Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Ethernet Network - Design and Analysis of Switching Systems - Exam, Exams of Design and Analysis of Algorithms

Main points of this exam paper are: Switching Systems, Analysis, Design, Switched Ethernet Network, Valid Entries, Transmission, Routing Tables, Sending Traffic, Inter-Switch Links, Queue Configuration

Typology: Exams

2012/2013

Uploaded on 03/23/2013

sardai
sardai 🇮🇳

4

(10)

117 documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1
A
B
C
f2
aa c3
b1
39
0
1
2
0
1
2
0
2
1
Ethernet Address
6f
Switch
Port
Number
Routing Table
Ethernet
Address
Field
Next
Hop
Field
D1
0
2
A
B
C
f2
aa c3
b1
39
0
1
2
0
1
2
0
2
1
Ethernet Address
6f
Switch
Port
Number
Routing Table
Ethernet
Address
Field
Next
Hop
Field
D1
0
2
Please write clearly. Make your answers concise, but complete.
1. (12 points) The figure below shows a small switched Ethernet network. Assume that
initially, none of the routing tables has any valid entries. Show the contents of the
routing tables following the transmission of a packet by the host with address 39 to
the host with address f2, followed by the transmission of a packet by host b1 to host
6f and a third packet from host aa to host 39.
If host 39 now starts sending traffic at 1 Mb/s to host b1 and host c3 sends to host
f2 at 5 Mb/s, how much traffic will each of the inter-switch links carry in each
direction?
AB traffic: BA traffic:
BC traffic: CB traffic:
BD traffic: DB traffic:
CS 577 – Design and Analysis of Switching Systems
Exam 1
J
onathan Turne
r
10/6/2009
pf3
pf4
pf5

Partial preview of the text

Download Ethernet Network - Design and Analysis of Switching Systems - Exam and more Exams Design and Analysis of Algorithms in PDF only on Docsity!

A

B

C

f

aa c

b

0

2 1 0

1

2

0

1 2

Ethernet Address

6f

Switch Port Number

Routing Table

Ethernet Address Field

Next Hop Field

D 1

0

2

A

B

C

f

aa c

b

0

2 1 0

1

2

0

1 2

Ethernet Address

6f

Switch Port Number

Routing Table

Ethernet Address Field

Next Hop Field

D 1

0

2

Please write clearly. Make your answers concise, but complete.

  1. (12 points) The figure below shows a small switched Ethernet network. Assume that initially, none of the routing tables has any valid entries. Show the contents of the routing tables following the transmission of a packet by the host with address 39 to the host with address f2, followed by the transmission of a packet by host b1 to host 6f and a third packet from host aa to host 39.

If host 39 now starts sending traffic at 1 Mb/s to host b1 and host c3 sends to host f2 at 5 Mb/s, how much traffic will each of the inter-switch links carry in each direction?

A→B traffic: B→A traffic:

B→C traffic: C→B traffic:

B→D traffic: D→B traffic:

CS 577 – Design and Analysis of Switching Systems

Exam 1

Jonathan Turner 10 /6/

  1. (14 points) The left hand diagram below shows a queue configuration for the most recent version of the wunet router. The first link is configured with a bandwidth of 8 Mb/s and has two queues, with WDRR quanta of 30 and 20, respectively. The second link is configured with a bandwidth of 16 Mb/s and has one queue with quantum of 40. The links’ next-send-times (in μs) and the queues’ current credit values (in bytes) are shown on the diagram, and the current queue is marked by a shaded dot. Each packet is labeled with a letter, and its length (you may assume these are the true packet lengths) are shown in bytes.

A 20

B 40

C 30

D 200

link 1 – 8 Mb/s next-send-time=10 μs

link 2 – 16 Mb/s next-send-time=5 μs

quantum credits^ current queue

30 25

20 15

40 100

link 1 next-send-time=__

link 2 next-send-time=__

credits

__

__

__

Which packet is sent next and at what time is it sent?

Which packet is sent after that and at what time?

Which packet is sent after that and at what time?

In the right hand diagram, show the state of the queues and links after the first three packets have been sent.

If a new packet arrives for link 2 at time 80, when will it be sent?

4. (12 points) The chart below shows the results of a performance simulation of d -left hashing for different values of d. These results are for a hash table that stores 100, items in 10,000 buckets.

1

10

100

1,

10,

0 5 10 15 20 25

buckets with

k

items

k

d =

d =

d =

n =100, db = n /

d =

d =

d =

d =

d =

d =

n =100, db = n /

d =

d =

d =

Suppose we constructed a real hash table for the d =1, in which each bucket had room to store 25 items and we inserted 100,000 items into the table, producing the distribution of bucket occupancies shown in the chart. Now, suppose we go to insert one more item. Estimate the probability that the insertion fails because the bucket that the item hashes to is full. Explain your answer.

Give a similar estimate for a hash table with d =2 and a bucket size of 12 items. Remember that for d =2, we perform two independent hash probes.

Revise your estimate for the d =2 case, assuming that the bucket has room to store 13 items, instead of 12.

5. (15 points) The diagram at left below shows the state of a crossbar switch with virtual output queues controlled by the i -SLIP crossbar scheduling algorithm. The dark circles represent VOQs with one or more cells at the input for the row, going to the output for the column (so input 3 has cells for outputs 0 and 4). The horizontal and vertical lines in the small white squares represent the i -SLIP pointers. Specifically, each output (column) has a horizontal line for the input corresponding to its pointer value, and each input (row) has a vertical line representing its pointer value. In the left hand figure, circle all the dots corresponding to VOQs that would be selected by the i -SLIP scheduler in its first iteration in this situation. In the figure at right, show the the state of all the pointers after the first iteration, and draw circles for all input-output pairs that would continue to the next iteration.

inputs

outputs

pointer for input 0

pointer for output 4

Now, mark the cells that would be selected in the second iteration in the right-hand diagram above. In the diagram below, show the state of the scheduler after the second iteration completes.

  1. (15 points) An instance of the binary-search-on-prefix-lengths data structure is shown below. Show how you would modify the data structure to add the prefixes x5.01 and x5.

5 xC.1 x1.0 x3.0/0 xB.0/3 xA.0/3 x4.1/

6 x3.00 xC.

7 xB.011 xA.010 x4.110 xB.001/3 xC.100/

8 xB.0011 xC.1000 xC.

Now, consider a tree bitmap implementation of the original prefix set, with a stride of 3. Complete the internal bitmap and external bitmaps for the root node shown below.

Internal bitmap: _ 0 _ _ 1 _ _

External bitmap: _ 1 _ 0 _ _ 1 _

Consider a general version of the tree bitmap data structure for prefixes of up to 64 bits. How many memory accesses would be needed to find the longest prefix in this data structure if the stride length were 4?

How many hash lookups would be needed if we used the binary search on prefix length structure?

Which do you think is the more practical alternative? Justify your answer.