Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 2 Time: 60 min (strictly enforced) Points: 50 { 5 questions,

Slides:



Advertisements
Similar presentations
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS Time: 75 min (strictly enforced)
Advertisements

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4690: Experimental Networking Informal Quiz: TCP Shiv Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Shivkumar KalyanaramanRensselaer Q2-1 Internet Protocols: Quiz 2 q This quiz consists of true/false questions for 20 pts and four short answers/quantitative.
Transport Layer 3-1 outline r TCP m segment structure m reliable data transfer m flow control m congestion control.
Transport Layer 3-1 Fast Retransmit r time-out period often relatively long: m long delay before resending lost packet r detect lost segments via duplicate.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization –All routers are identical –Network is flat. Not true in Practice Hierarchical.
Transport Layer 3-1 Outline r TCP m Congestion control m Flow control.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME (1.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
CS335 Networking & Network Administration Tuesday, May 18, 2010.
Unicast Routing Protocols: RIP, OSPF, and BGP
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 4: More Routing, DNS True or False? T F  Path-vector based distance vector.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 3 True or False? T F  The Nagle algorithm in TCP is intended to allow the ack.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 1: SOLUTIONS Time: 75 min (strictly enforced)
Routing.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 Shivkumar.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Informal Quiz 3 True or False? T F  Forwarding works in the control plane whereas routing.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 2 Shivkumar Kalyanaraman:
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
TCP/IP Protocol Suite 1 Chapter 14 Upon completion you will be able to: Unicast Routing Protocols: RIP, OSPF, and BGP Distinguish between intra and interdomain.
CIS 725 Wireless networks. Low bandwidth High error rates.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 Time: 75 min (strictly enforced) Points: 50.
ECE 4110 – Internetwork Programming
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 80 min (strictly enforced) [Hint: spend time roughly.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
1 INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is referred.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Fall 2004FSU CIS 5930 Internet Protocols1 Second phase of the project Please check some networking textbooks for details on TCP and OSPF.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
NAT – Network Address Translation
Routing Protocols (RIP, OSPF, BGP)
COMP 3270 Computer Networks
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Routing.
Transport Layer Unit 5.
ECE453 – Introduction to Computer Networks
ECSE-4670: Computer Communication Networks (CCN)
CS4470 Computer Networking Protocols
BGP Instability Jennifer Rexford
Computer Networks Protocols
Computer Networks Protocols
Routing.
Review of Internet Protocols Transport Layer
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 2 Time: 60 min (strictly enforced) Points: 50 { 5 questions, each 10 points} YOUR NAME: Be brief, but DO NOT omit necessary detail Time: 60 min (strictly enforced) Points: 50 { 5 questions, each 10 points} YOUR NAME: Be brief, but DO NOT omit necessary detail

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 q 1. Explain the problem in the figure to the right. If any other link were replaced by the 1 Mbps link, would you still encounter the congestion problem ? Why ? What does this tell you about placement (provisioning) of high speed links in a network ? All links 19.2 kb/s Replace with 1 Mb/s S S S S S S S S S S S S S S S S File Transfer Time = 7 hours File Transfer time = 5 mins

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 q 2. We would like to control the rates of TCP flows using a network component which can manipulate TCP acks. You are given the desired rate (R) and round trip time (RTT) for a TCP flow. How would you enforce this maximum rate and spread packet transmissions over an RTT by only manipulating TCP acks ? Assume infinite traffic on top of TCP and no packet loss/bottlenecks elsewhere. Hint: Exploit TCP header fields & ack clocking

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 q 3. Why are “sequence numbers”, “checksums” and techniques like “aging” not required in RIP ? Why is “count-to-infinity” absent in OSPF? Why can transient loops form in OSPF?

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6 q 4. Default-free routing tables and policy routing are important problems of inter-domain routing protocols. Does BGP-4 address these problems ? If so, how ?

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7 q 5. Mention two ways in which the naming hierarchy different from the addressing hierarchy, given that names are of variable length and can be organized independent of addresses ? How is DNS (based on this hierarchy) scalable and yet efficient ?

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8 q 1. Explain the problem in the figure to the right. If any other link were replaced by the 1 Mbps link, would you still encounter the congestion problem ? Why ? What does this tell you about placement (provisioning) of high speed links in a network ? q A) The problem of congestion arises because the high speed access link overloads the next (low speed) link. High overload leads to packet losses, timeouts, retransmissions, loss of retransmitted packets, timer backoffs etc slowing down information transfer substantially. q B) No. Because there is no overload situation assuming traffic flows from left to right. q C) Lesson: Access links should be low speed, and high speed links should first be deployed in the core. q 1. Explain the problem in the figure to the right. If any other link were replaced by the 1 Mbps link, would you still encounter the congestion problem ? Why ? What does this tell you about placement (provisioning) of high speed links in a network ? q A) The problem of congestion arises because the high speed access link overloads the next (low speed) link. High overload leads to packet losses, timeouts, retransmissions, loss of retransmitted packets, timer backoffs etc slowing down information transfer substantially. q B) No. Because there is no overload situation assuming traffic flows from left to right. q C) Lesson: Access links should be low speed, and high speed links should first be deployed in the core. All links 19.2 kb/s Replace with 1 Mb/s S S S S S S S S S S S S S S S S File Transfer Time = 7 hours File Transfer time = 5 mins

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9 q 2. We would like to control the rates of TCP flows using a network component which can manipulate TCP acks. You are given the desired rate (R) and round trip time (RTT) for a TCP flow. How would you enforce this maximum rate and spread packet transmissions over an RTT by only manipulating TCP acks ? Assume infinite traffic on top of TCP and no packet loss/bottlenecks elsewhere. Hint: Exploit TCP header fields & ack clocking q We need to translate the rate into a window value because TCP flow is controlled by a window variable = min (cwnd, rcvr_wnd) q Compute: W = RTT*R. Overwrite the receiver window field in the acks by this value. Recompute & rewrite TCP checksum. q Now, given this window value (written in acks) and the knowledge that TCP rate at a given window is determined by the ack rate, release W/MSS acks spaced uniformly over an RTT. Acks need to be buffered and delayed till this point. This will spread out packet transmissions uniformly over RTT. q FYI, Packeteer (packeteer.com) makes such a product. q 2. We would like to control the rates of TCP flows using a network component which can manipulate TCP acks. You are given the desired rate (R) and round trip time (RTT) for a TCP flow. How would you enforce this maximum rate and spread packet transmissions over an RTT by only manipulating TCP acks ? Assume infinite traffic on top of TCP and no packet loss/bottlenecks elsewhere. Hint: Exploit TCP header fields & ack clocking q We need to translate the rate into a window value because TCP flow is controlled by a window variable = min (cwnd, rcvr_wnd) q Compute: W = RTT*R. Overwrite the receiver window field in the acks by this value. Recompute & rewrite TCP checksum. q Now, given this window value (written in acks) and the knowledge that TCP rate at a given window is determined by the ack rate, release W/MSS acks spaced uniformly over an RTT. Acks need to be buffered and delayed till this point. This will spread out packet transmissions uniformly over RTT. q FYI, Packeteer (packeteer.com) makes such a product.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10 q 3. Why are “sequence numbers”, “checksums” and techniques like “aging” not required in RIP ? Why is “count-to-infinity” absent in OSPF? Why can transient loops form in OSPF? q RIP uses a distance vector approach where it requires information about neighbors’ signposts (distance vectors), and the cost of adjacent links. Sequence numbers are required for duplicate detection, out-of-order detection etc. RIP information traverses just one link (which does not duplicate/reorder information) and therefore sequence numbers are unnecessary. Aging is used to deal with wrap around of sequence numbers -- not required when sequence numbers are not used. RIP runs over UDP and relies on the UDP checksum (OSPF runs over IP directly) q The count-to-infinity problem occurs because some vector element increases unboundedly due to lack of complete path information. OSPF reliably gathers an entire map at every node and knows complete path information. Therefore, loops cannot be formed by count-to-infinity. However, due to transient delays in transmitting a larger amount of state information over unreliable channels, inconsistent information can result in different nodes leading to loops. q 3. Why are “sequence numbers”, “checksums” and techniques like “aging” not required in RIP ? Why is “count-to-infinity” absent in OSPF? Why can transient loops form in OSPF? q RIP uses a distance vector approach where it requires information about neighbors’ signposts (distance vectors), and the cost of adjacent links. Sequence numbers are required for duplicate detection, out-of-order detection etc. RIP information traverses just one link (which does not duplicate/reorder information) and therefore sequence numbers are unnecessary. Aging is used to deal with wrap around of sequence numbers -- not required when sequence numbers are not used. RIP runs over UDP and relies on the UDP checksum (OSPF runs over IP directly) q The count-to-infinity problem occurs because some vector element increases unboundedly due to lack of complete path information. OSPF reliably gathers an entire map at every node and knows complete path information. Therefore, loops cannot be formed by count-to-infinity. However, due to transient delays in transmitting a larger amount of state information over unreliable channels, inconsistent information can result in different nodes leading to loops.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 11 q 4. Default-free routing tables and policy routing are important problems of inter-domain routing protocols. Does BGP-4 address these problems ? If so, how ? q BGP-4 uses a path-vector based distance vector approach. Every autonomous system is given an AS#, and reachability to (address prefixes in) AS’s is represented in terms of a path- vector of AS#s. q Default-free tables are maintained as follows. Each AS is responsible for advertising reachability info for every address prefix contained in it. Every inter-domain router collects and maintains reachability to all such prefixes, and hence are default-free. q Policy involves constraining the set of ingress/egress routers for subgroups of transit traffic. This is accomplished through filtering of routing advertisements and/or use of “communities” attribute in BGP advertisements. q 4. Default-free routing tables and policy routing are important problems of inter-domain routing protocols. Does BGP-4 address these problems ? If so, how ? q BGP-4 uses a path-vector based distance vector approach. Every autonomous system is given an AS#, and reachability to (address prefixes in) AS’s is represented in terms of a path- vector of AS#s. q Default-free tables are maintained as follows. Each AS is responsible for advertising reachability info for every address prefix contained in it. Every inter-domain router collects and maintains reachability to all such prefixes, and hence are default-free. q Policy involves constraining the set of ingress/egress routers for subgroups of transit traffic. This is accomplished through filtering of routing advertisements and/or use of “communities” attribute in BGP advertisements.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 12 q 5. Mention two ways in which the naming hierarchy different from the addressing hierarchy, given that names are of variable length and can be organized independent of addresses ? How is DNS (based on this hierarchy) scalable and yet efficient ? q The naming hierarchy follows an organizational (not routing/topological) hierarchy. Also there is no limit to the depth/breadth of this hierarchy (unlike addressing hierarchy which is limited by the finite length of the address). q DNS scales because DNS servers resolve only part of the name space and are organized in a hierarchy closely paralleling the upon the naming hierarchy. One potential problem with unbounded levels in the hierarchy is the number of hops which need to be traversed for resolving a name. This process is speeded up through caching, and use of non-authoritative replies. q 5. Mention two ways in which the naming hierarchy different from the addressing hierarchy, given that names are of variable length and can be organized independent of addresses ? How is DNS (based on this hierarchy) scalable and yet efficient ? q The naming hierarchy follows an organizational (not routing/topological) hierarchy. Also there is no limit to the depth/breadth of this hierarchy (unlike addressing hierarchy which is limited by the finite length of the address). q DNS scales because DNS servers resolve only part of the name space and are organized in a hierarchy closely paralleling the upon the naming hierarchy. One potential problem with unbounded levels in the hierarchy is the number of hops which need to be traversed for resolving a name. This process is speeded up through caching, and use of non-authoritative replies.