Sie sind auf Seite 1von 5

ECE 450 Computer Networks Test 2 Review Guide Spring 2013

Problem 1. Complete the practice quiz for Chapter 7 IP protocol Problem 2 Complete the practice quiz for Chapter 8 ARP Problem 3. Complete the practice quiz for Chapter 9 ICMP Problem 4 Complete the practice quiz for Chapter 13 transport layer Problem 5. Complete the practice quiz for Chapter 14 UDP Problem 6. Complete the practice quiz for Chapter 15 TCP Problem 7. Complete the practice quiz for Chapter 19 DNS Problem 8. Complete the practice quiz for Chapter 22 WWW and http Problem 9. Explain the operation of the ARP protocol Address Resolution Protocol (ARP)- Will try to find the destination MAC address by sending a broadcast message of the destination IP to all the device on the network. Only the device with the matching IP will respond. The other device will drop the ARP message. ARP will save that destination MAC address into cache so next time it know where the destination device locate. When it request it broadcast, when the destination response it unicast. Problem 10 Compare and contrast dynamic and static mapping Dynamic IP addresses can change each time you connect to the Internet, while static IP addresses are reserved for you statically and don't change over time. Dynamic IP addresses are the normal customer access method used by most ISPs or Service Providers. When you do NOT need static IP addresses If you browse the Internet. When you need Static IP Addresses You run one or more Web server's directly on your site that require external access (from the Internet or an Extranet). You run one or more E-mail server's directly on your site that require external access (from the Internet or an Extranet).

If you download or upload files.

If you use Instant message services or chat services.

You run one or more FTP server's directly on your site that require external access (from the Internet or an Extranet)

Problem 11. Explain the types of ICMP messages that can be issued by ICMP Category Error-reporting messages Type 3 4 Message Destination unreachable- can be created only by the destination host. Source quench- informs the source that a datagram has been discarded due to congestion in a router or the destination host. The source must slow down the sending of datagrams until the congestion is relieved. Time exceeded-when a datagram time-to-live value is zero, the router discard the datagram and return a time exceeded message back to source. Or When the final destination does not receive all of the fragments in a set time, it discards the received fragments and sends a time exceeded message back to source. Parameter problem- can be created by a router or the destination host. Redirection- is sent from a router to a host on the same local network. Echo request or reply- is sent by the host or router that receives an echo-request message. Can be used by network managers to check the operation of the IP protocol. Can test the reachability of a host by invoking the ping command. Timestamp request or reply- can be

11

12 5 Query Messages 8 or 0

13 or 14

used to calculate the round-trip time between a source and a destination machine even if their clocks are not synchronized. The error-reporting messages report problems that a router or a host (destination) may encounter when it processes an IP packet. The query messages, which occur in pairs, help a host or a network manager get specific information from a router or another host. Problem 12. Compare and contrast UDP and TCP TCP does re-requesting, UDP does not. If a packet is missed in TCP, the stack relays this, an TCP makes sure every pack arrives and each packet is sorted back in order. TCP slows down the flow of information if there is congestion. TCP is good when data integrity is important eg. Emails and webpages. d rerequests. UDP will just ignore missed packets. UDP (user datagram protocol) in comparison, sends packets rapidly one after another with little checking and no sense of order of packets. Even though packets are sent in an orderly fashion, they may arrive disorderly. UDP on the receiving end does not sort packets that arrive out of order. UDP does have a checksum which can be used for checking packet integrity but in most cases even if the packet has been found to be corrupt, it is too late to re-request that packet. Online audio/video streaming can use UDP because it is fast and quality is not top priority. Problem 13 Compare and contrast the internet and the World Wide Web The Internet Governed by: Dependency: Internet Protocol (IP) This is the base; Independent of the World Wide Web Hardware World Wide Web Hyper Text Transfer Protocol (HTTP) It depends on the Internet to work. Software

Nature:

Problem 14 Explain fragmentation, discuss the purposes and operation related to fragmentation

Problem 15 Explain the three way handshake in TCP Host A sends a TCP SYNchronize packet to Host B Host B receives A's SYN Host B sends a SYNchronize-ACKnowledgement Host A receives B's SYN-ACK Host A sends ACKnowledge Host B receives ACK. TCP socket connection is ESTABLISHED. Problem 16. Explain windows in TCP and the silly window syndrome Silly window syndrome is defined as small amounts of TCP data (instead of maximum segment sized) packets being sent. This is avoided by: The receiver not advertising small windows. The sender must not transmit data unless: A packet is at least as large as the maximum segment size, or A packet with data which is half of the remote host's window size may be sent, or All of the output data may be sent and there is no unacknowledged data or the NAGLE algorithm is disabled. Problem 17 List the design goals for DNS Creation Of A Global, Scalable, Consistent Name Space Local Control Over Local Resources Distributed Design To Avoid Bottlenecks Application Universality Multiple Underlying Protocol Support Hardware Universality

Problem 18 Explain the operation of an iterative DNS server An iterative name query is one in which a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data. If the queried DNS server does not have an exact match for the queried name, the best possible information it can return is a referral (that is, a pointer to a DNS server authoritative for a lower level of the domain namespace). The DNS client can then query the DNS server for

which it obtained a referral. It continues this process until it locates a DNS server that is authoritative for the queried name, or until an error or time-out condition is met. Problem 19 Explain the operation of a recursive DNS server A DNS server does not have the requested information when it receives a recursive query, it queries other servers until it gets the information, or until the name query fails. Problem 20 Explain http The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access data on the World Wide Web. HTTP functions like a combination of FTP (Chapter 21) and SMTP (Chapter 23). It is similar to FTP because it transfers files and uses the services of TCP. However, it is much simpler than FTP because it uses only one TCP connection. There is no separate control connection; only data are transferred between the client and the server. Problem 21 Explain the operation of an httpd server It is designed to be run as a standalone daemon process. When used like this it will create a pool of child processes or threads to handle requests. Problem 22. Explain the differences between an iterative and a concurrent server An iterative server handles both the connection request and the transaction involved in the call itself. Iterative servers are fairly simple and are suitable for transactions that do not last long. However, if the transaction takes more time, queues can build up quickly. For lengthy transactions, a different sort of server is needed the concurrent server, as shown in Figure Figure 5. Here, Client A has already established a connection with the server, which has then created a child server process to handle the transaction. This allows the server to process Client B's request without waiting for A's transaction to complete. More than one child server can be started in this way.

Das könnte Ihnen auch gefallen