Final Project

Computer Networks

ITI-510 Section 13

 

Please submit the following project in either Microsoft Word or email (text) format via email to Chris Uriarte (chrisjur@cju.com).

 

The final project:

 

  1. Use utilities like traceroute (/usr/bin/traceroute) and ping to describe the network connection between iti.rutgers.edu and www.berkeley.edu.  Describe the round-trip times between the two points.  Describe the path taken from one machine to the other (How many routers are between the two?  What service providers own those routers?  Etc. etc.)

 

  1. Use traceroute to trace the path between iti.rutgers.edu and some other host on the   Internet.  Repeat the traceroute to this exact host two or three more times.  Notice that the first time you run a traceroute to that site, it takes longer than subsequent traceroutes to the same host.  Why do you think this occurs?

 

  1. Assume that you have a 56Kbit/sec link between your computer and another host on a TCP/IP network.  You want to transfer a 56Kbit file between the two hosts and employ a monitoring tool to measure total transfer time between them.  You believe that a 56Kbit file should take exactly 1 second on a 56Kbit/sec link. However, you notice that the file transfer ALWAYS takes longer than 1 second.   How do you explain this occurrence?

 

  1. Your company is opening a new branch office and your boss wants you to order a new T1 line for Internet access.  Who would you call first to provision this line?  Assuming you have no networking equipment, what equipment will you have to purchase to enable a medium-sized LAN (50-75 computers) to access the Internet?  What information will you need from your Internet Service Provider to bring these computers online? 

 

  1. Your network administrator has just left the company and you need to configure new PCs on a new segment of network, connected to an ISP via a T1.  You know that the address of the router connected to the T1 is 123.4.5.1, but you don’t have any additional details about the IP addressing scheme assigned to you by your ISP.  One of your system administrators is 100% sure the ex-network admin requested a block of 128 IP addresses from the ISP.  Based on this information:  What is the useable range of IP addresses you can assign to hosts on your network?  What is the subnet mask for the hosts on the network?  What should be the default gateway for hosts on the network?  What is the broadcast address for this particular subnet?

 

  1. Two network programmers write a similar application that connects to a remote server and receives a list of stock quotes.  Version A of the application uses UDP/IP to communicate with the server.  Version B other version uses TCP/IP to connect to the server.   Describe the differences one might encounter when using both these programs?  What type of “extra work” might the programmer of Version A (UDP version) have to do to achieve reliability when data is transferred?

 

  1. Describe the routing table of the host below:

 

Routing Table:

  Destination           Gateway           Flags Interface

-------------------- -------------------- ----- ---------

128.6.13.0           128.6.13.3            U      hme0

224.0.0.0            128.6.13.3            U      hme0

default              128.6.13.21           UG     

127.0.0.1            127.0.0.1             UH     lo0

 

  1. PPP (Point-to-Point-Protocol) is a Data Link Layer (Layer 2) protocol commonly used in Dialup connections.  How must this protocol adapt when using TCP between two hosts vs. using UDP between hosts?   How do applications like web browsers and mail clients know that your network connection is using PPP as a layer 2 protocol rather than other layer 2 protocols, such as Ethernet?

 

  1. You type “www.yahoo.com” (or any other URL) into your web browser and hit ‘enter’ – what happens behind the scenes?  How do all the pieces fall into place to deliver the Yahoo! Homepage to your web browser?  Include details about protocols, network layers, applications involved, etc.