Networking A few questions on the course A few questions about the course.

Slides:



Advertisements
Similar presentations
Networking A few questions on the course A few questions about the course.
Advertisements

Networking A few questions on the course A few questions about the course.
Everything.
IP Routing.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
CSE331: Introduction to Networks and Security Lecture 10 Fall 2002.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Network Layer Packet Forwarding IS250 Spring 2010
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Dynamic Routing Protocols Why Dynamic Routing Protocols? –Each router acts independently, based on information in its router forwarding table –Dynamic.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
Internet and Network Security Introduction to Network Security.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
© Introduction to Internetworking – Alex Kooijman 04/04/2000 Introduction to internetworking Part Two.
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
The Internet Network layer
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
UDP : User Datagram Protocol 백 일 우
1 Kyung Hee University Chapter 11 User Datagram Protocol.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
TCP/IP (Routing). Content DHCP And Mobile IP Internet Routing Protocol RIP (Routing Information Protocol) OSPF (Open Shortest Path First) BGP (Border.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
DCN286 Introduction to Data Communication Technology Session 11.
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Chapter 11 User Datagram Protocol
Dynamic Routing Protocols II OSPF
Internet Control Message Protocol (ICMP)
21-2 ICMP(Internet control message protocol)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
EEC-484/584 Computer Networks
TRANSMISSION CONTROL PROTOCOL
Net 323 D: Networks Protocols
Advanced Computer Networks
NET 323D: Networks Protocols
Presentation transcript:

Networking A few questions on the course A few questions about the course

The Head of Department is A.Peter Johnson B.Chris Jennison C.Glynis Breakwell D.Phil Willis E.Kevin Edge

That was the warmup I hope you got Phil Willis: Peter Johnson is so last last year! Chris is Phils boss, Kevin is Chriss boss, and Glynis is Kevins boss.

Questions on the course (mostly factual, but there is more to the course than facts)

An Ethernet address is how long? A.Variable length B.16 bytes C.6 bytes D.4 bytes

The answer is C (6 bytes) If you didnt get that, youre pretty confused: After last time, all I can suggest is that you really re-read sections 2.2 and 3.2 of the book.

Which of these is not a well-known routing protocol? A.Routing Information Protocol B.Open Shortest Path First C.Router Discovery Protocol D.Border Gateway Protocol

C Router Discovery Protocol A.RIP is a well-known protocol B.OSPF is a well-known protocol C.RDP, as far as I know, doesnt exist: Router Discovery Messages (chapter 9) say who routers are. D.BGP is a well-known protocol

There are thee kinds of autonomous system: which of these is not one: A.Stub B.Confederation C.Transit D.Multihomed

B (Confederation) is not a kind of autonomous system If you got this wrong, I suggest section 10.7 of the book, and also the updating notes for that

Which one of these statements about IP fragmentation is true A.A fragmented packet can never be refragmented B.Fragments are put together as soon as possible C.Fragmentation is optional for the sender D.Fragmentation is what happened to officers in Vietnam E.It is vital that fragments arrive in the right order

C (optional) is the right answer A.fragmented packets can be re- fragmented B.The receiver (or its firewall) puts fragments together, not intermediate hosts C.True: set the DF flag D.Thats not IP fragmentation E.Fragments can arrive in any order: the offset field tells how to put them back

Which one of these is true A is called limited broad- cast because its only used on startup B.Broadcasting is how internet radio works C.Given the choice, multicast is generally better than broadcast D.Multicasting only works on Ethernets

The answer was C: multicast is generally better than broadcast A.Its called limited because routers dont forward it, so its limited to that net B.Internet radio etc. work on multicasting C.Yes – doesnt load those who arent interested D.No: multicasting is very important on wide-area networks (e.g. radio)

Between A and PTR records A.The DNS is always consistent B.Consistent except for deliberate fraud C.Might well be inconsistent D.Consistency is meaningless E.Consistency is undecidable

A thinking question: C or E A.Certainly not true B.Fraud can certainly work by adding inconsistencies, but its not the only way C.DNS maintainers can easily screw up! D.An abstract definition is possible E.But it requires testing infinitely many possible cases. Also the DNS is distributed, so untestable.

The DNS … A.Always uses UDP B.Always uses TCP C.Normally uses UDP D.Questions are in UDP, but replies can be in either depending on length.

C normally UDP Both can be used UDP is more common for most transactions Hence C is the answer A UDP question always gets a UDP answer, possibly marked TC (truncated). It can be re-asked in TCP if necessary

Which one of these statements about TFTP is true A.TFTP was invented before TCP, so uses UDP B.TFTP, like UDP, is unreliable C.TFTP is obsolete D.TFTP uses UDP for simplicity

D simplicity A.No – TCP is RFC 793 but TFTP is RFC Anyway date isnt the reason B.TFTP numbers packets, and asks for repeats, so is reliable C.TFTP is in daily use in the Library D.Simplicity is the reason: UDP is simple, unchanging and fits in a boot PROM.

The TCP header is A.Exactly 20 bytes long B.At least 20 bytes long C.At most 20 bytes long D.Exactly 60 bytes long E.Between 20 and 60 bytes long

E (between 20 and 60) A.20 is the minimum B.Correct, but not the whole truth C.Wrong D.60 is the maximum, but its nearly always less E.Correct

The ACK bit in the TCP header is set A.All the time B.Only when theres new data being acknowledged C.On every packet except the first D.On every packet except the first in each direction

C every packet except first A.Cant be set on first packet theres nothing to acknowledge B.The data might not seem new to us, but our previous acknowledgement might have been lost C.Correct D.No the first packet from B to A has to acknowledge As SYN

A TCP segment with SYN must have a byte of data, so that it can be acknowledged 1.True 2.False

False The SYN bit itself is counted as if it were a byte of data. It is this pretend byte that is acknowledged.

The initiator of a TCP connection must be the one to close it. 1.True 2.False

False In a typical client-server situation, it is often the client (which is the one who starts the connection) who finishes it, but this is not an invariable rule. HTTP is a counter- example (at least in HTTP 0.9/1.0)

Networking A few questions on the course A few questions about the course (starting with some comments from the survey some of you kindly did)

Good fun, something different and its very good to be interactive since we do not get much class participation, except if we want to ask questions 1.Strongly Agree 2.Agree 3.Neutral 4.Disagree 5.Strongly Disagree

Although good for general feedback how we are doing, its not so good for passing course material on. 1.Strongly Agree 2.Agree 3.Neutral 4.Disagree 5.Strongly Disagree

I wish wed had more networking earlier in the degree course 1.Strongly Agree 2.Agree 3.Neutral 4.Disagree 5.Strongly Disagree

I wish this Audience Response System had been used earlier (i.e. in previous years) 1.Strongly Agree 2.Agree 3.Neutral 4.Disagree 5.Strongly Disagree