b) What is the utilisation on LAN Y? (c) How does Multicast transmission differ from Unicast transmission? (d) Calculate the utilisation for LAN Y when the file is sent using multicast packets instead of the unicast packets used in section (a). Q4 not used in (c) G. Fairhurst, 2011 v 12 page 2
3 TUTORIAL 4: Network Layer 5.1 (a) The Internet uses connectionless packet switching. Explain the difference between the operation of a packet switching network and a message switching network, paying attention to the transmission of long messages. (b) Define the following terms: (i) The IP Version number (ii) The IP network number (iii) The Network Layer address (c) Explain the term connectionless, describing the services which are provided by a connectionless network layer protocol, such as the Internet Protocol. 5.2 (a) The Domain Name System (DNS) provides resolution of Internet names and addresses. Explain the difference between a name and an address, giving examples of each. (b) Addresses may be assigned in a hierarchical or a flat structure. Describe (giving examples) the addressing structure using in the following types of network: (i) Ethernet (ii) a telephony network (iii) the Internet (c) A computer Z is the DNS server for two computers X and Y. Explain what is meant by the terms client and server. (d) Using the example of a login from the computer X to a remote computer Y, explain how the DNS server (Z) operates. TUTORIAL 5: The Address Resolution Protocol 6.1 (a) What is the purpose of the source and destination addresses in Ethernet frames? Describe in detail how a computer connected to an Ethernet LAN determines its own Ethernet address and how it determines the Ethernet address of other computers with which it needs to communicate. [10 marks] (b) An Ethernet Local Area Network (LAN) connects two workstations (A and B). The following information is provided about the IP interfaces of the computers connected to the LAN, also giving the hardware address (ha) for each interface. A: IP = ; h.a..= 08:00:20:02:b7:f9 B: IP = ; h.a..= 08:00:20:ff:00:00 The computer A has not previously sent any packets to the Ethernet LAN. The user at A runs a program which sends one IP packet and has a destination address of B. Explain the hardware address values in the first frame which is sent by the computer A. (c) What are the hardware source and destination addresses and the source and destination IP addresses of the first network layer packet which is received by B? (c) G. Fairhurst, 2011 v 12 page 3
4 6.2 (a) Three styles of transmission are commonly supported in networks: Unicast, Broadcast and Multicast What is the difference between each of these styles of transmission? (b) Redraw the diagram above to provide a detailed explanation of the operation of the Address Resolution Protocol (ARP). (c) For each packet, specify which computers addresses are used for the source and destination address at both the link layer AND the network layer. (d) Calculate the time taken to transmit one ARP packet using an Ethernet LAN operating at 10 Mbps. Your answer should first calculate the total size of the ARP packet including ALL overhead introduced by each layer during the transmission process. 6.3 Two computers, A and B are connected by an Ethernet LAN. (a) A has not previously sent any packets to the LAN. It sends 20B of data to B in a single IP datagram. (i) What is the type of the first Ethernet frame sent by A? (ii) To which MAC address is the first frame sent? [1 mark] (iii) What is the IP source address of the first IP packet received by B? (b) Computer B responds by sending an 8K byte datagram with a destination of A. (i) How many IP packets are sent by B? (ii) How many IP packets are received by the network layer at A? (iii) How many IP packets are received by the user program at A? (c) Now suppose a router, R, was inserted in the LAN between A and B, and that the Maximum Transmission Unit (MTU) of the LAN connected to B was set to 576 B. (i) How many IP packets are received by the network layer at A? (ii) How many IP packets are received by the user program at A? (iii) What would be the result if the first packet sent by B was lost due to an overflow of the buffer in the router R? [5 marks] TUTORIAL 6: Transport Layer 7.1 (a) List the functions of a reliable communication service. (b) What type of service is provided by the User Datagram Protocol (UDP)? (c) Explain the function of each of the fields in the UDP packet header. (d) A UDP packet containing 50 B of payload data is transmitted using IP over an Ethernet LAN. Draw a diagram showing the complete packet, including all protocol headers. What is the total size of the frame transmitted on the Ethernet LAN 7.2 (a) An end to end connection may be checked in an IP internet using the ping program which uses the Internet Control Management Protocol, ICMP. Describe the operation of the ICMP echo request and ICMP echo reply to perform this check, and how this may measure the round trip delay across the network. (b) Provide a step by step explanation using diagrams to show the way an Ethernet network interface card and the network layer protocol process an IP frame received from an Ethernet transceiver. [12 marks] (c) G. Fairhurst, 2011 v 12 page 4
5 TUTORIAL 7: Packet Decodes 8.1 (a) Define the functions of the transport layer in the OSI Reference Model (b) Define the following terms (i) Ethernet Source Address (ii) Service Access Point provided by the Medium Access Control (MAC) layer (iii) IP Header Checksum (iv) UDP Checksum (c) An Ethernet protocol analyser observes the following frame: DF F E 4A C B 85 CC 16 8B 85 CC B A By decoding the hexadecimal bytes of this frame using the header chart supplied, determine the values for each of the parts (i)- (iv) in the preceding question. Students are expected to know how to decode packets from the sequence of hexadecimal bytes passing over a physical media. The packets may be decoded using the packet header chart provided which indicates the format of the Protocol Control Information (PCI) for a set of well-known protocols. A table of Service Access Point (SAP) codes is also provided below: Ethernet: (in hexadecimal):0x0800 = IP; 0x0806 = arp IP: (in decimal) 1 = ICMP; 2= IGMP; 6 = TCP; 17= UDP TCP ports: (in decimal) 23 = Telnet; 25 = Mail; 69 = TFTP; 80 = WWW (http) You should assume the packet starts with a Medium Access Control (MAC) header. Given the MAC header format, you should be aware that the first six bytes are the destination MAC address, the next six are the MAC source address, and the final two bytes are the MAC protocol type. By identifying the protocol type using the table of SAPs, you should now identify the type of network layer header is expected to follow. The following information is also provided about the two communicating nodes: Node Name: gateway client Network Mask (netmask): Ethernet Physical Address: 00:e0:f7:26:3f:e9 08:00:20:86:35:4b 10.1) 00e0 f726 3fe b ab ff11 f700 8b85 d96e 8b85 e902 99d0 043f c6c 6f68 656c 6c6f 10.2) 00e0 f726 3fe b c 08b ff b85 d96e 8b85 e f a92c b4 10.3) b 00e0 f726 3fe aafb 4000 fc01 fa30 8b85 e902 8b85 d96e da 1e e 3ab ac a0b 0c0d 0e0f a1b 1c1d 1e1f a2b 2c2d 2e2f Further examples are available on the web in eg3567/inet-pages/packetdecode.html, including a complete decode of these three Ethernet frames. (c) G. Fairhurst, 2011 v 12 page 5
6 Additional Questions: 2.1 (a) 4 computers (W,X,Y,Z) are connected by Ethernet segments using a Repeater (R) and Bridges (B1,B2). Which computers receive (at the network level) the following frames? (Make sure your answer also shows which LAN segments carry each frame.) W -> Broadcast address X-> Z Y-> Z Y-> Broadcast address (b) The computers W and X have MAC addresses of W = 0x and X = 0x They are both also members of the multicast group 0x23. Sketch the MAC header for a multicast frame sent from X to the multicast group 0x23. (c) Which LAN segments carry a multicast frame? (explain your answer) (d) Which of the following may be used to extend a LAN to allow computers to be connected by more than 5 cable segments? (i) Transceiver (ii) Repeater (iii) Hub (iv) Bridge (v) Switch 3.2) (a) Define the term Utilisation. (b) An application sends 50 packets per second over an Ethernet Local Area Network. Each packet has a total size of 1480 B (excluding the preamble and cyclic redundancy check (CRC)). Determine the total number of bits sent by the transmitter, and hence the utilisation of the link given that the cable used is a 10BT shielded twisted pair cable. (c) Ethernet transmission over 10B2 cable may be described as Half Duplex. Explain this term. (d) A client on a Ethernet LAN sends a series of queries to a server on the same LAN. Each request is contained in an Ethernet frame with a payload of 100 B of data. The server transmits a response to each query by sending an Ethernet frame with 573 B of data. Given that there are 100 requests per second, calculate the size of each Ethernet frame and the utilisation of the Ethernet LAN. (c) G. Fairhurst, 2011 v 12 page 6
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationMathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More informationNetwork Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationBCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationInternetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
More informationTCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
More informationNetworked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationVisio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationLesson 2-3: Ethernet Basics
Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationIT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
More information10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core
1 Introduction The implements, in conjunction with a triple speed 10/100/1000 MAC, Layer 3 network acceleration functions, which are designed to accelerate the processing of various common networking protocols
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationFirst Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationIndustrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -
Industrial Networks & Databases - Device Bus - - Field Bus - - Data Bus - Recall MODBUS protocol is a messaging structure used to set up master/client type communications with slaves/servers between intelligent
More informationModule 1: Reviewing the Suite of TCP/IP Protocols
Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationHow To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)
PAGE 1 OF 16 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
More informationUnit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationIP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More information2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
More informationAsynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
More informationDATA COMMUNICATIONS AND NETWORKING. Solved Examples
Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following
More informationNetwork Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationThe IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationAdvanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationProtocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationTCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
More informationCan PowerConnect Switches Be Used in IP Multicast Networks?
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More information