ECSE-6600: Internet Protocols Exam 2 - SOLUTIONS

Slides:



Advertisements
Similar presentations
Internetworking II: MPLS, Security, and Traffic Engineering
Advertisements

Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
CS 164: Global Internet Slide Set In this set... More about subnets Classless Inter Domain Routing (CIDR) Border Gateway Protocol (BGP) Areas with.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) Points: 50 YOUR NAME: Be.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Extending Networks. Three Levels of Extension Physical Layer –Repeaters Link Layer –Bridges –Switches Network –Routers: “Connecting networks”
Routing and Routing Protocols
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
IP Multicast COSC Addressing Class D address Ethernet broadcast address (all 1’s) IP multicast using –Link-layer (Ethernet) broadcast –Link-layer.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Multiple Protocol Support: Multiprotocol Level Switching.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) [Hint: spend time roughly.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 80 min (strictly enforced) [Hint: spend time roughly.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Routing and Routing Protocols CCNA 2 v3 – Module 6.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Homework 4 Out: Fri 2/24/2017 In: Fri 3/10/2017.
Multi Protocol Label Switching (MPLS)
Advanced Computer Networks
TRANSPORT LAYER BY, Parthasarathy.g.
Network Layer, and Logical Addresses
Networking CS 3470, Section 1 Sarah Diesburg
Whirlwind Tour Of Lectures So Far
Routing BY, P.B.SHANMATHI.
Homework 4 Out: Fri 2/26/2016 In: Fri 3/11/2016.
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
ICMP ICMP – Internet Control Message Protocol
Chapter 4: Network Layer
Network Layer Goals: Overview:
CIS, University of Delaware
Multi Protocol Label Switching (MPLS)
ECSE-6600: Internet Protocols
Routing.
Cisco Real Exam Dumps IT-Dumps
What’s “Inside” a Router?
Network Core and QoS.
Static Routing 1st semester
Using Link Cost as a Metric
Network Layer I have learned from life no matter how far you go
PRESENTATION COMPUTER NETWORKS
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Internet Protocol, Version 6 (IPv6)
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
COMP/ELEC 429/556 Introduction to Computer Networks
IP Multicast COSC /5/2019.
Computer Networks Protocols
Routing.
Multicasting Unicast.
Internet Protocol version 6 (IPv6)
Network Core and QoS.
Presentation transcript:

ECSE-6600: Internet Protocols Exam 2 - SOLUTIONS Time: 75 min (strictly enforced) [Hint: spend time roughly in proportion to the points allocated to questions] Points: 40 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will not earn (partial) credit. Brief, clear and consistent explanation will.}

[10 pts] 1. Intra-Domain Routing Protocols: Explain the similarities/differences between OSPF and PNNI (5 pts). How does MPLS facilitate traffic engineering beyond what OSPF or PNNI provide (5 pts)? [Reminder: be brief! You have to answer many questions in limited time.] Similarities between PNNI and OSPF – Link state routing protocols, scalable to large network sizes, support hierarchical routing, and support QoS. Differences – PNNI uses source routing and mechanisms such as crank back upon route failures, whereas OSPF does not. This allows PNNI to support tunneling better than OSPF. OSPF is generally used over connectionless network layer protocols, whereas PNNI is used in ATM networks where signaling is used to establish connections. PNNI guarantees better QoS due to the use of signaling in addition to source routing. MPLS provides the abstraction of transparent tunneling based on explicit source routed circuits. The choice of the route is decoupled from the problem of traffic mapping onto the route providing greater flexibility. Global Ids (IP addresses) are mapped to local ids or labels, which are short and very few in number making switching decisions fast. Network utility is considered a part of route setup providing for traffic engineering, above and beyond QoS routing.

MED – Indicates receiver preference to control the inbound traffic [10 pts] 2. Inter-Domain Routing Protocols: Explain why path-vector & attribute-based vectoring is preferred to link-state routing in Inter-domain routing (4 pts)? What mechanisms are used in BGP (and how are they used) to facilitate in-bound and out-bound traffic engineering for an AS (6 pts). Inter-domain routing has a different set of requirements – (a) Reachability rather than optimal routes, (b) Scalability, to support the size of the internet, (c) There is a need to aggregate addresses to minimize core routing table sizes and associated control traffic, and (d) Need to support policy based routing. Link state routing is difficult to employ given the lack of information (hidden link states) and trust across AS’s. Also it suffers from scalability and privacy issues. Therefore the path-vector and attribute-based vectoring is preferred to link state routing. BGP allows for exchange of reachability information across AS and facilitates policy based routing. The various load balancing knobs to facilitate in-bound and out-bound traffic engineering include : Local Pref. – controls outbound traffic by preferring one exit path over another. AS prepending – To reduce inbound traffic, AS path length is artificially inflated. MED – Indicates receiver preference to control the inbound traffic CIDR subverting – Advertise different length prefixes for the same set of addresses to provide load balancing in inbound traffic. Inbound control knobs may lead to varying degrees of success compared to outbound knobs.

[10 pts] 3. Congestion Control: Explain how methods like AQM schemes (eg: RED), multi-bit feedback (eg: ERICA, VCP) and FEC integration (LT-TCP) improve performance of transport protocols (6 pts)? What is the concept of TCP friendliness (2 pts)? How do the binomial schemes allow a family of schemes to be TCP friendly (2 pts)? AQM (RED) schemes send early signals of congestion to sources by marking/dropping packets randomly to avoid congestion and lead to good overall performance. Multibit feedback schemes allow fine grained control of the operating point in the network by explicitly providing the senders with rates they should send traffic at. FEC integration provides robust error recovery and reduces the need for retransmissions over lossy wireless links. Together these schemes achieve high throughput and low delay, and also allow for bursty traffic patterns. TCP friendly congestion control scheme should not take more than its fair share of the link when operating together with other flows which use TCP. It should be fair to TCP, match its long term performance and should have the same utility functions. These properties are desirable in order for new CC schemes to co-exist with TCP. Binomial congestion control schemes use parameters k, l to increment/decrement their window size. Such schemes are TCP friendly if k + l = 1. Basically they react similarly to the lack or presence of congestion by reducing or increasing the congestion window size in a similar (aggressive) manner. If k + l = 1, then the rate is proportional to 1/sqrt(p) which is inline with TCP’s performance, and also results in equivalent utility functions.

[10 pts] 4. Multicast: Why is the multicast transport reliability problem is very different from unicast reliability (3 pts)? How are mechanisms like subcast, FEC, feedback aggregation useful (2 pts)? Explain the drop-to-zero and TCP-friendliness problems in single-rate multicast congestion control (3 pts). How does RLM achieve multi-rate multicast congestion control (2 pts)? Multicast transport reliability is different because – (a) Senders can not keep state information for a number of receivers. Also the receivers can join or leave dynamically. (b) Algorithms like TCP which use path properties like RTT estimation don’t generalize to trees. (c) There are other issues such as (N)ACK implosions and exposures. (d) Retransmissions need to be filtered. Subcast – send retransmissions only to a selected group of receivers. This addresses the exposure issue. FEC uses forward error correction schemes and thus avoids (N)ACK implosions. Feedback aggregation at routers also avoids the flooding of sender with a large number of (N)ACKs. Drop to zero – In single-rate multicast sessions, if every packet loss is considered to be a signal of congestion, the congestion window (and the throughput) would quickly drop to 0. Note that a packet can get lost along multiple paths to receivers, leading to multiple packet losses corresponding to one packet sent. There is a need to be TCP friendly and not take too much bandwidth, however at the same time do not over react to packet losses. RLM provides multi-rate multicast CC using a prioritized set of multicast groups. Receivers subscribe to max group with minimum drops. It is receiver driven and adaptive to available capacity. Receivers may subscribe to higher layers or drop a layer as needed.

[10 pts] 5. IPv6: How does IPv6 use its abundance of address space to simplify/consolidate auto-configuration, renumbering, address allocation, neighbor discovery etc (6 pts)? How does the dual-stack and 6-to-4 automatic tunneling approaches help deal with the transition issues (4 pts)? IPv6 auto-configuration allows for plug-and-play as the host can use its MAC address as the host portion of its IPv6 address. In stateless auto-configuration, for the network prefix, the host multicasts requests to All routers on the link. If no router present, the host uses link-local address, else it uses the prefix provided by the router. In stateful configuration, to prevent everyone from connecting, the router asks the host to multicast to All DHCP servers to get an IP address. Host renumbering occurs when the prefix changes due to a change in subnet (provider) address. Hosts learn about prefix changes through router advertisements. Router renumbering protocol allows domain-interior routers to learn of prefix introduction/withdrawal. ICMPv6 allows for neighbor discovery by combining features from ARP and Router discovery (also ICMP, IGMP). A source maintains various levels of caches for destinations, prefixes, routers and neighbors. Dual stack allows for indefinite coexistence of both IPv4 and v6. Allows for gradual upgrade to IPv6 on an application-by-application basis. It allows the applications to choose between v4 and v6. However it requires applications to be able to talk to both IPv6 and v4. Requires name lookup before connection establishment. It is an application level mechanism. 6-to-4 auto tunneling sends IPv6 packets over IPv4 tunnels. 6-to-4 allows stateless auto-tunnels establishment where the IPv4 address is used as the IPv6 site address. It is more transparent to the applications. It requires tunnel end points to be dual stack and requires some manual configuration of IPv4 addresses. Additional processing is also required at tunnel end points. Enables auto tunneling on packet by packet basis.