Download Northeastern Illinois University Department of Computer

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

TCP congestion control wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Internet protocol suite wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
1
Northeastern Illinois University
Department of Computer Science
CS 331
Name: _____________________
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Total
Final Grade
(Total *0.25)
___
10
___
10
___
15
___
20
___
20
___
25
___
100
___
25
Example Final Exam
Instructions: The answer to the questions should ALL be written down in space provided. Poorly written
answers will be poorly graded.
Question 1: Multiple choice (2 points for each correct answer), please select your answer by placing a circle
over the letter and justifying when asked. There is only one possible answer.
i.
Consider a subnet with prefix 128.119.40.128/26. How many bits are used for host addressing?
a) 2
b) 8
c) 26
d) 6
The Network layer receives services from which layer?
ii.
iii.
a) Transport layer
b) Data Link Layer
c) Application layer
d) none of the above
How many bytes does the UDP header have?
a) 64
b) 8
c) 16
d) 4
How many bits in a MAC address (i.e. used in most LAN with Ethernet) ?
a) 6
b) 32
c) 48
d) none of the above
Justify by drawing the header with the name and number of bytes for each field:
iv.
What is RTT?
a) propagation delay + transmission delay
b) 2 * end-to-end delay
c) end-to-end delay
d) none of the above
2
Question 2: Write one sentence definition for each concept (2 points for each definition)
a) IP Router:
(2 points)
b) Subnet:
(2 points)
c) Transmission delay:
(2 points)
d) Stop-and-Wait:
(2 points)
e) Integrity:
(2 points)
3
Question 3: Write a brief answer (be clear and concise)
Assuming TCP (TCP protocol discussed in class) answer the following questions and justify briefly your
answer.
a) Write in the space below the difference between congestion control and flow control.
(5 points)
b) Draw a graph that shows the saw-tooth behavior of TCP congestion control. Your graph must clearly
identify with labels the slow-start phase, when a time-out occurs, addictive-increase phase, fastrecovery, when a triple-ack occurs. You must label the graph with the correct units for x-axis and y-axis.
(10 points)
4
Question 4: This question is regarding the application layer.
a) Write the name of the application layer protocol, transport layer protocol, and application architecture
used by DNS.
(5 points)
b) Suppose there is a distributed denial of service attack on DNS. Assume you are at Youngstown State
University and you know that the IP address of YSU’s web server is 150.134.10.10. How would you be
able to connect to YSU’s web server without DNS? You must write down the steps and programs you
would used to access YSU’s web server.
(5 points)
c) Draw a diagram below that will explain the steps required by DNS to resolve the HTTP request
http://www.vindy.com from a computer located in the domain www.neiu.edu. You must label ALL the
servers involved in resolving the HTTP request using recursive queries, label each domain separately,
label each query with a number indicating the order in which queries are issued and responded by the
servers.
(10 points)
5
Question 5: Answer the following questions with short answers:
a) Given an IP address 198.64.12.13 and subnet mask of 255.255.255.0. Determine the network address.
You must write the binary representation of each element to obtain full credit for your answer.
(5 points)
b) Consider the ARP protocol and how IP addresses are mapped to MAC address. Carefully study the
picture below and answer the following questions assuming host A is sending a packet to host B
i.
Describe briefly what the ARP protocol is about?
(5 points)
ii.
What is the MAC address of host A?
(5 points)
iii.
Write down in the space below the MAC address the router (R) reads from A’s frame when
the packet arrives at the router (R).
(5 points)
6
Question 6: Write the solution to the following problems
a) Explain CSMA/CD (Carrier Sense Multiple Access with Collision Detection) in your own words by
describing the steps that a computer most follow to transmit a frame. You must consider the scenarios
were a collision occurs and the scenarios were there is no collision.
(5 points)
b) We would like to compare the performance of the STOP-AND-WAIT protocol versus the GO-BACK-N
protocol. Assume we are sending fives packets numbered from one to five; assume there is no loss in the
channel except when packet three and packet five were send for the first time.
b.1) Draw the protocol diagram for each protocol.
(10 points)
7
b.2) Write the total response time and overhead for each protocol.
(10 points)
Extra Credit: (10 points)
Consider all the concepts you have learn in this class listed below. Rank the list of topics and explain
why you think these topics are an essential learning outcome for this class.
•
•
•
•
•
•
•
•
•
•
Delay
Protocol
Internet Protocol Stack
Packet Switching
DNS
Peer-to-Peer Architecture
Security: Confidentiality, Integrity, and Availability
Reliable Data Transfer
TCP and UDP
Deterlab