Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------



Similar documents
First Midterm for ECE374 03/24/11 Solution!!

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Computer Networks Homework 1

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

First Midterm for ECE374 02/25/15 Solution!!

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Exam 1 Review Questions

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

Final for ECE374 05/06/13 Solution!!

Computer Networks & Security 2014/2015

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

IT Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

First Midterm for ECE374 03/09/12 Solution!!

Communications and Networking

New York University Computer Science Department Courant Institute of Mathematical Sciences

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Transport Layer Protocols

1 Introduction: Network Applications

LESSON Networking Fundamentals. Understand TCP/IP

Using IPM to Measure Network Performance

CS101 Lecture 19: Internetworking. What You ll Learn Today

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

CS3250 Distributed Systems

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Computer Networks - CS132/EECS148 - Spring

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Technical Support Information Belkin internal use only

DATA COMMUNICATOIN NETWORKING

PART-A Questions. 9. What are the two parts of message inside the envelope?

Architecture and Performance of the Internet

M3-R3: INTERNET AND WEB DESIGN

The Application Layer: DNS

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Chakchai So-In, Ph.D.

Domain Name System (DNS)

EECS 489 Winter 2010 Midterm Exam

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Computer Networks and the Internet

Protocol Data Units and Encapsulation

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Computer Networking LAB 2 HTTP

Transport and Network Layer

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Networking Applications

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Web Browsing Examples. How Web Browsing and HTTP Works

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Sage ERP Accpac Online

How do I get to

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Protocols. Packets. What's in an IP packet

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Homework Assignment #1 Solutions

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

Introduction to Network Operating Systems

Deliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group

Kick starting science...

Using MIS 3e Chapter 6A Appendix

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Bandwidth Aggregation, Teaming and Bonding

Computer Networks CS321

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

DATA COMMUNICATOIN NETWORKING

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

Lecture 28: Internet Protocols

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Application Protocols in the TCP/IP Reference Model

Key Components of WAN Optimization Controller Functionality

Unix System Administration

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Troubleshooting Tools

Domain Name System (DNS)

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Network Fundamentals Carnegie Mellon University

Introduction to Computer Networks

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

NQA Technology White Paper

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Transcription:

Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------ Problem 1 (1 points) - What is the difference between pull and push network protocols? Explain the difference by using two example protocols. Pull : HTTP, POP, IMAP : client requests (pulls) data from server Push : SMTP, server sends (pushes) its data to client whenever new data is available Problem 2 - (Chapter 1 problem 31, 5 points) In modern packet-switched networks, including the Internet, the source host segments long, application layer messages (for example an image or a music file) into smaller packets and sends the packets into the network. The receiver then resembles the packets back into the original message. We refer to this process as message segmentation. Consider a message that is 8*10^6 bits long that is to be sent from a source to a destination which are separated by two routers in between. Suppose each of the three link in this path is 2 Mbps. Ignore propagation, queueing and processing delays. a. Consider sending the message without message segmentation. How long does it take to move the message from the source host to the first router? Keeping in mind that each router uses a store-and-forward packet switching, what is the total time to move the message from source to destination? b. Now suppose the packet is segmented into 800 packets with each packet being 10000 bits long. How long does it take to move the first packet to the first router? When the first packet is being sent from the first router to the second one, the second packet is on its way to the first router. At what time will the second packet be fully received by the second router? c. What is the total to move the message to destination host? Compare this result with your answer in part a. d. In addition to reducing delay, what are the reasons to use message segmentation? e. Discuss the drawbacks of message segmentation. a) Time to send message from source host to first packet switch = 8*10^6 / 2*10^6 = 4 sec. With store-and-forward switching, the total time to move message from source host to destination host = 4 sec 3 hops = 12 sec b) Time to send 1st packet from source host to first packet switch = 1*10^4/2*10^6 = 5 m sec. Time at which second packet is received at the first switch = time at which 1 st packet is received at the second switch = 2 5m sec = 10 m sec c) Time at which 1st packet is received at the destination host = 5 m sec 3 hops = 15 m sec. After this, every 5msec one packet will be received; thus time at which last (800 th) packet is received = 15 m sec + 799 * 5m sec = 4.01 sec. It can be seen that delay in using message segmentation is significantly less (almost 1/3rd).

d) i. Without message segmentation, if bit errors are not tolerated, if there is a single bit error, the whole message has to be retransmitted (rather than a single packet). ii. Without message segmentation, huge packets (containing HD videos, for example) are sent into the network. Routers have to accommodate these huge packets. Smaller packets have to queue behind enormous packets and suffer unfair delays. e) i. Packets have to be put in sequence at the destination. ii. Message segmentation results in many smaller packets. Since header size is usually the same for all packets regardless of their size, with message segmentation the total amount of header bytes is more. Problem 3 - (Chapter 2 problem 1, 5 points) True or False? a. A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. b. Two distinct web pages (for example, www.mit.edu/research.html and www.mit.edu/students.html) can be sent over the same persistent connection. c. with nonpersistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. d. The Data: header in HTTP response message indicates when the object in the response was last modified. e. HTTP response messages never have an empty message body. a) False b) True c) False d) False e) False Problem 4 - (Chapter 2 problem 7, 4 points) Suppose within your web browser you click on a link to obtain a Web page. The IP address of the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP address. Suppose N DNS servers are visited before your host receives the IP address from DNS: the successive visits incur an RTT of RTT1,..., RTTn. Further suppose that the webpage associated with the link contains exactly one object consisting of a small amount of HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object? The total amount of time to get the IP address is RTT1 + RTT2 + + RTTn. Once the IP address is known, RTTO elapses to set up the TCP connection and another RTTO elapses to request and receive the small object. The total response time is

2 RTTo + RTT1 + RTT2 + + RTTn Problem 5 (2 points)- Briefly sketch and explain the process of manipulation of packets in different layers of network on server and client side for retrieving CS132 website first page. Please include the name of layers and protocols which are used in each layer. The sketch must show the stack of layers (Application, Transport,...) in TCP/IP on both sides and explain how HTTP packet is initiated in application layer and is passed to TCP and TCP header is added and... etc (similar to slides on general networking example) Problem 6 (2 points) In what layer of the network does UDP live in? By using an example, explain why it is necessary to have UDP. Name one application protocol which uses UDP as its supporting lower protocol. Transport layer. The example can be either DNS or a simple replicated database architecture that the master uses UDP to find available servers. DNS uses UDP as its transport protocol. Problem 7 - (Chapter 2 problem 8, 6 points) Referring to problem 4, suppose the HTML file references 8 very small objects on the same server. Neglecting transmission times, how time elapses with a. Non-persistent HTTP with no parallel TCP connections? b. Non-persistent HTTP with the browser configures for 5 parallel connections? c. Persistent HTTP? a) RTT1 + * + RTTn + 2 RTTo + 8 2 RTTo = 18RTTo + RTT1 + * + RTTn b) RTT1 + * + RTTn + 2 RTTo + 2 2 RTTo = 6 RTTo + RTT1 + * + RTTn c) RTT1 + * + RTTn + 2 RTTo + RTTo = 3RTTo + RTT1 + * + RTTn. Problem 8 - (Chapter 2 problem 9, 10 points) Consider Figure 2.12 in your book, for which there is an institutional network connected to the Internet. Suppose that the average object size is 850,000 bits and that the average request rate from institution browsers to the origin servers is 16 requests per second. Also suppose that the amount of time it takes from when the router on the internet side of the access link forwards an HTTP request until it receives the response is three seconds on average. Model the total average response time as the sum of the average access delay (that is the delay from the Internet router to institution router) and the average Internet delay. For the average access delay use Delta/(1 - Delta * Beta). Where Delta is the average time required to send an object over the access link and Beta is the arrival rate of objects to the access link.

a. Find the total average response time. b. Now suppose a cache installed in the institutional LAN, Suppose the miss rate is 0.4. Find the total response time. a) The time to transmit an object of size L over a link or rate R is L/R. The average time is the average size of the object divided by R: = (850,000 bits)/(15,000,000 bits/sec) =.0567 sec The traffic intensity on the link is given by β =(16 requests/sec)(.0567 sec/request) = 0.907. Thus, the average access delay is (.0567 sec)/(1 -.907).6 seconds. The total average response time is therefore.6 sec + 3 sec = 3.6 sec. b) The traffic intensity on the access link is reduced by 60% since the 60% of the requests are satisfied within the institutional network. Thus the average access delay is (.0567 sec) /[1 (.4)(.907)] =.089 seconds. The response time is approximately zero if the request is satisfied by the cache (which happens with probability.6); the average response time is.089 sec + 3 sec = 3.089 sec for cache misses (which happens 40% of the time). So the average response time is (.6)(0 sec) + (.4)(3.089 sec) = 1.24 seconds. Thus the average response time is reduced from 3.6 sec to 1.24 sec Problem 9 - (Chapter 2 problem 15, 4 points) Read RFC 5321 for SMTP. What does MTA stand for? Consider the spam email included in your book below this problem. Assuming the originator of this spam email is malicious and all other hosts are honest, identify the malicious host that has generated this email. MTA stands for Mail Transfer Agent. A host sends the message to an MTA. The message then follows a sequence of MTAs to reach the receiver s mail reader. We see that this spam message follows a chain of MTAs. An honest MTA should report where it receives the message. Notice that in this message, asusus-4b96 ([58.88.21.177]) does not report from where it received the email. Since we assume only the originator is dishonest, so asusus-4b96 ([58.88.21.177]) must be the originator. Problem 10 (8 points) - Consider DNS protocol. a. Sketch the main architecture of domain name servers currently used for the internet. You should include a client, a server and different types of DNSs. Sketch on page 138 of book is good. b. Explain four different types of record which are kept in a DNS list. According to your sketch in part a, in what point is each of these types used? A, CNAME, NS and MX. CNAME is used in authoritative or TLD servers. NS is used in authoritative servers. A is kept in local DNSs. MX is used for email applications. c. Name two different types of a DNS query. Complete your sketch with some arrows to explain how these two approaches work.

Iterative and Recursive. In iterative approach, client only talks to local DNS, local talks to Root DNS, Root talks to TLD, TLD talks to authoritative and.... In recursive approach, client talks to local DNS, then talks to Root, then talks to TLD, then to authoritative and... d. What is the necessity of having Root Domain Name Servers? Adding a new TLD requires updating only 13 entities in the network. Problem 11 (Modified version of Chapter 2 problem 22, 6 points ) - Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of Us = 30 Mbps, and each peer has a download rate of Di = 2 Mbps and an upload rate of U. We have N peers in total. a. Assume U = 700Kbps. Do the math and compare the total amount of time needed to distribute the file for N = 10 and N = 100. How does increasing N affect this comparison? Direct communication : max {10 (or 100) * 15000 / 30, 15000 / 2} P2P communication : max {15000 / 30, 15000 / 2, 10 (or 100) * 15000 / (30 + 10(or 100)*0.7)} If number of peers is increased enough, P2P becomes greater finally. b. Assume N = 50. Compare this time for U = 300 Kbps and U = 700 Kbps. How does increasing peer s upload rate (U) affects this comparison? Direct communication : max {50 * 15000 / 30, 15000 / 2} P2P communication : max {15000 / 30, 15000 / 2, 50 * 15000 / (30 + 50*0.3(or 0.7))} If upload rate of peers is increased enough, P2P becomes greater finally. Problem 12 (2 points) - Consider a P2P overlay network. a. One example of this network is Circular Architecture. Depict this architecture and briefly explain how a file is distributed among peers in this approach. Page 153 in book b. Add shortcuts to your answer for part a. How is total upload time affected by adding shortcuts? What is the drawback of adding more edges to the overlay network? Total time is decreased because of shortcuts but managing the network becomes more difficult due to peer churn. Problem 13 - (Chapter 2 problem 29, 5 points) Because an integer in [0, 2^n - 1] can be expressed as an n-bit binary number in a DHT, each key can be expressed as k = (k0,k1,..kn-1), and each peer identifier can be expressed as p = (p0, p1,..., pn-1). Let s now define the XOR distance between a key k and a peer p as d(k, p) = k0 - p0 *2^0 +... + kn-1 - pn-1 *2^(n-1) Describe how this metric can be used to assign (key, value) pairs to peers. For each key, we first calculate the distances (using d(k,p)) between itself and all peers, and then store the key in the peer that is closest to the key (that is, with smallest distance value). Extra Credit You can submit the answers to Problem 19, or Wireshark Lab problems of chapter 2 for 10 points extra credit.