588 section 8
Download
Skip this Video
Download Presentation
588 Section 8

Loading in 2 Seconds...

play fullscreen
1 / 14

588 Section 8 - PowerPoint PPT Presentation


  • 96 Views
  • Uploaded on

588 Section 8. Neil Spring May 25, 1999. Schedule. Notes Homework 3 Reservations?. Reminders & Notes. Homework 3 due June 1 Project 3 or final project will be due June 11 Word documents OK. Next week: 422. Homework 3 -1. Read Reflections on Trusting Trust , by Ken Thompson

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' 588 Section 8' - driscoll-roman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
588 section 8

588 Section 8

Neil Spring

May 25, 1999

schedule
Schedule
  • Notes
  • Homework 3
  • Reservations?
reminders notes
Reminders & Notes
  • Homework 3 due June 1
  • Project 3 or final project will be due June 11
    • Word documents OK.
  • Next week: 422
homework 3 1
Homework 3 -1
  • Read Reflections on Trusting Trust, by Ken Thompson
  • Figure 1 might give you some clues about how to answer this question.
homework 3 2
Homework 3 - 2
  • Sample denial of service attacks:
    • syn flooding
    • name service attacks, possibly pretending map www.cnn.com to your favorite (ahem) ‘adult entertainment’ site.
    • Infrastructure attacks:
      • smurfing: broadcast icmp echo with a forged source address
    • end host attacks
      • internet worm
homework 3 3
Homework 3 - 3
  • Multicast source routing packet header format
  • Efficiency: size, complexity
    • can you get both?
  • Evaluation
    • Could it be deployed?
    • Would it help?
homework 3 4
Homework 3 - 4
  • Incompatible routing protocols:
  • Two questions
    • How does it happen?
    • How do you fix it?

S

G1

R

G2

N1

N2

homework 3 5
Homework 3 - 5
  • End to end
    • (i) if lost (ii) how to recover
  • If lost should be of the form
    • the x doesn’t get his update
    • have to multicast everywhere
  • To recover should be of the form
    • we send the update to x again, x asks for an update…
    • pruning is initiated again
homework 3 6
Homework 3 - 6
  • DNS asynchronous update
  • a. write, but read the before image?
  • b. to get processor order?
  • c. to get total order?
homework 3 7
Homework 3 - 7
  • Distance vector updates
  • This is NOT link state, also NOT distance vector as described in the book:
    • The initial table contains no 1’s!!!
    • Routers don’t know about their direct links!!!
  • A) tables like on page 167
  • B) flooding direction might change if a new route is there
homework 3 8
Homework 3 - 8
  • Straightforward…
  • questions?
real time
Real Time
  • Problem:
    • Want interactive video, audio,
    • Interactive means buffering (normal technique) is bad
  • Maybe want multicast
  • Routers, links fail
  • Congestion happens
the story of rsvp
The Story of RSVP
  • Senders deliver flow specifications to receivers, over predictable routes. Receivers send resource reservations back toward the sender. Routers along the way do admission control to decide whether guarantees can be made, then packet scheduling to meet those guarantees.
the feature sheet
The Feature Sheet
  • Receiver-driven
    • scalable for multicast
    • heterogeneity
  • Soft-state
    • tolerates failures, changes
    • path state - forward, using existing routing
    • reservation state - reverse path
    • timeout & refresh
  • Filters: differentiate between senders
ad