Review CS 3516 – Computer Networks. Protocol What does a network protocol do?

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Introduction 2 1: Introduction.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
8-1 Last time □ Network layer ♦ Introduction forwarding vs. routing ♦ Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding.
Chapter 1 Review Csc4220/6220 Computer Networks Instructor: Akshaye Dhawan.
CS 381 Introduction to computer networks Lecture 2 1/29/2015.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
Lecture 2 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Internet Overview: roadmap 1.1 What is the Internet? (A simple overview last week) Today, A closer look at the Internet structure! 1.2 Network.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
CS335 Networking & Network Administration Tuesday, April 20, 2010.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Announcement r Project 2 Extension ? m Previous grade allocation: Projects 40% –Web client/server7% –TCP stack21% –IP routing12% Midterm 20% Final 20%
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
Lecture 8 Modeling & Simulation of Communication Networks.
Chapter 4 Queuing, Datagrams, and Addressing
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 4 Network Layer.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Network Layer Lecture # 2 MAHS. 4: Network Layer 4b-2 Hierarchical Routing scale: with 200 million destinations: r can’t store all dest’s in routing tables!
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Introduction 1-1 1DT057 Distributed Information Systems Chapter 1 Introduction.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
Network Processing Systems Design
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Part 0: Networking Review
Slides taken from: Computer Networking by Kurose and Ross
Scaling the Network: The Internet Protocol
Course Review 2015 Computer networks 赵振刚
MAC Addresses and ARP 32-bit IP address:
ARP: Address Resolution Protocol
Hubs Hubs are essentially physical-layer repeaters:
CPE 401 / 601 Computer Network Systems
Overview The Internet (IP) Protocol Datagram format IP fragmentation
Scaling the Network: The Internet Protocol
DHCP: Dynamic Host Configuration Protocol
Network Basics and Architectures Neil Tang 09/05/2008
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Review CS 3516 – Computer Networks

Protocol What does a network protocol do?

Protocol What does a network protocol do? 1) define format 2) order of msgs sent and received among network entities 3) actions taken on msg transmission, receipt

Home Access Networks What are some of the main differences between DSL and Cable for home network access?

Home Access Networks What are some of the main differences between DSL and Cable for home network access? DSL – Uses existing telephone infrastructure – 1 Mbps up, 8 Mbps down – dedicated physical line Cable –Uses existing cable infrastructure –2 Mbps up, 30 down –Shared access to headend

Traversing the Core What are two fundamentally different ways of getting packets across the network core?

Traversing the Core What are two fundamentally different ways of getting packets across the network core? Circuit switching –Call setup, dedicated resources, no sharing Packet switching –No setup, resources used as needed and available, sharing

Delay What are the four sources of delay in a network node?

Delay What are the four sources of delay in a network node? d proc = processing delay d queue = queuing delay d trans = transmission delay d prop = propagation delay

Layering Why are networks composed of layers? What are the layers in the Internet Protocol stack?

Layering Why are networks composed of layers? What are the layers in the Internet Protocol stack? Helps deal with complexity; modularization Application, transport, network, data-link, physical

Security What are sources of malware over a network?

Security What are sources of malware over a network? Trojan horse –Hidden part of some otherwise useful software Virus –infection by actively receiving object (e.g., attachment); self-replicating Worm –infection by passively receiving, self replicating

Architectures What is a hybrid architecture (in the context of this class)? Provide an example.

Architectures What is a hybrid architecture (in the context of this class)? Provide an example. Combines Client-Server (i.e. centralized server for some functionality) and P2P (for exchange of information/data) Example: IM – server for login, help peers find each other, P2P for exchange of messages

Process What is a process? Do pure P2P applications have server processes?

Process What is a process? Do pure P2P applications have server processes? A process is a program running on a host Yes, P2P architectures still have server processes –Client process: process that initiates communication –Server process: process that waits to be contacted

Transport Services to Application Layer What are the possible services that a Transport Layer provides?

Transport Services to Application Layer What are the possible services that a Transport Layer provides? Data loss Timing Throughput Security

Persistent versus Non-Persistent HTTP What is the difference between a persistent versus a non-persistent HTTP connection?

Persistent versus Non-Persistent HTTP What is the difference between a persistent versus a non-persistent HTTP connection? Nonpersistent HTTP At most one object is sent over a TCP connection. Persistent HTTP Multiple objects can be sent over single TCP connection between client and server.

Cookies What is an HTTP cookie? What is it used for?

Cookies What is an HTTP cookie? What is it used for? A header line in an HTTP request or response message that can be stored on a client browser Used to identify a client session at a browser since HTTP is effectively stateless

Web Cache Why use a Web Cache?

Web Cache Why use a Web Cache? Reduce response time for client request Reduce traffic on an institution’s access link

DNS Hierarchy What is the DNS hierarchy? Why is DNS organized in a hierarchy instead of being centralized?

DNS Hierarchy What is the DNS hierarchy? Why is DNS organized in a hierarchy instead of being centralized? Reasons –single point of failure, traffic volume, maintenance  doesn’t scale! Root DNS Servers com DNS servers org DNS serversedu DNS servers poly.edu DNS servers umass.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers

P2P Broadly, when can P2P file distribution be faster than Client-Server file distribution?

P2P Broadly, when is P2P file distribution efficient compared to Client-Server file distribution? When: –There are numerous clients –Server uplink capacity is the bottleneck –Clients have sufficient uplink capacity to participate in distribution

BitTorrent What is a tracker? What is a torrent?

BitTorrent What is a tracker? What is a torrent? tracker: tracks peers participating in torrent torrent: group of peers exchanging chunks of a file

What Messages are Exchanged by TCP During a Connection Setup?

What is Congestion in the Internet?

What is Congestion in the Internet? What Happens?

Informally: “too many sources sending too much data too fast for network to handle” Different from flow control! –(sender won’t overflow receiver’s buffer by transmitting too much, too fast) Manifestations: –Lost packets (buffer overflow at routers) –Long delays (queueing in router buffers)

How Does TCP Determine Rate and Infer Congestion?

D ecentralized: each TCP sender sets its own rate, based on implicit feedback: - ACK: segment received (a good thing!), network not congested, so increase sending rate - lost segment: assume loss due to congested network, so decrease sending rate

What is “Additive Increase, Multiplicative Decrease” in Relation to TCP Congestion Control?

Linear Increase - For each “cwnd’s worth” of packets successfully sent, increase cwnd by 1 packet Multiplicate Decrease - When loss, halve cwnd

Is TCPSlow Start Really Slow?

Every time an ACK arrives, cwnd is incremented  cwnd is effectively doubled per RTT “epoch”.

What is the Difference between Forwarding and Routing

forwarding: move packets from router’s input to appropriate router output routing: determine route taken by packets from source to destination

What is an MTU? Why Does it Matter for the Network Layer?

MTU = Maximum Transmission Unit –largest possible link-level frame IP datagrams larger than MTU are fragmented reassembly

What is DHCP?

DHCP: Dynamic Host Configuration Protocol Allows hosts to dynamically obtain its IP address from network server when it joins network –Plus first hop router –Plus name server

Why NAT?

Motivation: local network uses just one IP address as far as outside world is concerned: –Range of addresses not needed from ISP: just one IP address for all devices –Can change addresses of devices in local network without notifying outside world –Can change ISP without changing addresses of devices in local network –Devices inside local net not explicitly addressable, visible by outside world (a security plus)

In Forwarding IP Datagrams, What Layer Does NAT Violate and How?

Violates upper layer (Transport) boundary Modifies Port number

What are “Global” Routing Algorithms Called? What are “Decentralized” Routing Algorithms Called?

Global: All routers have complete topology, link cost info “link state” algorithms Decentralized: Router knows physically-connected neighbors, link costs to neighbors Iterative process of computation, exchange of info with neighbors “distance vector” algorithms

Compare and Contrast LS vs. DV

DV –Exchange information with neighbors when change in tables –Compute route based on distance to neighbor plus neighbors estimate LS –Flood link information periodically –Compute route based on full topology and link information

What and Why Hierarchical Routing?

Scale: with 200 million destinations: Can’t store all dest’s in routing tables! Routing table exchange would swamp links! Administrative autonomy Internet = network of networks Each network admin may want to control routing in its own network

What is a CRC?

Cyclic Redundancy Check View data bits, D, as a binary number Choose r+1 bit pattern (generator), G Goal: choose r CRC bits, R, such that – exactly divisible by G (modulo 2) –Receiver knows G, divides by G. If non-zero remainder  error detected! –Can detect all burst errors less than r+1 bits Widely used in practice (Ethernet, WiFi)

What are the 3 Broad Classes of MAC Protocols?

Three broad classes: Channel Partitioning –Divide channel into smaller “pieces” (time slots, frequency) –Allocate piece to node for exclusive use Random Access –Channel not divided, allow collisions –“Recover” from collisions Taking turns –Nodes take turns, but nodes with more to send can perhaps take longer turns

Why is ALOHA Inefficient? How to Fix in Wired Networks?

Empty slots and collisions Can fix with: –CA – Collision Avoidance – listen before transmit –CD – Collisions Detection – stop transmitting upon hearing collision

What Problem Does ARP Solve? And How?

How to determine MAC address of B knowing B’s IP address broadcasts ARP query packet, containing B's IP address –dest MAC address = FF-FF-FF-FF-FF-FF –all machines on LAN receive ARP query B receives ARP packet, replies to A with its (B's) MAC address –frame sent to A’s MAC address (unicast) A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out)