CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.

Slides:



Advertisements
Similar presentations
Everything.
Advertisements

Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Network Layer and Transport Layer.
Review CS 3516 – Computer Networks. Protocol What does a network protocol do?
CS335 Networking & Network Administration Tuesday, April 20, 2010.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
HTTP Performance Objective: In this problem, we consider the performance of HTTP, comparing non-persistent HTTP with persistent HTTP. Suppose the page.
Gursharan Singh Tatla Transport Layer 16-May
Everything. MACIP End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: MACIP MACInterfaceMACInterface.
Lecture 8 Modeling & Simulation of Communication Networks.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Process-to-Process Delivery:
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Exploring the Packet Delivery Process Chapter
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
CSx760 Computer Networks1 Introduction to Network Protocols Kang Li.
TCP/IP Networking Review Covered Subjects:  Packet Switched Network Structure  Issues of PSNs  Ports & IP Numbers  Delivery Services  Domain Name.
A day in the life: scenario
The complete picture Linux Network Management. End to End Connection Being able to describe the end to end connection sequence is a useful thing Very.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 John Magee 11 July 2013 CS 101 Lecture 11: How do you “visit” a web page, revisted Slides adapted from Kurose and Ross, Computer Networking 5/e Source.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.
Routers and Routing Basics CCNA 2 Chapter 10.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
IP BROS Presentation by: Amen Ahmed. Mario and Luigi are here to help us find our way through the internet. Mario will act as our browser and Luigi will.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
CS 164: Slide Set 2: Chapter 1 -- Introduction (continued).
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Presented by Rebecca Meinhold But How Does the Internet Work?
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Chapter 7 Application Layer 1 Some of the slides in this chapter are courtesy of Profs. Kurose/Ross and others.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
Ch 3. Transport Layer Myungchul Kim
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
Introduction to Networks
Virtualization of networks
DMET 602: Networks and Media Lab
The Transport Layer (TCP)
A Typical Connection Scenario
CS 280: Summary: A day in the life of a web request
Course Review 2015 Computer networks 赵振刚
Introduction to Networks
Chapter 6 The Data Link layer
Process-to-Process Delivery:
TRANSMISSION CONTROL PROTOCOL
Chapters 1~5 Overview Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley Prof. Hong Liu for ECE369 Adapted from.
Synthesis A day in the life of a web request
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy

Revision 1-2

A Day in the Life of a Webpage Request  Bob wishes to retrieve a page from  Bob has just booted up the computer Bob 00:16:D3:23:63:8A GUC /24 00:22:6B:45:1F:1B ISP /13 DNS Server Google /

4 A Day in the Life of a Webpage Request GUC /24 00:22:6B:45:1F:1B ISP /13 DNS Server Google / :16:D3:23:63:8AFF:FF:FF:FF:FF:FF Yiaddr: :22:6B:45:1F:1BFF:FF:FF:FF:FF:FF  DHCP ACK also includes IP of default gateway (router in this case) and DNS server Bob 00:16:D3:23:63:8A

5 A Day in the Life of a Webpage Request Bob 00:16:D3:23:63:8A GUC /24 00:22:6B:45:1F:1B ISP /13 DNS Server Google / ARP Query :16:D3:23:63:8AFF:FF:FF:FF:FF:FF ARP Reply :22:6B:45:1F:1B00:16:D3:23:63:8A  Before sending a DNS query, Bob must first discover the MAC address of the router through ARP

6 A Day in the Life of a Webpage Request GUC /24 00:22:6B:45:1F:1B ISP /13 DNS Server Google / DNS query: :16:D3:23:63:8A00:22:6B:45:1F:1B  To send HTTP request, Bob’s browser has to create a TCP socket. Thus, it needs the IP address of Bob 00:16:D3:23:63:8A DNS reply: MAC of DNSMAC of default R

7 A Day in the Life of a Webpage Request  To establish TCP connection, TCP SYN packet is sent GUC /24 00:22:6B:45:1F:1B ISP /13 DNS Server Google / Bob 00:16:D3:23:63:8A :16:D3:23:63:8A00:22:6B:45:1F:1B MAC of web serverMAC of default R

8 A Day in the Life of a Webpage Request  Finally HTTP request can be sent GUC /24 00:22:6B:45:1F:1B ISP /13 DNS Server Google / HTTP Request: google search :16:D3:23:63:8A00:22:6B:45:1F:1B Bob 00:16:D3:23:63:8A HTTP Reply: search results MAC of web serverMAC of default R

Solved Problems 1-9 Introduction I

Q1: Delays  Host A wishes to send a file of size 4 Mbits to Host B. The path from Host A to Host B has three links of rates R 1 = 500 kbps, R 2 = 1 Mbps, R 3 = 2 Mbps. The propagation speed is 2×10 8 m/s over all links and the lengths of the links are D 1 = 2 km, D 2 = 3 km, D 3 = 2 km. The processing time for each intermediate router is 0.1 × Transmission time. Ignore delays due to queuing and TCP and assume the file is transmitted directly (HTTP is not used).  What is the throughput of the path from Host A to Host B?  What is the total delay of transmitting the file?

Q1: Solution Transport Layer 1-11

Q2: Transport layer protocols Transport Layer 1-12  A sender, A, and receiver, B, are using the pure selective repeat protocol at the Transport Layer. Both sender and receiver windows can hold a maximum of 4 packets. Initially the sender and receiver windows are synchronized at [0, 1, 2, 3]. Only A is sending data to B. Complete the diagram below by specifying the sender’s window, receiver’s window, the sequence number of the buffered packets and of the ACKs, and any packets that are delivered to the network layer for the following succession of events. Assume NAKs and cumulative ACKs are not used.

Transport Layer 1-13

1-14

Q3: TCP Transport Layer 1-15  Consider two hosts A and B that are communicating over a TCP connection. Assume that the initial sequence numbers for A and B are 44 and 70, respectively. The figure below shows the exchange of messages between A and B. Assuming that the system is able to buffer packets that are received out of order, fill in the blanks for sequence numbers and acknowledgment numbers.

Q3: TCP Transport Layer 1-16

Q3: Solution Transport Layer 1-17

Q4: Congestion Control 1-18 Consider a host that is sending data over a TCP connection with the following initial values: cwnd = 1 MSS, ssthresh = 50 MSS. Suppose that the receiver buffer size = 20 MSS, and the receiver processing speed is 2 MSS per RTT. Draw a table that shows the sender rate of sending versus RTT (How many MSS per RTT) for the first 15 RTT. Note that three duplicate ACKs are received in the 5th RTT. TCP Reno is used.

Q4: Solution 1-19

Q5: Routing 1-20  The figure represents a network of one client (A), one server (G), and a series of routers (B  F). Use Dijkstra’s algorithm to determine the best paths from (A) to all other nodes in the network (warning: points will be given for the steps of the algorithm. Simply indicating the best paths without showing the steps will not be rewarded).  Draw the forwarding table at (A).

Q5: Solution 1-21

Q6: IP Addresses 1-22 An organization has 7 LANs as shown in the figure. The organization has a network address x. Determine:  The network address for each LAN.  The IP addresses of the hosts (H1  H6) and the routers shown in the figure. Note that LAN 7 has no hosts but requires IP addresses.  The maximum number of hosts that can be connected to each of the first 6 LANs (LAN1  LAN 6).

Q6: Solution Transport Layer networks  3 subnet bits and 5 host bits. Thus, max no. of hosts is 32 Network address LAN 1: LAN 2: LAN 3: LAN 4: LAN 5: LAN 6: LAN 7: Host address LAN 1: , LAN 2: , LAN 3: , LAN 4: , LAN 5: , LAN 6: , LAN 7: , Number of hosts 2^5 = = 30