0% found this document useful (0 votes)
128 views

NET 256 Assignment

This document provides instructions for an assignment on computer network foundations due on April 15, 2023. It includes 3 chapters to answer questions on: 1) an overview of the internet including differences between intranet and extranet and components of end-to-end delay, 2) application layer protocols like telnet and SSH, and 3) the transport layer regarding why TCP may be preferred over UDP and examples of port numbers in SSH sessions. References and expectations are provided, late assignments will lose points, and answers should be in the student's own words.

Uploaded by

Mohamed Mostfa
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views

NET 256 Assignment

This document provides instructions for an assignment on computer network foundations due on April 15, 2023. It includes 3 chapters to answer questions on: 1) an overview of the internet including differences between intranet and extranet and components of end-to-end delay, 2) application layer protocols like telnet and SSH, and 3) the transport layer regarding why TCP may be preferred over UDP and examples of port numbers in SSH sessions. References and expectations are provided, late assignments will lose points, and answers should be in the student's own words.

Uploaded by

Mohamed Mostfa
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Computer Network Foundations - NET-256

Assignment (15%) due April 15th, 2023

Name: ________________________________
ID: ________________________________

Instructions:
a. Answer all the questions
b. Answers should be paraphrased with your own words
c. Copy answers are not accepted
d. Answers should be related to the question
e. Due Date: Saturday, April 15, 2023
f. Late submission will lose 25% of the total grade of the assignment
g. References:
1. Slides and Additional resources posted on BlackBoard
2. Selected readings of the textbook
h. Reference external resources

Chapter 1: Overview of the Internet


1. Explain the difference between Intranet and Extranet.

Intranet: It’s a private network owned and controlled by specific organization. And it’s not allowed
for any one to entre the network without valid password and username. Also it is a tool for sharing
information throughout the organization.
Extranet is owned by either a single or a many organization. is a tool for sharing information
between the internal members and external members.

2. Consider sending a packet from a source host to a destination host over a fixed route. List the delay
components in the end-to-end delay with a brief explanation of each. Which of these delays are
constant and which are variable?

processing delays: It is the time taken by a router to process the data


transmission delay: time consumed in pushing all the packets of data into a transmission medium
propagation delays: It is the time consumed by a signal to reach the destination
queuing delays: It is the time for which a signal or data packet has to wait in the buffer

Fixed Delays: processing delays, transmission delays, and propagation delays

Variable Delays: Queuing delays.


3. Describe layered architecture, network model types, and compare them

layered architecture: describes an architectural pattern composed of several separate horizontal


layers that function together as a single unit of software.

computer network models are responsible for establishing a connection among the sender and
receiver and transmitting the data in a smooth manner respectively. There are two computer
network models. OSI Model and TCP/IP Model on which the whole data communication process
relies.

OSI stands for “Open System Interconnection” .OSI model having a layered architecture, allows
easy data communication as each layer has predefined structured and functionalities. It Consists of
7 layers:
 Application layer
 Presentation layer
 Session layer
 Transport layer
 Network layer
 Data link layer
 Physical layer

TCP/IP stands for Transmission Control Protocol with the help of which, protocol implementation over
the network can be achieved. The TCP/IP model also has a layered architecture which allows easy data
communication along with the facility of integrating multiple protocols. The layout remains similar to
OSI Model but the number of layer, their functionalities and properties got changed.

TCP/IP has 5 layers:


 Application layer
 Transport layer
 Internet layer
 Network access layer

Chapter 2: Application Layer


1. Telnet and SSH are classified as Application Layer protocols. Explain the network service provided
by each, which Transport protocol they use, what is the difference between them, and give an
example of how they are used in network communication.

2. Recall that TCP can be enhanced with TLS to provide process-to-process security services,
including encryption. Does TLS operate at the transport layer or the application layer? If the
application developer wants TCP to be enhanced with TLS, what does the developer have to do?

SSL operates at the application layer. The SSL socket takes unencrypted data from the application
layer, encrypts it and then passes it to the TCP socket. If the application developer wants TCP to be
enhanced with SSL, she has to include the SSL code in the application.

Chapter 3: Transport Layer


1. Describe why an application developer might choose to run an application over TCP rather than
UDP.
They choose to run their applications over UDP because they want to avoid TCP's congestion
control. Also, some applications do not need the reliable data transfer provided by TCP.

2. Suppose Client X initiates a SSH session with Server Z. At about the same time, Client Y also
initiates a SSH session with Server Z. Provide possible source and destination port numbers for the
below segments, assuming that port number 1905 is assigned to the client process on Client X, and
port number 3011 is assigned to the client process on Client Y.
Note: SSH service is accessible on port 22

a. The segments sent from X to Z


Source port= 1905 , Destination port= 22
b. The segments sent from Z to X
Source port= 22 , Destination port=1905
c. The segments sent from Y to Z
Source port= 3011 , Destination port= 22
d. The segments sent from Z to Y
Source port= 22 , Destination port= 3011

e. If X and Y are different hosts, is it possible that the source port number in the segments
from X to Z is the same as that from Y to Z? Explain.
Yes, they are different hosts so there is no relation between there port number
f. If X and Y are Same hosts, is it possible that the source port number in the segments from
X to Z is the same as that from Y to Z? Explain.
No, once the port number taken by protocol, no one can use it . it called

Chapter 4: Network Layer


1. What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no
more than N routers? Explain how it works.
Its time to live TTL
The TTL count subtracts 1 from the TTL number each hop, which can be as high as 255. The
records continue to decrease , through each hop, to the destination . If the TTL count gets to
'zero,' this would mean the information has traveled across 255 hops. if this happens, the
requested 'packet' is automatically discarded
2. Internet checksum is used in both transport-layer segment (in UDP and TCP headers) and in
network-layer datagrams (IP header). Consider a transport layer segment encapsulated in an IP
datagram. Are the checksums in the segment header and datagram header computed over any
common bytes in the IP datagram? Explain your answer.
IP header checksum only computes the checksum of an IP packet's IP header fields, which share
no common bytes with the IP datagram's transport-layer segment part.
3. A packet of 5,500 Bytes arrives at a router and must be forwarded to a link with an MTU of 1500
bytes.
a. How many fragments may be generated? Explain.
Packet size is 5500 subtracting 20 bytes for header, that leaves 5480 bytes
The mtu = 1500 subtracting 20 bytes that leaves 1480 bytes
5480/1480 = 4 fragment
So we need 4 fragment
b. What are the flags and offset values for each fragment, assuming the DF flag was not set,
and the IP datagram header is 20 bytes? Show your answer.

Fragment 1: Length=1480 byte, D= 0 , M= 1, Offset= 0


Fragment 2: Length=1480 byte, D= 0 , M= 1 Offset= 185
Fragment 2: Length= 1480 byte, D= 0 , M= 1 Offset=370
Fragment 2: Length= 1060 byte, D= 0 , M= 0 Offset=555

c. When a large datagram is fragmented into multiple smaller datagrams, where are these
smaller datagrams reassembled? Explain.

Datagrams are reassembled at the destination, before being passed to the transport layer.

4. A router has the following (CIDR) entries in its Forwarding Table:

Destination Network Next Hop/Output link


Route 1 170.46.56.0/21 Interface 3
Route 2 170.46.48.0/20 Interface 1
Route 3 176.53.40.0/22 Router 1
Otherwise Default Route Router 2

The router is receiving packets with the below destination IP addresses:


Destination 1: 170.46.63.10/21
Destination 2: 145.46.52.2 /22
Destination 3: 176.53.40.7 /24
Destination 4: 170.46.67.14/21

Determine the next hop/outgoing interface for each of those packets. Destination 1 is solved for
you as an example. Complete a similar table as below for Destinations 2, 3 and 4, showing and
verifying your worked answers in the space below.

IP Address Address converted to Binary Best Match


Destination 1 170.46.63.10/21 10101010 . 00101110 . 00111111 . 00001010

Route 1 170.46.56.0/21 10101010 . 00101110 . 00111000 . 00000000 Interface 3


Route 2 170.46.48.0/20 10101010 . 00101110 . 00110000 . 00000000
Route 3 176.53.40.0/22 10110000 . 00110101 . 00101000 . 00000000
Otherwise Default Route
Route 1 has subnet mask /21 that means it has 2048 IP, so the IP 170.46.63.10/21 can be reached through
route 1 using interface 3
Route 1 matched with the destination with the first 21 bit that mean the ip is 170.46.56.0/21
So it pass through route 1

IP Address Address converted to Binary Best Match


Destination 2 145.46.52.2/22 10010001. 0010 1110. 00110100. 00000010

Route 1 170.46.56.0/21 10101010 . 00101110 . 00111000 . 00000000


Route 2 170.46.48.0/20 10101010 . 00101110 . 00110000 . 00000000
Route 3 176.53.40.0/22 10110000 . 00110101 . 00101000 . 00000000
Otherwise Default Route Router 2

There is no matching with any route, so the packet will pass through the default route using router 2
The first 22 bit mean that the ip is 145.46.52.0/22, so there is no matching with any ip so it pass through
the default route

IP Address Address converted to Binary Best Match


Destination 3 176.53.40.7 /24 10110000 . 00110101 . 00101000. 00000111

Route 1 170.46.56.0/21 10101010 . 00101110 . 00111000 . 00000000


Route 2 170.46.48.0/20 10101010 . 00101110 . 00110000 . 00000000
Route 3 176.53.40.0/22 10110000 . 00110101 . 00101000 . 00000000 Router 1
Otherwise Default Route

Route 3 has subnet mask /22 that means it has 1024 IP, so the IP 170.53.40.7/24 can be reached through
route 3 using router 1
Route 3 matched with the destination with the first 24 bit
The first 24 bit mean that the ip is 176.53.40.0/24 so there is matching with the route 3 ip so it pass
through route 3

IP Address Address converted to Binary Best Match


Destination 4 170.46.67.14/21 10101010 . 00101110 . 01000011. 00001110

Route 1 170.46.56.0/21 10101010 . 00101110 . 00111000 . 00000000


Route 2 170.46.48.0/20 10101010 . 00101110 . 00110000 . 00000000
Route 3 176.53.40.0/22 10110000 . 00110101 . 00101000 . 00000000
Otherwise Default Route Router 2

Route 1 has subnet mask /21 so it has 2048 IP not including the destination
Router 2 has subnet mask /20 so it has 4096 IP not including the destination
There is no matching with any route, so the packet will pass through the default route using router 2
The first 21 bit mean that the ip is 170.46.64.0/21 so there is no matching with any route, so it
pass through the default route using router 2.

You might also like