Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #02 SOLUTIONS (part I) Shivkumar Kalyanaraman: GOOGLE:

Slides:



Advertisements
Similar presentations
Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
Advertisements

1 Scalability is King. 2 Internet: Scalability Rules Scalability is : a critical factor in every decision Ease of deployment and interconnection The intelligence.
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL). Functions, performed on the layer. МАС address in Ethernet networks. Layer 1 of the TCP/IP.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #05: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #06: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #12: Naming/DNS: SOLUTIONS Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #11 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 1 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 6 T F  Video is different from data only because it requires larger bandwidth.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking Concepts (Part 2) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
CS 268: Lecture 2 (Layering & End-to-End Arguments)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME (1.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates performance.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Exam 1: SOLUTIONS Time: 60 min (strictly enforced) Points:
System Architecture  you should list the layered Architecture  Understand the ISO/OSI model used in data communications  Understand the differences.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Introduction to Experiment Design Shiv Kalyanaraman Rensselaer Polytechnic Institute
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 3: Comprehensive Time: 120 min (strictly enforced) Points:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts (II) Two ways of constructing a software design: 1)make.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Exam 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME:
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 6: IPv6, QoS T F  Given a constant set of resources, the bandwidth and delay.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Introduction to Simulation Shiv Kalyanaraman Rensselaer Polytechnic Institute
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates scalability.
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 Shivkumar.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 5: SNMP, BOOTP, Multicast T F  A packet addressed to will not leave.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts (II): Brief Version Two ways of constructing a software.
CS 268: Lecture 3 (Layering & End-to-End Arguments)
Review of Networking and Design Concepts (II): Architecture & Evolution Two ways of constructing a software design: 1)make it so simple that there are.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #03 SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Architecting Web Services Unit – II – PART - III.
Network Protocol Hierarchies
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #14 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
03 - Winter 2006ECE 766 Computer Interfacing and Protocols 1 Protocol Hierarchies First networks: hardware comes first Increased complexity  network architecture.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Efficient Path Aggregation and Error Control for Video Streaming OMESH TICKOO, Shiv Kalyanaraman,
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Based upon slides from Jay Lepreau, Utah Emulab Introduction Shiv Kalyanaraman
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 Time: 75 min (strictly enforced) Points: 50.
1 Protocol Layering Myungchul Kim Tel:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) [Hint: spend time roughly.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
The Concept of Universal Service
Computer Networks.
ECSE-6600: Internet Protocols
Protocols and Layering
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL)
CPE 401 / 601 Computer Network Systems
EEC-484/584 Computer Networks
Review of Networking and Design Concepts (II)
ECSE-4670: Computer Communication Networks (CCN)
Chapter Five: Network Software Protocol Hierarchies
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #02 SOLUTIONS (part I) Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI” Informal Quiz #02 SOLUTIONS (part I) Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 Review of Networking Concepts (II): [i.e. slide set #3] Informal Quiz SOLUTIONS

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 Review of Networking Concepts (II) T F   Without layering, you would need to translate between all possible combinations of applications and networking systems functions   The interface between layers seldom outlives the technology used to implement each layer   The service interface defines the message formats and conventions exchanged with the peer.   A layer can use the services provided by the layer just above it in the layering stack   One key difference between the Internet and the Telephone network is that the latter (I.e. telephone network) places its intelligence at the end- systems   The end-to-end argument strongly encourages placement of the functions at the highest layer where it can be completely and correctly implemented.   The end-to-end argument precludes function-placement at lower layers at all costs, and does not even allow it for performance gains   The end-to-end argument is a principle, I.e. it can never be violated in Internet design

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 Review of Networking Concepts (II) T F   Network architecture should specify both the placement of functions and detailed guidelines on how to best implement them   The application-layer framing suggests that it would be advantageous to have application visibility and control mechanisms into as many networking functions as possible   RTP is a protocol designed to fit the ALF philosophy, I.e. it provides an application-extensible transport layer format and functionalities   Performance considerations are always absolute (I.e. relative performance questions such as: how much is A faster than B are not entertained)   A useful rule of thumb from Amdahl’s law is that we should focus our performance improvement efforts on the portion of the system that accounts for a significant share of performance (I.e. the “common case”)   Performance objectives and metrics depend upon the perspective taken (operator/user vs designer/implementor)   A useful general rule of thumb in system design is to tradeoff scarce resources and optimize on abundant resources (I.e. be frugal about what is already abundant)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 Review of Networking Concepts (II) T F   To apply Amdahl’s law, you first need accounting of the performance contribution due to individual components or interactions between components.   When capacity is cheap, we would design a system that optimizes capacity.   When capacity is costly, we would design a system that optimizes capacity.   The impact of technology trends is that the relative costs of components (eg: memory capacity vs memory access bandwidth vs optical link capacity) may change dramatically.   When the relative cost structure of components is expected to change in the future, the system design should allow options for re-composition, while identifying appropriate interfaces that are likely to be stable despite the changes in technology (eg: using techniques like modularity).   Putting the “brains” or system intelligence in end-systems limits the scope for system-wide disruption when a single end-system fails (aka limited fate-sharing scope).   Edge-boxes can be considered to be a “higher” level than core-routers when applying the e2e principle, and deciding where to place QoS functions.   The E2E principle first focuses on performance optimization, and only then on correctness and completeness as a secondary objective   Cross-layer design across adjacent layers that are implemented by the same entity are not uncommon (eg: PHY/MAC layer, transport/application layer).   The danger with cross-layer design is that it may impede technological progress enabled by Moore’s law etc in the name of short run performance optimization