SlideShare a Scribd company logo
1 of 18
ECET 465 Week 1 Homework (Chapters 1 and
5)
For more classes visit
www.snaptutorial.com
ECET 465 Week 1 Homework (Chapters 1 and 5)
********************************************************
ECET 465 Week 1 iLab
For more classes visit
www.snaptutorial.com
Scenario/Summary:
One’s understanding of network protocols can often be greatly deepened
by “seeing protocols in action” and by “playing around with protocols” –
observing the sequence of messages exchanged between two protocol
entities, delving down into the details of protocol operation, and causing
protocols to perform certain actions and then observing these actions and
their consequences. This can be done in simulated scenarios or in a
“real” network environment such as the Internet. The Java applets that
accompany your text take the first approach. In these Wireshark labs,
we’ll take the latter approach. You’ll be running various network
applications in different scenarios using a computer on your desk, at
home, or in a lab. You’ll observe the network protocols in your
computer “in action,” interacting and exchanging messages with
protocol entities executing elsewhere in the Internet. Thus, you and your
computer will be an integral part of these “live” labs. You’ll observe,
and you’ll learn, by doing.
********************************************************
ECET 465 Week 2 Homework (Chapters 4 and
5)
For more classes visit
www.snaptutorial.com
ECET 465 Homework week2
Chapter 4 Review Questions
R2. What are the two most important network layer functions in a
datagram network?
What are the three most important network layer functions in a virtual
circuit network?
R4. Do the routers in both datagram networks and virtual circuit
networks use for warding tables? If so, describe the forwarding tables
for both classes of networks.
R6. List some applications that would benefit from ATM’s CBR service
model.
R8. Three types of switching fabrics are discussed in Section 4.3. List
and briefly describe each type.
R10. Describe how packet loss can occur at output ports.
R12. Do routers have IP addresses? If so, how many?
R15. Suppose there are three routers between a source host and a
destination host. Ignoring fragmentation, an IP datagram sent from the
source host to the destination host will travel over how many interfaces?
How many forwarding tables will be indexed to move the datagram from
the source to the destination?
R19. Compare and contrast the IPv4 and the IPv6 header fields. Do they
have any fields in common?
R20. It has been said that when IPv6 tunnels through IPv4 routers, IPv6
treats the IPv4 tunnels as link-layer protocols. Do you agree with this
statement? Why or why not?
Chapter 4 Problems
P2. Consider a virtual circuit network. Suppose the VC number is an 8-
bit field.
What is the maximum number of virtual circuits that can be carried over
a link?
Suppose a central node determines paths and VC numbers at connection
setup. Suppose the same VC number is used on each link along the VC’s
path. Describe how the central node might determine the VC number at
connection setup. Is it possible that there are fewer VCs in progress than
the maximum as determined in part (a) yet there is no common free VC
number?
Suppose that different VC numbers are permitted in each link along a
VC’s path. During connection setup, after an end-to-end path is
determined, describe how the links can choose their VC numbers and
configure their forwarding tables in a decentralized manner, without
reliance on a central node.
P5. Consider a VC network with a 2- bit field for the VC number.
Suppose that the network wants to set up a virtual circuit over four links:
link A, link B, link C, and link D. Suppose that each of these links is
currently carrying two other virtual circuits, and the VC numbers of
these other VCs are as follows:
********************************************************
ECET 465 Week 2 iLab IP Protocol
For more classes visit
www.snaptutorial.com
Week 2 - IP Protocol
This lab is due on Sunday, at the end of Week 2.
Scenario/Summary:
In this lab, we’ll investigate the IP protocol, focusing on the IP
datagram. We’ll do so by analyzing a trace of IP datagrams sent and
received by an execution of the tracerouteprogram (the traceroute
program itself is explored in more detail in the Wireshark ICMP lab).
We’ll investigate the various fields in the IP datagram and study IP
fragmentation in detail.
********************************************************
ECET 465 Week 3 Homework (Chapters 3 and
4)
For more classes visit
www.snaptutorial.com
Chapter 3 Review Questions
R4. Describe why an application developer might choose to run an
application over UDP rather than TCP.
R6. Is it possible for an application to enjoy reliable data transfer even
when the application runs over UDP? If so, how?
R8. Suppose that a Web server runs in Host C on port 80. Suppose this
Web server uses persistent connections, and is currently receiving
requests from two different Hosts, A and B. Are all of the requests being
sent through the same socket at Host C? If they are being passed through
different sockets, do both of the sockets have port 80? Discuss and
explain.
Chapter 3 Problems
P2. Consider Figure 3.5. What are the sources and destination port
values in the segments flowing from the server back to the clients’
processes? What are the IP addresses in the network- layer datagrams
carrying the transport- layer segments?
P3. UDP and TCP use 1s complement for their checksums. Suppose you
have the following three 8- bit bytes: 01010011, 01010100, 01110100.
What is the 1s complement of the sum of these 8- bit bytes? (Note that
although UDP and TCP use 16-bit words in computing the checksum,
for this problem you are being asked to consider 8-bit sums.) Show all
work. Why is it that UDP takes the 1s complement of the sum; that is,
why not just use the sum? With the 1s complement scheme, how does
the receiver detect errors? Is it possible that a 1-bit error will go
undetected? How about a 2-bit error?
Chapter 4 Review Questions
R21. Compare and contrast link-state and distance-vector routing
algorithms.
R23. Is it necessary that every autonomous system use the same intra-
AS routing algorithm? Why or why not?
R25. Compare and contrast the advertisements used by RIP and OSPF.
R28. Why are policy considerations as important for intra-AS protocols,
such as OSPF and RIP, as they are for an Inter-AS routing protocol like
BGP?
R33. For each of the three general approaches we studied for broadcast
communication (uncontrolled flooding, controlled flooding, and
spanning-tree broadcast), are the following statements true or false? You
may assume that no packets are lost due to buffer overflow and all
packets are delivered on a link in the order in which they were sent.
R36. What is the difference between a group-shared tree and a source-
based tree in the context of multicast routing?
Chapter 4 Problems
P20. Suppose you are interested in detecting the number of hosts behind
a NAT. You observe that the IP layer stamps an identification number
sequentially on each IP packet. The identification number of the first IP
packet generated by a host is a random number, and the identification
numbers of the subsequent IP packets are sequentially assigned. Assume
all IP packets generated by hosts behind the NAT are sent to the outside
world.
a.Based on this observation, and assuming you can sniff all packets sent
by the NAT to the outside, can you outline a simple technique that
detects the number of unique hosts behind a NAT? Justify your answer.
P24. Consider the following network. With the indicated link costs, use
Dijkstra’s shortest-path algorithm to compute the shortest path from x to
all network nodes. Show how the algorithm works by computing a table
similar to Table 4.3.
P26. Consider the network shown below, and assume that each node
initially knows the costs to each of its neighbors. Consider the distance-
vector algorithm and show the distance table entries at node z.
P28. Consider the network fragment shown below. x has only two
attached neighbors, w and y. w has a minimum-cost path to destination u
(not shown) of 5, and y has a minimum-cost path touof 6. The complete
paths from w and y to u (and between w and y) are not shown. All link
costs in the network have strictly positive integer values.
P35. Consider the network shown below. Suppose AS3 and AS2 are
running OSPF for their intra-AS routing protocol. Suppose AS1 and
AS4 are running RIP for their intra-AS routing protocol. Suppose eBGP
and iBGP are used for the inter-AS routing protocol. Initially suppose
there is no physical link between AS2 and AS4.
P50. We saw in Section 4.7 that there is no network-layer protocol that
can be used to identify the hosts participating in a multicast group.
Given this, how can multicast applications learn the identities of the
hosts that are participating in a multicast group?
********************************************************
ECET 465 Week 3 iLab Router Configuration
For more classes visit
www.snaptutorial.com
ECET 465 Week 3 iLab Router Configuration
********************************************************
ECET 465 Week 4 Course Project
For more classes visit
www.snaptutorial.com
The week 4 class project is a simulation of major components and their
setup configurations that would be needed to create a network. More
specifically, we will be using routers, switches, hosts, and different
connections between them for physically transmitting. We are also going
to look at the addressing needs. The project uses the Cisco ConfigMaker
for the entire duration of the project . . . which, for me, involved a bit of
a learning curve all by itself. What is not covered would be some of the
personal settings that would be setup on an individual computer (as in: if
we were looking at different operating systems such as Windows XP, 7,
8, or perhaps a Mac).
********************************************************
ECET 465 Week 4 iLab TCP
For more classes visit
www.snaptutorial.com
TCP Lab:
Scenario/Summary:
In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so
by analyzing a
trace of the TCP segments sent and received in transferring a 150KB file
(containing the
text of Lewis Carrol’s Alice’s Adventures in Wonderland) from your
computer to a
remote server. We’ll study TCP’s use of sequence and
acknowledgement numbers for
providing reliable data transfer; we’ll see TCP’s congestion control
algorithm – slow start
and congestion avoidance – in action; and we’ll look at TCP’s receiver-
advertised flow
control mechanism. We’ll also briefly consider TCP connection setup
and we’ll
investigate the performance (throughput and round-trip time) of the TCP
connection between your computer and the server.
Before beginning this lab, you’ll probably want to review Sections 3.5
and 3.7 in the text.
Deliverables:
Lab Report with overview, activities, and summary
Answers to questions included in lab
Captured screenshots of data
iLab Steps
Step 1: Capturing a bulk TCP transfer from your computer to a remote
server
Before beginning our exploration of TCP, we’ll need to use Wireshark
to obtain a packet
trace of the TCP transfer of a file from your computer to a remote server.
You’ll do so by
accessing a Web page that will allow you to enter the name of a file
stored on your
computer (which contains the ASCII text of Alice in Wonderland), and
then transferring the
file to a Web server using the HTTP POST method (see Section 2.2.3 in
the text). We’re
using the POST method rather than the GET method, as we’d like to
transfer a large
amount of data from your computer to another computer. Of course,
we’ll be running
Wireshark during this time to obtain the trace of the TCP segments sent
and received from your computer.
Do the following:
· Start up your Web browser. Go the
http://gaia.cs.umass.edu/wiresharklabs/
alice.txt and retrieve an ASCII copy of Alice in Wonderland. Store this
file
on your computer.
· Next, go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark-
file1.html.
If you are unable to run Wireshark on a live network connection, you
can download a
packet trace file that was captured while following the steps above on
one of the author’s
computers. (Download the zip file in your Doc Sharing folder
http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract
the file tcpethereal-trace-1. The traces in this zip file were collected by
Wireshark running on one of the author’s computers, while performing
the steps indicated in the Wireshark lab. Once you have downloaded the
trace, you can load it into Wireshark and view the trace using the File
pull-down menu, choosing Open, and then selecting the tcp-ethereal-
trace-1 trace file). You may well find it valuable to download this trace
even if you’ve captured your own trace and use it, as well as your own
trace, when you explore the questions below.
Step 2: A first look at the captured trace
Answer the following questions by opening the Wireshark captured-
packet file tcpethereal-
trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip
(that is,
download the trace and open that trace in Wireshark; see Footnote 2).
Whenever possible,
when answering a question, you should hand in a printout of the
packet(s) within the trace
that you used to answer the question asked. Annotate the printout to
explain your
answer. To print a packet, use File->Print, choose Selected Packet Only,
choose Packet
Summary Line, and select the minimum amount of packet detail that you
need to answer the question.
********************************************************
ECET 465 Week 5 Homework (Chapter 2
Review Questions)
For more classes visit
www.snaptutorial.com
Chapter 2 Review Questions
SECTION 2.1
R.1. List five nonproprietary Internet applications and the application-
layer protocols that they use.
R.8 List the four broad classes of services that a transport protocol can
provide. For each of the service classes, indicate if either UDP or TCP
(or both) provides such a service.
SECTION 2.6
R.25 Skype uses P2P techniques for two important functions. What are
they?
SECTIONS 2.7–2.8
R.28 For the client-server application over TCP described inSection 2.7,
why must the server program be executed before the client program? For
the client-server application over UDP described inSection 2.8, why may
the client program be executed before the server program?
********************************************************
ECET 465 Week 5 iLab Client Server
Applications
For more classes visit
www.snaptutorial.com
We know that HTTP, FTP, and SMTP all use TCP. DNS and SNMP use
UDP. TCP offers reliable transport, while UDP is “best-effort.” When
you design your own distributed applications, you will need to decide
whether to use TCP or UDP. We are going to study differences between
TCP and UDP implementations of a very simple application.
Deliverables:
Provide a report that includes an overview, highlights the process,
answers the questions in the lab body, and provides your conclusion. In
addition to what you have learned, the conclusions should include the
following: Compare the TCP- and UDP-embedded applications. You
should mention differences in the code. Base this on your understanding
of the connection-oriented service of TCP, as compared to
connectionless UDP.
********************************************************
ECET 465 Week 7 Homework (Chapters 6
Questions and Problems)
For more classes visit
www.snaptutorial.com
Homework –
Chapter 6 Questions: R1, R3, R5, R8, R14, R16, R18, R19, R21
Chapter 6 Problems: P6, P7, P9, P10, P11, P14
********************************************************
ECET 465 Week 7 iLab 802.11 Wireless
Network Protocol
For more classes visit
www.snaptutorial.com
In this lab, we investigate the 802.11 wireless network protocol.
A trace of captured 802.11 frames is provided to analyze. This trace was
collected using AirPcap and Wireshark running on a computer in the
home network of one of the authors, consisting of a Linksys 802.11g
combined access point/router, with two wired PCs and one wireless host
PC attached to the access point/router. In this trace file, frames captured
on Channel 6 can be seen. The wireless host activities taken in the trace
file are:
The host is already associated with the 30 Munroe St AP when the trace
begins.
At t = 24.82, the host makes an HTTP request to
http://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address of
gaia.cs.umass.edu is 128.119.245.12.
At t = 32.82, the host makes an HTTP request to
http://www.cs.umass.edu, whose IP address is 128.119.240.19.
At t = 49.58, the host disconnects from the 30 Munroe St AP and
attempts to connect to the linksys_ses_24086 AP. This is not an open
access point, and so the host is eventually unable to connect to this AP.
At t = 63.0, the host gives up trying to associate with the
linksys_ses_24086 AP, and associates again with the 30 Munroe St
access point.
********************************************************
ECET 465 Week 7 iLab
For more classes visit
www.snaptutorial.com
ECET 465 Week 7 iLab
********************************************************

More Related Content

What's hot

Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolasimnawaz54
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
Communication networks_ARP
Communication networks_ARPCommunication networks_ARP
Communication networks_ARPGouravSalla
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Nicole Gaehle, MSIST
 
Wireshark udp solution
Wireshark udp solutionWireshark udp solution
Wireshark udp solutionYasin Abdullah
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPMaximilan Wilhelm
 
SubNetwork Calculator (Python Project)
SubNetwork Calculator (Python Project)SubNetwork Calculator (Python Project)
SubNetwork Calculator (Python Project)Dmitry Ponomarenko
 
Ch 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP AnalysisCh 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP AnalysisYoram Orzach
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Maximilan Wilhelm
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPMaximilan Wilhelm
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)NetProtocol Xpert
 
06 wireshark ip-solution_july_22
06 wireshark ip-solution_july_2206 wireshark ip-solution_july_22
06 wireshark ip-solution_july_22AlexandrTKim
 

What's hot (18)

Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocol
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Ip header
Ip headerIp header
Ip header
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Communication networks_ARP
Communication networks_ARPCommunication networks_ARP
Communication networks_ARP
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)
 
Wireshark udp solution
Wireshark udp solutionWireshark udp solution
Wireshark udp solution
 
IPv6 im Jahre 2018
IPv6 im Jahre 2018IPv6 im Jahre 2018
IPv6 im Jahre 2018
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
 
SubNetwork Calculator (Python Project)
SubNetwork Calculator (Python Project)SubNetwork Calculator (Python Project)
SubNetwork Calculator (Python Project)
 
Networking answers
Networking answersNetworking answers
Networking answers
 
Ch 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP AnalysisCh 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP Analysis
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IP
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
 
06 wireshark ip-solution_july_22
06 wireshark ip-solution_july_2206 wireshark ip-solution_july_22
06 wireshark ip-solution_july_22
 

Similar to ECET 465 Week 1 Homework, Protocols in Action (Chapters 1 and 5

Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.comDavis117a
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comHarrisGeorgx
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.comDavisMurphyC86
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
Ecet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comEcet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comrobertlesew62
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptxAliJrboy
 
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
Lab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docxLab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docx
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docxsmile790243
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
ECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comledlang1
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418IJRAT
 

Similar to ECET 465 Week 1 Homework, Protocols in Action (Chapters 1 and 5 (20)

Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
 
Ch5
Ch5Ch5
Ch5
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.com
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.com
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
Ecet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comEcet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.com
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptx
 
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
Lab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docxLab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docx
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
ECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.com
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 

Recently uploaded

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 

Recently uploaded (20)

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 

ECET 465 Week 1 Homework, Protocols in Action (Chapters 1 and 5

  • 1. ECET 465 Week 1 Homework (Chapters 1 and 5) For more classes visit www.snaptutorial.com ECET 465 Week 1 Homework (Chapters 1 and 5) ******************************************************** ECET 465 Week 1 iLab For more classes visit www.snaptutorial.com Scenario/Summary: One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol
  • 2. entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that accompany your text take the first approach. In these Wireshark labs, we’ll take the latter approach. You’ll be running various network applications in different scenarios using a computer on your desk, at home, or in a lab. You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of these “live” labs. You’ll observe, and you’ll learn, by doing. ******************************************************** ECET 465 Week 2 Homework (Chapters 4 and 5) For more classes visit www.snaptutorial.com ECET 465 Homework week2 Chapter 4 Review Questions
  • 3. R2. What are the two most important network layer functions in a datagram network? What are the three most important network layer functions in a virtual circuit network? R4. Do the routers in both datagram networks and virtual circuit networks use for warding tables? If so, describe the forwarding tables for both classes of networks. R6. List some applications that would benefit from ATM’s CBR service model. R8. Three types of switching fabrics are discussed in Section 4.3. List and briefly describe each type. R10. Describe how packet loss can occur at output ports. R12. Do routers have IP addresses? If so, how many? R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination? R19. Compare and contrast the IPv4 and the IPv6 header fields. Do they have any fields in common? R20. It has been said that when IPv6 tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer protocols. Do you agree with this statement? Why or why not? Chapter 4 Problems
  • 4. P2. Consider a virtual circuit network. Suppose the VC number is an 8- bit field. What is the maximum number of virtual circuits that can be carried over a link? Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the central node might determine the VC number at connection setup. Is it possible that there are fewer VCs in progress than the maximum as determined in part (a) yet there is no common free VC number? Suppose that different VC numbers are permitted in each link along a VC’s path. During connection setup, after an end-to-end path is determined, describe how the links can choose their VC numbers and configure their forwarding tables in a decentralized manner, without reliance on a central node. P5. Consider a VC network with a 2- bit field for the VC number. Suppose that the network wants to set up a virtual circuit over four links: link A, link B, link C, and link D. Suppose that each of these links is currently carrying two other virtual circuits, and the VC numbers of these other VCs are as follows: ******************************************************** ECET 465 Week 2 iLab IP Protocol
  • 5. For more classes visit www.snaptutorial.com Week 2 - IP Protocol This lab is due on Sunday, at the end of Week 2. Scenario/Summary: In this lab, we’ll investigate the IP protocol, focusing on the IP datagram. We’ll do so by analyzing a trace of IP datagrams sent and received by an execution of the tracerouteprogram (the traceroute program itself is explored in more detail in the Wireshark ICMP lab). We’ll investigate the various fields in the IP datagram and study IP fragmentation in detail. ******************************************************** ECET 465 Week 3 Homework (Chapters 3 and 4) For more classes visit www.snaptutorial.com
  • 6. Chapter 3 Review Questions R4. Describe why an application developer might choose to run an application over UDP rather than TCP. R6. Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, how? R8. Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B. Are all of the requests being sent through the same socket at Host C? If they are being passed through different sockets, do both of the sockets have port 80? Discuss and explain. Chapter 3 Problems P2. Consider Figure 3.5. What are the sources and destination port values in the segments flowing from the server back to the clients’ processes? What are the IP addresses in the network- layer datagrams carrying the transport- layer segments? P3. UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8- bit bytes: 01010011, 01010100, 01110100. What is the 1s complement of the sum of these 8- bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Show all work. Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? With the 1s complement scheme, how does the receiver detect errors? Is it possible that a 1-bit error will go undetected? How about a 2-bit error?
  • 7. Chapter 4 Review Questions R21. Compare and contrast link-state and distance-vector routing algorithms. R23. Is it necessary that every autonomous system use the same intra- AS routing algorithm? Why or why not? R25. Compare and contrast the advertisements used by RIP and OSPF. R28. Why are policy considerations as important for intra-AS protocols, such as OSPF and RIP, as they are for an Inter-AS routing protocol like BGP? R33. For each of the three general approaches we studied for broadcast communication (uncontrolled flooding, controlled flooding, and spanning-tree broadcast), are the following statements true or false? You may assume that no packets are lost due to buffer overflow and all packets are delivered on a link in the order in which they were sent. R36. What is the difference between a group-shared tree and a source- based tree in the context of multicast routing? Chapter 4 Problems P20. Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each IP packet. The identification number of the first IP packet generated by a host is a random number, and the identification numbers of the subsequent IP packets are sequentially assigned. Assume all IP packets generated by hosts behind the NAT are sent to the outside world.
  • 8. a.Based on this observation, and assuming you can sniff all packets sent by the NAT to the outside, can you outline a simple technique that detects the number of unique hosts behind a NAT? Justify your answer. P24. Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3. P26. Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance- vector algorithm and show the distance table entries at node z. P28. Consider the network fragment shown below. x has only two attached neighbors, w and y. w has a minimum-cost path to destination u (not shown) of 5, and y has a minimum-cost path touof 6. The complete paths from w and y to u (and between w and y) are not shown. All link costs in the network have strictly positive integer values. P35. Consider the network shown below. Suppose AS3 and AS2 are running OSPF for their intra-AS routing protocol. Suppose AS1 and AS4 are running RIP for their intra-AS routing protocol. Suppose eBGP and iBGP are used for the inter-AS routing protocol. Initially suppose there is no physical link between AS2 and AS4. P50. We saw in Section 4.7 that there is no network-layer protocol that can be used to identify the hosts participating in a multicast group. Given this, how can multicast applications learn the identities of the hosts that are participating in a multicast group? ********************************************************
  • 9. ECET 465 Week 3 iLab Router Configuration For more classes visit www.snaptutorial.com ECET 465 Week 3 iLab Router Configuration ******************************************************** ECET 465 Week 4 Course Project For more classes visit www.snaptutorial.com The week 4 class project is a simulation of major components and their setup configurations that would be needed to create a network. More specifically, we will be using routers, switches, hosts, and different connections between them for physically transmitting. We are also going to look at the addressing needs. The project uses the Cisco ConfigMaker
  • 10. for the entire duration of the project . . . which, for me, involved a bit of a learning curve all by itself. What is not covered would be some of the personal settings that would be setup on an individual computer (as in: if we were looking at different operating systems such as Windows XP, 7, 8, or perhaps a Mac). ******************************************************** ECET 465 Week 4 iLab TCP For more classes visit www.snaptutorial.com TCP Lab: Scenario/Summary: In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol’s Alice’s Adventures in Wonderland) from your computer to a
  • 11. remote server. We’ll study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; we’ll see TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and we’ll look at TCP’s receiver- advertised flow control mechanism. We’ll also briefly consider TCP connection setup and we’ll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server. Before beginning this lab, you’ll probably want to review Sections 3.5 and 3.7 in the text. Deliverables: Lab Report with overview, activities, and summary Answers to questions included in lab Captured screenshots of data iLab Steps Step 1: Capturing a bulk TCP transfer from your computer to a remote server Before beginning our exploration of TCP, we’ll need to use Wireshark to obtain a packet trace of the TCP transfer of a file from your computer to a remote server. You’ll do so by
  • 12. accessing a Web page that will allow you to enter the name of a file stored on your computer (which contains the ASCII text of Alice in Wonderland), and then transferring the file to a Web server using the HTTP POST method (see Section 2.2.3 in the text). We’re using the POST method rather than the GET method, as we’d like to transfer a large amount of data from your computer to another computer. Of course, we’ll be running Wireshark during this time to obtain the trace of the TCP segments sent and received from your computer. Do the following: · Start up your Web browser. Go the http://gaia.cs.umass.edu/wiresharklabs/ alice.txt and retrieve an ASCII copy of Alice in Wonderland. Store this file on your computer. · Next, go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark- file1.html. If you are unable to run Wireshark on a live network connection, you can download a packet trace file that was captured while following the steps above on one of the author’s
  • 13. computers. (Download the zip file in your Doc Sharing folder http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the file tcpethereal-trace-1. The traces in this zip file were collected by Wireshark running on one of the author’s computers, while performing the steps indicated in the Wireshark lab. Once you have downloaded the trace, you can load it into Wireshark and view the trace using the File pull-down menu, choosing Open, and then selecting the tcp-ethereal- trace-1 trace file). You may well find it valuable to download this trace even if you’ve captured your own trace and use it, as well as your own trace, when you explore the questions below. Step 2: A first look at the captured trace Answer the following questions by opening the Wireshark captured- packet file tcpethereal- trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip (that is, download the trace and open that trace in Wireshark; see Footnote 2). Whenever possible, when answering a question, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout to explain your answer. To print a packet, use File->Print, choose Selected Packet Only, choose Packet Summary Line, and select the minimum amount of packet detail that you need to answer the question.
  • 14. ******************************************************** ECET 465 Week 5 Homework (Chapter 2 Review Questions) For more classes visit www.snaptutorial.com Chapter 2 Review Questions SECTION 2.1 R.1. List five nonproprietary Internet applications and the application- layer protocols that they use. R.8 List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service. SECTION 2.6 R.25 Skype uses P2P techniques for two important functions. What are they? SECTIONS 2.7–2.8 R.28 For the client-server application over TCP described inSection 2.7, why must the server program be executed before the client program? For
  • 15. the client-server application over UDP described inSection 2.8, why may the client program be executed before the server program? ******************************************************** ECET 465 Week 5 iLab Client Server Applications For more classes visit www.snaptutorial.com We know that HTTP, FTP, and SMTP all use TCP. DNS and SNMP use UDP. TCP offers reliable transport, while UDP is “best-effort.” When you design your own distributed applications, you will need to decide whether to use TCP or UDP. We are going to study differences between TCP and UDP implementations of a very simple application. Deliverables: Provide a report that includes an overview, highlights the process, answers the questions in the lab body, and provides your conclusion. In addition to what you have learned, the conclusions should include the following: Compare the TCP- and UDP-embedded applications. You should mention differences in the code. Base this on your understanding
  • 16. of the connection-oriented service of TCP, as compared to connectionless UDP. ******************************************************** ECET 465 Week 7 Homework (Chapters 6 Questions and Problems) For more classes visit www.snaptutorial.com Homework – Chapter 6 Questions: R1, R3, R5, R8, R14, R16, R18, R19, R21 Chapter 6 Problems: P6, P7, P9, P10, P11, P14 ******************************************************** ECET 465 Week 7 iLab 802.11 Wireless Network Protocol
  • 17. For more classes visit www.snaptutorial.com In this lab, we investigate the 802.11 wireless network protocol. A trace of captured 802.11 frames is provided to analyze. This trace was collected using AirPcap and Wireshark running on a computer in the home network of one of the authors, consisting of a Linksys 802.11g combined access point/router, with two wired PCs and one wireless host PC attached to the access point/router. In this trace file, frames captured on Channel 6 can be seen. The wireless host activities taken in the trace file are: The host is already associated with the 30 Munroe St AP when the trace begins. At t = 24.82, the host makes an HTTP request to http://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address of gaia.cs.umass.edu is 128.119.245.12. At t = 32.82, the host makes an HTTP request to http://www.cs.umass.edu, whose IP address is 128.119.240.19. At t = 49.58, the host disconnects from the 30 Munroe St AP and attempts to connect to the linksys_ses_24086 AP. This is not an open access point, and so the host is eventually unable to connect to this AP. At t = 63.0, the host gives up trying to associate with the linksys_ses_24086 AP, and associates again with the 30 Munroe St access point.
  • 18. ******************************************************** ECET 465 Week 7 iLab For more classes visit www.snaptutorial.com ECET 465 Week 7 iLab ********************************************************