Internet Technology 4/5/2016

Size: px
Start display at page:

Download "Internet Technology 4/5/2016"

Transcription

1 Question 1 Compute the 8-bit Internet checksum of the following values: Internet Technology 11. Spring 2016 Exam 2 Review Paul Krzyzanowski Rutgers University Spring ~= Overflow (carry) Complement this value April 5, Paul Krzyzanowski 1 April 5, Paul Krzyzanowski 6 Question 2a Question 2b Apply Dijkstra s Link-State algorithm to the graph of nodes and costs to find the least-cost paths from node a. Express your answer as a list of { D(v), p(v) } tuples, where D(v) is the cost of the least-cost path from node a to some vertex v and p(v) is the previous node of v along that path. Nʹ D(b), p(b) D(c), p(c) D(d), p(d) D(e), p(e) a 1, a 3, a 3, a ab 1, a 3, a 2, b abd 1, a 3, a 2, b abdc 1, a 3, a 2, b 5, c abdce 1, a 3, a 2, b 5, c N = set of tested vertices 1. Pick the untested vertex with the least-cost path 2. Compute cost to each node through the new vertex 3. If it s lower then it displaces the previous least-cost path e 2 2 c 3 bd = 1, D(d) = D(b) + 1 = 2 d a b What is the forwarding table at node a? Nʹ D(b), p(b) D(c), p(c) D(d), p(d) D(e), p(e) abdce 1, a 3, a 2, b 5, c Create a path by following the previous nodes. Each entry of the forwarding table is the link that a packet must take when leaving node a Destination Path Next hop b b a b c c a c d d b a b e e c a c April 5, Paul Krzyzanowski 7 April 5, Paul Krzyzanowski 8 Question 3 Which statement is true about UDP? (a) UDP requires a connection setup between the client and server but the connection does not guarantee reliable delivery. (b) Message boundaries are not preserved: the application simply sees a stream of bytes. (c) Messages from different computers sent to the same port will be delivered to the same socket. (d) For efficiency, the kernel waits until it receives some minimum number of bytes before sending a UDP datagram (a) No connection setup in UDP (b) Message boundaries are preserved: # bytes sent = # bytes read (d) No. Data is sent immediately. Question 4 The Go-Back-N protocol is an example of: (a) Alternating bit protocol. (b) Negative acknowledgements. (c) Stop-and-wait. (d) Pipelining. (a) No. Alternating bit is only useful for stop-and-wait, where we have one at most one outstanding message. alternating bit = one-bit sequence # (b) No. GBN uses sequence #s, not negative ACKs (c) No. GBN allows multiple segments to be in transit at a time (= pipelining) April 5, Paul Krzyzanowski 9 April 5, Paul Krzyzanowski 10 Paul Krzyzanowski 1

2 Question 5 Question 6 A drawback of the Go-Back-N protocol is: (a) A failure to receive one packet may require retransmitting many packets. (b) Only N packets may be in transit at any one time. (c) It does not support pipelining. (d) It uses a timer. Selective Repeat does not use: (a) Timeouts. (b) A sliding window. (c) A receive window. (d) Cumulative acknowledgements. Drawback = undesirable consequence (a) If the sender times out (does not receive a cumulative ACK), it will retransmit ALL segments in its window. Worst case = first segment is lost but all others are received. Selective Repeat fixes this (at a cost of non-cumulative ACKs). (b) Yes but this is not a drawback. Only N segments (the window size) can be in transit. This allows control of effective network utilization (c) Yes it does this is not a drawback. It improves network utilization. (d) Yes it does this is not a drawback. It enables detection of lost segments. SR was designed to address the drawback of GBN: having to re-transmit segments that may have been successfully received. It does this by sending individual ACKs instead of cumulative ACKs. (a) Timeouts are used on a per-segment basis to detect lost ACKs or lost segments (b) Sliding window: set of sent but unacknowledged segments (c) Receive window used as a buffer to assemble out-of-order segments Since each segment is acknowledged individually it will not be re-transmitted. (d) No. SR uses individual ACKs. April 5, Paul Krzyzanowski 11 April 5, Paul Krzyzanowski 12 Question 7 The goal of Path MTU Discovery is to: (a) Determine the most efficient route to the destination. (b) Avoid having IP datagrams get fragmented. (c) Define the largest transmit window size. (d) Define the largest receive window size. Question 8 Which of these is not a field in the TCP header? (a) Checksum. (b) Acknowledgement number. (c) Destination IP address. (d) Source port number. MTU = Maximum Transmission Unit = largest acceptable payload size that a link can carry Path MTU discovery discovers the smallest MTU along the entire path. This allows the formation of datagrams that will not get fragmented It does not report the path. (a) IP, UDP, and TCP headers all have checksums (b) TCP headers have an ACK number (c) The source and destination IP addresses are in the IP header, not TCP or UDP (d) TCP and UDP headers have source & destination port numbers Windows size segment size April 5, Paul Krzyzanowski 13 April 5, Paul Krzyzanowski 14 Question 9 The receive window in the TCP header: (a) Defines the maximum number of bytes that the receiver can accept. (b) Identifies the address of the first free byte in the receive buffer. (c) Is the next sequence number needed by the receiver. (d) Contains the number of bytes that have been successfully received so far. Question 10 Which value is doubled when a timeout occurs in TCP? (a) Round-trip time variation. (b) Smoothed round-trip time. (c) Timeout interval. (d) Exponentially weighted moving average (a, b, c): these are measured values. April 5, Paul Krzyzanowski 15 April 5, Paul Krzyzanowski 16 Paul Krzyzanowski 2

3 Question 11 Question 12 You sent five segments starting at 1460 and received the following TCP acknowledgements: 2400, 3860, 3860, 3860 What is this most likely to indicate? (a) One segment was lost. (b) Two segments were lost. (c) The receiver got three duplicate segments. (d) All segments have been received Each duplicate ack means: here is what I need I still didn t get it ACK 2400: I got everything up to 2399 ACK 3860: I got everything up to 3859 ACK 3860: I got a segment but still need bytes starting at 3860 ACK 3860: I get another segment but still need bytes starting at n n LOST ack: 2400 ack: 3860 ack: 3860 ack: 3860 Piggybacking acknowledgements means that: (a) Multiple acknowledgements can be sent in the same segment. (b) An acknowledgement is sent in the same segment as return data. (c) A cumulative acknowledgement is sent. (d) The receiver is sending a duplicate acknowledgement April 5, Paul Krzyzanowski 17 April 5, Paul Krzyzanowski 18 Question 13 One way of dealing with a SYN flooding attack is to: (a) Not allocate TCP buffers until the initial handshake is complete. (b) Limit the total number of TCP connections at a host. (c) Limit the number of TCP connections from each client. (d) Authenticate the identity of each client SYN floods often sends a SYN packet with an unreachable return address. The OS allocates buffers for the connection but the handshake never completes, leaving resources allocated until a timeout period (typically >30 sec) (a) SYN cookies: Don t allow any single packet to cause the OS to allocate buffers. Instead, allocate when the connection handshake is complete: when the final ACK is sent, which will contain a sequence # that is f(addresses, ports, server_secret). (b) Every OS does this this does not prevent SYN flooding. (c) This does not prevent SYN flooding either since source addresses are usually random unreachable addresses. (d) The server does not perform any client authentication; it simply checks that the ACK is a legitimately related to the SYN-ACK that the server sent. Question 14 When a host receives a TCP segment with a FIN (finish) flag, it means that the sending host: (a) May send data until it receives a FIN as a response. (b) Will not send any more data. (c) Will not receive any more data. (d) Will neither send nor receive any more data FIN means that you re done communicating and want to close the connection. You will not send more data but there still may be data coming your way that you may receive. April 5, Paul Krzyzanowski 19 April 5, Paul Krzyzanowski 20 Question 15 TCP s fast retransmit occurs when a segment is retransmitted: (a) Before a timeout occurs. (b) Immediately after a timeout. (c) At a faster transmission rate than normal. (d) Upon receiving a negative acknowledgement (NACK). Three received segments with duplicate ACK #s assume sent segment was lost without Retransmit the missing segment without waiting for the timer to expire (b) No we beat the timer (c) No we transmit at whatever the transmission rate of the interface is (d) No TCP doesn t use NACKs Question 16 You sent five segments of 1000 bytes with a starting sequence number of 1000 and received the following TCP acknowledgements: 2000, 2000, 2000, What is this most likely to indicate? ack: 2000 (a) Two segments are lost (b) Three duplicate segments have been received. (c) One segment was lost. (d) All segments have been received. We send segments with seq # 1000, 2000, 30000, 4000, 5000 If ALL are received, our cumulative ACK will be for 6000 (we got up to byte #5999) Looks like we lost a segment because we received duplicate ACKs. But then we get an ACK for DELAYED or LOST 5000 ack: 2000 ack: 2000 ack: 4000 ack: 6000 April 5, Paul Krzyzanowski 21 April 5, Paul Krzyzanowski 22 Paul Krzyzanowski 3

4 Question 17 Question 18 TCP differs from a Go-Back-N protocol in that: (a) Go-Back-N does not support reliable delivery. (b) Go-Back-N does not support cumulative acknowledgements. (c) TCP does not use a sliding window. (d) TCP will only retransmit one segment on a timeout TCP s congestion window (cwnd): (a) Is a backlog queue for storing data when the network is congested. (b) Increases when the network appears to be less congested. (c) Is negotiated with the receiver to maximize the segment size. (d) Is a time interval that determines when a segment can be retransmitted (a) No: Go-Back-N is designed for reliable delivery (b) No: Go-Back-N does use cumulative acknowledgements (c) No: TCP does use a sliding window (d) Yes: GBN retransmits the entire window on timeout TCP only must retransmit the first lost segment on a timeout The congestion window is the transmit window size based on a guess of network congestion (packet loss congestion). Larger cwnd more pipelining increased network utilization cwnd increases during slow start until a threshold is reached cwnd increases during congestion avoidance until a timeout occurs (or 3 duplicate ACKs are received) April 5, Paul Krzyzanowski 23 April 5, Paul Krzyzanowski 24 Question 19 TCP s slow start means that the transmission rate: (a) Increases exponentially by one MSS with each received acknowledgement. (b) Increases linearly by one MSS every RTT. (c) Increases sub-linearly by less than one MSS every RTT. (d) Decreases gradually by one less MSS every RTT Question 20 In TCP s congestion avoidance state: (a) The window size remains constant. (b) The window size gradually increases. (c) The window size gradually decreases. (d) Transmission is temporarily stopped to relieve network congestion Slow start = cwnd size increases by one MSS with each received ACK +MSS per segment Congestion avoidance = cwnd increases by one MSS each RTT cwnd MSS segments per window Congestion avoidance = cwnd increases by one MSS each RTT cwnd MSS segments per window cwnd increases until: 3 duplicate ACKs received cwnd = cwnd/2 + 3 MSS timeout cwnd = 1 April 5, Paul Krzyzanowski 25 April 5, Paul Krzyzanowski 26 Question 21 The control plane of a router: (a) Checks and recomputes IP checksums. (b) Looks up the destination for an incoming IP datagram. (c) Manages output queues. (d) Updates the router s forwarding table Any decisions having to do with real-time routing are handled at the data plane. Question 22 What address belongs in the /22 network? (a) bits 8 bits 8 bits 8 bits (b) (c) (d) We need to match the first 6 bits of the 3 rd byte 8 = (a) 11 = (b) 12 = (c) 7 = (d) 5 = bits April 5, Paul Krzyzanowski 27 April 5, Paul Krzyzanowski 28 Paul Krzyzanowski 4

5 Question 23 Question 24 How does a DHCP client receive an offer from a server if it does not yet have an IP address? (a) The DHCP server uses a broadcast to send the response. (b) The client acquires a temporary address from which it contacts the server. (c) The response is sent via a link layer protocol. (d) The client must be configured with an address; DHCP just provides DNS servers and the gateway address. The client sends a request via a limited broadcast ( ). Since it does not have an address, the server sends a reply to everyone via a limited broadcast. Unlike IPv4, an IPv6 header does not contain a: (a) Checksum. (b) Protocol ID. (c) Source address. (d) Destination port number IPv6 got rid of checksums: At the link layer, Ethernet & Wi-Fi have them At the transport layer, TCP & UDP have them It s redundant for IP April 5, Paul Krzyzanowski 29 April 5, Paul Krzyzanowski 30 Question 25 Network Address Translation, NAT, translates: (a) Between IPv4 and IPv6 addresses. (b) The destination address of a packet to the address of the next router at each hop in the path. (c) Internal IP addresses in a packet to external ones. (d) User friendly domain names to IP addresses Question 26 An autonomous system is a set of hosts and routers that: (a) Expose a single routing policy. (b) Are hidden behind a NAT gateway. (c) Are fully configured and do not need to use protocols such as BGP to determine external routes. (d) Are disconnected from the rest of the Internet Autonomous Systems are an administrative collection of systems that provide a uniform policy for what traffic they permit to be routed through them. (b) No they have nothing to do with NAT and are not hidden (c) No they rely on BGP to advertise their routes and discover routes (d) No they are a core part of the Internet April 5, Paul Krzyzanowski 31 April 5, Paul Krzyzanowski 32 Question 27 TCP does not use negative acknowledgements. Question 28 Fragmentation requires recomputing TCP checksums since data is now split across multiple packets. TCP uses cumulative acknowledgements and timeouts No. The packets must be reassembled into one datagram before the segment is extracted and sent to the transport layer. April 5, Paul Krzyzanowski 33 April 5, Paul Krzyzanowski 34 Paul Krzyzanowski 5

6 Question 29 Question 30 Route aggregation reduces the number of entries in a forwarding table. An alternating bit protocol is a form of a stop-and-wait protocol that identifies duplicate packets. It allows you to use a single prefix to specify multiple IP addresses Alternating bit = 1 bit sequence number We added this to distinguish new data from duplicate data due to a retransmission April 5, Paul Krzyzanowski 35 April 5, Paul Krzyzanowski 36 Question 31 A NAT-aware router may have to recompute TCP and UDP checksums in addition to the IP checksum. Question 32 The traceroute program shows the route to a remote node by querying each router for its next hop. Yes. If it changes port numbers, which are in TCP and UDP headers, those checksums will need to be recomputed No the router will not state its next hop. Traceroute relies on TTL timeouts. A router sends an ICMP TTL Exceeded error to the sender. The sender looks at the source address to identify the router. April 5, Paul Krzyzanowski 37 April 5, Paul Krzyzanowski 38 Question 33 Poison reverse helps avoid the count-to-infinity problem with unreachable networks. Question 34 BGP uses a distance vector algorithm to establish least-cost paths. A router will not advertise routes to a router X if any of those routes go through X. BGP peers exchange information by sending route advertisements. It tells its peers which other routers it can reach. April 5, Paul Krzyzanowski 39 April 5, Paul Krzyzanowski 40 Paul Krzyzanowski 6

7 Question 35 A Stub AS (autonomous system) is connected only to one other AS: The end A stub autonomous system cannot provide transit service between ASes. April 5, Paul Krzyzanowski 41 April 5, Paul Krzyzanowski 42 Paul Krzyzanowski 7

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Exercises TCP/IP Networking. Solution. With Solutions

Exercises TCP/IP Networking. Solution. With Solutions Exercises TCP/IP Networking Solution. With Solutions Jean-Yves Le Boudec Fall 2010 Exercises marked with a were given at exams in the past. 1 Module 1: TCP/IP Architecture Exercise 1.1 Elaine is setting

More information

HOST AUTO CONFIGURATION (BOOTP, DHCP)

HOST AUTO CONFIGURATION (BOOTP, DHCP) Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson) Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

TCP/IP Security Problems. History that still teaches

TCP/IP Security Problems. History that still teaches TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Introduction to IP networking

Introduction to IP networking DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture

More information

THE UNIVERSITY OF AUCKLAND

THE UNIVERSITY OF AUCKLAND COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.

More information

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes: Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Routing Protocols (RIP, OSPF, BGP)

Routing Protocols (RIP, OSPF, BGP) Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15

Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15 1 Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013 CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Application Protocols for TCP/IP Administration

Application Protocols for TCP/IP Administration Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities

More information

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Computer Networks. Main Functions

Computer Networks. Main Functions Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching

More information

The Internet. Internet Technologies and Applications

The Internet. Internet Technologies and Applications The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information