Answer FIVE Questions only. Each carries 20 marks.
|
|
|
- Anna Holt
- 9 years ago
- Views:
Transcription
1 Instructions: Answer FIVE Questions only. Each carries 20 marks. Question 1 Answer FOUR parts only. Each carries 5 marks: i) Outline the structure of computer names used by DNS. DNS uses a hierarchical naming scheme that forms an inverted tree when viewed from the root. The most significant part of a domain name is on the right which identifies the top level domain. The host name is the leftmost part. Intermediate parts identify subdomains. e.g. venus.cs.tcd.ie Top level Domains.com,.edu,.int,.gov,.mil,.org,.arpa,.country code Naming authorities only look after names under the top level domains - organizations responsible for how they partition that. Some countries do partition top level domains e.g..ac.uk or.co.uk Naming follows organizational boundaries not physical networks ii) Describe the main features of the Post Office Protocol (POP) POP3 (Post Office Protocol 3.. defined in RFC 1225) is a simple protocol used for retrieving mail from a remote mailbox. The computer maintaining the mailbox must run an additional server that supports the POP3 protocol. A user runs software that interacts with the POP server to retrieve messages from the server. Note that the SMTP server and POP server communicate across the Internet but use different protocols. Also the SMTP server accepts messages from an arbitrary server, whereas the POP server will only allow an authenticated user to access their mailbox. POP is particularly popular with those users with dial-up accounts. iii) What causes network congestion and outline 2 solutions for it. Congestion is a fundamental problem in packet switching systems caused when sending stations swamp bottleneck with packets. Bottleneck queue builds up causing further congestion and possibly packet loss. Solution A involves getting the bottleneck device to send back a control message to sending stations advising them to reduce output. Solution B involves sending stations using packet loss as an estimate of congestion and reducing output accordingly based on the premise that most packet loss on modern networks is caused by congestion. iv) Distinguish between Anonymous vs non-anonymous FTP There are two types of FTP connections available on the Internet: ii)anonymous iii)non-anonymous The most widely used type is anonymous FTP. If a file is stored in an anonymous FTP directory virtually anyone with Internet access and an FTP program of some sort, even a web browser, can download the file.
2 Uploading, on the other hand, is not usually possible with anonymous FTP. Anonymous FTP, therefore, is used primarily to give the Internet public download access to a particular directory of files. Anyone can download files from the directory, but only the "owner" of directory can upload to the directory. When you connect to any FTP directory, the host system asks for your username and password before allowing you access to the directory (this process is done behind the scenes when you use a web browser to access an FTP directory). With an anonymous FTP directory, the username is always "anonymous" and the password is always the user's address. Non-anonymous FTP, on the other hand, requires a unique username and password for the FTP directory in question. v) Describe how the Address Resolution Protocol (ARP) operates. ARP used to by workstation to get hardware address of machine on same network segment. Machine A has the IP address of Machine B but needs its hardware address to communicate. Uses ARP broadcasts ARP packet to all stations. Packet contains IP address of the remote machine, which replies with its hardware address. Question 2 Answer all parts i) Describe the main features of the IP protocol. (3 marks) IP (defined in RFC 791) is the core protocol of the TCP/IP suite. It provides a connectionless, unreliable data delivery service. All TCP and UDP data are transmitted as IP datagrams. The main functions of the IP protocol include addressing, packet routing, packet fragmentation and reassembly. ii) Explain the five classes of IP address (5 marks) There are five classes of IP address and they are distinguished both by the number of octets used for the network id and the address range of the first octet. 8 bits 8 bits 8 bits 8 bits Class A 0 Net id Host Class B 10 Net id Host Class C 110 Net id Host Class D 1110 Multicast address Class E 1111 Reserved Classes A, B and C are called the primary classes because they are used for host addresses. Class D is used for multicasting. Whereas a broadcast is directed to all hosts on the network, a multicast is sent only to the members of the multicast group. iii) There are five reserved IP addresses. What are these and what are they used for? (5 marks ) Some addresses are reserved and cannot be used to assign to hosts. Network Address Host address is 0. Directed Broadcast Address Host address is all 1s. Single packet traverses the internet to the destination network. The packet is then delivered to all hosts on the network. Limited broadcast address IP address consisting of all 1s A broadcast on the local network. This computer address
3 IP address consisting of all 0s For computers that do not have an IP address yet. Loopback address Class A network address is 127 Used for testing iv) A company with a network address of wants to segment the network into 18 different subnets? What subnet mask is needed and how many hosts per subnet could be supported? , 2^11-2 (2 marks) v) What subnet mask is needed for a class C network divided into 5 different subnets and how many hosts per subnet could be supported? , 2^5-2 vi) What subnet mask is needed for a class B network divided into 10 different subnets and how many hosts per subnet could be supported? , 2^12-2 (2 marks) (2 marks) vii) How many bits does IPv6 use for network addresses? (1 mark) Question 3 Answer all parts i) Outline four methods of attack on an e-commerce system. (4 marks) Methods of attack USER A Attacker Online merchant eavesdropping (easy on broadcast networks) copies of messages obtained without authority how? - listen to network traffic OR set machine address to match others USER A Hi, I'm user A. Buy goods with CC# & PIN of User A. Attacker Online merchant masquerading (at the human or machine level) send or receive messages using a stolen identity, token or access capability attacker pretends to be another valid user, merchant or even bank How? Steal passwords, PINs, account #, identity details etc. by eavesdropping Use stolen details to withdraw funds or make purchases USER A 2. Alter message 1. Withdraw 5 3. Withdraw Here is 5 4. Here's Take 195 Attacker Online merchant message tampering (easy for store and forward, hard with broadcast networks) Capture a message and alter it Send altered message to original recipient Includes substitution, deletion, new message construction. interrupt communications channel (denial of service)
4 USER A Old message from user A. Withdraw 5 from my account Online merchant replay Send recorded message (eavesdropped) again at a later time e.g. replay a request to withdraw money from a bank Attacker Here's 5 ii) Distinguish fully between Symmetric and Asymmetric Cryptosystems. (8 marks) 2 types of Cryptosystem: 1. Symmetric: Identical keys used to encrypt and decrypt (secret key algorithm) 2. Asymmetric: Two different keys used to encrypt and decrypt (public-key algorithm) Symmetric Cryptosystems Identical keys to encrypt and decrypt The key must be kept a secret (secret key) Both sender and receiver must know key Examples: DES, Triple DES, RC5 Secret Key (sender) Plaintext Encryption Ciphertext (sent over network) Identical Secret Key (receiver) Decryption Plaintext Notation: E K (P)=C D K (C)=P Asymmetric Cryptography Big problem with symmetric cryptography: Key management problem Solution: Asymmetric cryptography (public-key cryptography) Different keys used to encrypt and decrypt Each user has 2 keys - Public key: Made available to everyone - Private key: Kept a secret by the user Anyone with the public key can encrypt a message but not decrypt it. Only the private key can decrypt. Example Alice sends a message to Bob so Alice gets Bob's public key. Alice encrypts message with Bob's public key and sends it. Only Bob's private key can decrypt it
5 PK BOB SK BOB Plaintext Encryption Ciphertext (sent over network) Sender: Alice Decryption Receiver: Bob Asymmetric vs Symmetric Asymmetric offer: + Increased security private keys are never transmitted over the network - Much slower than symmetric cryptosystems iii) Explain what is meant by a digital signature and identify how it is used? (4 marks) If users are assigned public/private key pairs, then applying the private key to a message is tantamount to SIGNING the message - only holder of the private key could have originated the message - message integrity is assured - but SLOW - anyone can read/verify the message Same effect can be got by signing the message digest alone: - much faster - message sent in clear iv) Explain what is meant by a message digest and identify how it is used? (4 marks) Functions that are applied to a (long) message to produce a unique (short) "fingerprint" of the message Properties: Given a message M, it is easy to compute the digest D. Given D, it is hard to compute M Given M, it is hard to find another message M1 that will produce the same digest D. Uses: Used primarily as a message integrity checker. Can determine whether message has been altered in transit. Message is sent in clear, digest is encrypted and sent. Question 4 Answer all parts i) What is a network s topology? (1 mark) General shape of the network ii) Distinguish between the following network topologies: (6 marks) a) Star DIAGRAM star shaped. Computers connect to central hub. b) Bus DIAGRAM computers connect to shared cable. c) Ring DIAGRAM computers connect to shared cable which forms a ring. iii) What is CSMA/CD and explain how it controls medium access and (6 marks) handles collisions.
6 Carrier Sense Multiple Access with Collision Detection. Protocol to manage access to a shared medium. Used by ethernet. Listens for the carrier on the cable. When in use station does not use cable. Waits a random amount of time before trying to send again. If not in use the station starts transmitting and continues to listen to the line. If a collision occurs, station stops transmitting and waits a random amount of time before retrying. The random delay is chosen between 0 and specified delay d. If another collisions occurs d is doubled called binary exponential backoff. iv) Describe how token ring controls medium access and collisions (3 marks) Token circulates on ring, station that has token controls medium. Collisions avoided. v) List three reasons why LAN extension technologies required? (1 marks) vi) Briefly distinguish between repeaters, bridges and routers. (3 marks) All used to extend max. distances of communication media. A repeater is usually an electronic device that allows two cables to be joined together. Repeaters operate at the physical layer and do not understand or interpret frames. Bridges are also electronic devices that operate at the Data Link layer. Bridges listen to traffic on each cable segment and forwards only those frames destines for the other segment. Routers are network level devices that are used to interconnect networks. Question 5 Answer all parts i) Outline the different types of Web documents and their relative (8 marks) advantages/disadvantages. Three basic types of Web documents Static Created and non-changing + easy to build + easy to test ish + fast + longevity inflexible Dynamic Created dynamically by the Web server + flexible + can report current news e.g. stock prices slower than static increased cost testing more difficult Not that both static and dynamic documents do not change once downloaded by a browser. Active Consists at least partly of a computer program When running the program can interact with the user and change the display continuously + can update information continuously e.g. running an animated image + can access sources of information continuously and ergot update the display continuously e.g. stock prices increased costs lack of security ii) Describe the Common Gateway Interface and the two methods of sending (6 marks)
7 user data to the server. Building Dynamic Documents A widely used technology is the Common Gateway Interface (CGI) 1. Specifies how a server interacts with an application 2. Does not specify what programming language to use 3. The URL specifies which program to run Passing Parameters Two methods of sending user data to the server: GET and POST HTTP requests GET appends the parameters to the URL Parameters are accessed via the QUERY_STRING environment variable A? is placed at the end of the URL, parameters are placed after this e.g. POST sends the data in the optional data field of the HTTP request Passed to CGI program as standard input like command line arguments In both cases CGI program must decode the data Simple CGI Example #!/bin/sh echo Content_type: text/plain echo echo Hello echo This document was created on date CGI program should return a valid HTTP header through standard output iii) Outline the main features of Active Server Pages. (3 marks) Active Server Pages a HTML page that includes one or more scripts (small embedded programs) processed on a Microsoft Web server before the page is sent to the user. similar to the common gateway interface (CGI) Typically, interrogates a database and customizes the page before sending it to the requestor. iv) What are sockets? (3 marks) Sockets are a BSD operating system abstraction to allow users to write programs that utilize the underlying communication protocols. Unrelated processes on different nodes can communicate across the network by writing to and reading from sockets. Sockets are bi-directional. Sockets sit on top of the transport layer, which provides an end-to-end connection across multiple networks. Question 6 Answer FOUR parts only. Each carries 5 marks: i) Describe the main features of Asymmetric Digital Subscriber Line (ADSL)
8 reserves more bandwidth going downstream (to the user channels for downstream transmission & 31 for upstream) most attractive to Internet surfers and users of remote LANs, because they typically download much more data than they send. ii) iii) iv) Write short notes on checksums? Error detection mechanism Sum of data in message treated as array of integers Can be 8-, 16- or 32-bit integers Typically use 1s-complement arithmetic Example - 16-bit checksum with 1s complement arithmetic Describe how name resolution is handled by DNS. Resolver software typically available as library procedures Calling program is client Constructs DNS protocol message - a DNS request Sends message to local DNS server DNS server resolves name Constructs DNS protocol message - a DNS reply Sends message to client program and waits for next request Each DNS server is the authoritative server for the names it manages If request contains name managed by receiving server, that server replies directly Otherwise, request must be forwarded to the appropriate authoritative server What is byte stuffing and why is it used? Bit stuffing and byte stuffing are two techniques for inserting extra data to encode reserved bytes Byte stuffing translates each reserved byte into two unreserved bytes For example, can use esc as prefix, followed by x for soh, y for eot and z for esc: v) Briefly describe the following transmission media: radio, microwave & infrared Radio o Data transmitted using radio waves o Energy travels through the air rather than copper or glass o Conceptually similar to radio, TV, cellular phones o Can travel through walls and through an entire building o Can be long distance or short distance Microwave o High frequency radio waves o Unidirectional, for point-to-point communication o Antennas mounted on towers relay transmitted data o Infrared Infrared light transmits data through the air o Similar to technology used in TV remote control o Can propagate throughout a room (bouncing off surfaces), but will not penetrate walls
9 Question 7 Answer all parts i) Describe the main features of TCP (5 marks) Connection oriented: Application requests connection to destination and then uses connection to deliver data to transfer data Point-to-point: A TCP connection has two endpoints Reliability: TCP guarantees data will be delivered without loss, duplication or transmission errors Full duplex: The endpoints of a TCP connection can exchange data in both directions simultaneously Stream interface: Application delivers data to TCP as a continuous stream, with no record boundaries; TCP makes no guarantees that data will be received in same blocks as transmitted Reliable connection startup: Three-way handshake guarantees reliable, synchronized startup between endpoints Graceful connection shutdown: TCP guarantees delivery of all data after endpoint shutdown by application ii) Describe how TCP recovers from a lost packet (3 marks) TCP uses positive acknowledgment with retransmission to achieve reliable data delivery Recipient sends acknowledgment control messages (ACK) to sender to verify successful receipt of data Sender sets timer when data transmitted; if timer expires before acknowledgment arrives, sender retransmits (with new timer) iii) Outline how TCP correctly orders incoming data (3 marks) Application delivers arbitrarily large chunks of data to TCP as a``stream'' TCP breaks this data into segments, each of which fits into an IP datagram Original stream is numbered by bytes Segment contains sequence number of data bytes iv) Describe how TCP manages flow control. (3 marks) TCP uses sliding window for flow control Receiver specifies window Called window advertisement Specifies which bytes in the data stream can be sent Carried in segment along with ACK Sender can transmit any bytes, in any size segment, between last acknowledged byte and within window size v) Outline the process of connection establishment and termination as employed by TCP. (3 marks) TCP uses three-way handshake for reliable connection establishment and termination Host 1 sends segment with SYN bit set and random sequence number Host 2 responds with segment with SYN bit set, acknowledgment to Host 1 and random sequence number Host 1 responds with acknowledgment TCP will retransmit lost segments Random sequence numbers ensure synchronization between endpoints
10 vi) Outline the main features of UDP (3 marks) UDP delivers independent messages, called datagrams between applications or processes on host computers ``Best effort'' delivery - datagrams may be lost, delivered out of order, etc. Checksum (optionally) guarantees integrity of data For generality, endpoints of UDP are called protocol ports or ports Each UDP data transmission identifies the internet address and port number of the destination and the source of the message Destination port and source port may be different
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Mathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Introduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
TCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Written examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
College 5, Routing, Internet. Host A. Host B. The Network Layer: functions
CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
Network Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
DATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
Introduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
