SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
ECET 465 Week 1 Homework (Chapters 1 and 5)
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
Homework (Chapters 1 and 5) ECET 465 Week 1
------------------------------------------
ECET 465 Week 1 iLab
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
Scenario/Summary:
One’s understanding of network protocols can often be greatly deepened
by “seeing protocols in action” and by “playing around with protocols” –
observing the sequence of messages exchanged between two protocol
entities, delving down into the details of protocol operation, and causing
protocols to perform certain actions and then observing these actions and
their consequences. You’ll be running various network applications in
different scenarios using a computer on your desk, at home, or in a lab.
You’ll observe the network protocols in your computer “in action,”
interacting and exchanging messages with protocol entities executing
elsewhere in the Internet. Thus, you and your computer will be an
integral part of these “live” labs. You’ll observe, and you’ll learn, by
doing.
This can be done in simulated scenarios or in a “real” network
environment such as the Internet. The Java applets that accompany your
text take the first approach. In these Wireshark labs, we’ll take the latter
approach.
------------------------------------------
ECET 465 Week 2 Homework (Chapters 4 and 5)
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
ECET 465 Homework week2
Chapter 4 Review Questions
P2. Consider a virtual circuit network. Suppose the VC number is an 8-
bit field.
What is the maximum number of virtual circuits that can be carried over
a link?
Suppose a central node determines paths and VC numbers at connection
setup. Suppose the same VC number is used on each link along the VC’s
path. Describe how the central node might determine the VC number at
connection setup. Is it possible that there are fewer VCs in progress than
the maximum as determined in part (a) yet there is no common free VC
number?
R2. What are the two most important network layer functions in a
datagram network?
What are the three most important network layer functions in a virtual
circuit network?
R4. Do the routers in both datagram networks and virtual circuit
networks use for warding tables? If so, describe the forwarding tables
for both classes of networks.
R6. List some applications that would benefit from ATM’s CBR service
model.
R8. Three types of switching fabrics are discussed in Section 4.3. List
and briefly describe each type.
R10. Describe how packet loss can occur at output ports.
R12. Do routers have IP addresses? If so, how many?
R15. Suppose there are three routers between a source host and a
destination host. Ignoring fragmentation, an IP datagram sent from the
source host to the destination host will travel over how many interfaces?
How many forwarding tables will be indexed to move the datagram from
the source to the destination?
R19. Compare and contrast the IPv4 and the IPv6 header fields. Do they
have any fields in common?
R20. It has been said that when IPv6 tunnels through IPv4 routers, IPv6
treats the IPv4 tunnels as link-layer protocols. Do you agree with this
statement? Why or why not?
Chapter 4 Problems
Suppose that different VC numbers are permitted in each link along a
VC’s path. During connection setup, after an end-to-end path is
determined, describe how the links can choose their VC numbers and
configure their forwarding tables in a decentralized manner, without
reliance on a central node.
P5. Consider a VC network with a 2- bit field for the VC number.
Suppose that the network wants to set up a virtual circuit over four links:
link A, link B, link C, and link D. Suppose that each of these links is
currently carrying two other virtual circuits, and the VC numbers of
these other VCs are as follows:
------------------------------------------
ECET 465 Week 2 iLab IP Protocol
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
Week 2 - IP Protocol
This lab is due on Sunday, at the end of Week 2.
Scenario/Summary:
received by an execution of the tracerouteprogram (the traceroute
program itself is explored in more detail in the Wireshark ICMP lab).
We’ll investigate the various fields in the IP datagram and study IP
fragmentation in detail.
In this lab, we’ll investigate the IP protocol, focusing on the IP datagram.
We’ll do so by analyzing a trace of IP datagrams sent and
------------------------------------------
ECET 465 Week 3 Homework (Chapters 3 and 4)
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
R6. Is it possible for an application to enjoy reliable data transfer even
when the application runs over UDP? If so, how?
R8. Suppose that a Web server runs in Host C on port 80. Suppose this
Web server uses persistent connections, and is currently receiving
requests from two different Hosts, A and B. Are all of the requests being
sent through the same socket at Host C? If they are being passed through
different sockets, do both of the sockets have port 80? Discuss and
explain.
Chapter 3 Problems
Chapter 3 Review Questions
R4. Describe why an application developer might choose to run an
application over UDP rather than TCP.
P2. Consider Figure 3.5. What are the sources and destination port
values in the segments flowing from the server back to the clients’
processes? What are the IP addresses in the network- layer datagrams
carrying the transport- layer segments?
P3. UDP and TCP use 1s complement for their checksums. Suppose you
have the following three 8- bit bytes: 01010011, 01010100, 01110100.
What is the 1s complement of the sum of these 8- bit bytes? (Note that
although UDP and TCP use 16-bit words in computing the checksum,
for this problem you are being asked to consider 8-bit sums.) Show all
work. Why is it that UDP takes the 1s complement of the sum; that is,
why not just use the sum? With the 1s complement scheme, how does
the receiver detect errors? Is it possible that a 1-bit error will go
undetected? How about a 2-bit error?
Chapter 4 Review Questions
R21. Compare and contrast link-state and distance-vector routing
algorithms.
R23. Is it necessary that every autonomous system use the same intra-
AS routing algorithm? Why or why not?
R25. Compare and contrast the advertisements used by RIP and OSPF.
R28. Why are policy considerations as important for intra-AS protocols,
such as OSPF and RIP, as they are for an Inter-AS routing protocol like
BGP?
R33. For each of the three general approaches we studied for broadcast
communication (uncontrolled flooding, controlled flooding, and
spanning-tree broadcast), are the following statements true or false? You
may assume that no packets are lost due to buffer overflow and all
packets are delivered on a link in the order in which they were sent.
R36. What is the difference between a group-shared tree and a source-
based tree in the context of multicast routing?
Chapter 4 Problems
P20. Suppose you are interested in detecting the number of hosts behind
a NAT. You observe that the IP layer stamps an identification number
sequentially on each IP packet. The identification number of the first IP
packet generated by a host is a random number, and the identification
numbers of the subsequent IP packets are sequentially assigned. Assume
all IP packets generated by hosts behind the NAT are sent to the outside
world.
a.Based on this observation, and assuming you can sniff all packets sent
by the NAT to the outside, can you outline a simple technique that
detects the number of unique hosts behind a NAT? Justify your answer.
P24. Consider the following network. With the indicated link costs, use
Dijkstra’s shortest-path algorithm to compute the shortest path from x to
all network nodes. Show how the algorithm works by computing a table
similar to Table 4.3.
P26. Consider the network shown below, and assume that each node
initially knows the costs to each of its neighbors. Consider the distance-
vector algorithm and show the distance table entries at node z.
P28. Consider the network fragment shown below. x has only two
attached neighbors, w and y. w has a minimum-cost path to destination u
(not shown) of 5, and y has a minimum-cost path touof 6. The complete
paths from w and y to u (and between w and y) are not shown. All link
costs in the network have strictly positive integer values.
P35. Consider the network shown below. Suppose AS3 and AS2 are
running OSPF for their intra-AS routing protocol. Suppose AS1 and
AS4 are running RIP for their intra-AS routing protocol. Suppose eBGP
and iBGP are used for the inter-AS routing protocol. Initially suppose
there is no physical link between AS2 and AS4.
P50. We saw in Section 4.7 that there is no network-layer protocol that
can be used to identify the hosts participating in a multicast group.
Given this, how can multicast applications learn the identities of the
hosts that are participating in a multicast group?
------------------------------------------
ECET 465 Week 3 iLab Router Configuration
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
iLab Router Configuration ECET 465 Week 3
------------------------------------------
ECET 465 Week 4 Course Project
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
The week 4 class project is a simulation of major components and their
setup configurations that would be needed to create a network. The
project uses the Cisco ConfigMaker for the entire duration of the
project . . . which, for me, involved a bit of a learning curve all by itself.
What is not covered would be some of the personal settings that would
be setup on an individual computer (as in: if we were looking at different
operating systems such as Windows XP, 7, 8, or perhaps a Mac).
More specifically, we will be using routers, switches, hosts, and
different connections between them for physically transmitting. We are
also going to look at the addressing needs.
------------------------------------------
ECET 465 Week 4 iLab TCP
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
TCP Lab:
Scenario/Summary:
In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so
by analyzing a
trace of the TCP segments sent and received in transferring a 150KB file
(containing the
accessing a Web page that will allow you to enter the name of a file
stored on your
computer (which contains the ASCII text of Alice in Wonderland), and
then transferring the
file to a Web server using the HTTP POST method (see Section 2.2.3 in
the text). We’re
using the POST method rather than the GET method, as we’d like to
transfer a large
amount of data from your computer to another computer. Of course,
we’ll be running
text of Lewis Carrol’s Alice’s Adventures in Wonderland) from your
computer to a
remote server. We’ll study TCP’s use of sequence and
acknowledgement numbers for
providing reliable data transfer; we’ll see TCP’s congestion control
algorithm – slow start
and congestion avoidance – in action; and we’ll look at TCP’s receiver-
advertised flow
control mechanism. We’ll also briefly consider TCP connection setup
and we’ll
investigate the performance (throughput and round-trip time) of the TCP
connection between your computer and the server.
Before beginning this lab, you’ll probably want to review Sections 3.5
and 3.7 in the text.
Deliverables:
Lab Report with overview, activities, and summary
Answers to questions included in lab
Captured screenshots of data
iLab Steps
Step 1: Capturing a bulk TCP transfer from your computer to a remote
server
Before beginning our exploration of TCP, we’ll need to use Wireshark
to obtain a packet
trace of the TCP transfer of a file from your computer to a remote server.
You’ll do so by
Wireshark during this time to obtain the trace of the TCP segments sent
and received from your computer.
Do the following:
· Start up your Web browser. Go the
http://gaia.cs.umass.edu/wiresharklabs/
alice.txt and retrieve an ASCII copy of Alice in Wonderland. Store this
file
on your computer.
· Next, go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark-
file1.html.
If you are unable to run Wireshark on a live network connection, you
can download a
packet trace file that was captured while following the steps above on
one of the author’s
computers. (Download the zip file in your Doc Sharing folder
http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract
the file tcpethereal-trace-1. The traces in this zip file were collected by
Wireshark running on one of the author’s computers, while performing
the steps indicated in the Wireshark lab. Once you have downloaded the
trace, you can load it into Wireshark and view the trace using the File
pull-down menu, choosing Open, and then selecting the tcp-ethereal-
trace-1 trace file). You may well find it valuable to download this trace
even if you’ve captured your own trace and use it, as well as your own
trace, when you explore the questions below.
Step 2: A first look at the captured trace
Answer the following questions by opening the Wireshark captured-
packet file tcpethereal-
trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip
(that is,
download the trace and open that trace in Wireshark; see Footnote 2).
Whenever possible,
when answering a question, you should hand in a printout of the packet(s)
within the trace
that you used to answer the question asked. Annotate the printout to
explain your
answer. To print a packet, use File->Print, choose Selected Packet Only,
choose Packet
Summary Line, and select the minimum amount of packet detail that you
need to answer
the question.
------------------------------------------
ECET 465 Week 5 Homework (Chapter 2 Review
Questions)
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
Chapter 2 Review Questions
SECTION 2.1
R.25 Skype uses P2P techniques for two important functions. What are
they?
SECTIONS 2.7–2.8
R.28 For the client-server application over TCP described inSection 2.7,
why must the server program be executed before the client program? For
the client-server application over UDP described inSection 2.8, why may
the client program be executed before the server program?
R.1. List five nonproprietary Internet applications and the application-
layer protocols that they use.
R.8 List the four broad classes of services that a transport protocol can
provide. For each of the service classes, indicate if either UDP or TCP
(or both) provides such a service.
SECTION 2.6
------------------------------------------
ECET 465 Week 5 iLab Client Server Applications
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
Great detail, gave me the help needed in writing my paper
Order Id
Order Id will be kept Confidential
Your Name:
Your Review:
Rating: A B C D F
Enter the code in the box below:
Showing 1 to 1 of 1 (1 Pages)
Write a review
------------------------------------------
ECET 465 Week 7 Homework (Chapters 6
Questions and Problems)
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
Homework –
Chapter 6 Problems: P6, P7, P9, P10, P11, P14
Chapter 6 Questions: R1, R3, R5, R8, R14, R16, R18, R19, R21
------------------------------------------
ECET 465 Week 7 iLab 802.11 Wireless Network
Protocol
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
In this lab, we investigate the 802.11 wireless network protocol.
A trace of captured 802.11 frames is provided to analyze. In this trace
file, frames captured on Channel 6 can be seen. The wireless host
activities taken in the trace file are:
The host is already associated with the 30 Munroe St AP when the trace
begins.
At t = 24.82, the host makes an HTTP request to
http://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address of
gaia.cs.umass.edu is 128.119.245.12.
At t = 32.82, the host makes an HTTP request to
http://www.cs.umass.edu, whose IP address is 128.119.240.19.
At t = 49.58, the host disconnects from the 30 Munroe St AP and
attempts to connect to the linksys_ses_24086 AP. This is not an open
access point, and so the host is eventually unable to connect to this AP.
At t = 63.0, the host gives up trying to associate with the
linksys_ses_24086 AP, and associates again with the 30 Munroe St
access point.
This trace was collected using AirPcap and Wireshark running on a
computer in the home network of one of the authors, consisting of a
Linksys 802.11g combined access point/router, with two wired PCs and
one wireless host PC attached to the access point/router.
------------------------------------------
ECET 465 Week 7 iLab
To Purchase This Material Click below Link
For more classes visit
www.snaptutorial.com
iLab ECET 465 Week 7
------------------------------------------

Weitere ähnliche Inhalte

Was ist angesagt? (18)

Ccna 200-120 Exam Dumps
Ccna 200-120 Exam DumpsCcna 200-120 Exam Dumps
Ccna 200-120 Exam Dumps
 
IGMP
IGMPIGMP
IGMP
 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip Overview
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
ICMP
ICMP ICMP
ICMP
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoN
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
Icmp
IcmpIcmp
Icmp
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
I Pv6 Nd
I Pv6 NdI Pv6 Nd
I Pv6 Nd
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Computer networks protocols
Computer networks protocolsComputer networks protocols
Computer networks protocols
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)
 

Ähnlich wie ECET 465 help Making Decisions/Snaptutorial

ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comsholingarjosh104
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.comHarrisGeorgz
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.comWilliamsTaylorzo
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.comDavis117a
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comHarrisGeorgx
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
ECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comledlang1
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manualnudicixox
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 

Ähnlich wie ECET 465 help Making Decisions/Snaptutorial (20)

ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.com
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.com
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.com
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
 
Ch5
Ch5Ch5
Ch5
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.com
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
ECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.com
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 

Kürzlich hochgeladen

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

ECET 465 help Making Decisions/Snaptutorial

  • 1. ECET 465 Week 1 Homework (Chapters 1 and 5) To Purchase This Material Click below Link For more classes visit www.snaptutorial.com Homework (Chapters 1 and 5) ECET 465 Week 1 ------------------------------------------ ECET 465 Week 1 iLab To Purchase This Material Click below Link
  • 2. For more classes visit www.snaptutorial.com Scenario/Summary: One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. You’ll be running various network applications in different scenarios using a computer on your desk, at home, or in a lab. You’ll observe the network protocols in your computer “in action,”
  • 3. interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of these “live” labs. You’ll observe, and you’ll learn, by doing. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that accompany your text take the first approach. In these Wireshark labs, we’ll take the latter approach. ------------------------------------------ ECET 465 Week 2 Homework (Chapters 4 and 5) To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 4. ECET 465 Homework week2 Chapter 4 Review Questions P2. Consider a virtual circuit network. Suppose the VC number is an 8- bit field. What is the maximum number of virtual circuits that can be carried over a link? Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the central node might determine the VC number at connection setup. Is it possible that there are fewer VCs in progress than the maximum as determined in part (a) yet there is no common free VC number?
  • 5. R2. What are the two most important network layer functions in a datagram network? What are the three most important network layer functions in a virtual circuit network? R4. Do the routers in both datagram networks and virtual circuit networks use for warding tables? If so, describe the forwarding tables for both classes of networks. R6. List some applications that would benefit from ATM’s CBR service model. R8. Three types of switching fabrics are discussed in Section 4.3. List and briefly describe each type. R10. Describe how packet loss can occur at output ports. R12. Do routers have IP addresses? If so, how many? R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination? R19. Compare and contrast the IPv4 and the IPv6 header fields. Do they have any fields in common? R20. It has been said that when IPv6 tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer protocols. Do you agree with this statement? Why or why not? Chapter 4 Problems Suppose that different VC numbers are permitted in each link along a VC’s path. During connection setup, after an end-to-end path is determined, describe how the links can choose their VC numbers and configure their forwarding tables in a decentralized manner, without reliance on a central node. P5. Consider a VC network with a 2- bit field for the VC number. Suppose that the network wants to set up a virtual circuit over four links: link A, link B, link C, and link D. Suppose that each of these links is currently carrying two other virtual circuits, and the VC numbers of these other VCs are as follows: ------------------------------------------
  • 6. ECET 465 Week 2 iLab IP Protocol To Purchase This Material Click below Link For more classes visit www.snaptutorial.com Week 2 - IP Protocol This lab is due on Sunday, at the end of Week 2. Scenario/Summary: received by an execution of the tracerouteprogram (the traceroute program itself is explored in more detail in the Wireshark ICMP lab).
  • 7. We’ll investigate the various fields in the IP datagram and study IP fragmentation in detail. In this lab, we’ll investigate the IP protocol, focusing on the IP datagram. We’ll do so by analyzing a trace of IP datagrams sent and ------------------------------------------ ECET 465 Week 3 Homework (Chapters 3 and 4) To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 8. R6. Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, how? R8. Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B. Are all of the requests being sent through the same socket at Host C? If they are being passed through different sockets, do both of the sockets have port 80? Discuss and explain. Chapter 3 Problems Chapter 3 Review Questions R4. Describe why an application developer might choose to run an application over UDP rather than TCP. P2. Consider Figure 3.5. What are the sources and destination port values in the segments flowing from the server back to the clients’ processes? What are the IP addresses in the network- layer datagrams carrying the transport- layer segments? P3. UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8- bit bytes: 01010011, 01010100, 01110100. What is the 1s complement of the sum of these 8- bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Show all work. Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? With the 1s complement scheme, how does the receiver detect errors? Is it possible that a 1-bit error will go undetected? How about a 2-bit error? Chapter 4 Review Questions R21. Compare and contrast link-state and distance-vector routing algorithms. R23. Is it necessary that every autonomous system use the same intra- AS routing algorithm? Why or why not? R25. Compare and contrast the advertisements used by RIP and OSPF. R28. Why are policy considerations as important for intra-AS protocols, such as OSPF and RIP, as they are for an Inter-AS routing protocol like BGP?
  • 9. R33. For each of the three general approaches we studied for broadcast communication (uncontrolled flooding, controlled flooding, and spanning-tree broadcast), are the following statements true or false? You may assume that no packets are lost due to buffer overflow and all packets are delivered on a link in the order in which they were sent. R36. What is the difference between a group-shared tree and a source- based tree in the context of multicast routing? Chapter 4 Problems P20. Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each IP packet. The identification number of the first IP packet generated by a host is a random number, and the identification numbers of the subsequent IP packets are sequentially assigned. Assume all IP packets generated by hosts behind the NAT are sent to the outside world. a.Based on this observation, and assuming you can sniff all packets sent by the NAT to the outside, can you outline a simple technique that detects the number of unique hosts behind a NAT? Justify your answer. P24. Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3. P26. Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance- vector algorithm and show the distance table entries at node z. P28. Consider the network fragment shown below. x has only two attached neighbors, w and y. w has a minimum-cost path to destination u (not shown) of 5, and y has a minimum-cost path touof 6. The complete paths from w and y to u (and between w and y) are not shown. All link costs in the network have strictly positive integer values. P35. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for their intra-AS routing protocol. Suppose AS1 and AS4 are running RIP for their intra-AS routing protocol. Suppose eBGP and iBGP are used for the inter-AS routing protocol. Initially suppose there is no physical link between AS2 and AS4.
  • 10. P50. We saw in Section 4.7 that there is no network-layer protocol that can be used to identify the hosts participating in a multicast group. Given this, how can multicast applications learn the identities of the hosts that are participating in a multicast group? ------------------------------------------ ECET 465 Week 3 iLab Router Configuration To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 11. iLab Router Configuration ECET 465 Week 3 ------------------------------------------ ECET 465 Week 4 Course Project To Purchase This Material Click below Link For more classes visit www.snaptutorial.com The week 4 class project is a simulation of major components and their setup configurations that would be needed to create a network. The project uses the Cisco ConfigMaker for the entire duration of the
  • 12. project . . . which, for me, involved a bit of a learning curve all by itself. What is not covered would be some of the personal settings that would be setup on an individual computer (as in: if we were looking at different operating systems such as Windows XP, 7, 8, or perhaps a Mac). More specifically, we will be using routers, switches, hosts, and different connections between them for physically transmitting. We are also going to look at the addressing needs. ------------------------------------------ ECET 465 Week 4 iLab TCP To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 13. TCP Lab: Scenario/Summary: In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the accessing a Web page that will allow you to enter the name of a file stored on your computer (which contains the ASCII text of Alice in Wonderland), and then transferring the file to a Web server using the HTTP POST method (see Section 2.2.3 in the text). We’re using the POST method rather than the GET method, as we’d like to transfer a large
  • 14. amount of data from your computer to another computer. Of course, we’ll be running text of Lewis Carrol’s Alice’s Adventures in Wonderland) from your computer to a remote server. We’ll study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; we’ll see TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and we’ll look at TCP’s receiver- advertised flow control mechanism. We’ll also briefly consider TCP connection setup and we’ll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server. Before beginning this lab, you’ll probably want to review Sections 3.5 and 3.7 in the text. Deliverables: Lab Report with overview, activities, and summary Answers to questions included in lab Captured screenshots of data iLab Steps Step 1: Capturing a bulk TCP transfer from your computer to a remote server Before beginning our exploration of TCP, we’ll need to use Wireshark to obtain a packet trace of the TCP transfer of a file from your computer to a remote server. You’ll do so by Wireshark during this time to obtain the trace of the TCP segments sent and received from your computer. Do the following: · Start up your Web browser. Go the http://gaia.cs.umass.edu/wiresharklabs/ alice.txt and retrieve an ASCII copy of Alice in Wonderland. Store this file on your computer.
  • 15. · Next, go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark- file1.html. If you are unable to run Wireshark on a live network connection, you can download a packet trace file that was captured while following the steps above on one of the author’s computers. (Download the zip file in your Doc Sharing folder http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the file tcpethereal-trace-1. The traces in this zip file were collected by Wireshark running on one of the author’s computers, while performing the steps indicated in the Wireshark lab. Once you have downloaded the trace, you can load it into Wireshark and view the trace using the File pull-down menu, choosing Open, and then selecting the tcp-ethereal- trace-1 trace file). You may well find it valuable to download this trace even if you’ve captured your own trace and use it, as well as your own trace, when you explore the questions below. Step 2: A first look at the captured trace Answer the following questions by opening the Wireshark captured- packet file tcpethereal- trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip (that is, download the trace and open that trace in Wireshark; see Footnote 2). Whenever possible, when answering a question, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout to explain your answer. To print a packet, use File->Print, choose Selected Packet Only, choose Packet Summary Line, and select the minimum amount of packet detail that you need to answer the question. ------------------------------------------
  • 16. ECET 465 Week 5 Homework (Chapter 2 Review Questions) To Purchase This Material Click below Link For more classes visit www.snaptutorial.com Chapter 2 Review Questions SECTION 2.1 R.25 Skype uses P2P techniques for two important functions. What are they?
  • 17. SECTIONS 2.7–2.8 R.28 For the client-server application over TCP described inSection 2.7, why must the server program be executed before the client program? For the client-server application over UDP described inSection 2.8, why may the client program be executed before the server program? R.1. List five nonproprietary Internet applications and the application- layer protocols that they use. R.8 List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service. SECTION 2.6 ------------------------------------------ ECET 465 Week 5 iLab Client Server Applications To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 18. Great detail, gave me the help needed in writing my paper Order Id Order Id will be kept Confidential Your Name: Your Review: Rating: A B C D F
  • 19. Enter the code in the box below: Showing 1 to 1 of 1 (1 Pages) Write a review ------------------------------------------ ECET 465 Week 7 Homework (Chapters 6 Questions and Problems) To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 20. Homework – Chapter 6 Problems: P6, P7, P9, P10, P11, P14 Chapter 6 Questions: R1, R3, R5, R8, R14, R16, R18, R19, R21 ------------------------------------------ ECET 465 Week 7 iLab 802.11 Wireless Network Protocol To Purchase This Material Click below Link For more classes visit
  • 21. www.snaptutorial.com In this lab, we investigate the 802.11 wireless network protocol. A trace of captured 802.11 frames is provided to analyze. In this trace file, frames captured on Channel 6 can be seen. The wireless host activities taken in the trace file are: The host is already associated with the 30 Munroe St AP when the trace begins. At t = 24.82, the host makes an HTTP request to http://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address of gaia.cs.umass.edu is 128.119.245.12. At t = 32.82, the host makes an HTTP request to http://www.cs.umass.edu, whose IP address is 128.119.240.19.
  • 22. At t = 49.58, the host disconnects from the 30 Munroe St AP and attempts to connect to the linksys_ses_24086 AP. This is not an open access point, and so the host is eventually unable to connect to this AP. At t = 63.0, the host gives up trying to associate with the linksys_ses_24086 AP, and associates again with the 30 Munroe St access point. This trace was collected using AirPcap and Wireshark running on a computer in the home network of one of the authors, consisting of a Linksys 802.11g combined access point/router, with two wired PCs and one wireless host PC attached to the access point/router. ------------------------------------------ ECET 465 Week 7 iLab To Purchase This Material Click below Link For more classes visit www.snaptutorial.com
  • 23. iLab ECET 465 Week 7 ------------------------------------------