Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #01 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Jaringan Komputer Lanjut Packet Switching Network.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Protocols ECSE Or
Chabot College ELEC VLAN. Data Link Sublayers LLC (Logical Link Control) MAC (Media Access Control)
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4690: Experimental Networking Informal Quiz: TCP Shiv Kalyanaraman:
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #11 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
CCNA 3 v3.1 Module 4.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Broadband AND OPTICAL NetworkING ECSE Or
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961 Internet Protocols Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking Concepts (Part 2) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME (1.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates performance.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Protocols ECSE:6961 Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates scalability.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 Shivkumar.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 ECSE-4670: CCN Quiz 1: Solutions Time: 45 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Informal Quiz 3 True or False? T F  Forwarding works in the control plane whereas routing.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 00-1 ECSE-4730: Computer Communications Networks (CCN): Introduction Shivkumar Kalyanaraman Rensselaer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 2 Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 Shivkumar Kalyanaraman:
Connecting LANs, Backbone Networks, and Virtual LANs
Chapter 11 Extending LANs: Fiber Modems, Repeaters, Bridges, & Switches Hub Bridge Switch.
Switching Techniques Student: Blidaru Catalina Elena.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #03 SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Review of Network Technologies. Basic of Network concepts Computer Network – A Communication system for connecting computers/hosts Why? – Better connectivity.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts (I): Brief Version Based in part upon slides of Prof.
Lecture # 3: WAN Data Communication Network L.Rania Ahmed Tabeidi.
Computer Networking Lecture 16 – Reliable Transport.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Scaling the Network: The Internet Protocol
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Hubs Hubs are essentially physical-layer repeaters:
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Hubs Hubs are essentially physical-layer repeaters:
Network Architecture for Cyberspace
ECSE-4670: Computer Communication Networks (CCN)
Scaling the Network: The Internet Protocol
ECSE-4670: Computer Communication Networks (CCN)
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Review of Networking and Design Concepts (I)
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #01 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI” Informal Quiz #01 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 Review of Networking Concepts (I): Informal Quiz

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 Review of Networking Concepts (I) T F  Connectivity implies a direct point-to-point link between any pair of end-system hosts.  A performance tradeoff is usually made to achieve “connectivity” instead of having direct point-to-point physical links between end-hosts  Best-effort service offers the best possible combination of performance characteristics: defined capacity, delay and jitter.  The physical layer that transmits bits uses protocol concepts like “switches”, “packets” etc  SLIP is a bare-bones link-layer protocol designed specifically for IP: it cannot support any other layer 3 protocol  PPP shares one big drawback of SLIP, I.e., it cannot support multi- protocol encapsulation.  The minimum link speed supported by PPP is 28 kbps  A checksum is used in link-layers to both detect and correct errors at the destination node  A duplicate acknowledgement indicates that a packet was incorrectly received (or is missing)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 Review of Networking Concepts: Contd... T F  ACKs and NAKs are required for providing reliability over an error- free channel  Stop-and-wait uses a 1-bit sequence number  Stop-and-wait and window-based protocols use timers (and timeouts) both at the sender and receiver (I.e. in both directions)  Stop-and-wait protocol can only correct for packet errors and cannot compensate for bit-errors, especially in the reverse direction  Explicit NAKs are essential in any retransmission-based reliability scheme  Stop-and-wait is quite efficient if the transmission time of packets is very large compared to propagation times (eg: low-speed LANs)  Sliding window protocols can never attain a utilization of 100%  A virtual resource (eg: virtual circuit, virtual memory) can be constructed through the combination of a multiplexed physical resource and the concept of indirection  Packets, slots, tokens, forwarding tables are examples of “indirection” mechanisms in networks to create an end-to-end virtual link abstraction

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 Review of Networking Concepts: Contd... T F  Statistical multiplexing is most useful to analyze the case when we have fixed (I.e. constant) demand, and fixed capacity  It is possible to operate a statistically multiplexed system forever with average demand exceeding average capacity  The problem of congestion control is to dynamically detect overload and adapt demand to maintain stability.  In a zero-sum-game (or a tradeoff), you can indefinitely gain something for nothing  Statistical multiplexing imposes both tangible and intangible costs on users in pursuit of economical sizing of capacity to meet demand.  Direct connectivity is a scalable strategy for building the Internet.  The primary source of limits to scalability is some form of resource usage inefficiency.  In networking, the “filtering” function is performed by specialized nodes called “switches”, “bridges”, “routers” etc  Forwarding implies sending packets on a filtered subset of links

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6 Review of Networking Concepts: Contd... T F  Token ring is an example of a random access MAC protocol  TDMA is an example of a random access MAC protocol  Hub is a layer 2 device  A bridge is a layer 2 device that connects two collision domains in Ethernet  A bridge has more efficient filtering capabilities compared to a router, I.e., bridged networks are more scalable than routed networks  A switch has a “fabric” that allows multiple parallel forwarding paths between ports. A switch can operate at layer 2 or layer 3.  A router demarcates a broadcast domain in Ethernet  Flat addresses (eg: Ethernet) do not explicitly acknowledge the possibility of indirect connectivity: it assumes all nodes are directly connected to each other. This fundamentally limits scalability.  Token passing and polling are two examples of “taking turns” method of MAC layer protocol design  The internet looks like a virtual “switch” between end-hosts, I.e. it provides filtering and forwarding services on a large-scale.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7 Review of Networking Concepts: Contd... T F  Address hierarchy in IP is targeted at solving the heterogeneity problem of internetworking.  Circuit switched network design is well-matched to applications whose traffic is constant and they require strict bounds on network performance  Since there are no “headers” in circuit-switched information, all meta- data for the purposes of forwarding decisions is inferred from timing  Circuit switching divides up the network resources (eg: link bandwidth) a priori whereas packet switching divides up the information to be transmitted a priori.  Packets need “headers” because relative timing (between packets) is perfect in packet-switched networks  Packet switching uses the concept of a packet queue (I.e. store-and- forward), a concept that trades off packet delay (and loss) for increased link utilization  Link and router/switch resources are statistically multiplexed in packet-switched networks (I.e. provisioned based upon statistical knowledge of the uncertain traffic demands)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8 Review of Networking Concepts: Contd... T F  Overload in statistically multiplexed packet-switched networks is handled through a demand-management procedure called congestion control  Temporal multiplexing refers to the mode of sharing where a resource is split up a priori (I.e. ahead of time) and pre-assigned to users; therefore there is no queuing at the resource  Packet switching allows both modes of statistical multiplexing gains: temporal and spatial: hence it is potentially more efficient than circuit- switching.  The purpose of hierarchical structuring of host addresses is to make the address carry more information: information about the end-hosts as well as information about the network to which the end-host belongs.  Flat (unstructured) addresses lead to inherently un-scalable network designs  The congestion control problem is difficult because it is a distributed problem with incomplete & time-delayed information about capacity/load imbalances

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9 PRE-REQUISITIES

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10 Informal Quiz: Prerequisites T F (True or False)  Datalink refers to the 3rd layer in the ISO/OSI reference model  If peak rate = 10 Mbps, Avg rate = 2 Mbps and Service rate = 4 Mbps, multiplexing gain = 2.  An even parity bit value for the 8-bit string is 0.  Packet forwarding is a control-plane function and routing is a data-plane function.  Bridges and switches in Ethernet allow separation of collision domains, and reduce the degree of sharing of the physical media.  Finding path from one node to another in a large network is a transport layer function.  It is impossible to send 3000 bits/second through a wire which has a bandwidth of 1000 Hz.  Randomness (in service and arrival) is what causes queuing at buffers.  Little’s law which relates expected queuing delay E(T) and expected # in the system E(n) is applicable only to M/M/1 queues.  Little’s law also holds for instantaneous (as opposed to average) queuing delay and instantaneous number in the system

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 11 Pre-requisities (Continued)  Bit stuffing is used so that framing characters do not occur in the frame payload.  CRC is based upon the idea that it is highly unlikely for an uncorrupted packet to be perfectly divisible by the CRC polynomial.  Random access MAC protocols tend to perform very well at low loads in terms of channel multiplexing; but suffer from high delay at high loads.  “Taking turns” or token-based protocols like token-ring offer a best of both partitioning and random access worlds.  For long delay paths, on-off flow control is better than window flow control.  Ethernet uses a CSMA/CD access method.  The packets sent in a connection-oriented network are called datagrams.  The distance-vector protocol involves checking neighbors’ distance vectors and updating its own distance vector.  Address structure is required to recognize whether the destination is one-hop or multiple-hops away.