COS 461: Computer Networks Spring 2013

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

The subnet /28 has been selected to be further subnetted to support point-to-point serial links. What is the maximum number of serial links.
Taekyung Kim 0x410 ~ 0x International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 Comnet 2010 Communication Networks Recitation 6 Routing.
Unicast Routing Protocols: RIP, OSPF, and BGP
CS335 Networking & Network Administration Tuesday, April 20, 2010.
ROUTING PROTOCOL IGRP. REVIEW 4 Purpose of Router –determine best path to destination –pass the frames to the destination 4 Protocols –routed - used by.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.5 Routing algorithms m Link state m Distance.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
CSE123A discussion session 2007/03/08 Ryo Sugihara.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
Lecture 8 Modeling & Simulation of Communication Networks.
Introduction to networking (Yarnfield) Introduction to routing.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Virtual Circuit Network. Network Layer 2 Network layer r transport segment from sending to receiving host r network layer protocols in every host, router.
A day in the life: scenario
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
Network Programming Eddie Aronovich mail:
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
Lecture #3 OSPF Asst.Prof. Dr.Anan Phonphoem Department of Computer Engineering, Faculty of Engineering, Kasetsart University, Bangkok, Thailand.
Networking and internetworking devices. Repeater.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
4: Network Layer4a-1 Distance Vector Routing Algorithm iterative: r continues until no nodes exchange info. r self-terminating: no “signal” to stop asynchronous:
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Virtualization of networks
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CPSC 335 Data Communication.
A quick intro to networking
Introduction to TCP/IP
(How the routers’ tables are filled in)
COMP 3270 Computer Networks
Routing Information Protocol (RIP)
ICMP – Using Ping and Trace
Internet Networking recitation #4
Single-Area OSPF (Open Shortest Path First Protocol)
Network Architecture Introductory material
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
ECE 544 Protocol Design Project 2016
ICMP – Using Ping and Trace
Network Layer Path Determination.
Review of Important Networking Concepts
Chapter 6 The Data Link layer
Department of Computer and IT Engineering University of Kurdistan
RFC 1058 & RFC 2453 Routing Information Protocol
ECE453 – Introduction to Computer Networks
Network Layer I have learned from life no matter how far you go
COS 461: Computer Networks Spring 2014
Communication Networks
COMP/ELEC 429/556 Introduction to Computer Networks
Chapter 15. Connecting Devices
Communication Networks
Chapter 4: Network Layer
Module 9 Troubleshooting.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Chapter 4 Network Layer A note on the use of these ppt slides:
OSPF Protocol.
Presentation transcript:

COS 461: Computer Networks Spring 2013 Routing Recitation #3 COS 461: Computer Networks Spring 2013

Outline Fork() Wireshark Practice routing questions

Handle Multiple Clients using fork() Steps to handle multiple clients Go to a loop and accept connections using accept() After a connection is established, call fork() to create a new child process to handle it Go back to listen for another socket in the parent process close() when you are done

while (1) { fd = accept (srv_fd, (struct sockaddr. ) &caddr, &clen); while (1) { fd = accept (srv_fd, (struct sockaddr *) &caddr, &clen); ... pid = fork(); children++; /* child process to handle request */ if (pid == 0) { /* exit(0) on success, exit(1) on error */ } /* parent process */ else if (pid > 0) { while ((waitpid(-1, &status, WNOHANG)) > 0) children--; if (children > MAX_PROCESSES) else { perror("ERROR on fork"); exit(1); }}

Wireshark Selecting and listening on interface Root for promiscuous mode: sniff on neighbors! Writing filters to select packets “udp.dstport == 53”, “http.request_method is present” Examining packet formats Look at Ethernet, IP, TCP, HTTP headers Following TCP streams Trace HTTP request(s) belonging to a TCP connection

Questions

Link State (Djikstra’s) dest link b (a,?) 6 e d c (a,?) 4 22 7 d (a,?) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,?) 4 22 7 d (a,?) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,?) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,f) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,f) b c 7 10 18 e (a,f) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,f) b c 7 10 18 e (a,f) a f 4 f (a,f)

Which routing protocol requires the least amount of state on the router? link state distance vector path vector

Which routing protocol requires the least amount of state on the router? link state distance vector path vector

Which of the following, if true, ensures packets from a to e always traverse c? B. Y > X + 1 C. Y > X D. A or B D

Which of the following, if true, ensures packets from a to e always traverse c? B. Y > X + 1 C. Y > X D. A or B D

Which of the following, if true, ensures packets from b to e always traverse d? B. Y > X + 1 C. Y > X D. A or B B

Which of the following, if true, ensures packets from b to e always traverse d? B. Y > X + 1 C. Y > X D. A or B B

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A B C D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C 11 D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C 11 D 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 11 12 5 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A Inf --- B C 11 D 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B Inf --- C 11 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B 29 C 11 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B 29 C 11 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B 29 C 11 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 32 D B 29 C 11 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 29 11 D 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 28 11 D 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 28 11 D 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 28 11 D 16

Distance Vector Routing B 18 C X 12 5 11 A D E 15 17 For what value of x does the routing table at E not change anymore after two iterations? For all X >= 2 For all X >= 3 For all X <= 4 For all X <= 3

Distance Vector Routing B 18 C X 12 5 11 A D E 15 17 For what value of x does the routing table at E not change anymore after two iterations? For all X >= 2 For all X >= 3 For all X <= 4 For all X <= 3