Create a simple balanced data-center-like topology

Assignment Help Computer Networking
Reference no: EM133536039

Part A - Hands-On Networking

Overview:
The purpose of this exercise is to familiarize you with emerging network technologies, like SDN, and to reinforce your understanding of the network protocol stack. Using the Mininet virtual network manager to create a simple virtual network, implementing a set of simple performance limitations, while using the Floodlight SDN controller. Note that Mininet is not a traditional network simulator; rather, it is a tool to instantiate lightweight virtual hosts and connect them using a set of virtual switches.

Students are encouraged to proactively find the solutions to the exercise challenges on their own and contact the instructor/TA in case they find requirements unclear or under-specified. A Canvas Discussion is available to enable conversation between students (and the instructor/TA). While students can discuss challenges, each individual must submit their own work.

Part 1. Mininet and Floodlight Setup:

Project Floodlight (an openSDN project) provides a pre-configured virtual machine (VM) which includes both the Floodlight software and the Mininet virtual network emulator. This enables users to instantiate a virtual SDN using Mininet and to control the network using an instance of Floodlight. The Floodlight VM also includes the Eclipse IDE and Wireshark. You can run them by browsing in the Ubuntu GUI or through the terminal.

To run the Floodlight/Mininet VM, you need to install VirtualBox, a free virtualization software available. The Floodlight VM may run within other virtualization technologies, but for grading purposes students must use VirtualBox.

Once VirtualBox is installed, download the Floodlight VM following the instructions. Skip the section titled "Update Floodlight", as it will cause issues within your VM.

Mininet comes pre-installed in the Floodlight VM. You are required to read through the Mininet walkthrough to familiarize yourself with this complex tool. It is recommended that you complete the Mininet walkthrough to ensure your grasp of the concepts.

Part 2. Create a Network Topology

Step 1: Using python, write a script to create a simple "balanced" data-center-like topology (e.g., a tree topology) with eight hosts, seven switches and one domain controller. The figure below depicts an example of a tree topology with a depth of 2 and a fanout of 2 switches/hosts per level:

1974_Network Topology.jpg

 

Step 2: Modify your script to include to following performance settings of 10Mbps, 5ms delay between most links and 100Mbps and 10ms delay between switch 4 and its hosts.

1. Your python script to complete Part 2 - Step 1
2. Your python script to complete Part 2 - Step 2

Part B - Theoretical Q&A

Questions:

A. One of your classmates, Josh, has pointed out that it is wasteful to end each frame with a flag byte and then begin the next one with a second flag byte. One flag byte could do the job as well, and a byte saved is a byte earned. Do you agree? Explain your answer.

B. Given a sixteen-bit message using Hamming Code, how many check bits are needed to ensure that the receiver can detect and correct a single-bit error? Show the bit pattern transmitted for the message 1101001100110101. You can assume that even parity is used.

C. Given the transmitted message 1001 1100 1010 0011; what is the value of the 4-bit checksum?

Chap 4: 13, 20, 24, 25, and 31 (worth 6 points per question)

V5: 11, 18, 22, 23, and 27

D. Given a wireless network with 5 stations, A-E. Station A can communicate with all other stations. B can communicate with A, C, and E. C can communicate with A, B, and D. D can communicate with A, C, and E. E can communicate with A, D, and B.
a. When A is sending to B, what other communications are possible?
b. When B is sending to A, what other communications are possible?
c. When B is sending to C, what other communications are possible?

Reference no: EM133536039

Questions Cloud

Discuss a conference management system : Consider the following requirements of a Conference Management System (CMS) expressed by a staff during a system analysis session.
Discuss three broad topical domains of health policy : Discuss three broad topical domains of health policy and law. For example, Healthcare Policy and Law, Public Health Policy and Law, and Bioethics.
How to engage in collaborative practice to advocate for : A discussion of the relationship of culturally relevant research to the promotion of social justice for the group you are studying. Identify how to engage
Explain claim denial management program : Explain the Claim Denial Management (CDM) Program for a typical healthcare facility. How CDM differs from Claim Rejection?
Create a simple balanced data-center-like topology : Given a sixteen-bit message using Hamming Code, how many check bits are needed to ensure that the receiver can detect and correct a single-bit error
Serum lipase better indicator of acute pancreatitis : Is Serum amylase of Serum lipase a better indicator of acute pancreatitis ? Why? What intervention would you anticipate being initiated FIRST for Mr. P?
How to start & finish your thesis, book, or article : What are the main ideas from this chapter and a main takeaway that can be applied to future writing? How to Start & Finish Your Thesis, Book, or Article
Differences between proprietary and open-source software : Discusses the differences between proprietary software such as Windows and Apple's OS X and open source code.
Differences between press fit implants and cemented ones : How does a total hip procedure differ from a bipolar hip replacement? What are the differences between press fit implants and cemented ones?

Reviews

Write a Review

Computer Networking Questions & Answers

  Provide a scenario for using point to point topology

In this paper, (a) define each topology, (b) provide a scenario for using each topology, and (c) identify at least one disadvantage of using each topology.

  Describe the function of dynamic host configuration protocol

Why are some users reluctant to store their files in network folders? Describe the function of Dynamic Host Configuration Protocol (DHCP). Why are network drives considered a safe place to store user documents?

  Description of the purpose of prototyping

A description of the purpose of prototyping within the example in the chosen article

  What is the internetwork-layer source address

Capturing and Identifying DHCP Packets Time Required: 30 minutes Objective: Capture the packets used to lease a DHCP address to a client.

  Provide one real-world application of the information learn

Provide one real-world application of the information learned in this class that has been the most valuable to you. Why has it been valuable?

  Discuss performance and deployment issues

BN208 - Networked Applications - Network Performance Analysis - Melbourne Institute of Technology - Discuss performance and deployment issues for networked

  Compare the typical wireless networking equipment

Compare the typical wireless networking equipment used in a home or small-office wireless network to that of a corporate wireless network.

  Security challenges in emerging networks

MN502 - Develop skills to independently think of innovation and Demonstrate professional and ethical behaviour with regard to network security

  Draw a network diagram similar to the given figure

Documentation: Draw a network diagram similar to Figure consisting of 3 computers, a switch, and a printer. Use the MAC addresses given in Table.

  Describe the quality differences you hear

Produce three MP3 files of the same music or voice recording at three different quality levels.- List the size of each file.- Listen to each file and describe the quality differences you hear.

  Connecting computers in a local area network

Assume you are asked to head a non computerized department and you need ten computers and would like to connect them to each other.

  Subnets broadcast address

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. The new subnet mask after the subnetting

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd