CS 372 - Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

UDP service - internet protocols

"unreliable" (best effort) data transfer between sending and receiving process - does not provide: connection setup, reliability, flow control, congestion control, timing, or bandwidth guarantee - suitable for multimedia applications

Convert the following units. Your answer should be a whole number with no text in the answer field: 60.76 Kbps = _____ bits per second

60.76 x 1000 = 60,760 60,760

Al Gore invented the internet.

False

An HTTP server maintains client states.

False

Cookies are not a security or privacy concern.

False

Does HTTP preserves state between sessions?

False

FTP is implemented over a pair of UDP connections.

False

FTP is implemented over a single TCP connection

False

HTTP implements caching by use of a UDP check.

False

If there is only one error bit in a segment, it can go undetected.

False

In store-and-forward networks, only one packet may be in transit on a link at any given time.

False

In store-and-forward transmission, a packet switch may begin transmitting the first bits of packet before it has finished receiving that the last bits of the packet.

False

It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet.

False

The TCP protocol provides error detection and correction.

False

The TCP protocol provides reliable, connectionless service.

False

The UDP protocol implements congestion control.

False

The UDP protocol implements reliable data transfer.

False

The UDP protocol is connection-oriented.

False

The UDP protocol provides reliable, connectionless service.

False

The following is a valid IP address: 130.154.1.256

False

The following is a valid IP address: 130.154.465.201

False

The internet is a system for connecting computers using a single transmission technology.

False

The organization that manages the .org TLD is known as the Public Internet Organization (PIO).

False

There is a single, central DNS server.

False

Match the event with the TCP receiver action: Arrival of segment that partially or completely fills in gap in received data.

Immediately send ACK, provided that segment starts at the lower end of gap.

Match the event with the TCP receiver action: Arrival of out-of-order segment with higher-than-expected sequence number.

Immediately send duplicate ACK, indicating sequence number of next expected byte.

A simple checksum can detect all 1-bit errors.

True

A simple checksum can detect some 2-bit errors.

True

An FTP server maintains client states.

True

FTP is a peer-to-peer protocol.

True

FTP is implemented over a pair of TCP connections.

True

HTTP implements caching by use of a conditional GET.

True

IMAP maintains the client's entire email directory structure on the client.

True

If a file is up-to-date in your local browser cache, then the use of a proxy server will not save time.

True

If there are 2 bits in error, the errors can go undetected?

True

In one mode, POP3 can download emails to the client, and keep the originals on the mail server.

True

Most packet switches use store-and-forward transmission.

True

SMTP can send additional types of objects Multipurpose Internet Mail Extension / MIME.

True

Sending emails with false "Sender IP" is called "email spoofing".

True

The TCP protocol implements flow control.

True

The TCP protocol is connection-oriented.

True

The UDP protocol provides error detection.

True

The following is a valid IP address: 130.154.1.25

True

The internet is a network of networks.

True

There are 232 (4,294,967,296) unique 32-bit IP addresses (ignoring reserved addresses)

True

What is the benefit of broadband cabling over baseband cabling? Can Broadcast cabling utilize a greater range of frequencies in transferring information. This allows more data to be transferred over this type of cabling.

True

What is the role of physical media in access networks? Do Analog signals relate to bits propagating over/through the physical media.

True

What is the role of physical media in access networks? Is the physical media a physical link in the chain between sender/receiver pairs.

True

What is an application that does NOT have stringent data integrity requirements?

Video streaming

Which of the following is NOT a characteristic of a computer virus?

Viruses are designed to collect information from the user, like keystrokes

Proxy server

a server that takes some of the load off an origin server (e.g. Amazon) Scenario: a user's browser sends all HTTP requests to cache - if object in cache: cache returns object - else, proxy server has to pass the HTTP request to the origin server and the origin server will return it to the proxy, then client.

spyware

a type of malware that infects your computer and attempts to capture various bits of your data or even your passwords and send them back to the attacker through the internet.

As a packet is being constructed and passed "down" to the next layer of the internet protocol stack, a new "header" is added. This process is called ____________

encapsulation

Top-Level Domain (TLD)

example: eecs.oregonstate.edu - eecs: specific computer server that can be contact - edu : TLD

Retransmitting a missing segment before the segment's countdown timer expires is called...

fast retransmission

Two types of physical media

guided media: signals propagate in solid media unguided media: signals propagate freely

Network edge

hosts and applications clients and servers

network security

how computer networks can be attacked intentionally or unintentionally and how we can defend ourselves against that.

A ______________ model uses a central server to setup connection between peers

hybrid

In a ______________ architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.

hybrid client-server/P2P

ICMP applications

implemented at the network layer, only user interface goes to the application layer.

Reliable data transfer

implemented in the application, transport, internet layers

The TCP sequence numbers are used to implement _________ .

in-order delivery

Worm

installs itself, replicates itself, and sends itself around the internet (attacks the network core)

network core

interconnected routers network of networks

Protocol ___________ allows multiple protocols to work together.

interoperability

Pipelining

sender transmits multiple packets - packets "in-flight" have yet to be acknowledged - receiver might not be able to handle that many packets arriving at the same time benefit : increases network utilization

The TCP sequence numbers are used to implement _________.

reliable data transmission

two main types of HTTP

request, response -ASCII (human readable) Uploading form input: URL method: - uses GET method - input is uploaded in URL field of request line. POST method: input is uploaded to server in the entity body

IP addresses and "root zone" TLDs coordinated by IANA (Internet Assigned Numbers Authority) High-level management of Internet names and addresses handled by ICANN (Internet Corporation for Assigned Names and numbers)

root zone = .uk, .edu, etc

RTT

round-trip time: time for a small packet to travel from client to server and back

HostA has established a TCP connection with HostB in a remote network. HostA is sending packets to HostB. Assume we have configured TCP, somehow, to ACK every segment (no ACKing every other segment). Assume that the timeout is the same for all packets. HostB's "window size" is 20000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #3,356. HostA now sends segments of the same application data stream in order: P: 210 bytes Q: 174 bytes R: 115 bytes Suppose the segments arrive at Host B in the order Q, P, and R. What is the acknowledgment number on the segment sent in response to segment R?

segment sent in response to segment R: = 3,356 + (sequence P) + (Sequence Q) + (Sequence R) + 1 = 3,856

IP spoofing

send packet with false source address

The transport layer resides on/in the network ________.

edge

A client-side history of transactions between a client and server using HTTP is called a Cookie.

True

A network is a system for connecting multiple computers using a single transmission technology.

True

TCP uses

- client initiates tcp connection to server, port 80 - server is always listening, accepts tcp connection - http messages are exchanged between client and server - tcp connection closed

Two categories of physical media

- Guided Physical Media include wired communication types such as: Twisted Pair, Coaxial Cable (coax), and Fiber-Optic cable. - Unguided Physical Media is another name for wireless radio communication. Types include: Terrestrial Microwave, Wifi LAN, Wide-Area Networks or WAN (cellular), and Satellite communications.

Applications that use TCP

- HTTP -FTP (file transfer) -SMTP (email) -Telnet (remote login)

Frequency division multiplexing (FDM)

- Achieves multiplexing by using different carrier frequencies - Frequencies must be separated to avoid interference - Receiver can "tune" to specific frequency and extract modulation for that one channel - Useful only in media that can carry multiple signals with different frequencies - high-bandwidth required

Non-persistent HTTP

- At most one object is sent over a TCP connection. - downloading multiple objects requires multiple connections - browsers often open parallel TCP connections to fetch referenced objects Response time: 2*RTT + transit time - one RTT to initiate TCP connection - one RTT for HTTP request and response - file transmission time

Baseband and broadband

- Baseband uses a small part of the wave spectrum and sends only one signal at a time - Broadband uses a larger part of the wave spectrum and uses frequency division multiplexing to send multiple signals simultaneously

What is the goal of caching in HTTP

- Caching prevents excessive requests to the origin server. - Caching prevents additional congestion in the internet - Caching prevents the same information from being repeatedly downloaded - Caching appears to speed up page downloads

What are some reasons for the layering of network protocols?

- Can update the inner workings of a protocol, as long as input/output remain the same - Protocols can be tested independently of one another - The complication of dealing with the intermeshed types of hosts and data is lessened - When maintenance is required at one level, changes do not affect other layers

What are cookies used for?

- Cookies make some web browsing more convenient by saving browsing history - Cookies can save preferences for a news-feed - Cookies can enable targeted advertising - Cookies can save info a shopping cart - Cookies can save your location for weather report

Packet switching cont 2

- Data transmitted in small, independent pieces. source divides outgoing messages into packets and destination recovers original data - Each packet travels independently Includes enough information for delivery, may follow different paths and can be retransmitted if lost

What devices reside on the network edge? (check all that apply)

- End-systems - smartphones - laptops - servers - hosts

What are some tools for implementation of reliable data transfer?

- Error Detection - Timing Message Sequencing - Receipt Acknowledgement

Please select all examples of systems using guided media.

- Ethernet home networks - Cable television/internet - ADSL - Fiber-optic internet

Two ways of dividing the link bandwidth into pieces

- Frequency division multiplexing (FDM) - Time division multiplexing (TDM)

Characteristics of TCP

- Full-duplex operation (bi-directional data flow in the same connection at the same time) - In-order byte stream service (received data same as sent data) - Acknowledgment of bytes received - Retransmission of packets if necessary - Pipelining for efficiency (multiple packets sent at once) - Hurry-up-and-wait (burst of packets sent, then wait for acknowledgment) - Flow-controlled for reliability (sender will not overwhelm receiver) - MSS: Data will be broken up into segments, then reassembled at the receiver

What must an application layer protocol specify?

- Message Semantics (meaning) - Rules for message send & response (how, when) - Types of message exchanged - Message Syntax (fields, structure)

What must an application-level protocol specify? (Check all that apply)

- Message response rules - Message sending rules - Message semantics - Types of messages exchanged -Message fields & structure

What are some tradeoffs for the implementation of RDT in TCP

- More packets on the network (because of ACKs) - leading to congestion issues - Additional overhead - Possible delays due to waiting for acknowledgements

Socket programming with UDP

- No "connection" between client and server - Transmitted data may be lost or received out-of-order - no handshaking before sending data - sender explicitly attaches IP destination address and port# to each packet - Receiver extracts sender's address and port number from received packet.

peer to peer

- No always on server - peers are intermittently connected and might change IP addresses - illegally share files (bitTorrent) Pros: scalable & distributive Cons: difficult to manage & not secure Peer-to-peer is a different model. With P2P there is no central authoritative server. End-user machines will find other end-user machines through advertised IP addresses. They will then use their P2P client software to connect and exchange info. Examples include bit-torrent and other file-sharing services.

Why is there a UDP?

- No connection establishment (Which can add to delay) - Simple: No connection state at sender, receiver - Small header size - No congestion control: UDP can blast away as fast as desired

UDP: summary

- No frills, bare bones transport protocol - Best effort service - Basic error detection - UDP segments may be lost or delivered out of order - Connectionless: + No handshaking between UDP sender and receiver + Each UDP segment handled independently of others - UDP use: + Streaming multimedia apps (loss tolerant, rate sensitive) + DNS

Two generals problem

- cannot guarantee that message will be received - cannot guarantee that received message has no errors

How is data transferred through the network?

- circuit switching : dedicated circuit per call [ telephone net ] - packet-switching : data sent through net in discrete "chunks" on shared media

As discussed in the lectures, what are the primary functions of a packet-switched network.

- Packet construction - Packet transmissioon - Packet interpretation

Four sources of packet delay

- Processing delay: check bit errors, determine whether the packet is valid, and determine output link (where to send data to) - Queuing delay : time waiting at output link for transmission - Transmission delay: R = link bandwidth (bps) L = packet length (in bits) transmission delay = L / R - Propagation delay d = length of physical link (in meters) s = propagation speed in medium (~2.5 x 10^8 m/sec) propagation delay = d/s

Other functions of the network core

- Queuing packets - Route discovery - Traffic/congestion control - Retransmitting lost packets - Determining type of data - messages, service requests/responses, files, audio/video

ICMP allows information to be carried between what types of devices (e.g. router to...)?

- Router to Source Host - Source Host to Destination Host - Destination Host to Source Host - Router to Router

What are some responsibilities of the Application Layer?

- Support network applications - Determine destination IP address

The HTTP request message require an extra \r\n at the end of the header Section because:

- The HTTP header must be separated from the entity body. - That's just the way it is

What are characteristics of FDM?

- The spectrum is divided up into bands of frequency - Multiple users can transmit, provided that they use the right frequency

Web caching

- Typically, cache is installed by ISP (university, company, residential ISP) - Cached objects have "expiration" so that they can be refreshed automatically Why web caching? reduce response time for req, reduce traffic on an institution's access link, enables poor providers to effectively deliver content Conditional GET: don't send object if cache has up-to-date cached version specify date of cached copy in HTTP request : If-modified-since<date>

Three major components in Email

- User Agents : compose, read,edit, send e.g. Gmail, outlook, yahoo - Mail Server • mailbox contains incoming messages for user • message queue of outgoing mail messages (emails have to be kept in the mail server as the user agents might not work. so we need a server to store the messages). - SMTP (Simple Mail Transfer Protocol) • defines message transfer rules & formats between mail servers • Client: sending mail • Server: receiving mail user mailbox

What are the components of e-mail?

- User agent (such as an email client, or webmail) - An email protocol - A mail server

Packet switching disadvantages/ downsides

- When many users want to be active at the same time - Packet switching is fine for data that is not time-critical - Excessive congestion causes: packet delay and lost, "jitter" - packet construction creates additional overhead - protocols needed for reliable data transfer congestion control - bandwidth guarantees are needed for audio/video apps

Packet switching cont.

- all streams share network resources - each packet uses full link bandwidth - resources used as needed better utilization, less waste & we can also have a congestion when demands exceed resources

Client server

- always on - fixed/known IP address - serves many clients simultaneously A client will contact a server to download or upload data. The server is always on and listening for incoming requests. A well-known example is the web. Your internet browser is the client, and the websites you visit are the servers. ex: Google, amazon, myspace

SMTP

- application layer protocol uses TCP as it is more reliable - default port is 25 - "push" protocol command/response interaction - commands: plain text - response: status code and phrase messages must be in 7-bit ASCII

Packet "sniffing"

- broadcast media (shared ethernet, wireless) - promiscuous network interface reads/records all packets (e.g., including passwords!) passing by

Typical home network components

- cable or DSL modem - routerr/firewall/ NAT - etherrnet - wireless access point cabled/wireless devices

TCP service - internet protocols

- connection-oriented: setup required between client and server processes - reliable transport between sending and receiving process -flow control: sender won't overwhelm receiver -congestion control: throttle sender when network overloaded -does not provide: timing, minimum bandwidth guarantees

Twisted pair connectors

- connector: same on both ends of the cable; used with hubs, switches - crossover: one of each; direct connection

ICMP has two classes of messages

- error messages - informational messages Ex of error messages: • Destination unreachable router sends when a datagram cannot be delivered to its final destination • Source quench router sends when it has no more queuing space available. • Time exceeded message is sent in two cases 1. router sends when TTL = 0 2. destination host sends when reassembly timer expires before all fragments arrive • Fragmentation required- router sends when datagram too large for outbound network (if "do-not-fragment" flag is set)

Guided Media: fiber optic cable

- glass fiber carrying light pulses, each pulse represents one bit • high-speed operation:- high-speed point-to-point transmission (e.g., 10's-100's Gbps) • low error rate: - immune to electromagnetic noise and other interference BIGGEST PROBLEM: breakage. when a main fiber optic line goes down, an area will lose the internet/ it'll be very slow

end systems(hosts)

- individual computers that initiate requests or provide services e.g. personal computers, cellphones e.g. server computers

Circuit switching fundamentals

- link bandwidth, switch capacity - dedicated resources, no sharing - circuit-like (guaranteed) performance - call setup required *bandwidth = transmission rate (bps)

network structure

- network edge - network core - physical media

ISP's (internet service provider)

- occupy the lowest tier - called access networks cause they provide access to the internet Communication starts with a local or tier 3 ISP, and may traverse many networks, including Tier 1 providers, before it reaches another local network and its destination.

Circuit switching cont.

- pieces allocated to calls - circuit switching can be wasteful, a call might be set up even when two hosts that are talking have nothing to transfer - resource piece idle if not used by owning call - consumers are charged on a per-minute basis

ISO (International Standards Organization)/ OSI reference model

- presentation layer: Allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions - session layer: synchronization, checkpointing, recovery of data exchange -Internet stack "missing" these layers• these services, if needed, must be implemented in the application layer of the Internet protocol stack

Physical media

- provides the required link between sender & receiver - propagates bits between sender/receiver pairs

packet loss

- queue (buffer) has finite capacity - if packet arrives at a full queue, it is dropped (lost) - lost packet may possibly be retransmitted by the previous node, by the source, or not at all

What device reside in the network core?

- routers - switches

Unguided media: wireless radio

- signal carried in electromagnetic spectrum - no physical wire effects of propagation environment (can cause a high error rate) - reflection - obstruction by objects - interference

TCP

- stop and wait protocol, with poor network utilization - TCP will send a burst of packets and then wait for acknowledgement. Utilization for a single TCP packet is poor, so solution is: pipelining: TCP solves this by sending a number of packets, one right after another, and then waiting for an acknowledgement.

UDP use

- streaming multimedia apps (loss tolerant, rate sensitive) - DNS - SNMP

POP3

- uses "download and delete" mode. - Bob cannot re-read e-mail if he changes client -"Download-and-keep": copies of messages on different clients - POP3 is stateless across sessions

Transport protocols

-Provide logical communication between application processes running on different hosts - Run on end systems

A network protocol may do the following (check all that apply):

-Specify actions taken upon message transmission - Specify actions taken upon message receipt - Specify the whether or not information is sent - Specify the order of messages sent and received - Specify the time between sending information. - Specify the form of messages sent and received

What are some examples of guided media?

-Waveguide cabling (fiber-optic) -Cups with a string connecting them -Twisted pair copper wires -Coaxial cables

Convert the following units. Your answer should be a whole number with no text in the answer field: 6.18 Mbps = _____ Kbps

6,180 Kbps

Suppose there are 62 packets entering a queue at the same time. Each packet is of size 9 MiB. The link transmission rate is 2.1 Gbps. What is the queueing delay of packet number 1 (in milliseconds, rounded to one decimal place, e.g. 0.01234 seconds would be entered as "12.3")

0

The one's complement of 10010110 is

01101001

For the following question, proper hexadecimal format is (0xYYYY) where Y will range in (0-9) or (A-F). Only proper formats will be accepted. Suppose that we send a DNS request with ID #26944. What is the little-endian representation (hexadecimal)? What is the big-endian representation (hexadecimal)? Which representation is required for network communication? (Enter "1" or "2" without quotes)

0x4069 0x6940 2

Suppose that we send a DNS request with ID # 46921. (Note the network order is in big-endian) What is the little-endian representation (hexadecimal)? ________ What is the big-endian representation (hexadecimal)? ________ Which representation is required for network communication? ________

0x49B7, 0xB749, 0xB749

Compute the sum with carry-wraparound (sometimes called the one's complement sum) of the following two numbers. Give answer in 8-bit binary, zero-padded to 8 bits if necessary, with no spaces (e.g. 00101000). Please note this is different than the checksum calculation.NOTE: Canvas will remove any leading zeros from your answer. This will not cause your answer to be marked as incorrect. 00000001 11111111

1

The UDP protocol uses a 16 -bit, ___'s complement of the ___ 's complement sum to compute the checksum

1's 1's

Alice sends message to Bob

1) Alice uses her user agent to compose message and send to [email protected] 2) Alice's user agent sends message to her mail server; message placed in message queue 3) Client side of SMTP opens TCP connection with Bob's mail server 4) SMTP client sends Alice's message over the TCP connection 5) Bob's mail server places the message in Bob's mailbox 6) Bob uses his user agent to read message

Assume a TCP sender is continuously sending 1,034-byte segments. If a TCP receiver advertises a window size of 8,943 bytes, and with a link transmission rate 35 Mbps an end-to-end propagation delay of 23.4 ms, what is the utilization? Assume no errors, no processing or queueing delay, and ACKs transmit instantly. Also assume the sender will not transmit a non-full segment. Give answer in percentages, rounded to one decimal place, without units (e.g. for an answer of 10.43% you would enter "10.4" without the quotes).

4

Transport layer protocols

1. A message (data) is passed from the Application layer to the Transport layer. 2. The Transport layer breaks the message up into data blocks (if necessary). 3. The Transport layer appends a header that contains the source and destination port numbers that correspond to the source and destination processes. 4. These blocks/ports are encapsulated into segments. The segments and their IP addresses are then passed to the Network layer. 5. This process is then reversed at the destination host, where the destination port is used to find the correct process. Upon arrival, the segments must be demultiplexed, or separated, and then delivered to the correct process.

Place the steps in the correct order for a complete e-mail communication.

1. Alice uses her user agent to compose message and sent to Bob's email address. 2. Alice's user agent sends message to her mail server; message placed in message queue. 3. Client side of SMTP opens TCP connection with Bob's mail server. 4. SMTP client sends Alice's message over the TCP connection. 5. Bob's mail server places the message in Bob's mailbox. 6. Bob uses his user agent to read the message.

How long does it take to send a file of 80 KiB from host A to host B over a circuit-switched network? - The link's transmission rate = 1.5 Mbps - Each link uses TDM with 24 slots/sec - 500 ms to establish end-to-end circuit

1. Change KiB to Kb 80 Kib = (80 x 2^10 bytes)* 8 bits per byte = 640 Kib = 655.36 Kb 2. Bandwidth of the circuit 1.5 Mbps/ 24 = 62.5 Kbps 3. Time to send 655.36 Kb/62.5 Kbps + 0.5 s = ~ 11 s

Put the steps in the most correct order for TCP Connection initialization.

1. Client sends segment with SYN set to 1 2. Server sends segment with SYN set to 1 and ACK set to the Client's SeqNum+1 3. Client sends segment with SYN set to 0 and ACK set to the Server's SeqNum+1

We want to know how long it would take to send five 1480-byte packets. Assume the pipeline will accommodate 6000 bytes from sender to receiver at any given time. 1. How many packets will fit in the pipeline? 2. ​​​​​​How many pipelines will it take to deliver the five packets? 3. How long will it take to send the 5 packets? ( ______ ms.) 4. What is the utilization with pipelining? ( ______ % ) 5. What happens if the sender sends information faster than the receiver can process?

1. Floor(6000 / 1480) = 4 packets will fit in the pipeline. We can send the 5th packet when we receive the ACK for the first packet. See diagram below. 2. 2 3. From #2 above, one pipeline will take 23.2 ms. It will take 2 pipelines to send all the data. So the time is 23.2ms * 2 = 46.4 ms (much better than the previous 116ms) 4. Answer: Time spent transmitting = 5*(1.184 + 0.016) = 6ms Total time until finished = 46.4 ms (from above) Utilization = (6 ms / 46.4 ms) * 100 = approx. 12.9%, much better than before! 'NOTE: The reason this looks different from lecture is that, in the lecture slides, there is a continuous stream of packets (infinite packets). In this problem there are a limited number of packets. 5. Packets would be dropped. With a receive window implementation, the receive window size will shrink over time, eventually limiting the sender's output rate to that which can be processed by the receiver (flow control).

DNS services

1. Hostname to IP address translation 2. Web server aliasing- Canonical, alias names 3. Mail server aliasing 4. Load distribution

With a stop-and-wait implementation (no pipelining) subject to the following conditions: - R = 10Mbps - Network end-to-end time (after initial transmission) = 11 ms - ACK packet L = 20 bytes 1. What is the transmission time for one packet 1480-byte packet? (_______ ms) 2. What is the ACK transmission time? (_____ ms) 3. What is the end-to-end time for one packet? (____ ms) 4. How long would it take to send five 1480-byte packets? (_____ ms) 5. What is the utilization? (______ %) 6. How does the receiver handle multiple incoming packets?

1. Initial Transmit = L/R = 1480 * 8 / 10,000,000 = 1.184 ms. 2. ACK transmit = 20 * 8 / 10,000,000 = 0.016 ms 3. First packet total = 1.184 + 11 + 0.016 + 11 = 23.2ms (Just the first packet) 4. 5 * 23.2ms = 116 ms 5. Time spent transmitting = 1.184 + 0.016 = 1.2msTotal time until finished = 23.2 ms (from above)(1.2ms / 23.2 ms) x 100 = approx. 5.2 % 6. An input buffer is filled as data comes in, and the application layer drains the buffer as it needs the data contained therein.

HostA has established a TCP connection with HostB in a remote network. HostA is sending packets to HostB, and HostB immediately acknowledges every packet. Assume that the timeout is the same for all packets. HostB's "window size" is 2000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #140. HostA now sends packets of the same application data stream in order: P (50 Bytes), Q (60 Bytes), and R (100 Bytes). 1. Suppose that packet P is lost, but packets Q and R are received. What is the acknowledgement number in the ACK for packets Q and R?

1. Q: 141, R: 141

A typical HTTP session:

1. The client initiates a TCP connection (creates socket) to server, port 80. 2. The server accepts the TCP connection from the client. 3. HTTP messages (application-layer protocol messages) are exchanged between the browser (HTTP client) and the Web server (HTTP server). 4. The TCP connection may then be closed by the client or server.

Process for DNS

1. client queries root server to find .com DNS server 2, client queries .com DNS server to get amazon.com DNS server 3. client queries amazon.com DNS server to get IP address for www.amazon.com

protocols define

1. format and order of messages sent and received among network entities 2. actions taken on message transmission and receipt

Compute the sum with carry-wraparound (sometimes called the one's complement sum) of the following two numbers. Give answer in 8-bit binary, zero-padded to 8 bits if necessary, with no spaces (e.g. 00101000). Please note this is different than the checksum calculation.NOTE: Canvas will remove any leading zeros from your answer. This will not cause your answer to be marked as incorrect. 10000010 10001111

10,010

The one's complement of 01101001 is

10010110

Compute the sum with carry-wraparound (sometimes called the one's complement sum) of the following two numbers. Give answer in 8-bit binary, zero-padded to 8 bits if necessary, with no spaces (e.g. 00101000). Please note this is different than the checksum calculation.NOTE: Canvas will remove any leading zeros from your answer. This will not cause your answer to be marked as incorrect. 10010110 10010000

100111

How long does it take to send a 10 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmission rate = 91.7 Gbps. Network is TDM, with 19 permitted users, each with an equal time slot size. A link connection requires a setup time of 87.1 ms. Your answer should be in miliseconds (ms) with one decimal place, and without the unit (e.g. "140.6" without the quotes)

104.5

Suppose there are 84 packets entering a queue at the same time. Each packet is of size 9 MiB. The link transmission rate is 2.1 Gbps. What is the queueing delay of packet number 4 (in milliseconds, rounded to one decimal place, e.g. 0.01234 seconds would be entered as "12.3")

107.9

How long does it take to send a 19 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmission rate = 66.4 Gbps. Network is FDM, with 19 permitted users, each with an equal bandwidth share. A link connection requires a setup time of 62.5 ms. Your answer should be in miliseconds (ms) with one decimal place, and without the unit (e.g. "140.6" without the quotes)

108.1

Suppose there are 4 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total end-to-end delay for a packet originating from Host A with destination Host B, under the following conditions. Each of the link transmission rates are 7.9 Mbps The total distance from Host A to Host B along its path of transmisison is 164.2 km The speed of propagation through the transmission medium is is 2.5 x 108 m/s The packet size is 2 KiB Remember that you must also uplink from Host A to the first router. Give answer in milliseconds, rounded to 1 decimal place, without units (e.g. for 0.12345 seconds you would enter "123.5" without the quotes).

11

How long does it take to send a 11 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmission rate = 34.1 Gbps. Network is TDM, with 9 permitted users, each with an equal time slot size. A link connection requires a setup time of 89 ms. Your answer should be in miliseconds (ms) with one decimal place, and without the unit (e.g. "140.6" without the quotes)

113.4

Convert the following units. Your answer should be a whole number with no text in the answer field: 146.38 Kbps = _____ bits per second

146.380

Convert the following units. Your answer should be a whole number with no text in the answer field: 149.86 Kbps = _____ bits per second

149860

Convert the following units. Your answer should be a whole number with no text in the answer field: 2 MiB = _____ bits

16,777,216

Convert the following units. Your answer should be a whole number with no text in the answer field: 257 B = _____ bits

2056

A client in a network with a proxy server requests a 4 MiB file from an internet server, fakeservername.com. The network's proxy server has a 2.01 Mbps connection to fakeservername.com. The average response time between the network's proxy server and the internet origin server (including RTT) is 3.8 seconds for a small "header-only" HTTP request/response. The file requested by the client is currently in the proxy server cache, but the proxy server relays the client's request to the internet server with "if-modified since". Assume that transmissions between the proxy and the origin servers are stream (not packets) at full bandwidth, with negligible propagation delay. How much time is saved if the file has not been modified? (Give answer in seconds, without units, rounded to two decimal places, so for an answer of 1.4233 seconds you would enter "1.42" without the quotes.)

16.69

Convert the following units. Your answer should be a whole number with no text in the answer field: 20 KiB = _____ bits

163,840

How many unique network interface hardware addresses are possible (ignoring reserved addresses

16^12 (281,474,976,710,656)

Suppose there are 5 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total end-to-end delay for a packet originating from Host A with destination Host B, under the following conditions. Each of the link transmission rates are 5.8 Mbps The total distance from Host A to Host B along its path of transmisison is 152.6 km The speed of propagation through the transmission medium is is 2.5 x 108 m/s The packet size is 2 KiB Remember that you must also uplink from Host A to the first router. Give answer in milliseconds, rounded to 1 decimal place, without units (e.g. for 0.12345 seconds you would enter "123.5" without the quotes).

17.6

Convert the following units. Your answer should be a whole number with no text in the answer field: 24 B = _____ bits

192

The reserved port for FTP data transfer is port __

20

A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 2 sec, including the RTT. The browser then sends the request for the website's index file. The index file references 9 additional images, which are to be requested/downloaded by the client's browser. How many requests (including the initial request) must be sent by the browser... 1. With non-persistent HTTP? 2. With persistent HTTP?

20 11

The minimum size of a TCP header is ____ bytes. The maximum size of a TCP header is ____ bytes.

20 bytes minimum, maximum is 60 bytes

HTTP Response Codes

200 : OK 301 : Moved permanently : requested object moved 400 : Bad request : req not understood by server 404 : Not found 505 : HTTP version not supported

Given the attached image, and:h Host A converts analog to digital at a = 49 Kbps Link transmission rate R = 5 Mbps Host A groups data into packets of length L = 111 bytes Distance to travel d = 755.5 km Propagation speed s = 2.5 x 108 m/s Host A sends each packet to Host B as soon as it gathers a whole packet. Host B converts back from digital to analog as soon as it receives a whole packet. How much time elapses from when the first bit starts to be created until the conversion back to analog begins? Give answer in milliseconds (ms) to two decimal places, normal rounding, without units (e.g. 1.5623 ms would be entered as "1.56" without the quotes)

21.32

The reserved port for SSH is port __

22

A client in a network with a proxy server requests a 6 MiB file from an internet server, fakeservername.com. The network's proxy server has a 2.16 Mbps connection to fakeservername.com. The average response time between the network's proxy server and the internet origin server (including RTT) is 4.9 seconds for a small "header-only" HTTP request/response. The file requested by the client is currently in the proxy server cache, but the proxy server relays the client's request to the internet server with "if-modified since". Assume that transmissions between the proxy and the origin servers are stream (not packets) at full bandwidth, with negligible propagation delay. How much time is saved if the file has not been modified? (Give answer in seconds, without units, rounded to two decimal places, so for an answer of 1.4233 seconds you would enter "1.42" without the quotes.)

23.3

How many bytes of data are in the "application data" section of a TCP segment with a total length of 2400 bytes and a header length of 8?

2380 2368

The dotted-decimal form of 32-bit internet addresses is composed of 4 decimal numbers, separated by periods. What is range of possible values for each of the four decimal numbers? 0 to _____

255

Convert the following units. Your answer should be a whole number with no text in the answer field: 26.42 Mbps = _____ Kbps

26,420

Given the attached image, and:h Host A converts analog to digital at a = 45 Kbps Link transmission rate R = 3.1 Mbps Host A groups data into packets of length L = 124 bytes Distance to travel d = 957.9 km Propagation speed s = 2.5 x 108 m/s Host A sends each packet to Host B as soon as it gathers a whole packet. Host B converts back from digital to analog as soon as it receives a whole packet. How much time elapses from when the first bit starts to be created until the conversion back to analog begins? Give answer in milliseconds (ms) to two decimal places, normal rounding, without units (e.g. 1.5623 ms would be entered as "1.56" without the quotes)

26.2 ms

Convert the following units. Your answer should be a whole number with no text in the answer field: 26 MiB = _____ bytes

27,262,976

Given the attached image, and:h Host A converts analog to digital at a = 40 Kbps Link transmission rate R = 2.2 Mbps Host A groups data into packets of length L = 115 bytes Distance to travel d = 905.9 km Propagation speed s = 2.5 x 108 m/s Host A sends each packet to Host B as soon as it gathers a whole packet. Host B converts back from digital to analog as soon as it receives a whole packet. How much time elapses from when the first bit starts to be created until the conversion back to analog begins? Give answer in milliseconds (ms) to two decimal places, normal rounding, without units (e.g. 1.5623 ms would be entered as "1.56" without the quotes)

27.04

Convert the following units. Your answer should be a whole number with no text in the answer field: 3 MiB = _____ bytes

3,145,728

If a TCP sender sends packets with sequence numbers 100, 200, and 300, and has several more packets (all of 100 bytes) waiting in the sending buffer, and two ACKs are received back, with ACK numbers 200 and 300, what is the next step for the sender?

300

Convert the following units. Your answer should be a whole number with no text in the answer field: 33.35 Mbps = _____ bits per second

33,350,000 bits

The sequence number of a TCP segment is 768. This segment has a total length of 1400 bytes and a header length of 10 (10 32-bit words). The next segment has the same total length and header length. What is the sequence number of the segment immediately following these two? Assume that the first segment from earlier is received with errors. The second segment is received ok. What is the ACK number for the second segment from earlier?

3488 768

The sequence number of a TCP segment is 768. This segment has a payload data size of 1380 bytes. The next segment also has a payload of 1380 bytes. What is the sequence number of the segment immediately following these two? Assume both segments from earlier are sent and received with no errors. What is the ACK number sent back to the sender in response to the second segment?

3528 3528

Convert the following units. Your answer should be a whole number with no text in the answer field: 47 B = _____ bits

376

If a TCP sender sends packets with sequence numbers 100, 200, and 300, and has several more packets (all of 100 bytes) waiting in the sending buffer, and only one ACK is received, with ACK number 400, the sender should send a packet with sequence number ________,

400

Suppose there are 3 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total end-to-end delay for a packet originating from Host A with destination Host B, under the following conditions. Each of the link transmission rates are 2.1 Mbps The total distance from Host A to Host B along its path of transmisison is 130.4 km The speed of propagation through the transmission medium is is 2.5 x 108 m/s The packet size is 3 KiB Remember that you must also uplink from Host A to the first router. Give answer in milliseconds, rounded to 1 decimal place, without units (e.g. for 0.12345 seconds you would enter "123.5" without the quotes).

47.3

A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 5.6 ms, including the RTT. The browser then sends the request for the website's index file. The index file references 10 additional images, which are to be requested/downloaded by the client's browser. Assuming all other conditions are equal, how much longer would non-persistent HTTP take than persistent HTTP? (Give answer in milliseconds, without units, rounded to one decimal place. For an answer of 0.01005 seconds, you would enter "10.1" without the quotes.)

56

What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the following properties: Two users each using 92% of their bandwidth share Two users each using 43% of their bandwidth share One user using 13% of their bandwidth share Give answer in percent, with one decimal place (normal rounding) and no percentage sign (e.g. for 49.15% you would enter "49.2" without the quotes).

56.6

A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 2.6 ms, including the RTT. The browser then sends the request for the website's index file. The index file references 22 additional images, which are to be requested/downloaded by the client's browser. Assuming all other conditions are equal, how much longer would non-persistent HTTP take than persistent HTTP? (Give answer in milliseconds, without units, rounded to one decimal place. For an answer of 0.01005 seconds, you would enter "10.1" without the quotes.)

57.2

How long does it take to send a 7 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmission rate = 81.8 Gbps. Network is FDM, with 12 permitted users, each with an equal bandwidth share. A link connection requires a setup time of 50.2 ms. Your answer should be in miliseconds (ms) with one decimal place, and without the unit (e.g. "140.6" without the quotes)

58.8

A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 2 sec, including the RTT. The browser then sends the request for the website's index file. The index file references 2additional images, which are to be requested/downloaded by the client's browser. How many requests (including the initial request) must be sent by the browser... With non-persistent HTTP? __ requests With persistent HTTP? __ requests

6 4

What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the following properties: Three users each using 97% of their bandwidth share Two users each using 8% of their bandwidth share Give answer in percent, with one decimal place (normal rounding) and no percentage sign (e.g. for 49.15% you would enter "49.2" without the quotes).

61.4

What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the following properties: Three users each using 98% of their bandwidth share Two users each using 7% of their bandwidth share Give answer in percent, with one decimal place (normal rounding) and no percentage sign (e.g. for 49.15% you would enter "49.2" without the quotes).

61.6

Theoretically, the maximum number of bytes that can be carried in the "application data" section of a UDP segment is

65,527

Given a link with a maximum transmission rate of 87.9 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0 seconds. Computer X sends fileX (19 MiB) and computer Y sends fileY (340 KiB), both starting at time t = 0. Statistical multiplexing is used, with details as follows: -Packet Payload Size = 1000 Bytes -Packet Header Size = 24 Bytes (overhead) -Ignore Processing and Queueing delays -Assume partial packets (packets consisting of less than 1000 Bytes of data) are padded so that they are the same size as full packets. -Assume continuous alternating-packet transmission. -Computer X gets the transmission medium first. At what time (t = ?) would FileY finish transmitting? Give answer in milliseconds, without units, and round to one decimal places (e.g. for an answer of 0.013777 seconds you would enter "13.8" without the quotes)

65.1

How long does it take to send a 8 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmission rate = 86.7 Gbps. Network is FDM, with 9 permitted users, each with an equal bandwidth share. A link connection requires a setup time of 60.9 ms. Your answer should be in miliseconds (ms) with one decimal place, and without the unit (e.g. "140.6" without the quotes)

67.9

Convert the following units. Your answer should be a whole number with no text in the answer field: 87 B = _____ bits

696

Convert the following units. Your answer should be a whole number with no text in the answer field: 903 B = _____ bits

7224

What is the minimum UDP header size?

8 bytes

The reserved port for HTTP is port __

80

Convert the following units. Your answer should be a whole number with no text in the answer field: 89.28 Kbps = _____ bits per second

89,280

HostA has established a TCP connection with HostB in a remote network. HostA is sending packets to HostB. Assume we have configured TCP, somehow, to ACK every segment (no ACKing every other segment). Assume that the timeout is the same for all packets. HostB's "window size" is 20000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #1,448. HostA now sends segments of the same application data stream in order: P: 147 bytes Q: 197 bytes R: 313 bytes Suppose that packet P is lost, but packets Q and R are received. What is the acknowledgement number in the ACK for packet R.

= 1,448 + 1 = 1,449

FTP opens an extra connection for a file transfer because:

A control connection can be dedicated and maintained.

HostA has established a TCP connection with HostB in a remote network. HostA is sending packets to HostB. Assume we have configured TCP, somehow, to ACK every segment (no ACKing every other segment). Assume that the timeout is the same for all packets. HostB's "window size" is 20000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #3,408. HostA now sends segments of the same application data stream in order: P: 307 bytes Q: 287 bytes R: 265 bytes Suppose that segments P, Q, and R are received, but the acknowledgements for segments P and Q are lost. If there are more segments waiting to be transmitted, what is the sequence number of the next segment transmitted after the ACK for segment R is received?

ACK for next segment transmitted after ACK for R is received: = 3,408 + 307 + 287 + 265 + 1 = 4,268

ACK

ACK's are cumulative. The ACK # is always the next expected byte number. This implies that all previous bytes have been accounted for. If ACK received: • Check to see if ACK includes previously unACK'ed segments - update what is known to be ACK'ed - restart timer if there are outstanding segments

A network that allows a host to connect to the internet is called an __________ network.

Access

A simple checksum can detect all 2-bit errors.

False

Which of the following is NOT a characteristic of "packet sniffing"?

An attacker can "catch-and-kill" the packet, preventing the destination from receiving it

In the Internet protocol stack, the _________- is responsible for assembling user data to be sent.

Application Layer

In the Internet protocol stack, the ___________ is responsible for finding the destination IP address.

Application Layer

Why does the internet require a layered model?

Dealing with complex systems, explicit structure, and modularization. The layered model allows us to have plug in modules that are designed to solve specific problems at different system levels - Modularization eases maintenance and updating of complex system

How can sender know that an error has occurred?

Bit flipped Missing packet Out-of sequence

Error detection in UDP

Can tell if the received data was corrupted during the transfer process. UDP includes length of bytes and segment and header, and ones complement checksum of the entire segment contents

Server X is running Diablo II services on port #4000. Client A is running an application that uses port #450 to request an Diablo IITCP connection to Server X. Client B is running an application that uses port #455 to request an Diablo II TCP connection to Server X. IP addresses: Server X: 152.111.20.36 Client A: 113.13.131.10 Client B: 114.192.111.23 The connection created for Client B is identified by the sockets at the endpoints as follows:

Client b: - IP address: 152.111.20.36 - Port num: 4000 On server X: - IP address: 114.192.111.23 - Port num: 455

In a _______ acknowledgement scheme, a received ACK indicates all segments prior to the ACK'd segment were received.

Cumulative

Which of the following states does the FTP protocol maintain?

Current Directory Earlier Authentication Limit on Concurrent Connections

If a botnet or another large group of hosts is used to execute this attack it is called a _________ attack

DDos

An attack which attempts to make network resources unavailable to legitimate users by flooding a system with illegitimate traffic is called a _________________ attack.

Denial of Service

For de-multiplexing, how is a UDP socket identified?

Destination IP Address Destination Port Number

For de-multiplexing, how is a TCP socket identified?

Destination IP Address Source IP Address Destination Port Number Source Port Number

DNS

Each name consists of a sequence of alphanumeric components separated by periods e.g. www.oregonstate.edu Names are hierarchical, with most significant component on the right -Top-Level Domain (TLD) -Second from right is the domain name within the TLD - Approved by a global authority - uses UDP - DNS domains are logical concepts and need not correspond to physical location of organizations (E.G., chinatoday.com is hosted partly in Beijing, partly in San Francisco)

A connection-oriented protocol in a packet-switched network guarantees a dedicated line - similar to how a circuit-switched network works.

False

What is an application that does NOT have stringent bandwidth requirements?

Email

When a packet is passed down to the next lower layer, it is _____________ into the lower-layer packet.

Encapsulated

Which of the following are application-layer protocols? File Transfer Protocol (FTP) Domain Name Service (DNS) Post Office Protocol v3 (POP3) Internet Protocol (IP) Transmission Control Protocol (TCP) Telnet Secure Shell (SSH) User Datagram Protocol (UDP)

FTP, DNS, POP3, Telnet, Secure shell (SSH)

Which of the following are application-layer protocols?

FTP, DNS, Telnet, Post office protocol v3 (POP3), Secure shell (SSH)

Sending email requires a "pull" protocol to send messages to the recipient's mail service on demand. Receiving mail requires a "push" protocol for the mail service provider to push email into the recipient's inbox.

False, it's the opposite

What is the purpose of fast retransmit? How is it implemented?

Fast retransmit was originated to streamline the process of retransmissions, to increase utilization. If a TCP sender sees three duplicate ACKs (so four ACKs total) for the same segment, it assumes the segment was dropped, and retransmits, even if the countdown timer hasn't expired.

What is an application that does NOT have stringent timing requirements?

File transfer

What transport-layer services are provided by the base TCP protocol? (Check all that apply) Flow control Message security Jitter minimization Connection-oriented service Minimum bandwidth Reliable data transmission Congestion control

Flow control Connection-oriented service Reliable data transmission Congestion control

Fiber optic cable uses wave-length division multiplexing

Frequency division multiplexing can be applied to optical transmission Informally known as color division multiplexing. Receiver separates frequencies using a prism

The ______ application-layer protocol utilizes the TCPtransport-layer protocol.

HTTP

What are some application-layer protocols, and what are they used for?

HTTP Used often for communication of hosted information on the internet (web pages) FTP Used often for transfer of files without a web interface (uploading, etc) SMTP/IMAP/POP3 - Email protocols DNS - Domain name resolution (from www.google.com to 173.194.33.176, etc) SCCP - used in VoIP etc..

Local Area Network (LAN)

Home network can be viewed as LAN but this term usually refers to institutional networks with multiple users , web servers, mail servers

Consider the following: http://www.oregon.gov/SiteCollectionImages/branding/portal/bigfoot.pn

Host name : www.oregon.gov path name: /SiteCollectionImages/branding/portal/bigfoot.png the url is : http://www.oregon.gov/SiteCollectionImages/branding/portal/bigfoot.png The TLD is: GOV

Consider the following: http://www.google.com/images/nav_logo195.png

Host name: www.google.com path name: /images/nav_logo195.png the url is: http://www.google.com/images/nav_logo195.png the tld is : COM

The network layer manages communications from __________.

Host to host

IP addresses

IANA assigns IP network addresses to service providers to be managed hierarchically All applications use IP addresses through the TCP/IP protocol software Domain Name System (DNS) provides translation between symbolic names and IP addresses

How are OSI and ISO related to each other?

ISO is a multinational dedicated to the agreement of standards worldwide and the OSI is the model which purpose is to show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software."

If a TCP sender sends packets with sequence numbers 100, 200, and 300, and has several more packets (all of 100 bytes) waiting in the sending buffer, and no ACKs are received back, what is the next step for a TCP sender, the sender should send a packet with sequence number ________,?

If countdown timer expires, re-send packet with sequence number 100.

What about RDT is indicated by the two-generals problem?

If there is any possibility of error in the communications channel, it is impossible to guarantee 100% reliable data transfer.

Match the event with the TCP receiver action: Arrival of in-order segment with expected sequence number. One other in-order segment waiting for ACK transmission.

Immediately send single cumulative ACK, ACKing both in-order segments.

Fill in the blanks

In an internet name, what is the highest-priority component? The Top-Level Domain ex: .com, .org, .edu The second-highest priority component? The domain name. ex: oregonstate What are subsequently prioritized components used for? internal host names ex: engr.oregonstate.edu

hybrid

In this model, a central server will exchange connection info with its clients, and then the clients make contact directly with each other. Examples include Skype video conferencing.

Access networks are managed by ____

Internet Service Providers (ISP) Connection to ISP edge routers via telephone lines, cable, cooper coaxial, fiber Wireless (stationary and mobile)

Connection-oriented services TCP - transmission control protocol

Internet's connection-oriented service handshake: prepare for transfer reliable, in-order, byte-stream data transfer flow control: sender won't overwhelm receiver congestion control: senders "slow down sending rate" when network is congested

Connectionless service UDP Service - User Data Protocol

Internet's connectionless service - NO handshake - Unreliable data transfer (fire and forget) - (best effort) data transfer - If a packet is lost, it's lost - No flow control - No congestion control Applications that use UDP must be able to handle missing data. In this case, it's like video streaming services

Traceroute

List of all routers on the computed path from A to B is called the route from A to B traceroute uses UDP with TTL field set and sends to a very unlikely port Finds route via expanding ring search: • when ICMP message arrives, source keeps copy of message • UDP segment eventually arrives at destination host • destination returns ICMP "port unreachable" message (3, 3)

What devices reside on the network edge?Laptops Tablets Printers Smart TVs Desktop Computers Routers Switches

Laptops Tablets Printers Smart TVs Desktop Computers

Please place the following in the order of the OSI layering model.

Layer 1 : Physical layer Layer 2 : Link/Data-link Layer 3: network layer layer 4: transport layer layer 5 : session layer layer 6: presentation layer layer 7: application layer

What are the seven layers in the Open Systems Interconnection (OSI)?

Layer 1 : Physical layer Layer 2 : Link/Data-link Layer 3: network layer layer 4: transport layer layer 5 : session layer layer 6: presentation layer layer 7: application layer

Internet protocol stack

Layer 1: Physical Layer carries actual signals between devices through the physical media ex: cable, wireless, Layer 2: Link layer data transfer between neighboring network elements (node to node transfer) ex: PPP, Ethernet Layer 3: Network layer routing of datagrams from source to destination through the core of the internet ex: IP, routing protocols Layer 4: Transport layer process-process data transfer ex: TCP (reliable data stream), UDP (fast but less reliable) Layer 5: Application layer supporting network applications ex: FTP (File transfer protocol), SMTP (simple mail transfer protocol), HTTP

Modems connect end systems to edge routers via access network media

Legacy, cable, and wireless

What is the minimum necessary information for identifying a process on a remote host?

Local host IP address & Port Number plus Remote host IP address & Port Number

Multimedia in email

MIME allows SMTP to handle foreign characters and images, additional lines in message header declare MIME type

Multiplexing with physical media means

Merging multiple communication streams onto the same medium

ICMP message format

Message format depends on type • Type 8-bit [0 .. 40] (41 .. 255 reserved) • Code 8-bit (sub-type) Checksum • Same as UDP Other information (32-bit units) •Router addresses, etc. Original IP Header + first 8 bytes of data • Original IP header is at least 20 bytes. • Datagram data is used by host to match message to appropriate process.

Persistent HTTP

Multiple objects can be sent over single TCP connection between client and server. - server leaves connection open after sending response - subsequent HTTP messages between same client/server sent over open connection - client sends requests as soon as it encounters a referenced object - as little as one RTT for all the referenced objects

UDP, in order delivery? full duplex service? in order delivery? pipelining? Flow Control? (Yes / No) Congestion Control? (Yes / No) Bandwidth Guarantee? (Yes / No) Reliable Delivery(mostly)? (Yes / No) Jitter Threshold? (Yes / No)

No - Packets may be delivered out of order No - One way service No - Packets may be delivered out of order No pipeline, BUT it is fire and forget (so you can transmit all you want) No - Sender may overwhelm receiver No - Ignores possibility of congestion in the internet. No - no bandwidth guarantees. No - "Fire and Forget" service ("Send it, and, FORGET IT!") No - no jitter threshold.

What transport-layer services are provided by the base UDP protocol? (Check all that apply) Jitter minimization Message security None of these services are provided by UDP Connection-oriented service Congestion control Flow control Minimum bandwidth

None of these services are provided by UDP

What transport-layer services are provided by the base UDP protocol? (Check all that apply) Message security Minimum bandwidth Connection-oriented service Jitter minimization Congestion control None of these services are provided by UDP Flow control

None of these services are provided by UDP

Web page consists of a base HTML-file which includes several referenced objects

Object can be HTML file, JPEG image, etc

Server X is running enigma services on port #2100. Client A is running an application that uses port #437 to request an enigma TCP connection to server X. Client B is running an application that uses port #1296 to request an enigma TCP connection to server X. Use this information to answer the few questions below IP addresses: Server X: 201.64.107.12 Client A: 128.193.51.213 Client B: 128.193.35.127 On Client A: Source IP address and port .On Server X: Destination IP address and port .On Server X: Source IP address and port . 2. Is it OK for Client B to start a second application (running at the same time as the first application) that uses port #213 to request an enigma TCP connection to server X? (True/False) 3. Is it OK for Client A to start a third application (running at the same time as the first and second applications) that uses port #213 to request an enigma TCP connection to server X? (True/False)

On Client A: - Destination IP address and port: 201.64.107.12, 2100 Source IP address and port: - 128.193.51.213, 437 On Server X: Destination IP address and port: 128.193.51.213, 437 Source IP address and port: 201.64.107.12, 2100 2) True 3) False

Server X is running Diablo II services on port #4000. Client A is running an application that uses port #450 to request an Diablo II TCP connection to Server X. Client B is running an application that uses port #455 to request an Diablo II TCP connection to Server X. IP addresses: Server X: 152.111.20.36 Client A: 113.13.131.10 Client B: 114.192.111.23 Client B starts a second application (running at the same time as the first application) that uses the next incremental port number to request an Diablo II TCP connection to Server X. The connection created for Client B is identified by the sockets at the endpoints as follows:

On client b: ip address: 152.111.20.36 port number: 4000 On server X: ip address: 114.192.111.23 port number: 456 (increment by 1)

Server X is running XBox Live services on port #3072. Client A is running an application that uses port #1796 to request an XBox Live TCP connection to Server X. Client B is running an application that uses port #2076 to request an XBox Live TCP connection to Server X. IP addresses: Server X: 201.164.10.123 Client A: 128.193.11.113 Client B: 128.193.45.227 Client B starts a second application (running at the same time as the first application) that uses the next incremental port number to request an XBox Live TCP connection to Server X. The connection created for Client B is identified by the sockets at the endpoints as follows:

On client b: ip address: 201.164.10.123 port number: 3072 On server X: ip address: 128.193.45.227 port number: 2077 (increment by 1)

Connection-oriented demultiplexing

One-to-one relationship between the two end-systems. Incoming segments are directed to just one socket based on these values: source iP address, source port number, destination ip address, destination port number - Server host may support many simultaneous TCP sockets. - Web servers have different sockets for each connecting client. > non-persistent HTTP will have different socket for each request

What are characteristics of TDM?

Only one user may transmit at a time

What are some common usages of ICMP?

PING requests use ICMP messages with echo requested. Traceroute (tracert) uses a series of ICMP messages, each with an incrementing TTL, to trace the path from source to destination. Destination Network Unreachable is extremely common if your internet goes down somewhere. Destination Port Unreachable is common if a web server goes down. Internet Core Routing Algorithms use ICMP to establish paths and active router listings.

What is NOT a characteristic of client-server architecture? -The client initiates communication with a server by sending a request. -All data flows through the server. -A server is always on and waiting for requests. -Peers can connect to each other once initial server contact is made.

Peers can connect to each other once initial server contact is made.

If an HTTP server can send 14 objects over a single TCP connection, this is an example of _______ HTTP.

Persistent

We call a program that is running on a host a _______________

Process

Sockets and connections

Process sends/receives messages to/from its socket. A connection is a socket pair (4-tuple consisting of the client IP address, client port number, server IP address and server port number) that identifies two endpoints.

The transport layer manages communications from __________.

Process to process

Time spent in transit between nodes in a network is called ___________________.

Propagation Delay

What is an application that does NOT have stringent security requirements?

Public records

Application layer protocols

Public-domain protocols: defined in RFCso allow for interoperability e.g., HTTP, SMTP, etc. Proprietary protocols: defined by the application e.g., Skypeo e.g., the app you will create for Project #1

The IMAP e-mail protocol is called a ___protocol.

Pull

The SMTP e-mail protocol is called a ____ protocol.

Push

Time spent waiting for the transmission medium to become available is called ____________.

Queueing Delay

What are some examples of unguided media?

Radar Broadcast wireless Bat sonar Human speech

Throughput

Rate(bits/sec) at which bits are actually being transferred between sender/receiver - instantaneous: rate at given point in time - average: rate over longer period of time

TCP Fast transmit

Receipt of duplicate ACKs indicate loss of segments - Sender usually pipelines segments - If segment is lost, there will likely be many duplicate ACKs. fast retransmit: - resend segment before timer expires - better performance

What are the key points of a Selective Repeat retransmission scheme?

Selective repeat retransmission will keep a countdown timer for each un-ACK'd segment. When the protocol calls for a retransmission, it will only re-transmit un-ACK'd segments individually, rather than a bulk dump of all un-ACK'd segments.

TCP acknowledgement numbers

Receiver acknowledges all correct segments received. - Error segments are not acknowledged at all "acknowledgement number" field contains the number of the next byte expected

The minimum necessary information for identifying a process on a remote host would be (check all that apply):

Remote host IP Remote port number

What is the minimum necessary information for identifying a process on a remote host?

Remote host IP address & Port Number

What devices reside in the network core?

Routers Switches

Two key functions of packet-switching

Routing: determines source-destination route taken by packets Forwarding: move packets from router's input to appropriate router output

push/pull protocol

SMTP is a Push protocol IMAP is a Pull protocol POP3 is a Pull protocol.

TCP sequence numbers

Segments are sent as a stream of bytes: - Not separated into records, data types, etc. - Protocol keeps count of data bytes sent + For each segment, protocol puts byte stream number of first byte in segment's data into "sequence number" field Sender keeps a copy of each segment until acknowledged by receiver (for possible retransmission) Sender's segment also has "acknowledgement number" - TCP is full-duplex. Data can flow in both directions simultaneously - Typical (nothing to ACK) segment has a bogus number in the "acknowledgement number" field

sender protocol and receiver protocol

Sender protocol: - accepts messages from application socket - breaks messages into data blocks - encapsulates blocks/ports into segments - passes segments/addresses to network layer Receiver protocol: - accepts segments from network layer - re-assembles data blocks into messages - passes messages to sockets at application layer

TCP retransmission

Sender sets a count-down timer for each segment sent - If timer expires before ACK received... re-send - If segment error, ACK will never arrive Receiver can detect and discard duplicates - If ACK is delayed (Arrives after re-send) - If ACK is lost

HostA has established a TCP connection with HostB in a remote network. HostA is sending segments to HostB. Assume we have configured TCP, somehow, to ACK every segment (no ACKing every other segment). Assume that the timeout is the same for all packets. HostB's "window size" is 20000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #1,059. HostA now sends segments of the same application data stream in order: P: 284 bytes Q: 255 bytes R: 125 bytes What is the sequence number on segment R?

Seq num for R: = 1,059 + Segment P + Segment Q +1 = 1,059 + 284 + 255 + 1 = 1,599

HostA has established a TCP connection with HostB in a remote network. HostA is sending packets to HostB. Assume we have configured TCP, somehow, to ACK every segment (no ACKing every other segment). Assume that the timeout is the same for all packets. HostB's "window size" is 20000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #4,874. HostA now sends segments of the same application data stream in order: P: 190 bytes Q: 127 bytes R: 440 bytes What is the sequence number on segment Q?

Sequence number on segment Q : = 4,874 + (sequence P) + 1 = 4,874 + 190 + 1 = 5,065

What is the first step for the use of cookies in the HTTP request/response procedure?

Server responds to the initial client request, and includes in this response a request to use cookies.

What aspects of RDT does the UDP protocol implement?

Simple error detection.

What is another name for a host IP address and port number?

Socket/endpoint

Path MTU discovery

Source can determine path MTU - smallest MTU on path from source to destination

Functions of packet-switching networks

Source host (edge) : Packet construction - encode/package data at source Routers(core): packet transmission - send packet from source to destination Destination(edge): Packet interpretation - unpack/decode data from packet at destination - acknowledgement receipt

How layering works

Starting at the Source, data is passed down through the layers until it reaches the physical layer and is transmitted to the next node in the network. Each layer appends a header to the data, may perform other tasks, and then passes the data along.

If I want to be fair about my usage of internet resources, I would use the ___ protocol.

TCP

If I want to be reasonably sure the recipient received my transmitted information, I would use the ____ protocol.

TCP

In the internet, an application-level protocol implemeting email service would most likely utilize ___ as its transport-layer protocol.

TCP

In the internet, an application-level protocol implemeting email service would most likely utilize ______ as its transport-layer protocol.

TCP

In the internet, an application-level protocol implemeting web browsing would most likely utilize ____- as its transport-layer protocol.

TCP

The FTP application-layer protocol utilizes the ____ transport-layer protocol.

TCP

The SMTP application-layer protocol utilizes the _____ transport-layer protocol.

TCP

HTTP uses the ___ transfer-layer protocol at port __

TCP, 80

What is the key point of a cumulative acknowledgement scheme?

The ACK you receive is for the next expected byte number. This means that an ACK for byte #N means that all bytes (N-1, N-2, ... 1) have already been received.

What is the Domain Name System (DNS) application-layer protocol used for and what transport-layer protocol does it make use of?

The DNS protocol uses UDP, and is used to resolve human-friendly word-based web addresses into Network-layer IP addresses and alias web and mail servers.

How is an ICMP message carried?

The ICMP message is in the payload of the IP datagram. The format of the information in the payload depends on the type of ICMP message being sent.

What is reliable data transfer?

The ability to guarantee that a transmitted message was received, and it was received as it was sent (without errors).

Which of the following best describes reliable data transfer in the internet (using networking terminology)?

The ability to send and receive information that you are reasonably sure is what was sent, without losing any information.

What is the purpose of the TCP countdown timer?

The countdown timer is used in RDT to help determine if a packet has dropped. TCP will retransmit a packet, and restart the timer, upon a timer interrupt.

If an IPv4 datagram had to traverse 15 routers to reach its destination host, and I set the IPv4 header TTL field to 10, what would happen?

The datagram would be dropped by the 10th router in the path, and that router would send an ICMP Type 11 (Time Exceeded), Code 0 (TTL expired in transit) message back to the sending host.

A client-side piece of data which is used to keep track of transactions between a client and server is called a cookie.

True

Constraints

The software for each layer depends only on the services of the software provided by neighboring layers (well-defined interfaces) The software at layer n at the destination receives exactly the same protocol message sent by layer n at the sender (consistency) - These constraints mean that protocols within a protocol stack can be: tested independently and modified/replaced independently

____________________ is the rate at which bits are actually transferred between sender/receiver.

Throughput

definition of Transmission delay

Time spent being placed on the transmission medium limited by the transmission protocol

Definition of processing delay

Time spent processing header information. Checking bit errors and deciding outport link.

definition of Propagation delay

Time spent traveling on the physical medium

definition of Queueing delay

Time waiting for the transmission medium

Identifier

To receive messages, process must have an identifier. How to identify a process? have an identifier that consists of IP address and port number (called a socket/endpoint)

Time spent being placed on the transmission medium is called _____________________.

Transmission Delay

In the Internet protocol stack, the ____________ is responsible for process-to-process communication.

Transport Layer

If I were going to implement a lossy VoIP connection, I would use the ____ protocol.

UDP

In the internet, an application-level protocol implemeting live-streaming video would most likely utilize _________ as its transport-layer protocol.

UDP

Connectionless demultiplexing

UDP socket identified by destination (iP address, port number) When host receives UDP segment: check destination port number and directs UDP segment to socket with that port number.

In the HTTP protocol, an object is addressable by its ____

URL

Each object is addressable by a ..

Uniform Resource Locator (URL)

Communication via guided media is complex enough by itself, but communication via unguided (wireless) media is even more complicated. What are some additional difficulties of wireless networking?

Wireless signals are more vulnerable to interference and noise. Wireless signals may be blocked, especially by metal. Wireless signals attenuate with distance. Wireless signals may reflect and interfere with other wireless signals. Wireless signals may reflect and interfere with other wireless signals.

A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called _______________

a packet sniffer

TCP, full duplex service?

Yes, for example Telnet, which echoes back every character.

TCP, connection oriented?

Yes, implemented by a 3-way handshake at start of connection.

TCP, in order delivery? pipeling? Flow Control? (Yes / No) Congestion Control? (Yes / No) Bandwidth Guarantee? (Yes / No) Reliable Delivery(mostly)? (Yes / No) Jitter Threshold? (Yes / No)

Yes, via sequence numbers in tcp header information Yes, though pipeline is limited by congestion and flow control Yes, receiver advertises a window size, and sender limits output accordingly. Yes, implemented by restricting pipeline size based on receipt of acknowledgements (or lack thereof) No bandwidth guarantees. Yes - Acknowledgement for delivery of packets No - no jitter threshold.

Botnet

a group of virus-infected computers acting in concert to achieve some nefarious task. - used for spam, distributed denial of service (DDos) attacks

Layering

each layers implements a service - via its own internal-layer actions - relying on services provided by layer above/below

HostA has established a TCP connection with HostB in a remote network. HostA is sending packets to HostB. Assume we have configured TCP, somehow, to ACK every segment (no ACKing every other segment). Assume that the timeout is the same for all packets. HostB's "window size" is 20000 bytes. HostB has already received and acknowledged everything sent by HostA's application up to and including byte #2,475. HostA now sends segments of the same application data stream in order: P: 116 bytes Q: 225 bytes R: 179 bytes Suppose the segments arrive at Host B in the order Q, P, and R. What is the acknowledgment number on the segment sent in response to segment Q?

acknowledgement number sent in response to Q: = 2,475 + 1 = 2,476

protocol

allows entities to talk to one another in a defined manner.

The payload (non-header portion) of a transport-layer segment is the data from the ______________ layer.

application

At the transport layer, what is the payload?

application data

Sockets

are a "door" to the services provided by the transport layer. Sockets are created by and associated with an application process running on the host. Two socket types for two transport services: - UDP : the unreliable datagram - TCP : the reliable byte stream

Cookies

are bits of client state that are shared with the originating server, and possibly with 3rd-party websites. They enable things like shopping carts and directed advertising. Four components of cookies: 1. cookie header line of HTTP response message 2. cookie header line in HTTP request message 3. cookie file kept on user's host, managed by user's browser 4. back-end database at Web site How cookies work: - when initial HTTP requests arrives at site, site creates : unique ID and entry in backend database for ID

DoS

attackers make resources (server, bandwidth) unavailable to legitimate traffic byoverwhelming resource with bogus traffic

What cookies can provide:

authorization, shopping carts, recommendations, user session state (web e-mail) cookies permit sites to learn a lot about you, you may be giving your name and e-mail to sites malware/spyware cannot reside in cookies.

A ______________ is a group of computers all controlled for a common objective, possibly by an infection in the system, used cooperatively to process and/or send information in mass amounts (DDoS, distributed computing).

botnet

If your computer becomes infected, you may be enrolled in a ________ and used in _______ attack(s) against other hosts without your knowledge.

botnet(s), DDoS attack(s)

What units are used for transmission rate?

bps

What units are we using for network bandwidth?

bps

How reliable is reliable data transfer?

can take steps to make physical layer more reliable, but there will always be problem (congestion in core, etc). small steps: - Error detection - Acknowledgement - Sequencing - Timing (flow/congestion control) - Retransmission - Fairness

IP can detect a variety of errors including

checksum, TTL expires, no route to destination network. IP discards datagrams with certain types of problems. If an error occurs, IP will discard the datagram. Some errors can be reported using ICMP.

A ____________-switched network has a dedicated circuit through which information is sent, whereas a _____________-switched network sends information in "chunks" through a network on shared media

circuit, packet

A TDM-based network is a ______________ network

circuit-switched

client/server model

client host requests/receives service from a server that is "always on" e.g. web browser (client), web server, email client/server

Socket programming with TCP

client must contact server: server process must first be running, server must have created socket that welcomes client's contact - when contacted by client, server TCP creates new socket for server process to communicate with that particular client > allow server too talk with multiple clients > source port numbers used to distinguish clients

In a ___________ architecture, one host is always on, and other hosts may connect and be continually serviced by this first host.

client-server

In a _____________ architecture, one host is always on, and other hosts may connect and be continually serviced by this first host.

client-server

A _____________ has dedicated service provider

client-server model

physical media

communication links

A pair of sockets is called a __________

connection

TCP

connection-oriented: • handshake (exchange of control messages) initializes sender/receiver state before data exchange point-to-point: • one sender, one receiver • full duplex (bi-directional data flow in same connection) in-order byte steam: • cumulative byte count • acknowledgement of bytes received pipelined: • CP congestion and flow control • send & receive buffers flow controlled: • sender will not overwhelm receiver • MSS: maximum segment size

The network layer resides on/in the network ________.

core

Difference between HTTP 1 and HTTP 2

data and headers are separated in HTTP 2. This allows HTTP 2 connections to send headers and data in multiplexed/interleaved fashion

Lower layer services required by the application layer protocols

data integrity, timing, bandwidth and security

Packet switching

data sent through net in discrete "chunks" (packets) of media - 'virtual' connections and many machines accessing the network at the same time - The job of the network core, is to forward all of those packets through the network to the correct destination.

Circuit switching

dedicated circuit per call - With circuit switching, a physical connection, or circuit, is setup over some part of the network. - data is transferred between just two machines. In other words, all of the bandwidth is dedicated to two machines for a period of time. Then another set of machines will talk.

Application layer

defines types of messages exchanged (requests, response), messages syntax (what fields are included in messages), messages semantics (meaning of information in fields) how to talk to a remote host and what happens when the packages come in

Demultiplexing at receiving host

demultiplexed: separated apart segments are demultiplexed and delivered received segments to correct socket. How it works? - Host receives IP datagrams, each datagram has source IP address and destination IP address. - Has source, and destination port number Host then uses IP addresses and port numbers to direct segment to appropriate socket.

UDP checksum

detect "errors" (e.g., flipped/ lost bits) in transmitted segment sender: - start checksum = 0 - compute checksum : one's complement of sum of segment contents as 16 bit int receiver: -compute checksum of received segment - compare computed checksum to segment checksum field. if equal, no error detected. If not equal, error detected and discard packet.

DNS records

distributed database storing resource records (RR) type A : used to identify IP addresses type NS: host name of the authoritative name server of the domain type CNAME: real name of the server type MX: .. ttl : returns the num of seconds for objects to remain in cache

Statistical multiplexing in FDM

each host gets same bandwidth (continuously) - a limited number of hosts get exclusive use of one slot or one channel - if a host is idle, its bandwidth is wasted

Statistical multiplexing in TDM

each host gets same slot (periodically) - a limited number of hosts get exclusive use of one slot or one channel - if a host is idle, its bandwidth is wasted

Flow control is intended primarily to ..

keep a TCP sender from overwhelming a receiver's buffer.

Socket

logical connection between processes running on hosts, it is created by and associated with an application on the localhost. an application process uses a socket to send/ receive messages to/from another application process.

peer to peer model

minimal or no use of dedicated server we want to transfer data as quick as possible and not store them on our servers e.g. skype or bitTorrent

multiplexed

mixed together in a sending queue. sent out in the order they were received Multiplexing means to combine, or mix-together. De-multiplexing means to separate out again.

Multiplexing at sending hosts

multiple processes can be running at the same in host. gather all those data from multiple sockets, create segments and encapsulate segments with header multiplexed : mixed together

Merging multiple communication streams into the same media is called _________?

multiplexing

The internet core is a _______________ network

packet-switched

A __________________ model connects hosts to each other without the use of dedicated services

peer-to-peer

In a __________ architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion.

peer-to-peer

If an HTTP server can send 2 objects over a single TCP connection, this is an example of ______ HTTP.

persistent

A program running on a host is called a ______

process

The transport layer manages communications from _______ to ________

process to process

Processes communicate

process: a program running within a host - Processes inside a single host communicate using inter-process communication (managed by OS). - Processes communicate by exchanging messages (managed by protocols). Client process: process that initiates communication Server process: process that waits to be contacted

nodal delay

processing delay + queuing delay + transmission delay + propagation delay

The POP3 e-mail protocol is called a ___l protocol.

pull

Statistical multiplexing

refers to the way in which packet-switched networks share network resources - sequence of A & B does not have fixed pattern - Transmission medium is shared on demand (if a host is idle, its bandwidth is available to others)

TCP flow control - sliding window

sender won't overflow receiver's buffer by transmitting too much, too fast 1. sender transmits one segment 2. receiver specifies window size (specifies how many bytes in the data stream can be sent) 3. sender limits unACKed data to "receive window"

demultiplexed

separated out and recombined into the original byte stream

HTTP is stateless

server maintains no information about past client requests

KEEP-ALIVE in HTTP 1.0

specifies persistence (keep the connection open) since 1.1, all connections default to persistent

__________ is designed to act like a server, and can distribute data from an infected computer to a remote host upon request.

spyware

Radio link types

terrestrial microwave, LAN, wide-area, satellite with satellite, you can get signal out in the country where no other network is possible

End-to-end delay (nodal delay)

total time from initiating send from source to completed "receive" at destination

FTP (file transfer protocol)

transfer file to/from remote host TCP control connection port 21 TCP data connection port 20 After transferring one file, server closes TCP data connection. TCP control stays on. FTP server maintains "state": • current directory, earlier authentication • limit on concurrent connections

The __________ layer manages communications from process to process.

transport

The transport layer requires some network layer services

transport layer: logical communication between processes network layer: logical communication between hosts - packet addressing, route computation, packet forwarding

ICMP informational messages

triggered by request • Echo request/reply - Sent to ICMP software on any host/router - In response to a request, the ICMP software is required to send an ICMP echo reply message. • Address mask request/reply - Broadcast when a host boots- Router replies with the mask used in that subnet • Router path MTU discovery - Distributed path discovery

Guided media

twisted-pair cooper wire - rate depends on thickness and distaance - make up 99% of wired connections - may pick up intereference ("noise")

The transport layer

two types of connection: connection and connectionless connectionless UDP : fire and forget, best-effort, fastest way to send data connection TCP : Slower, reliable

The DNS application-layer protocol utilizes the ____ transport-layer protocol.

udp

__________ are designed to destroy files or cause a computer malfunction.

viruses

Malware

when your computer/device gets attacked, it's normally due to a software that gets installed somehow - virus: self-replicating infection by receiving/executing object, usually corrupt files on a host - worm: self-replicating infection that executes itself as it travels around a network (attacks the network core) -spyware: can record keystrokes, websites visited upload info to collection sites

IMAP

• Keep all messages in one place: the server • Allows user to organize messages in folders • IMAP keeps user state across sessions

Three mail access protocols

• POP: Post Office Protocol [RFC 1939] authorization (agent <-->server) and download • IMAP: Internet Mail Access Protocol [RFC 1730] manipulation of stored messages on server, more complex • HTTP: gmail, Hotmail, Yahoo! Mail, etc.

Sequence vs ACK#

• Sequence# is the number (in the data stream) of the first byte of the sent segment • ACK# is the number of the next byte expected by the receiver.

Applications that use UDP

• streaming media • Teleconferencing • DNS (Domain Name Service) • Internet telephony


Set pelajaran terkait

1.3 Culture EAQ, Culture adaptive quiz, Adaptive quiz: professional identity, 38 Case Study, section 2 1st semester

View Set

Chapter Quiz EXAM FX (Completing the applications, Underwriting, and Delivering the policy.

View Set

OCR A Level Biology: Cellular Control

View Set