Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012

Size: px
Start display at page:

Download "Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012"

Transcription

1 Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012 Please submit your solutions using BSpace ( Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa12 tab, and click on Assignments under Course Tools. Your assignment should be submitted as hw3.txt, using the format described on the class web page ( The answers will be graded automatically, but please show your work so we can check your reasoning. This work can be included in the hw3.txt file, or in a separate hw3work.txt or hw3work.pdf file. Assignments with only answers and no shown work will receive no credit. Improperly formatted assignments will receive no credit. Each question is worth a single point, and the total assignment is worth 30 points. Some questions are similar to previous years mid-terms and/or homeworks, but you should work these out from first principles. The old solutions may not be directly applicable, or could even be wrong! 1

2 Packet Timings I Consider a network with two links. Node X is trying to send data to node Z. X Y Z The first link (X-Y) has bandwidth B and latency (i.e., propagation delay) L, and the second link (Y-Z) has bandwidth 2B and latency L/2. Consider two cases: The network is circuit-switched: Assume that all path setup has already occurred and that at time t=0 node X begins sending a 1MB file to Z. As soon as the last bit of the file has been put on the wire, X sends a 2MB file to Z. The last bit of the 1MB file arrives at Z at time t=0.8sec, and the last bit of the 2MB file arrives at Z at time t=1.8sec. 1. What is L (in msec)? What is B (in Mbps)? 16 The circuit as a whole can offer service with end-to-end bandwidth B (we ll call this throughput T to avoid confusion with bytes), and latency of (L + L/2). 1MB / T + (L + L/2) =.8sec (1) (1MB + 2MB) / T + (L + L/2) = 1.8sec (2) 2MB / T = 1.8sec - 0.8sec = 1sec (3) from (1) + (2) T = 2MB/sec (4) from (3) 1MB / (2MB/sec) + (L + L/2) = 0.8sec (5) from (1) + (4) 0.5sec + (L + L/2) = 0.8sec (6) from (5) L + L/2 = 0.3sec (7) from (6) L = 0.2sec (8) from (7) File 1: Trans XZ 0.5s P XY 0.2 P YZ 0.1 P = propagation time File 2: Transmission XZ 1.0 P XY 0.2 P YZ 0.1 2

3 The network is packet-switched: Assume that at time t=0 node X begins sending a 1KB packet to Z. As soon as this transmission is completely on the wire X sends a 2KB packet to Z. Assume there is no processing delay at any node. The first packet arrives at Z at time t=1.8msec, and the second packet arrives at Z at time t=3.4msec. 3. What is L (in msec)? What is B (in Mbps)? 12.5 Note: since the second link is faster, there is no queueing delay. (1KB / T) + L + (1KB / 2T) + L/2 = 1.8ms (1) (1KB / T) + (2KB / T) + L + (2KB / 2T) + L/2 = 3.4ms (2) (5KB / 2T) = 3.4ms 1.8ms = 1.6ms (3) from (1) + (2) T = 5KB / 2 / 1.6ms = 12.5Mbps (4) from (3) 0.64ms + L ms + L/2 = 1.8ms (5) from (1) + (4) L + L/2 = 0.84ms (6) from (5) L = 0.56ms (7) from (6) File 1: Trans XY 0.64 P XY 0.56 Tr YZ 0.32 P YZ 0.28 File 2: Transmission XY 1.28 P XY 0.56 Tr YZ 0.64 P YZ

4 Packet Timings II Now consider a different network with only one link, of bandwidth B and latency L. At time t=0, node V sends two data packets back-to-back to W, which ACKs them. Assume that the data packets are 240 bytes each and the ACK packets are 360 bytes each (this is larger than the data packet! 1 ). The first ACK packet arrives at t=5.6ms, and the second arrives at t=5.96ms. V W 5. What is L (in msec)? What is B (in Mbps)? 8 Note: the ACK packet is larger than the data packet, hence the difference between when the first and second ACK packets arrives is due to the transmission time of the ACK packet. 5.96ms 5.6ms = 360 bytes / T (1) T = 360 bytes / 0.36ms (2) from (1) T = 1KB / 1ms = 8Mbps (3) from (2) L bytes / T + L bytes / T = 5.6ms (4) L ms + L ms = 5.6ms (5) from (2) + (4) L = 2.5ms (6) from (5) 1 e.g., imagine that the data packet is an HTTP request, and the ACK packet is an HTTP response (with piggedbacked ACK). 4

5 Plugging in the formula from last year s mid-term solution will get the wrong answer! The following diagram (not to scale) depicts what happened in last year s mid-term (Question 7. iii): TransD1: 0.48 Prop D1: 1.5ms TransA1:.32 Prop A1: 1.5ms TransD2: 0.48 Prop D2: 1.5ms TransA2:.32 Prop A2: 1.5ms In the time it took for data packet 2 to be transmitted, ACK packet 1 was already transmitted. Thus, when data packet 2 was received, it was possible to commence transmitting ACK packet 2 immediately. The following is the result of naïvely plugging-in last year s formula: TransD1:.36 Prop D1: 2.35ms TransA1:.54 Prop A1: 2.35ms TransD2:.36 Prop D1: 2.35ms TransA2:.54 Prop A2: 2.35ms The time ( ) == 5.96ms would assume that A2 is being transmitted immediately, even though A1 is still being transmitted. (If we did want to use the formula from the mid-term, we could revise it to be T2 = (max{p,a}/b) + T1.) In our revised question, there is queueing delay, because D2 is received before A1 is fully sent: TransD1:.24 Prop D1: 2.5ms TransA1:.36 Prop A1: 2.5ms TransD2:.24 Prop D1: 2.5ms TransA2:.36 Prop A2: 2.5ms 5

6 ICMP Consider the following network, which contains a client A, two routers B and C, and a webserver D that listens on port 80 and does not listen on any other port: A B C D The links AB, BC and CD have a maximum transmission unit (MTU) of 9000 bytes, 1500 bytes, and 1480 bytes respectively. For every packet, we are using TCP (with no options) and IPv4 (with the DF flag set on every packet, and no options). The TCP payload contains data that is within the receiver window, and not previously acknowledged. All the checksums are valid, and no data corruption occurs. In the following, the sender gets a response to every packet it sends. In the questions below, list: Which node responds (select one of B, C, D); and, The type of response (select either ICMP or TCP) For example, a response might be B,ICMP or D,TCP. Please explain each answer. 7. The first packet from A to D has a TCP payload length of 1490, a TTL of 149, and a destination port of B,ICMP The packet is 20 (IP header) + 20 (TCP header) (TCP payload) bytes == 1530 bytes. This is large enough to pass from A to B, but not from B to C. Since the DF flag is set, B will send an ICMP Need Fragmentation message to A. N.B. the TTL is large enough to have traversed the link A-B. 8. The second packet from A to D has a TCP payload length of 222, a TTL of 2, and a destination port of 22. C,ICMP When the packet has reached router C, the TTL would be 0. It would send an ICMP TTL Expired message to A. N.B. the payload is small enough, and the TTL large enough, to have traversed links A-B and B- C. The port is only relevant to the webserver D. 6

7 9. The third packet from A to D has a TCP payload length of 150, a TTL of 150, and a destination port of 150. [This is a trick question; look at the section notes!] D,TCP This is Question 2d) of the section 9 worksheet: On the event of an unreachable port, the return of a TCP RST message already indicates this. We would generally not expect an ICMP Destination Port Unreachable message! N.B. the payload is small enough, and the TTL large enough, to have traversed links A-B, B-C and C-D. 10. The fourth packet from A to D has a TCP payload length of 100, a TTL of 80, and a destination port of 80. D,TCP D would send an ACK. N.B. the payload is small enough, and the TTL large enough, to have traversed links A-B, B-C and C-D, and D has a webserver listening on the destination port. 7

8 ARP The following diagram shows three subnets (all with netmasks ), each with a switch (unlabeled squares). These subnets are connected by a router (unlabeled circle, with interfaces A, B, and C). The MAC addresses of these three interfaces are listed below (in shortened form; in the real-world, all MAC addresses are 48-bit), along with their IP addresses. The switches also have MAC addresses on their interfaces, but we can ignore them in this question. Initially, all the interfaces have no ARP table entries. Any ARP replies received by an interface will be cached (i.e., can be used, if relevant, for subsequent questions) E E DE-AD F4-DD B A C F0-F CA-BE A B 13-1F-F C B The host wants to send a message to Specify the MAC addresses of all the host and/or router interfaces (if any) that will receive an ARP request packet E5,48-DE-AD, and are in the same subnet ( ). However, does not have the MAC address of , so it sends an ARP request packet, which is broadcast on the subnet i.e., the interfaces corresponding to , and

9 12. Next, the host wants to send a message to Specify the MAC addresses of all the host and/or router interfaces (if any) that will receive an ARP request packet E5,48-DE-AD, and are in the same subnet. However, did not learn about s MAC address from the previous question, because ARP replies are not broadcast. Thus, must broadcast an ARP request packet on the subnet, which is received by the interfaces corresponding to , , and Finally, the host wants to send a message to After all the appropriate ARP queries and replies occur, what destination MAC address should the sending adapter on insert into its Ethernet header? realizes that is not on the same subnet, so it must send the packet to the router (interface A, which is on s subnet). 9

10 BGP Policy I Consider a set of non-transit ASes A, B, C, D, and a set of transit ASes P, R, X, Y, Z. They follow standard selection and export policies, and have the following relationships: A is customer of X. B is customer of X and Y and peer of C. C is customer of Y and peer of B. D is customer of Z. X is customer of P and peer of Y Y is customer of P and R, and peer of Z. Z is customer of R and peer of Y. P and R are peers. Assume that if there are two policy compliant paths, the shorter one is chosen. For each of the following source/destination pairs, list the path that would be chosen, or None if no policy-compliant path exists: Recall from lecture 16 (p. 37): that standard policies for transit networks are: Selection: prefer customer to peer to provider Export: o Let customers use any of your routes o Let anyone route through you to your customer o Don t export route to someone on that route (poison reverse) o Block everything else These policies effectively mean that each AS is willing to carry traffic only if: they are the source or destination; or, they get to charge someone (i.e., a customer) money 10

11 Hence, for the answers that follow, we can reason with the principle that routing follows the money (lecture 16, p. 27). It s also helpful to draw a diagram: P R X Y Z A B C D 14. from A to B: AXB All parties are happy with the traffic flow (X gets to charge its customers A and B, and B is the destination). There is no shorter policy compliant paths (A and B are not directly connected). 15. from A to C: AXYC All parties are happy with the traffic flow (X gets to charge its customer A, X sends directly to its peer Y, Y gets to charge its customer C, and C is the destination). There is no shorter policy compliant path. 2 Also note that AXBC is not compliant (B would object, because B has to pay X, but B does not gain anything). 2 For brevity, we don t explicitly state this claim in subsequent answers. 11

12 16. from A to D: AXPRZD With AXPRZD, X charges A, P charges X, P sends directly to its peer R, R charges Z, and Z charges D, which is the destination. Note that AXYZD would not be policy compliant: Y would not get to charge anyone, so it does not tell X about its route to Z or D. 17. from B to C: BC Policy dictates that peers are chosen over providers. 18. from B to D: BYZD Same reasoning as A to C. 19. from C to D: CYZD Same reasoning as A to C (and B to D). 12

13 For each of the following routing change questions, list your answer in the following form: if you think that the route from A to B is now AXYZZYB (probably not a good answer!) then list A-B,AXYZZYB. 20. Assume that P and R stop peering. What route changes? What is the new route? A-D,None The network topology is now: P R X Y Z A B C D Any route from A to D must go through Y, but Y will not allow it because it cannot charge R or Z (the only plausible next hops). 13

14 21. Ignoring Q20 (i.e., assume P and R are peering), assume instead that Z becomes a customer of Y (rather than a peer). What route changes? What is the new route? A-D,AXYZD P R X Y Z A B C D With this new route, everyone s a winner: A is able to send data to D (indirectly) X is able to charge its customer A X sends directly to its peer Y Y is able to charge its customer Z Z is able to charge its customer D (presumably more than Z got charged by Y!) D is able to receive data from A 14

15 BGP Policy II Consider domains A, B, C, D, E, F connected as shown below. A B C F E D Assume that all domains have the policy that given a choice of paths, they prefer the one starting with the earliest letter in the alphabet. That is, A-*-* is preferred over B-*-*. 15

16 22. Assume that all nodes export all selected routes to all peers (except when those routes would create loops). List all routes from A to D that are possible policy-compliant routes (i.e. that could be steady-states of a BGP convergence process), comma-separated. For example, if you think ABBCD and ACED are possible routes, write ABBCD,ACED. Consider all the (non-looping) routes from A-D individually: ABCD: This is possible the following diagram shows the path taken by traffic from any node to D. It is a steady-state because all the route advertisements about D will not cause any changes. (B would rather route through A, but A will not tell B about its route [it would create a loop]; similarly, C would prefer to route through B, but B will not tell C about its route. All other nodes are already doing as they best can with regards to choosing the node with the earliest letter in the alphabet.) Furthermore, it is a reachable state, under the scenario: 1. D exports its routes, and all neighbors receive and process the messages. 2. then C exports it routes, and all neighbors receive and process the messages. 3. then B exports its routes, and all neighbors receive and process the messages. 4. then A exports its routes, and all neighbors receive and process the messages. A B C F E D 16

17 ABED: Ok A B C F E D It is a steady-state because: B would prefer to go through A, but A will not give B a route; similarly, E would prefer to route to B, but B will not give its route to E. It is a reachable state, under the scenario: 1. D exports its routes, but only E receives and processes the message. (i.e., the message to C is lost; since BGP runs over TCP, it will eventually be resent) 2. E exports its routes, and all neighbors receive and process the messages. 3. B exports its routes, and all neighbors receive and process the messages. 4. C receives the message from D (it is ignored because C already has a better route) 5. A exports its routes, and all neighbors receive and process the messages. AFED: Ok A B C F E D 17

18 It is a steady-state because: A would prefer to go through B, but B will not give A a route; similarly, E would also like to route through B, but that would result in a loop, so E cannot use that route. It is a reachable state, under the scenario: 1. D exports its routes, but only E receives and processes the message. 2. E exports its routes, but only F receives and processes the message. 3. F exports its routes, and all neighbors receive and process the message. 4. A exports its routes, and all neighbors receive and process the message. 5. B exports its routes, and all neighbors receive and process the message. 6. The lost messages (i.e., D to C, and E to B) are received, but ignored because the recipients already have better routes. AFEBCD: Not possible A B C F E D B routes through C, so it would happily tell A about its route. A would then choose to route through B (rather than F), and F would then choose to route through A i.e., this state is not stable, and would turn into the ABCD case. 18

19 23. Keeping the same selection policies, but changing the export policies, now assume that all nodes only export routes to letters that follow them in the alphabet (e.g., B does not tell A about its routes, but it tells C and E). List all routes from D to A (this is not the same as the previous question) that are possible policy-compliant routes (i.e. that could be steady-states of a BGP convergence process). The export policies effectively mean nodes can only direct traffic to nodes that are earlier in the alphabet. DCBA: Ok A B C F E D DEBA: Not possible E does not tell D about E s routes DEFA: Not possible e.g., E does not tell D about E s routes DCBEFA: Not possible e.g., E does not tell B about E s routes 19

20 CDNs, proxies, and all that... Web content is often replicated at multiple locations to minimize the time it takes a user to download a webpage. This problem explores two basic approaches for replicating web content: HTTP forward proxies and CDNs. CDN-based approaches rely on a content distribution network to serve content from multiple locations; there are (at least) three ways to implement the CDN distribution model. Thus, we have four different options at our disposal: a) HTTP Caching with a Forward Proxy: A local network routes all HTTP requests through a HTTP forward proxy. The forward proxy first checks if the requested page is already cached, in which case the proxy returns the cached page to the user. If the page is not cached, the proxy requests the page from the site, caches the result, and returns it to the user. b) CDN using DNS: When the authoritative server for the site receives a DNS request, it returns one of many IP addresses, each of which corresponds to a CDN server hosting the web content. c) CDN using IP Anycast: DNS requests for the site always return the same, single IP address. Multiple CDN servers (at various different locations) that host the web content advertise this same IP address. d) CDN based on rewriting media URLs: All requests for the base page of a site are served from a single server hosted by that site. The site s server re-writes the URLs for media content (e.g., images) to be URLs corresponding to CDN servers, so that media content is served from the CDN. Your new web startup has gone viral, and you want to purchase services from a CDN in order to minimize the load on your servers. List one of the options, or None if appropriate. 24. Which approach allows the finest-grained control over which users are directed to which servers? In particular, which approach allows a site to dictate exactly how many users are sent to each server, and to instantaneously re-balance load between servers? D a) Not applicable (not a CDN!) b) Once a user has received an IP address from the DNS server, they will continue using it for a long time (if cached, or if the user decides to browse using the IP address!). c) Anycast would direct users to the nearest server, even if that server is overloaded. d) With option D (CDN based on rewriting media URLs), the centralized server can look at the incoming traffic and send a different URL. 20

21 25. You delegated this decision to your business partner, who chooses one of the CDN-based approaches. After purchasing services from the CDN, traffic to your servers decreases substantially, but you continue to see requests for the content on your website (including both base pages and media) for a few hours. After a full day, traffic to your server dies out completely. Which approach did your business partner choose? B or C or None There are three possible answers (this is where you reasoning section counts a lot!): o b): DNS records are cached, so users will continue visiting the old IP address for some time o c): We didn t state that the CDN servers take over the startup s old IP address. If the CDN uses a new IP address for anycast, and the old IP address is linked to the startup s servers), since users will have cached the old IP address, the same reasoning as option b) applies. o None: A CDN performs document caching, so ultimately it must request some pages from your webserver, and it must make requests periodically 3 to keep the cache up to date. Thus, none of the CDN options would entirely eliminate requests to the website. o None: It is also possible to argue that the DNS records may be cached in excess of a day, so neither b) or c) would apply. For completeness: o a) is not applicable (not a CDN). Furthermore, proxies still need to contact the original server (with conditional GET requests). o d) is not correct, because requests for base pages would still be served from the original server. 26. Which approach can guarantee that customers will be served from the CDN server closest to the customer? C See Q Which approach leads to additional load on your local DNS server? If your refers to users of the startup: D. Options b) and c) give them an IP address, almost as if there was no CDN involved. With option d), the media content URLs may point to many different CDN servers, and each of those URLs will need to be resolved. If your refers to the startup owner: None. The owner s local DNS server is irrelevant. 4 Note that local DNS server is distinct from the authoritative DNS servers. 3 It s likely push because the web startup is frequently accessed, but the same reasoning applies to a pull approach. 4 Unless they browse their own web site! 21

22 Now we consider network conditions at Berkeley. List one of the options, or None if appropriate. 28. UC Berkeley is suffering major budget cuts, and turns to you for help in lowering the cost of providing Internet for students. UC Berkeley pays its Internet provider based on the amount of bandwidth it uses, which is dominated by students downloading external web content. Which option, if any, can help UC Berkeley reduce the amount it pays its provider? A The forward proxy is within UC Berkeley s local network, so if students download previously viewed content, Berkeley does not need to send the requests to its ISP. 29. AirBears wireless is terrible, and periodically drops connections, which is frustrating when you are trying to stream the Giants game during EE122 lecture (we know who you are!). Which option, if any, can help ensure that you don t miss any of the game due to AirBear flakiness? None The proxy and CDN options will speed up getting traffic from the Internet to the nearest AirBears router, but they can t magically fix the connection between the AirBears router to your laptop. (Put another way: suppose your laptop is connected to Berkeley s network via Ethernet, and someone pulls out your Ethernet cable.) Note (if we wanted a super-tricky question): our best option, assuming we can t change AirBears, probably is a CDN, if it performs transcoding. If the bitrate is low, and AirBears only drops out for short periods, the buffer in the video player should hide the losses. 30. You do a DNS lookup for from your laptop connected to AirBears, and compare the results with your friend. Your friend did the same DNS lookup from India, and got a different IP address. Which option, if any, could Google have been using? B o a) only affects HTTP requests, not DNS requests (besides, the forward proxy is at Berkeley s discretion i.e., not something that Google chooses!) o b) gives one of many IP addresses o c) would give everyone the same, single IP address o d) would also give everyone the same IP address ( servers [ ] advertise this same IP address ) 22

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Operating Systems and Networks Sample Solution 1

Operating Systems and Networks Sample Solution 1 Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Policy Based Forwarding

Policy Based Forwarding Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy , ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Life of a Packet CS 640, 2015-01-22

Life of a Packet CS 640, 2015-01-22 Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

Debugging With Netalyzr

Debugging With Netalyzr Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies: Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]

More information

Assignment 6: Internetworking Due October 17/18, 2012

Assignment 6: Internetworking Due October 17/18, 2012 Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet

More information

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

IPv6 Associated Protocols

IPv6 Associated Protocols IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC

More information

BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01

BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01 BR-800 ProHD Broadcaster Easy Set-Up Guide V 1.01 BR-800 EASY SET-UP GUIDE BEFOREYOUBEGIN! Pleasedeterminethetypeofconfigurationbyselectingthescenariothatbest describesthewayyouwillbeusingyourbr-800prohdbroadcaster.onceyouhavedeterminedyour

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski [email protected]

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski [email protected] 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered

More information

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link

More information