Lesson 6: Study Guide Flashcards

1
Q

Why is packet classification needed?

A

as internet increases, networks require service garauntees for traffic; packet classification allows handling of packets based on criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three established variants of packet classification?

A
  1. Firewalls: Routers implement firewalls at the entry and exit points of the network to filter out unwanted traffic or enforce security policies.
  2. Resource reservation protocols: DiffServ has been used to reserve bandwidth between a source and a destination.
  3. Routing based on traffic type: Routing based on the specific type of traffic helps avoid delays for time-sensitive applications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the simple solutions to the packet classification problem?

A
  1. Linear Search : Firewall implementations perform a linear search of the rules database, pick best match rule.
  2. Caching : cache the results so that future searches can run faster.
  3. Passing Labels : intermediate routers between A and B apply a label header without having to redo packet classification. Used by Multiprotocol Label Switching (MPLS) and DiffServ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does fast searching using set-pruning tries work?

A

build a trie on the destination prefixes in the database, and then for every leaf-node at the destination trie to “hang” source tries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s the main problem with the set pruning tries?

A

memory explosion; a source prefix can occur in multiple destination tries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between the pruning approach and the backtracking approach for packet classification with a trie?

A

backtracking has high lookup cost (time), but lower memory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the benefit of a grid of tries approach?

A

reduce the wasted time in the backtracking search by using precomputation of switch pointers that take us directly to the next possible source trie containing a matching rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the “Take the Ticket” algorithm.

A

inside a crossbar switch, a scheduling algorithm, when an input line intends to send a packet to a specific output line, it requests a ticket. input line waits for the ticket to be served, then connects to the output line, the crosspoint is turned on, and the input line sends the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the head-of-line problem?

A

in take the ticket algo, when entire queue is blocked by the progress of the head of the queue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the head-of-line problem avoided using the knockout scheme?

A

it has the switching fabric running N times faster than the input links by breaking up packets into cells, it is complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is the head-of-line problem avoided using parallel iterative matching?

A

break down the single queue into virtual queues, with one virtual queue per output link. more efficient than take a ticket. 3 phases:
1. request - all inputs send requests in parallel to outputs
2. grant - outputs pick a random request
3. accept - input randomly picks a grant, sends packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe FIFO with tail drop.

A

packets enter a router on input links, they are then looked up using the address lookup component, switching system places the packet in the corresponding output port. This port is a FIFO (first-in, first-out) queue. If output link buffer is full, incoming packets are dropped. Simple, fast scheduling decisions but potential loss in packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the reasons for making scheduling decisions more complex than FIFO?

A
  1. Router support for congestion
  2. Fair sharing of links among competing flows
  3. Providing QoS (quality of service) guarantees to flows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Bit-by-bit Round Robin scheduling.

A

it is used to avoid packet loss and introduce fairness in servicing different flows. ideally split packet up bit-by-bit, so this stratefy uses an imaginary bit-by-bit system to calculate the packet-finishing time and send a packet as a whole. packet with smallest finishing round number is sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bit-by-bit Round Robin provides fairness; what’s the problem with this method?

A

time complexity is hard to implement with increased number of flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Deficit Round Robin (DRR).

A

a quantum size (Qi) is assigned that determines the share of bandwidth allocated to a flow, and a deficit counter (Di). For each turn of round-robin, the algorithm will serve as many packets in the flow i with size less than (Qi + Di). If packets remain in the queue, it will store the remaining bandwidth in Di, otherwise Di will clear for next round.

17
Q

What is a token bucket shaping?

A

Used to limit the burstiness of a flow by
1. Limiting the average rate
2. Limiting maximum burst size

If the bucket is full with tokens, additional tokens are dropped. If bucket isn’t full, then packet waits until enough tokens are in the bucket

Problem: one queue per flow

18
Q

In traffic scheduling, what is the difference between policing and shaping?

A

both limit the output rate of a link.
Policer: at max traffic rate, excess traffic is dropped, or the packet’s setting or “marking” is changed. rate is a saw-toothed wave.
Shaper: retains excess packets in a queue or a buffer, and this excess is scheduled for later transmission. excess traffic is delayed instead of dropped. flow is shaped or smoothed when the data rate is higher than the configured rate

19
Q

How is a leaky bucket used for traffic policing and shaping?

A

leak rate of packets is constant, uniform distribution of packets sent to the network regardless of input rate.
conforming packet - does not overflow bucket
non-conforming- overflows bucket, is discarded