Project 1 grading & midterm review 15-441 Computer Networks, Spring 2010 Recitation #8.

Slides:



Advertisements
Similar presentations
Any Questions?.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Router Architecture : Building high-performance routers Ian Pratt
IP, Wireless The world is the network. From Ethernet up Ethernet uses 6 byte addresses Source, destination, data, and control stuff Local networks only.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
EE 122: Switching and Forwarding Kevin Lai September 23, 2002.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Networking and Internetworking Devices Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
Connecting LANs, Backbone Networks, and Virtual LANs
Chapter 11 Extending LANs: Fiber Modems, Repeaters, Bridges, & Switches Hub Bridge Switch.
Networks. Bus Network Terminator‘Workstation’ ‘Client’ ‘Terminal’ ‘Node’ Computer Terminator Backbone Server (optional)
Network Layer Moving datagrams. How do it know? Tom-Tom.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Q and A for Ch. 17 CS 332, Spring Fiber Modems Q: Why use fiber modem extensions? Is it to save money on not having to use as much fiber (otherwise.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 4: Managing LAN Traffic
Midterm Review - Network Layers. Computer 1Computer 2 2.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Chapter 1 Overview Review Overview of demonstration network
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Router Architecture Overview
Module 8: Ethernet Switching
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Topology, refers to the physical and logical diagrams which summarize network connections and information flow.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
Computer Networks. Internetworking Devices Network Interface Card (NIC) Repeaters HUB Bridge Switch Router.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Forwarding.
 A hub is a central connecting device in a network.  Each node is connected directly to the hub.  They receive a data packet from one node and send.
Networking Components Assignment 3 Corbin Watkins.
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Building A Network: Cost Effective Resource Sharing
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Network Processing Systems Design
Quality and Value for the Exam 100% Guarantee to Pass Your Exam Based on Real Exams Scenarios Verified Answers Researched by Industry.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Youngstown State University Cisco Regional Academy
Networking CS 3470, Section 1 Sarah Diesburg
Whirlwind Tour Of Lectures So Far
Part III Datalink Layer 10.
Layered Architectures
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
CS 457 – Lecture 8 Switching and Forwarding
CONGESTION CONTROL.
CS 457 – Lecture 10 Internetworking and IP
IP Forwarding Relates to Lab 3.
LESSON 2.1_B Networking Fundamentals Understand Switches.
IP Forwarding Relates to Lab 3.
Network Core and QoS.
Part III Datalink Layer 10.
Building A Network: Cost Effective Resource Sharing
Network Layer: Control/data plane, addressing, routers
IP Forwarding Relates to Lab 3.
ITIS 6167/8167: Network and Information Security
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Network Core and QoS.
Presentation transcript:

Project 1 grading & midterm review Computer Networks, Spring 2010 Recitation #8

Project 1 results Avg: 87 Med: 98 STD: 27.3 Max: 100 Min: 0 2

Project 1 grading rubric (1/2) Checkpoints – 15 points – Does it pass the tests in the checkpoint scripts? Server core networking – 20 points – Handling connections, concurrency, etc… Protocol implementation – 25 points – Does it implement the required commands – Some people had trouble with WHO and LIST 3

Project 1 grading rubric (2/2) Robustness – 25 points – Does it crash or segfault? – Specific tests: Client disconnects without calling quit Send unknown commands Send long command with more than 512 bytes Style – 15 points – Documentation, code structure, command line options, etc 4

Midterm results 5 Avg: 59.5 Med: 59 STD: 10.4 Max: 78 Min: 28

A – True or False For a bandwidth of t Hz, noise is 1/8th of the received signal strength, can you get 2t bits per second? XBoth Manchester and NRZI can handle long strings of 1’s and long strings of 0’s UDP is a better choice than TCP for a real time voice application XModern high speed routers use shared busses to gain benefits from statistical multiplexing. Modern high speed routers use virtual output queues to avoid head-of-line blocking. 6

A – Longest prefix match implementations 7 Binary trie (B) vs Patricia trie (P) vs direct high- radix trie (D) Fewest lookups needed? D because it is direct. Requires backtracking? P because you can a take to big a leap while following a link. Most memory efficient? P because you compress nodes with a single child.

A – DNS (1/2) A asks for nothing in cache: 1.C asks L; 2.L asks A_root; 3.A_root tells L to ask A_com; 4.L asks A_com, A com tells L to ask A_foo.com; 5.L asks A_foo.com; 6.A_foo.com answers to L; 7.L answers to C. 8

A – DNS (2/2) A asks for ftp.foo.com, in cache:ftp.foo.comwww.foo.com 1.C asks L; 2.L asks A_foo.com; 3.A_foo.com answers to L; 4.L answers to C. 9

B – Ethernet (1/4) 8 – Why 48 bit addresses if 16 would be enough? Gives us the uniqueness property, this means: – no configuration necessary for hooking up a new node; – separation of routing from addressing; – a basis for unique identification of files, programs and other objects on the networked hosts. Common mistakes: saying the addresses need to be unique in the whole world, they don’t. We were looking for the advantages that the uniqueness property gives. 10

B – Ethernet (2/4) 9 b) What to do to ensure collision detection when increasing the bandwidth 10 times? – Increase the minimum packet size x10 – Decrease the wire length x10 Common mistakes: optic fiber is not 10x faster, it won’t solve the problem! 11

B – Ethernet (3/4) 9 c) 1Gbps network. Node starts sending after hearing 100 bits and it collides with you after you send 700 bits. How far is he from you? 12

B – Ethernet (4/4) 9 c) continued 700 = 2x  x = 300 bits Prop_delay = 300/10^9 = 3 x 10^-7 s Dist = Prop_delay * 1.8 x 10^8 = 54 m Common mistakes: no calculations, using 600 or 100 bits instead of

C – BGP Relationships (1/4) 14 Invalid – violates valley free routing on the P to Q link

C – BGP Relationships (2/4) 15 Valid!

C – BGP Relationships (3/4) 16 Invalid – violates valley free routing on the Q to P link, Q is loosing

C – BGP Relationships (4/4) 11 a) Can AS Q prevent outbound traffic from going through AS R? – Yes, just announce routes through other ASs 11 b) Can AS R simply stop serving AS R’s costumers? – No, it needs to announce reachability to AS R to its costumers 17

D – Repeaters, Bridges, Routers and Tunneling (1/5) 18 Everyone will hear it! Source Dest Hub

D – Repeaters, Bridges, Routers and Tunneling (2/5) 19 A doesn’t forward to D! Source Dest Hub SwitchHub

D – Repeaters, Bridges, Routers and Tunneling (3/5) 20 No one overhears the packet! Source Dest Switch

D – Repeaters, Bridges, Routers and Tunneling (4/5) Header typeSource AddressDestination address Link-layerMAC-H1MAC-H4 IPIP-H1IP-H a) A is a switch, B, C and D are hubs. A packet is sent from H1 to H4, what do the headers look like while crossing the B-A link? 13 b) They are all routers. Header typeSource AddressDestination address Link-layerMAC-BMAC-A IPIP-H1IP-H4

D – Repeaters, Bridges, Routers and Tunneling (5/5) Header typeSource AddressDestination address Link-layerMAC-BMAC-A IPIP-BIP-C IPIP-H1IP-H c) A, B, C and D are all routers. There is an IP-in-IP tunnel from B to C. A packet is sent from H1 to H4, what do the headers look like while crossing the B-A link?

Parting thoughts Still 62.5% of points up for grabs! Don’t forget to submit Project 2 CP2 today. Homework 3 is due Tuesday in class. 23