Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 80 min (strictly enforced) [Hint: spend time roughly.

Slides:



Advertisements
Similar presentations
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 7: QoS->Optical T F  Strong authentication involves sending shared secrets.
Advertisements

24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 2: SOLUTIONS Time: 75 min (strictly enforced) Points: 50 YOUR.
CS162 Section Lecture 9. KeyValue Server Project 3 KVClient (Library) Client Side Program KVClient (Library) Client Side Program KVClient (Library) Client.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5-1 Internet Protocol (IP): Packet Format, Fragmentation, Options Shivkumar Kalyanaraman Rensselaer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS Time: 75 min (strictly enforced)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #05: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4690: Experimental Networking Informal Quiz: TCP Shiv Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 1 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
TDC365 Spring 2001John Kristoff - DePaul University1 Internetworking Technologies Transmission Control Protocol (TCP)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
1 ELEN 602 Lecture 20 More on Routing RIP, OSPF, BGP.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar 1 ECSE-4670: Computer Communication Networks (CCN) Network Layer Shivkumar.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME (1.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Exam 1: SOLUTIONS Time: 60 min (strictly enforced) Points:
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 3: Comprehensive Time: 120 min (strictly enforced) Points:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Exam 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 4: More Routing, DNS True or False? T F  Path-vector based distance vector.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 2: Solutions Time: 75 min (strictly enforced)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 1: SOLUTIONS Time: 75 min (strictly enforced)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Internetworking: addressing, forwarding, resolution, fragmentation Shivkumar Kalyanaraman Rensselaer.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 Shivkumar.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 2 Time: 60 min (strictly enforced) Points: 50 { 5 questions,
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 3 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 2 Shivkumar Kalyanaraman:
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Presentation on Osi & TCP/IP MODEL
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #03 SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Transport over Wireless Networks Myungchul Kim
CCNA3 ’s PAQ PAQ Pre-Assessment Quiz Produced by Mohamed BEN HASSINE CNA Instructor The American University of Paris.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #08: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 Time: 75 min (strictly enforced) Points: 50.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) [Hint: spend time roughly.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Chapter 8: IP Addressing
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Karn’s Algorithm Do not use measured RTT to update SRTT and SDEV Calculate backoff RTO when a retransmission occurs Use backoff RTO for segments until.
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Network Layer, and Logical Addresses
ECSE-6600: Internet Protocols Exam 2 - SOLUTIONS
Transport Layer Unit 5.
ECSE-4670: Computer Communication Networks (CCN)
Lecture#3-IPV4 Addressing
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 80 min (strictly enforced) [Hint: spend time roughly in proportion to the points allocated to questions] Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will not earn (partial) credit. Brief, clear and consistent explanation will.}

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 [5 pts] I. The IP address, Area ID, AS number are all identifiers. Unlike ATM networks, IP does not encode the Area ID and AS number into the IP address. What are the benefits and drawbacks of such encoding (of AreaIDs & ASNs in IP addresses) in 32 bit IPv4 addresses? [REMINDER: Be brief]

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 [4 pts] II. What is the key difference between I-BGP and an IGP protocol (like OSPF)? Why are I-BGP mechanisms preferred to OSPF’s AS-external-LSA (type 5 LSA) mechanism? [REMINDER: Be brief]

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 II. [6 pts] III. TCP congestion control has four key pieces: self-clocking, slow start phase, congestion avoidance phase and fast retransmit/recovery. a) Explain the difference between slow-start and congestion-avoidance phases. Why do we need both phases (why not just one of the two)? [REMINDER: Be brief] b) Under what circumstances does fast retransmit actually avoid an expensive timeout? When could it fail (and TCP will timeout) ? [REMINDER: Be brief]

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 [10 pts] IV. Briefly explain the differences (if any) in: How the OSPF building blocks (Hello exchange, database synchronization, LSA type & who generates LSAs for the link), are mapped to various underlying networks: - point-to-point links, - broadcast subnets & - NBMA subnets (the pt-mpt model ONLY, not the NBMA model). Hello Exchange: (3pts) Database Synchronization: (3pts)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6 LSA Type & Who generates it: (4 pts)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7 q III. [12 pts] A large enterprise (AS1) has 125 LANs with 250 nodes each. It has the address prefix /16 from ISP1. It has two connections to ISP1, and one connection to ISP2 [See Figure below]. It does business with AS2 and AS3 (with prefixes /16 and /20). Which of the following actions are possible? What BGP-related mechanisms would you use (briefly explain)? q A) Send the outbound traffic to AS2 via Link A and the outbound traffic to AS3 via Link B. q B) For all other incoming traffic, (assuming traffic is uniformly distributed to all of its address space) it would like to load-balance and get roughly 1/6th of all traffic from Link C. q What implications does AS1’s actions have on the global routing mesh ? Internet Routing Mesh Link B AS /16 Link A Link C ISP /11 ISP /10 AS /16 AS /20

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8 q

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9 q III. [13 pts] Consider a long TCP session (large file transfer) from Server A to Client B running over an asymmetric last mile link. Assuming 1500 byte packets and 40 byte acks (ignore other headers), and no loss anywhere, q What is the maximum TCP throughput possible from A->B? Why ? q What would happen if the packet size were 8000 bytes or 500 bytes instead? [ Hint: think about how self-clocking determines TCP throughput ] q Suppose, operator Frank Hacker can: q i) modify the interface at node B to suppress a subset of TCP ACKs q ii) regenerate the suppressed TCP ACKs at node interface I (towards node A) q Hacker is not allowed to break the byte-stream and end-to-end reliability semantics of TCP. (eg: node I cannot generate acks beyond the ack number received from node B). q Briefly explain how and why these actions could affect the I->B TCP dynamics and throughput (if at all)? [ Hint: think about what would happen if an ack were lost (or suppressed), how can a lost ack be regenerated, how these actions affect TCP self-clocking & hence the TCP throughput ] AIB Internet (no congestion, bandwidth > 6Mbps) 6Mbps 16kbps

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10