Internet Technology 4/5/2016
|
|
- Gillian Davidson
- 7 years ago
- Views:
Transcription
1 Question 1 Compute the 8-bit Internet checksum of the following values: Internet Technology 11. Spring 2016 Exam 2 Review Paul Krzyzanowski Rutgers University Spring ~= Overflow (carry) Complement this value April 5, Paul Krzyzanowski 1 April 5, Paul Krzyzanowski 6 Question 2a Question 2b Apply Dijkstra s Link-State algorithm to the graph of nodes and costs to find the least-cost paths from node a. Express your answer as a list of { D(v), p(v) } tuples, where D(v) is the cost of the least-cost path from node a to some vertex v and p(v) is the previous node of v along that path. Nʹ D(b), p(b) D(c), p(c) D(d), p(d) D(e), p(e) a 1, a 3, a 3, a ab 1, a 3, a 2, b abd 1, a 3, a 2, b abdc 1, a 3, a 2, b 5, c abdce 1, a 3, a 2, b 5, c N = set of tested vertices 1. Pick the untested vertex with the least-cost path 2. Compute cost to each node through the new vertex 3. If it s lower then it displaces the previous least-cost path e 2 2 c 3 bd = 1, D(d) = D(b) + 1 = 2 d a b What is the forwarding table at node a? Nʹ D(b), p(b) D(c), p(c) D(d), p(d) D(e), p(e) abdce 1, a 3, a 2, b 5, c Create a path by following the previous nodes. Each entry of the forwarding table is the link that a packet must take when leaving node a Destination Path Next hop b b a b c c a c d d b a b e e c a c April 5, Paul Krzyzanowski 7 April 5, Paul Krzyzanowski 8 Question 3 Which statement is true about UDP? (a) UDP requires a connection setup between the client and server but the connection does not guarantee reliable delivery. (b) Message boundaries are not preserved: the application simply sees a stream of bytes. (c) Messages from different computers sent to the same port will be delivered to the same socket. (d) For efficiency, the kernel waits until it receives some minimum number of bytes before sending a UDP datagram (a) No connection setup in UDP (b) Message boundaries are preserved: # bytes sent = # bytes read (d) No. Data is sent immediately. Question 4 The Go-Back-N protocol is an example of: (a) Alternating bit protocol. (b) Negative acknowledgements. (c) Stop-and-wait. (d) Pipelining. (a) No. Alternating bit is only useful for stop-and-wait, where we have one at most one outstanding message. alternating bit = one-bit sequence # (b) No. GBN uses sequence #s, not negative ACKs (c) No. GBN allows multiple segments to be in transit at a time (= pipelining) April 5, Paul Krzyzanowski 9 April 5, Paul Krzyzanowski 10 Paul Krzyzanowski 1
2 Question 5 Question 6 A drawback of the Go-Back-N protocol is: (a) A failure to receive one packet may require retransmitting many packets. (b) Only N packets may be in transit at any one time. (c) It does not support pipelining. (d) It uses a timer. Selective Repeat does not use: (a) Timeouts. (b) A sliding window. (c) A receive window. (d) Cumulative acknowledgements. Drawback = undesirable consequence (a) If the sender times out (does not receive a cumulative ACK), it will retransmit ALL segments in its window. Worst case = first segment is lost but all others are received. Selective Repeat fixes this (at a cost of non-cumulative ACKs). (b) Yes but this is not a drawback. Only N segments (the window size) can be in transit. This allows control of effective network utilization (c) Yes it does this is not a drawback. It improves network utilization. (d) Yes it does this is not a drawback. It enables detection of lost segments. SR was designed to address the drawback of GBN: having to re-transmit segments that may have been successfully received. It does this by sending individual ACKs instead of cumulative ACKs. (a) Timeouts are used on a per-segment basis to detect lost ACKs or lost segments (b) Sliding window: set of sent but unacknowledged segments (c) Receive window used as a buffer to assemble out-of-order segments Since each segment is acknowledged individually it will not be re-transmitted. (d) No. SR uses individual ACKs. April 5, Paul Krzyzanowski 11 April 5, Paul Krzyzanowski 12 Question 7 The goal of Path MTU Discovery is to: (a) Determine the most efficient route to the destination. (b) Avoid having IP datagrams get fragmented. (c) Define the largest transmit window size. (d) Define the largest receive window size. Question 8 Which of these is not a field in the TCP header? (a) Checksum. (b) Acknowledgement number. (c) Destination IP address. (d) Source port number. MTU = Maximum Transmission Unit = largest acceptable payload size that a link can carry Path MTU discovery discovers the smallest MTU along the entire path. This allows the formation of datagrams that will not get fragmented It does not report the path. (a) IP, UDP, and TCP headers all have checksums (b) TCP headers have an ACK number (c) The source and destination IP addresses are in the IP header, not TCP or UDP (d) TCP and UDP headers have source & destination port numbers Windows size segment size April 5, Paul Krzyzanowski 13 April 5, Paul Krzyzanowski 14 Question 9 The receive window in the TCP header: (a) Defines the maximum number of bytes that the receiver can accept. (b) Identifies the address of the first free byte in the receive buffer. (c) Is the next sequence number needed by the receiver. (d) Contains the number of bytes that have been successfully received so far. Question 10 Which value is doubled when a timeout occurs in TCP? (a) Round-trip time variation. (b) Smoothed round-trip time. (c) Timeout interval. (d) Exponentially weighted moving average (a, b, c): these are measured values. April 5, Paul Krzyzanowski 15 April 5, Paul Krzyzanowski 16 Paul Krzyzanowski 2
3 Question 11 Question 12 You sent five segments starting at 1460 and received the following TCP acknowledgements: 2400, 3860, 3860, 3860 What is this most likely to indicate? (a) One segment was lost. (b) Two segments were lost. (c) The receiver got three duplicate segments. (d) All segments have been received Each duplicate ack means: here is what I need I still didn t get it ACK 2400: I got everything up to 2399 ACK 3860: I got everything up to 3859 ACK 3860: I got a segment but still need bytes starting at 3860 ACK 3860: I get another segment but still need bytes starting at n n LOST ack: 2400 ack: 3860 ack: 3860 ack: 3860 Piggybacking acknowledgements means that: (a) Multiple acknowledgements can be sent in the same segment. (b) An acknowledgement is sent in the same segment as return data. (c) A cumulative acknowledgement is sent. (d) The receiver is sending a duplicate acknowledgement April 5, Paul Krzyzanowski 17 April 5, Paul Krzyzanowski 18 Question 13 One way of dealing with a SYN flooding attack is to: (a) Not allocate TCP buffers until the initial handshake is complete. (b) Limit the total number of TCP connections at a host. (c) Limit the number of TCP connections from each client. (d) Authenticate the identity of each client SYN floods often sends a SYN packet with an unreachable return address. The OS allocates buffers for the connection but the handshake never completes, leaving resources allocated until a timeout period (typically >30 sec) (a) SYN cookies: Don t allow any single packet to cause the OS to allocate buffers. Instead, allocate when the connection handshake is complete: when the final ACK is sent, which will contain a sequence # that is f(addresses, ports, server_secret). (b) Every OS does this this does not prevent SYN flooding. (c) This does not prevent SYN flooding either since source addresses are usually random unreachable addresses. (d) The server does not perform any client authentication; it simply checks that the ACK is a legitimately related to the SYN-ACK that the server sent. Question 14 When a host receives a TCP segment with a FIN (finish) flag, it means that the sending host: (a) May send data until it receives a FIN as a response. (b) Will not send any more data. (c) Will not receive any more data. (d) Will neither send nor receive any more data FIN means that you re done communicating and want to close the connection. You will not send more data but there still may be data coming your way that you may receive. April 5, Paul Krzyzanowski 19 April 5, Paul Krzyzanowski 20 Question 15 TCP s fast retransmit occurs when a segment is retransmitted: (a) Before a timeout occurs. (b) Immediately after a timeout. (c) At a faster transmission rate than normal. (d) Upon receiving a negative acknowledgement (NACK). Three received segments with duplicate ACK #s assume sent segment was lost without Retransmit the missing segment without waiting for the timer to expire (b) No we beat the timer (c) No we transmit at whatever the transmission rate of the interface is (d) No TCP doesn t use NACKs Question 16 You sent five segments of 1000 bytes with a starting sequence number of 1000 and received the following TCP acknowledgements: 2000, 2000, 2000, What is this most likely to indicate? ack: 2000 (a) Two segments are lost (b) Three duplicate segments have been received. (c) One segment was lost. (d) All segments have been received. We send segments with seq # 1000, 2000, 30000, 4000, 5000 If ALL are received, our cumulative ACK will be for 6000 (we got up to byte #5999) Looks like we lost a segment because we received duplicate ACKs. But then we get an ACK for DELAYED or LOST 5000 ack: 2000 ack: 2000 ack: 4000 ack: 6000 April 5, Paul Krzyzanowski 21 April 5, Paul Krzyzanowski 22 Paul Krzyzanowski 3
4 Question 17 Question 18 TCP differs from a Go-Back-N protocol in that: (a) Go-Back-N does not support reliable delivery. (b) Go-Back-N does not support cumulative acknowledgements. (c) TCP does not use a sliding window. (d) TCP will only retransmit one segment on a timeout TCP s congestion window (cwnd): (a) Is a backlog queue for storing data when the network is congested. (b) Increases when the network appears to be less congested. (c) Is negotiated with the receiver to maximize the segment size. (d) Is a time interval that determines when a segment can be retransmitted (a) No: Go-Back-N is designed for reliable delivery (b) No: Go-Back-N does use cumulative acknowledgements (c) No: TCP does use a sliding window (d) Yes: GBN retransmits the entire window on timeout TCP only must retransmit the first lost segment on a timeout The congestion window is the transmit window size based on a guess of network congestion (packet loss congestion). Larger cwnd more pipelining increased network utilization cwnd increases during slow start until a threshold is reached cwnd increases during congestion avoidance until a timeout occurs (or 3 duplicate ACKs are received) April 5, Paul Krzyzanowski 23 April 5, Paul Krzyzanowski 24 Question 19 TCP s slow start means that the transmission rate: (a) Increases exponentially by one MSS with each received acknowledgement. (b) Increases linearly by one MSS every RTT. (c) Increases sub-linearly by less than one MSS every RTT. (d) Decreases gradually by one less MSS every RTT Question 20 In TCP s congestion avoidance state: (a) The window size remains constant. (b) The window size gradually increases. (c) The window size gradually decreases. (d) Transmission is temporarily stopped to relieve network congestion Slow start = cwnd size increases by one MSS with each received ACK +MSS per segment Congestion avoidance = cwnd increases by one MSS each RTT cwnd MSS segments per window Congestion avoidance = cwnd increases by one MSS each RTT cwnd MSS segments per window cwnd increases until: 3 duplicate ACKs received cwnd = cwnd/2 + 3 MSS timeout cwnd = 1 April 5, Paul Krzyzanowski 25 April 5, Paul Krzyzanowski 26 Question 21 The control plane of a router: (a) Checks and recomputes IP checksums. (b) Looks up the destination for an incoming IP datagram. (c) Manages output queues. (d) Updates the router s forwarding table Any decisions having to do with real-time routing are handled at the data plane. Question 22 What address belongs in the /22 network? (a) bits 8 bits 8 bits 8 bits (b) (c) (d) We need to match the first 6 bits of the 3 rd byte 8 = (a) 11 = (b) 12 = (c) 7 = (d) 5 = bits April 5, Paul Krzyzanowski 27 April 5, Paul Krzyzanowski 28 Paul Krzyzanowski 4
5 Question 23 Question 24 How does a DHCP client receive an offer from a server if it does not yet have an IP address? (a) The DHCP server uses a broadcast to send the response. (b) The client acquires a temporary address from which it contacts the server. (c) The response is sent via a link layer protocol. (d) The client must be configured with an address; DHCP just provides DNS servers and the gateway address. The client sends a request via a limited broadcast ( ). Since it does not have an address, the server sends a reply to everyone via a limited broadcast. Unlike IPv4, an IPv6 header does not contain a: (a) Checksum. (b) Protocol ID. (c) Source address. (d) Destination port number IPv6 got rid of checksums: At the link layer, Ethernet & Wi-Fi have them At the transport layer, TCP & UDP have them It s redundant for IP April 5, Paul Krzyzanowski 29 April 5, Paul Krzyzanowski 30 Question 25 Network Address Translation, NAT, translates: (a) Between IPv4 and IPv6 addresses. (b) The destination address of a packet to the address of the next router at each hop in the path. (c) Internal IP addresses in a packet to external ones. (d) User friendly domain names to IP addresses Question 26 An autonomous system is a set of hosts and routers that: (a) Expose a single routing policy. (b) Are hidden behind a NAT gateway. (c) Are fully configured and do not need to use protocols such as BGP to determine external routes. (d) Are disconnected from the rest of the Internet Autonomous Systems are an administrative collection of systems that provide a uniform policy for what traffic they permit to be routed through them. (b) No they have nothing to do with NAT and are not hidden (c) No they rely on BGP to advertise their routes and discover routes (d) No they are a core part of the Internet April 5, Paul Krzyzanowski 31 April 5, Paul Krzyzanowski 32 Question 27 TCP does not use negative acknowledgements. Question 28 Fragmentation requires recomputing TCP checksums since data is now split across multiple packets. TCP uses cumulative acknowledgements and timeouts No. The packets must be reassembled into one datagram before the segment is extracted and sent to the transport layer. April 5, Paul Krzyzanowski 33 April 5, Paul Krzyzanowski 34 Paul Krzyzanowski 5
6 Question 29 Question 30 Route aggregation reduces the number of entries in a forwarding table. An alternating bit protocol is a form of a stop-and-wait protocol that identifies duplicate packets. It allows you to use a single prefix to specify multiple IP addresses Alternating bit = 1 bit sequence number We added this to distinguish new data from duplicate data due to a retransmission April 5, Paul Krzyzanowski 35 April 5, Paul Krzyzanowski 36 Question 31 A NAT-aware router may have to recompute TCP and UDP checksums in addition to the IP checksum. Question 32 The traceroute program shows the route to a remote node by querying each router for its next hop. Yes. If it changes port numbers, which are in TCP and UDP headers, those checksums will need to be recomputed No the router will not state its next hop. Traceroute relies on TTL timeouts. A router sends an ICMP TTL Exceeded error to the sender. The sender looks at the source address to identify the router. April 5, Paul Krzyzanowski 37 April 5, Paul Krzyzanowski 38 Question 33 Poison reverse helps avoid the count-to-infinity problem with unreachable networks. Question 34 BGP uses a distance vector algorithm to establish least-cost paths. A router will not advertise routes to a router X if any of those routes go through X. BGP peers exchange information by sending route advertisements. It tells its peers which other routers it can reach. April 5, Paul Krzyzanowski 39 April 5, Paul Krzyzanowski 40 Paul Krzyzanowski 6
7 Question 35 A Stub AS (autonomous system) is connected only to one other AS: The end A stub autonomous system cannot provide transit service between ASes. April 5, Paul Krzyzanowski 41 April 5, Paul Krzyzanowski 42 Paul Krzyzanowski 7
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationAnswers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationCOMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationExercises TCP/IP Networking. Solution. With Solutions
Exercises TCP/IP Networking Solution. With Solutions Jean-Yves Le Boudec Fall 2010 Exercises marked with a were given at exams in the past. 1 Module 1: TCP/IP Architecture Exercise 1.1 Elaine is setting
More informationHOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationGary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationNetworks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More informationB-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More informationOutline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationLayer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationThis sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
More informationMidterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationChapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationIP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationUnix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
More informationTCP/IP Security Problems. History that still teaches
TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationIntroduction to IP networking
DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture
More informationTHE UNIVERSITY OF AUCKLAND
COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.
More informationPrefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationRouting Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationEECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationHomework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15
1 Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
More informationNetwork Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationCS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationApplication Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
More informationTCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
More informationNetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
More informationWide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationExam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationComputer Networks. Main Functions
Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching
More informationThe Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More information