Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012
|
|
|
- MargaretMargaret Scott
- 9 years ago
- Views:
Transcription
1 Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012 Please submit your solutions using BSpace ( Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa12 tab, and click on Assignments under Course Tools. Your assignment should be submitted as hw3.txt, using the format described on the class web page ( The answers will be graded automatically, but please show your work so we can check your reasoning. This work can be included in the hw3.txt file, or in a separate hw3work.txt or hw3work.pdf file. Assignments with only answers and no shown work will receive no credit. Improperly formatted assignments will receive no credit. Each question is worth a single point, and the total assignment is worth 30 points. Some questions are similar to previous years mid-terms and/or homeworks, but you should work these out from first principles. The old solutions may not be directly applicable, or could even be wrong! 1
2 Packet Timings I Consider a network with two links. Node X is trying to send data to node Z. X Y Z The first link (X-Y) has bandwidth B and latency (i.e., propagation delay) L, and the second link (Y-Z) has bandwidth 2B and latency L/2. Consider two cases: The network is circuit-switched: Assume that all path setup has already occurred and that at time t=0 node X begins sending a 1MB file to Z. As soon as the last bit of the file has been put on the wire, X sends a 2MB file to Z. The last bit of the 1MB file arrives at Z at time t=0.8sec, and the last bit of the 2MB file arrives at Z at time t=1.8sec. 1. What is L (in msec)? What is B (in Mbps)? 16 The circuit as a whole can offer service with end-to-end bandwidth B (we ll call this throughput T to avoid confusion with bytes), and latency of (L + L/2). 1MB / T + (L + L/2) =.8sec (1) (1MB + 2MB) / T + (L + L/2) = 1.8sec (2) 2MB / T = 1.8sec - 0.8sec = 1sec (3) from (1) + (2) T = 2MB/sec (4) from (3) 1MB / (2MB/sec) + (L + L/2) = 0.8sec (5) from (1) + (4) 0.5sec + (L + L/2) = 0.8sec (6) from (5) L + L/2 = 0.3sec (7) from (6) L = 0.2sec (8) from (7) File 1: Trans XZ 0.5s P XY 0.2 P YZ 0.1 P = propagation time File 2: Transmission XZ 1.0 P XY 0.2 P YZ 0.1 2
3 The network is packet-switched: Assume that at time t=0 node X begins sending a 1KB packet to Z. As soon as this transmission is completely on the wire X sends a 2KB packet to Z. Assume there is no processing delay at any node. The first packet arrives at Z at time t=1.8msec, and the second packet arrives at Z at time t=3.4msec. 3. What is L (in msec)? What is B (in Mbps)? 12.5 Note: since the second link is faster, there is no queueing delay. (1KB / T) + L + (1KB / 2T) + L/2 = 1.8ms (1) (1KB / T) + (2KB / T) + L + (2KB / 2T) + L/2 = 3.4ms (2) (5KB / 2T) = 3.4ms 1.8ms = 1.6ms (3) from (1) + (2) T = 5KB / 2 / 1.6ms = 12.5Mbps (4) from (3) 0.64ms + L ms + L/2 = 1.8ms (5) from (1) + (4) L + L/2 = 0.84ms (6) from (5) L = 0.56ms (7) from (6) File 1: Trans XY 0.64 P XY 0.56 Tr YZ 0.32 P YZ 0.28 File 2: Transmission XY 1.28 P XY 0.56 Tr YZ 0.64 P YZ
4 Packet Timings II Now consider a different network with only one link, of bandwidth B and latency L. At time t=0, node V sends two data packets back-to-back to W, which ACKs them. Assume that the data packets are 240 bytes each and the ACK packets are 360 bytes each (this is larger than the data packet! 1 ). The first ACK packet arrives at t=5.6ms, and the second arrives at t=5.96ms. V W 5. What is L (in msec)? What is B (in Mbps)? 8 Note: the ACK packet is larger than the data packet, hence the difference between when the first and second ACK packets arrives is due to the transmission time of the ACK packet. 5.96ms 5.6ms = 360 bytes / T (1) T = 360 bytes / 0.36ms (2) from (1) T = 1KB / 1ms = 8Mbps (3) from (2) L bytes / T + L bytes / T = 5.6ms (4) L ms + L ms = 5.6ms (5) from (2) + (4) L = 2.5ms (6) from (5) 1 e.g., imagine that the data packet is an HTTP request, and the ACK packet is an HTTP response (with piggedbacked ACK). 4
5 Plugging in the formula from last year s mid-term solution will get the wrong answer! The following diagram (not to scale) depicts what happened in last year s mid-term (Question 7. iii): TransD1: 0.48 Prop D1: 1.5ms TransA1:.32 Prop A1: 1.5ms TransD2: 0.48 Prop D2: 1.5ms TransA2:.32 Prop A2: 1.5ms In the time it took for data packet 2 to be transmitted, ACK packet 1 was already transmitted. Thus, when data packet 2 was received, it was possible to commence transmitting ACK packet 2 immediately. The following is the result of naïvely plugging-in last year s formula: TransD1:.36 Prop D1: 2.35ms TransA1:.54 Prop A1: 2.35ms TransD2:.36 Prop D1: 2.35ms TransA2:.54 Prop A2: 2.35ms The time ( ) == 5.96ms would assume that A2 is being transmitted immediately, even though A1 is still being transmitted. (If we did want to use the formula from the mid-term, we could revise it to be T2 = (max{p,a}/b) + T1.) In our revised question, there is queueing delay, because D2 is received before A1 is fully sent: TransD1:.24 Prop D1: 2.5ms TransA1:.36 Prop A1: 2.5ms TransD2:.24 Prop D1: 2.5ms TransA2:.36 Prop A2: 2.5ms 5
6 ICMP Consider the following network, which contains a client A, two routers B and C, and a webserver D that listens on port 80 and does not listen on any other port: A B C D The links AB, BC and CD have a maximum transmission unit (MTU) of 9000 bytes, 1500 bytes, and 1480 bytes respectively. For every packet, we are using TCP (with no options) and IPv4 (with the DF flag set on every packet, and no options). The TCP payload contains data that is within the receiver window, and not previously acknowledged. All the checksums are valid, and no data corruption occurs. In the following, the sender gets a response to every packet it sends. In the questions below, list: Which node responds (select one of B, C, D); and, The type of response (select either ICMP or TCP) For example, a response might be B,ICMP or D,TCP. Please explain each answer. 7. The first packet from A to D has a TCP payload length of 1490, a TTL of 149, and a destination port of B,ICMP The packet is 20 (IP header) + 20 (TCP header) (TCP payload) bytes == 1530 bytes. This is large enough to pass from A to B, but not from B to C. Since the DF flag is set, B will send an ICMP Need Fragmentation message to A. N.B. the TTL is large enough to have traversed the link A-B. 8. The second packet from A to D has a TCP payload length of 222, a TTL of 2, and a destination port of 22. C,ICMP When the packet has reached router C, the TTL would be 0. It would send an ICMP TTL Expired message to A. N.B. the payload is small enough, and the TTL large enough, to have traversed links A-B and B- C. The port is only relevant to the webserver D. 6
7 9. The third packet from A to D has a TCP payload length of 150, a TTL of 150, and a destination port of 150. [This is a trick question; look at the section notes!] D,TCP This is Question 2d) of the section 9 worksheet: On the event of an unreachable port, the return of a TCP RST message already indicates this. We would generally not expect an ICMP Destination Port Unreachable message! N.B. the payload is small enough, and the TTL large enough, to have traversed links A-B, B-C and C-D. 10. The fourth packet from A to D has a TCP payload length of 100, a TTL of 80, and a destination port of 80. D,TCP D would send an ACK. N.B. the payload is small enough, and the TTL large enough, to have traversed links A-B, B-C and C-D, and D has a webserver listening on the destination port. 7
8 ARP The following diagram shows three subnets (all with netmasks ), each with a switch (unlabeled squares). These subnets are connected by a router (unlabeled circle, with interfaces A, B, and C). The MAC addresses of these three interfaces are listed below (in shortened form; in the real-world, all MAC addresses are 48-bit), along with their IP addresses. The switches also have MAC addresses on their interfaces, but we can ignore them in this question. Initially, all the interfaces have no ARP table entries. Any ARP replies received by an interface will be cached (i.e., can be used, if relevant, for subsequent questions) E E DE-AD F4-DD B A C F0-F CA-BE A B 13-1F-F C B The host wants to send a message to Specify the MAC addresses of all the host and/or router interfaces (if any) that will receive an ARP request packet E5,48-DE-AD, and are in the same subnet ( ). However, does not have the MAC address of , so it sends an ARP request packet, which is broadcast on the subnet i.e., the interfaces corresponding to , and
9 12. Next, the host wants to send a message to Specify the MAC addresses of all the host and/or router interfaces (if any) that will receive an ARP request packet E5,48-DE-AD, and are in the same subnet. However, did not learn about s MAC address from the previous question, because ARP replies are not broadcast. Thus, must broadcast an ARP request packet on the subnet, which is received by the interfaces corresponding to , , and Finally, the host wants to send a message to After all the appropriate ARP queries and replies occur, what destination MAC address should the sending adapter on insert into its Ethernet header? realizes that is not on the same subnet, so it must send the packet to the router (interface A, which is on s subnet). 9
10 BGP Policy I Consider a set of non-transit ASes A, B, C, D, and a set of transit ASes P, R, X, Y, Z. They follow standard selection and export policies, and have the following relationships: A is customer of X. B is customer of X and Y and peer of C. C is customer of Y and peer of B. D is customer of Z. X is customer of P and peer of Y Y is customer of P and R, and peer of Z. Z is customer of R and peer of Y. P and R are peers. Assume that if there are two policy compliant paths, the shorter one is chosen. For each of the following source/destination pairs, list the path that would be chosen, or None if no policy-compliant path exists: Recall from lecture 16 (p. 37): that standard policies for transit networks are: Selection: prefer customer to peer to provider Export: o Let customers use any of your routes o Let anyone route through you to your customer o Don t export route to someone on that route (poison reverse) o Block everything else These policies effectively mean that each AS is willing to carry traffic only if: they are the source or destination; or, they get to charge someone (i.e., a customer) money 10
11 Hence, for the answers that follow, we can reason with the principle that routing follows the money (lecture 16, p. 27). It s also helpful to draw a diagram: P R X Y Z A B C D 14. from A to B: AXB All parties are happy with the traffic flow (X gets to charge its customers A and B, and B is the destination). There is no shorter policy compliant paths (A and B are not directly connected). 15. from A to C: AXYC All parties are happy with the traffic flow (X gets to charge its customer A, X sends directly to its peer Y, Y gets to charge its customer C, and C is the destination). There is no shorter policy compliant path. 2 Also note that AXBC is not compliant (B would object, because B has to pay X, but B does not gain anything). 2 For brevity, we don t explicitly state this claim in subsequent answers. 11
12 16. from A to D: AXPRZD With AXPRZD, X charges A, P charges X, P sends directly to its peer R, R charges Z, and Z charges D, which is the destination. Note that AXYZD would not be policy compliant: Y would not get to charge anyone, so it does not tell X about its route to Z or D. 17. from B to C: BC Policy dictates that peers are chosen over providers. 18. from B to D: BYZD Same reasoning as A to C. 19. from C to D: CYZD Same reasoning as A to C (and B to D). 12
13 For each of the following routing change questions, list your answer in the following form: if you think that the route from A to B is now AXYZZYB (probably not a good answer!) then list A-B,AXYZZYB. 20. Assume that P and R stop peering. What route changes? What is the new route? A-D,None The network topology is now: P R X Y Z A B C D Any route from A to D must go through Y, but Y will not allow it because it cannot charge R or Z (the only plausible next hops). 13
14 21. Ignoring Q20 (i.e., assume P and R are peering), assume instead that Z becomes a customer of Y (rather than a peer). What route changes? What is the new route? A-D,AXYZD P R X Y Z A B C D With this new route, everyone s a winner: A is able to send data to D (indirectly) X is able to charge its customer A X sends directly to its peer Y Y is able to charge its customer Z Z is able to charge its customer D (presumably more than Z got charged by Y!) D is able to receive data from A 14
15 BGP Policy II Consider domains A, B, C, D, E, F connected as shown below. A B C F E D Assume that all domains have the policy that given a choice of paths, they prefer the one starting with the earliest letter in the alphabet. That is, A-*-* is preferred over B-*-*. 15
16 22. Assume that all nodes export all selected routes to all peers (except when those routes would create loops). List all routes from A to D that are possible policy-compliant routes (i.e. that could be steady-states of a BGP convergence process), comma-separated. For example, if you think ABBCD and ACED are possible routes, write ABBCD,ACED. Consider all the (non-looping) routes from A-D individually: ABCD: This is possible the following diagram shows the path taken by traffic from any node to D. It is a steady-state because all the route advertisements about D will not cause any changes. (B would rather route through A, but A will not tell B about its route [it would create a loop]; similarly, C would prefer to route through B, but B will not tell C about its route. All other nodes are already doing as they best can with regards to choosing the node with the earliest letter in the alphabet.) Furthermore, it is a reachable state, under the scenario: 1. D exports its routes, and all neighbors receive and process the messages. 2. then C exports it routes, and all neighbors receive and process the messages. 3. then B exports its routes, and all neighbors receive and process the messages. 4. then A exports its routes, and all neighbors receive and process the messages. A B C F E D 16
17 ABED: Ok A B C F E D It is a steady-state because: B would prefer to go through A, but A will not give B a route; similarly, E would prefer to route to B, but B will not give its route to E. It is a reachable state, under the scenario: 1. D exports its routes, but only E receives and processes the message. (i.e., the message to C is lost; since BGP runs over TCP, it will eventually be resent) 2. E exports its routes, and all neighbors receive and process the messages. 3. B exports its routes, and all neighbors receive and process the messages. 4. C receives the message from D (it is ignored because C already has a better route) 5. A exports its routes, and all neighbors receive and process the messages. AFED: Ok A B C F E D 17
18 It is a steady-state because: A would prefer to go through B, but B will not give A a route; similarly, E would also like to route through B, but that would result in a loop, so E cannot use that route. It is a reachable state, under the scenario: 1. D exports its routes, but only E receives and processes the message. 2. E exports its routes, but only F receives and processes the message. 3. F exports its routes, and all neighbors receive and process the message. 4. A exports its routes, and all neighbors receive and process the message. 5. B exports its routes, and all neighbors receive and process the message. 6. The lost messages (i.e., D to C, and E to B) are received, but ignored because the recipients already have better routes. AFEBCD: Not possible A B C F E D B routes through C, so it would happily tell A about its route. A would then choose to route through B (rather than F), and F would then choose to route through A i.e., this state is not stable, and would turn into the ABCD case. 18
19 23. Keeping the same selection policies, but changing the export policies, now assume that all nodes only export routes to letters that follow them in the alphabet (e.g., B does not tell A about its routes, but it tells C and E). List all routes from D to A (this is not the same as the previous question) that are possible policy-compliant routes (i.e. that could be steady-states of a BGP convergence process). The export policies effectively mean nodes can only direct traffic to nodes that are earlier in the alphabet. DCBA: Ok A B C F E D DEBA: Not possible E does not tell D about E s routes DEFA: Not possible e.g., E does not tell D about E s routes DCBEFA: Not possible e.g., E does not tell B about E s routes 19
20 CDNs, proxies, and all that... Web content is often replicated at multiple locations to minimize the time it takes a user to download a webpage. This problem explores two basic approaches for replicating web content: HTTP forward proxies and CDNs. CDN-based approaches rely on a content distribution network to serve content from multiple locations; there are (at least) three ways to implement the CDN distribution model. Thus, we have four different options at our disposal: a) HTTP Caching with a Forward Proxy: A local network routes all HTTP requests through a HTTP forward proxy. The forward proxy first checks if the requested page is already cached, in which case the proxy returns the cached page to the user. If the page is not cached, the proxy requests the page from the site, caches the result, and returns it to the user. b) CDN using DNS: When the authoritative server for the site receives a DNS request, it returns one of many IP addresses, each of which corresponds to a CDN server hosting the web content. c) CDN using IP Anycast: DNS requests for the site always return the same, single IP address. Multiple CDN servers (at various different locations) that host the web content advertise this same IP address. d) CDN based on rewriting media URLs: All requests for the base page of a site are served from a single server hosted by that site. The site s server re-writes the URLs for media content (e.g., images) to be URLs corresponding to CDN servers, so that media content is served from the CDN. Your new web startup has gone viral, and you want to purchase services from a CDN in order to minimize the load on your servers. List one of the options, or None if appropriate. 24. Which approach allows the finest-grained control over which users are directed to which servers? In particular, which approach allows a site to dictate exactly how many users are sent to each server, and to instantaneously re-balance load between servers? D a) Not applicable (not a CDN!) b) Once a user has received an IP address from the DNS server, they will continue using it for a long time (if cached, or if the user decides to browse using the IP address!). c) Anycast would direct users to the nearest server, even if that server is overloaded. d) With option D (CDN based on rewriting media URLs), the centralized server can look at the incoming traffic and send a different URL. 20
21 25. You delegated this decision to your business partner, who chooses one of the CDN-based approaches. After purchasing services from the CDN, traffic to your servers decreases substantially, but you continue to see requests for the content on your website (including both base pages and media) for a few hours. After a full day, traffic to your server dies out completely. Which approach did your business partner choose? B or C or None There are three possible answers (this is where you reasoning section counts a lot!): o b): DNS records are cached, so users will continue visiting the old IP address for some time o c): We didn t state that the CDN servers take over the startup s old IP address. If the CDN uses a new IP address for anycast, and the old IP address is linked to the startup s servers), since users will have cached the old IP address, the same reasoning as option b) applies. o None: A CDN performs document caching, so ultimately it must request some pages from your webserver, and it must make requests periodically 3 to keep the cache up to date. Thus, none of the CDN options would entirely eliminate requests to the website. o None: It is also possible to argue that the DNS records may be cached in excess of a day, so neither b) or c) would apply. For completeness: o a) is not applicable (not a CDN). Furthermore, proxies still need to contact the original server (with conditional GET requests). o d) is not correct, because requests for base pages would still be served from the original server. 26. Which approach can guarantee that customers will be served from the CDN server closest to the customer? C See Q Which approach leads to additional load on your local DNS server? If your refers to users of the startup: D. Options b) and c) give them an IP address, almost as if there was no CDN involved. With option d), the media content URLs may point to many different CDN servers, and each of those URLs will need to be resolved. If your refers to the startup owner: None. The owner s local DNS server is irrelevant. 4 Note that local DNS server is distinct from the authoritative DNS servers. 3 It s likely push because the web startup is frequently accessed, but the same reasoning applies to a pull approach. 4 Unless they browse their own web site! 21
22 Now we consider network conditions at Berkeley. List one of the options, or None if appropriate. 28. UC Berkeley is suffering major budget cuts, and turns to you for help in lowering the cost of providing Internet for students. UC Berkeley pays its Internet provider based on the amount of bandwidth it uses, which is dominated by students downloading external web content. Which option, if any, can help UC Berkeley reduce the amount it pays its provider? A The forward proxy is within UC Berkeley s local network, so if students download previously viewed content, Berkeley does not need to send the requests to its ISP. 29. AirBears wireless is terrible, and periodically drops connections, which is frustrating when you are trying to stream the Giants game during EE122 lecture (we know who you are!). Which option, if any, can help ensure that you don t miss any of the game due to AirBear flakiness? None The proxy and CDN options will speed up getting traffic from the Internet to the nearest AirBears router, but they can t magically fix the connection between the AirBears router to your laptop. (Put another way: suppose your laptop is connected to Berkeley s network via Ethernet, and someone pulls out your Ethernet cable.) Note (if we wanted a super-tricky question): our best option, assuming we can t change AirBears, probably is a CDN, if it performs transcoding. If the bitrate is low, and AirBears only drops out for short periods, the buffer in the video player should hide the losses. 30. You do a DNS lookup for from your laptop connected to AirBears, and compare the results with your friend. Your friend did the same DNS lookup from India, and got a different IP address. Which option, if any, could Google have been using? B o a) only affects HTTP requests, not DNS requests (besides, the forward proxy is at Berkeley s discretion i.e., not something that Google chooses!) o b) gives one of many IP addresses o c) would give everyone the same, single IP address o d) would also give everyone the same IP address ( servers [ ] advertise this same IP address ) 22
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Operating Systems and Networks Sample Solution 1
Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
EECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Instructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Computer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?
Midterm Exam for Computer Networks (CNT 4004) Fall 2013 >>> SOLUTIONS
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics
CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14
1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
Architecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Web Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
IPv6 Associated Protocols
IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC
BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01
BR-800 ProHD Broadcaster Easy Set-Up Guide V 1.01 BR-800 EASY SET-UP GUIDE BEFOREYOUBEGIN! Pleasedeterminethetypeofconfigurationbyselectingthescenariothatbest describesthewayyouwillbeusingyourbr-800prohdbroadcaster.onceyouhavedeterminedyour
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
architecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski [email protected]
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski [email protected] 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems
CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link
