Solutions to Select Exercises
|
|
- Scarlett Bethanie Rogers
- 6 years ago
- Views:
Transcription
1 Solutions to Select Exercises CHAPTER. We will count the transfer as completed when the last data bit arrives at its destination (a). MB = 89 bits. initial RTTs (6 ms) +,8,9/,, bps (transmit) + RTT/ (propagation).8 seconds. (b) Number of packets required =. MB/KB = 6. To the above we add the time for RTTs (the number of RTTs between when packet arrives and packet 6 arrives), for a total of =.8 seconds. (c) Dividing the 6 packets by gives This will take 76. RTTs (half an RTT for the first batch to arrive, plus 76 RTTs between the first batch and the 77th partial batch), plus the initial RTTs, for 6.8 seconds. (d) Right after the handshaking is done we send one packet. One RTT after the handshaking we send two packets. At n RTTs past the initial handshaking we have sent n = n+ packets. At n = we have thus been able to send all 6 packets; the last batch arrives. RTT later. Total time is +. RTTs, or second. 6. Propagation delay is m/( 8 m/s) = µs. 8 bits / µs is. Mbps. For -byte packets, this rises to 6. Mbps.. (a) Propagation delay on the link is ( 9 )/( 8 ) = 8 seconds. Thus, the RTT is 68 seconds. (b) The delay bandwidth product for the link is 8 8 =.8 MB. (c) After a picture is taken, it must be transmitted on the link and be completely propagated before Mission Control can interpret it. Transmit delay for MB of data is,9, 8
2 8 Solutions to Select Exercises bits/8 = 8 seconds. Thus, the total time required is transmit delay + propagation delay = = seconds. 7. (a) For each link, it takes Gbps / kb = µs to transmit the packet on the link, after which it takes an additional µs for the last bit to propagate across the link. Thus, for a LAN with only one switch that starts forwarding only after receiving the whole packet, the total transfer delay is two transmit delays + two propagation delays = µs. (b) For three switched and thus four links, the total delay is four transmit delays + four propagation delays = 6 µs. (c) For cut-through, a switch need only decode the first 8 bits before beginning to forward. This takes 8 ns. This delay replaces the switch transmit delays in the previous answer for a total delay of one transmit delay + three cut-through decoding delays + four propagation delays =.8 µs. 7. (a) 9 8 =,9,99,. Gbps. (b) 8 8 = 6 Kbps. (c) 6 = Kbps. (d) 88, = 6,8. Mbps. CHAPTER. The B/B encoding of the given bit sequence is the following: Bits NRZ 7. Let mark each position where a stuffed bit was removed. There was one error where the sever consecutive s are detected (err) At the end of the bit sequence, the end of frame was detected (eof). err eof 9. (a) We take the message, append 8 zeros and divide by (x 8 + x + x + ). The remainder
3 Solutions to Select Exercises 8 is. We transmit the original message with this remainder appended, resulting in. (b) Inverting the first bit gives. Dividing by (x 8 + x + x + ) gives a a remainder of.. One-way latency of the link is ms. (Bandwidth) (roundtrip delay) is about pps. sec, or packets. SWS should be this large. (a) If RWS=, the necessary sequence number space is 6. Therefore, bits are needed. (b) If RWS=SWS, the sequence number space must cover twice the SWS, or up to. Therefore, 6 bits are needed.. The figure that follows gives the timeline for the first case. The second case reduces the total transaction time by roughly RTT. Frame[] Frame[] Frame[] Frame[] Frame[] Frame[] ACK[] Frame[] Frame[] ACK[] RTT Frame[] DUPACK[] DUPACK[] DUPACK[] RTT Frame[] Frame[] DUPACK[] DUPACK[] DUPACK[] RTT Timeout Frame[] RTT Frame[6] ACK[] RTT Frame[6] ACK[] RTT ACK[6] ACK[6] RTT RTT
4 8 Solutions to Select Exercises CHAPTER. The following table is cumulative; at each part the VCI tables consist of the entries at that part and also all previous entries. Note that at stage (d) we assume that VCI on port of switch cannot be reused (it was used for a connection to H in part (a)). This would correspond to the case where VCIs are bidirectional, as they commonly are. Exercise Part Switch Input Port VCI Output Port VCI (a) (b) (c) (d) (e) (f). The following list shows the mapping between LANs and their designated bridges. B dead B A,B,D
5 Solutions to Select Exercises 8 B E,F,G,H B I B idle B6 J B7 C 6. All bridges see the packet from D to C. Only B, B, and B see the packet from C to D. Only B, B, and B see the packet from A to C. B A-interface : A B-interface : D (not C) B B-interface : A B-interface : C B-interface : D B C-interface : C B-interface : A,D B D-interface : D B-interface : C (not A) 7. Since the I/O bus speed is less than the memory bandwidth, it is the bottleneck. Effective bandwidth that the I/O bus can provide is / Mbps because each packet crosses the I/O bus twice. Therefore, the number of interfaces is (/) =. 7. By definition, path MTU is 76 bytes. Maximum IP payload size is 76 = 6 bytes. We need to transfer + = bytes in the IP payload. This would be fragmented into fragments, the first of size bytes (because the fragment needs to be a multiple of 8 bytes, so it can t be exactly 6) and the second of size = 9 bytes. There are packets in total if we use path MTU. In the previous setting we needed packets. 7. (a) Information Stored at Node A Distance to Reach Node B C D E F A B C D E F
6 A Distance to Reach Node 6 B A 6 F E B 86 Solutions to Select Exercises (b) Information Distance to Reach Node Stored at Node C D A B C D E F (c) Information Stored at Node C D E F A B C D E F. The following is an example network topology. C A D E B F 6. Apply each subnet mask and, if the corresponding subnet number matches the SubnetNumber column, then use the entry in Next-Hop. (a) Applying the subnet mask..., we get Use interface as the next hop. (b) Applying subnet mask..., we get (Next hop is Router.) Applying subnet mask..., we get (Next hop is Router.) However,... is a longer prefix, so use Router as the next hop.
7 Solutions to Select Exercises 87 (c) None of the subnet number entries match, so use default Router R. (d) Applying subnet mask..., we get Use interface as the next hop. (e) Applying subnet mask..., we get Use Router as the next hop. 6. Step Confirmed Tentative 6 (A,,-) (A,,-) (A,,-) (B,,B) (A,,-) (B,,B) (D,,B) (A,,-) (B,,B) (D,,B) (C,,B) (A,,-) (B,,B) (D,,B) (C,,B) (E,6,B) (B,,B) (D,,D) (D,,B) (C,7,B) (C,,B) (E,7,B) (E,6,B) 7. (a) F (b) B (c) E (d) A (e) D (f) C CHAPTER. The following figures illustrate the multicast trees for sources D and E. CHAPTER. The advertised window should be large enough to keep the pipe full; delay (RTT) bandwidth here is ms Gbps = Mb = 7. MB of data. This requires bits ( =,,) for the
8 88 Solutions to Select Exercises AdvertisedWindow field. The sequence number field must not wrap around in the maximum segment lifetime. In 6 seconds, 7. GB can be transmitted. bits allows a sequence space of 8.6 GB, and so will not wrap in 6 seconds.. (a) B / ( GB) = 89 ms. (b) ticks in 89 ms is once each 89 µs indicating wrap around in.7 Ms or approximately days. 7. Using initial Deviation = it took iterations for TimeOut to fall below.. Iteration SampleRTT EstRTT Dev diff TimeOut
9 Solutions to Select Exercises 89 CHAPTER 6. (a) First we calculate the finishing times F i. We don t need to worry about clock speed here since we may take A i = for all the packets. F i thus becomes just the cumulative per-flow size: F i = F i + P i. Packet Size Flow F i We now send in increasing order of F i : Packet, Packet, Packet 6, Packet, Packet 7, Packet, Packet, Packet 8. (b) To give flow a weight of we divide each of its F i by : F i = F i + P i /. To give flow a weight of we divide each of its F i by : F i = F i + P i /. To give flow a weight of we divide each of its F i by : F i = F i + P i /. Again, we are using the fact that there is no waiting. Packet Size Flow Weighted F i
10 8 Solutions to Select Exercises Transmitting in increasing order of the weighted F i we send as follows: Packet, Packet, Packet 6, Packet, Packet, Packet 7, Packet 8, Packet.. (a) For the ith arriving packet on a given flow we calculate its estimated finishing time F i by the formula F i = max{a i,f i } +, where the clock used to measure the arrival times A i runs slow by a factor equal to the number of active queues. The A i clock is global; the sequence of F i values calculated as above is local to each flow. The following table lists all events by wall clock time. We identify packets by their flow and arrival time; thus, packet A is the packet that arrives on flow A at wall clock time (ie., the third packet). The last three columns are the queues for each flow for the subsequent time interval, including the packet currently being transmitted. The number of such active queues determines the amount by which A i is incremented on the subsequent line. Multiple packets appear on the same line if their F i values are all the same; the F i values are in italic when F i = F i + (versus F i = A i + ). Wall Clock A i Arrivals F i Sent A s Queue B s Queue C s Queue. A,B,C. A A B. C. B B.8 A. C A. B. A A B C..666 A. C A B 6. A6. B A,A6 B C6. 7. B7 C7. 6. A A,A6 B A8 B8 6.. C A6,A8 B7,B8 9 A9 7. B7 A6,A8,A9 B7,B8,B9 B9 6. C C,C C,C C,C C,C C,C6 C,C6,C7 C,C6,C7 C6,C7 (Continued)
11 Solutions to Select Exercises 8 Wall Clock A i Arrivals F i Sent A s Queue B s Queue C s Queue A C B B A6 C6 B8 A8 C7 B9 A9 C B A B A6,A8,A9 A8,A9,A A8,A9,A A8,A9,A A9,A A9,A A9,A A A A B8,B9 B8,B9 B8,B9 B9,B B9,B B9,B,B B,B B,B B,B B B C6,C7 C7 C7,C C7,C C7,C C C C (b) For weighted fair queuing we have, for flow B,. A,C. B A B C B C A B C A A6 C6 B7 C7 A8 B8 F i = max{a i,f i } +. For flows A and C, F i is as before. Here is the table corresponding to the one above: Wall Clock A i Arrivals F i Sent A s Queue B s Queue C s Queue A C B A C A C A A A,A A,A6 A,A6 A6,A8 B B7 B7,B8 C,C C,C C,C C,C C,C,C6 C,C6,C7 C6,C7 (Continued)
12 8 Solutions to Select Exercises Wall Clock A i Arrivals F i Sent A s Queue B s Queue C s Queue 9. A9 7. B7 A6,A8,A9 B7,B8,B9 C6,C7 B B8 A6,A8,A9 B8,B9 C6,C7. A 8. A6 A6,A8,A9,A B9 C6,C7. C 7. C6 A8,A9,A B9 C6,C7,C.666 B 6.66 B9 A8,A9,A B9,B C7,C 6. A8 A9,A B C7,C 6. B 6.8 C7 A9,A B,B C B A9,A B,B C 7 7. B A B C 8 7. A9 A C C A C 8. A A. (a) We have TempP = MaxP AvgLen MinThreshold MaxThreshold MinThreshold. AvgLen is halfway between MinThreshold and MaxThreshold, which implies that the fraction here is / and so TempP = MaxP/ = p/. We now have P count = TempP/( count TempP) = /(x count), where x = /p. Therefore, P count = Evaluating the product gives where x = /p. x x x x x (count + ). x count ( P ) ( P n ) x (n + ) x n = x (n + ), x
13 Solutions to Select Exercises 8 (b) From the result of previous question, Therefore, Accordingly, x = α = x (n + ). x (n + ) α α p = ( α) (n + ) α = /p. 8. At every second, the bucket volume must not be negative. For a given bucket depth D and token rate r, we can calculate the bucket volume v(t) at time t seconds and enforce v(t) being non-negative: v() = D + r = D ( r) v() = D + r = D ( r) v() = D + r = D ( r) v() = D + r = D ( r) v() = D 6 + r = D (7 r) v() = D 6 + 6r = D 6( r) We define the functions f (r),f (r),...,f 6 (r) as follows: f (r) = r f (r) = ( r) = f (r) f (r) (for r ) f (r) = r f (r) (for r ) f (r) = r < f (r) (for r ) f (r) = 7 r f 6 (r) = 6( r) f (r) (for r ) First of all, for r, f i (r) for all i. This means if the token rate is faster than packets per second any positive bucket depth will suffice (i.e., D ). For r, we only need to consider f (r) and f (r), since other functions are less than these functions.
14 8 Solutions to Select Exercises One can easily find f (r) f (r) = r 7. Therefore, the bucket depth D is enforced by the following formula: f (r) = 7 r (r =,) D f (r) = ( r) (r =,,) (r ) CHAPTER 7. Each string is preceded by a count of its length; the array of salaries is preceded by a count of the number of elements. That leads to the following sequence of integers and ASCII characters being sent: M A R Y 77 7 J A N U A R Y INT INT INT be le be le 8998 be 8998 le
CPE 448 Exam #2 (50 pts) April Name Class: 448
Name Class: 448 1) (5 pts) Draw the three way handshake used to establish a TCP connection. Show all SYN and ACK packets. Also show all sequence and acknowledgement numbers associated with the SYN and
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Homework 4 Out: 11/27, Due: 12/4 Total 48.5 points Question 1 Assume that we have a token bucket shaper that has a replenishment rate r = 10 KBps, an infinite maximum rate R,
More informationChapter 6 Congestion Control and Resource Allocation
Chapter 6 Congestion Control and Resource Allocation Congestion-Avoidance Mechanisms Congestion avoidance is to predict when congestion is about to happen and then to reduce sending rate of source host
More informationCS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control
COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control P. Farrell and H. Peyravi Department of Computer Science Kent State University
More informationVTU-NPTEL-NMEICT Project
PROBLEMS Module 05: Performance Metrics RTT (Round Trip Time) 1. Calculate the total time required transfer a 1.5 MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1-KB data and
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationCongestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues
Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion
More informationTCP Congestion Control. Housekeeping. Additive Increase/Multiplicative Decrease. AIMD (cont) Pick up folders for exam study Exam next Friday, Nov.
Fall 01 CptS/EE 555 3 Fall 01 CptS/EE 555 4 TCP Congestion Control Idea assumes best-effort network (FIFO or FQ routers)each source determines network capacity for itself uses implicit feedback ACKs pace
More informationCongestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources
Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationChapter 6 Congestion Avoidance. Networking CS 3470, Section 1
Chapter 6 Congestion Avoidance Networking CS 3470, Section 1 Congestion Avoidance TCP s strategy control congestion once it happens repeatedly increase load in an effort to find the point at which congestion
More informationCS244a: An Introduction to Computer Networks
Grade: MC: 7: 8: 9: 10: 11: 12: 13: 14: Total: CS244a: An Introduction to Computer Networks Final Exam: Wednesday You are allowed 2 hours to complete this exam. (i) This exam is closed book and closed
More informationChapter 3 Packet Switching
Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationComputer Network (2012 Spring) Homework Answer. Chapter2
Computer Network (2012 Spring) Homework Answer Chapter2 Question 6 Suppose the following sequence of bits arrives over a link: 1101011111010111110010111110110 Show the resulting frame after any stuffed
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationCongestion Control. Resource allocation and congestion control problem
Congestion Control 188lecture8.ppt Pirkko Kuusela 1 Resource allocation and congestion control problem Problem 1: Resource allocation How to effectively and fairly allocate resources among competing users?
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction
More informationCSCI-1680 Transport Layer II Data over TCP Rodrigo Fonseca
CSCI-1680 Transport Layer II Data over TCP Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last Class CLOSED Passive open Close Close LISTEN Introduction to TCP
More informationCongestion Control & Resource Allocation. Issues in Resource Allocation Queuing Discipline TCP Congestion Control
Congestion Control & Resource Allocation Issues in Resource Allocation Queuing Discipline TCP Congestion Control Reacting to Congestion Avoiding Congestion QoS Issues 1 Issues in Resource Allocation RA
More informationPoint-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1
Point-to-Point Links Outline Encoding Framing Error Detection Sliding Window Algorithm Fall 2004 CS 691 1 Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage
More informationEnd-to-End Protocols. End-to-End Protocols
End-to-End Protocols UDP (User Datagram Protocol) (Transport Control Protocol) Connection Establishment/Termination Sliding Window Revisit Flow Control Adaptive Retransmission End-to-End Protocols Limitations
More informationReliable Byte-Stream (TCP)
Reliable Byte-Stream () Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout Simple Demultiplexer (UDP) Header format Note 16 bit port number (so only 64K
More information11/24/2009. Fundamentals of Computer Networks ECE 478/578. Flow Control in TCP
Fundamentals of Computer Networks ECE 478/578 Lecture #21: TCP Window Mechanism Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona Sliding Window in TCP Goals of
More informationSolutions for Homework #4
Solutions for Homework #4 EE122: Introduction to Communication Networks (Fall 2006) Department of Electrical Engineering and Computer Sciences College of Engineering University of California, Berkeley
More informationL5: Building Direct Link Networks III. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L5: Building Direct Link Networks III Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were
More informationc) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.
Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each
More informationPractice Problems: P22, 23, P24, P25, P26, P27, P28, P29, P30, P32, P44 and P45. Hand-in the following: P27, P28, P32, P37, P44
Practice Problems: P, 3, P4, P5, P6, P7, P8, P9, P30, P3, P44 and P45. Hand-in the following: P7, P8, P3, P37, P44 Chapter-3 Assigned/ Practice - Problems Problem a) Here we have a window size of N=3.
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationCode No: RR Set No. 1
Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationInternet Protocols Fall Outline
Internet Protocols Fall 2004 Lecture 12 TCP Andreas Terzis Outline TCP Connection Management Sliding Window ACK Strategy Nagle s algorithm Timeout estimation Flow Control CS 449/Fall 04 2 1 TCP Connection
More informationCS/ECE 438: Communication Networks Spring Problem Set 7. Title: Congestion control and Performance Analysis
Problem Set 7 Title: Congestion control and Performance Analysis Due: start of class, Wednesday, May 2 nd Recommended Reading: Section 6. All problems carry equal weight. To receive full credit, show all
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More informationOverview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.
Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can
More informationa) Adding the two bytes gives Taking the one s complement gives
EE33- solutions for homework #3 (3 problems) Problem 3 Note, wrap around if overflow One's complement = To detect errors, the receiver adds the four words (the three original words and the checksum) If
More informationFlow and Congestion Control Marcos Vieira
Flow and Congestion Control 2014 Marcos Vieira Flow Control Part of TCP specification (even before 1988) Goal: not send more data than the receiver can handle Sliding window protocol Receiver uses window
More informationDelhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: Ph:
Serial : BS_CS_A_Computer Network_040 Delhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: E-mail: info@madeeasy.in Ph: 0-45242 CLASS TEST 20-9 COMPUTER SCIENCE & IT Subject
More informationL2: Bandwidth and Latency. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L2: Bandwidth and Latency Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained
More informationProblem. Chapter Outline. Chapter Goal. End-to-end Protocols. End-to-end Protocols. Chapter 5. End-to-End Protocols
Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie End-to-End Protocols Problem How to turn this host-to-host packet delivery service into a process-to-process communication
More informationChapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup
Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationThere are 10 questions in total. Please write your SID on each page.
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationWhat is Congestion? Congestion: Moral of the Story. TCP Approach. Transport Layer: TCP Congestion Control & Buffer Management
Transport Layer: TCP Congestion Control & Buffer Management Congestion Control What is congestion? Impact of Congestion Approaches to congestion control TCP Congestion Control End-to-end based: implicit
More informationCPE 548 Exam #1 (50 pts) February 17, 2016
Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic
More informationCSE 473 Introduction to Computer Networks. Exam 1. Your name: 9/26/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam 1 Your name: 9/26/2013 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)
More informationOverview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers
Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control
More informationNETWORK PROBLEM SET Solution
NETWORK PROBLEM SET Solution Problem 1 Consider a packet-switched network of N nodes connected by the following topologies: 1. For a packet-switched network of N nodes, the number of hops is one less than
More informationTCP Congestion Control
TCP Congestion Control Lecture material taken from Computer Networks A Systems Approach, Third Ed.,Peterson and Davie, Morgan Kaufmann, 2003. Computer Networks: TCP Congestion Control 1 TCP Congestion
More informationTCP congestion control:
TCP congestion control: Probing for usable bandwidth: Ideally: transmit as fast as possible (cwnd as large as possible) without loss Increase cwnd until loss (congestion) Loss: decrease cwnd, then begin
More informationCPSC 441 Tutorial-1. Department of Computer Science University of Calgary
CPSC 441 Tutorial-1 Department of Computer Science University of Calgary Question-1 A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the
More informationProblem Statement. Physical and Data Link Layer Overview. Five Tasks Encoding. Make two computers talk to each other
Physical and Data Link Layer Overview Problem Statement Make two talk to each other Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Physical media transmit Analog signals Modulate/demodulate
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationCRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors
CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationCSE/EE 461 Lecture 16 TCP Congestion Control. TCP Congestion Control
CSE/EE Lecture TCP Congestion Control Tom Anderson tom@cs.washington.edu Peterson, Chapter TCP Congestion Control Goal: efficiently and fairly allocate network bandwidth Robust RTT estimation Additive
More informationCSE 1 23: Computer Networks
CSE 1 23: Computer Networks Total Points: 47.5 Homework 2 Out: 10/18, Due: 10/25 1. The Sliding Window Protocol Assume that the sender s window size is 3. If we have to send 10 frames in total, and the
More informationTCP Congestion Control
6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different
More informationCSE 473 Introduction to Computer Networks. Final Exam Review
CSE 473 Introduction to Computer Networks Final Exam Review Roch Guérin 12/4/2014 1) The diagram at right shows a switched Ethernet LAN with two routers (labeled Q and R), seven switches and five hosts.
More informationData Communication Networks Final
Data Communication Networks Final Saad Mneimneh Visiting Professor Hunter College of CUNY NAME: This final test is take home... There are 8 Problems (but each problem has multiple parts, possibly on separate
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationCS 640 Lecture 4: 09/11/2014
CS 640 Lecture 4: 09/11/2014 A) Bandwidth-delay product B) Link layer intro C) Encoding, Framing, Error Detection D) Multiple access Ethernet A. Bandwidth-delay product This in the above example is C *
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationFACULTY OF COMPUTING AND INFORMATICS
namibia UniVERSITY OF SCIEnCE AnD TECHnOLOGY FACULTY OF COMPUTING AND INFORMATICS DEPARTMENT OF COMPUTER SCIENCE QUALIFICATION: Bachelor of Computer Science {Honours) QUALIFICATION CODE: 08BCSH LEVEL:
More informationSolutions for Homework #2
Solutions for Homework #2 EE122: Introduction to Communication Networks (Fall 2006) Department of Electrical Engineering and Computer Sciences College of Engineering University of California, Berkeley
More informationDirect Link Networks (II)
Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question
More informationComputer Networks. Course Reference Model. Topic. Congestion What s the hold up? Nature of Congestion. Nature of Congestion 1/5/2015.
Course Reference Model Computer Networks 7 Application Provides functions needed by users Zhang, Xinyu Fall 204 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationRouters. Session 12 INST 346 Technologies, Infrastructure and Architecture
Routers Session 12 INST 346 Technologies, Infrastructure and Architecture Goals for Today Finish up TCP Flow control, timeout selection, close connection Network layer overview Structure of a router Getahead:
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.
More informationModels. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models
Models Motivation Timing Diagrams Metrics Evaluation Techniques TOC Models Motivation Understanding Network Behavior Improving Protocols Verifying Correctness of Implementation Detecting Faults Choosing
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationCS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.
CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More informationCS244a: An Introduction to Computer Networks
Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete
More informationTransport: How Applications Communicate
Transport: How Applications Communicate Week 2 Philip Levis 1 7 Layers (or 4) 7. 6. 5. 4. 3. 2. 1. Application Presentation Session Transport Network Link Physical segments packets frames bits/bytes Application
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationFINAL Tuesday, 20 th May 2008
Data Communication & Networks FINAL Exam (Spring 2008) Page 1 / 23 Data Communication & Networks Spring 2008 Semester FINAL Tuesday, 20 th May 2008 Total Time: 180 Minutes Total Marks: 100 Roll Number
More informationKent State University
CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-11, S-2 Congestion
More informationTCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)
Lecture 16 TCP Congestion Control Homework 6 Due Today TCP uses ACK arrival as a signal to transmit a new packet. Since connections come-and-go TCP congestion control must be adaptive. TCP congestion control
More informationCS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers Xiaowei Yang xwy@cs.duke.edu Overview More on TCP congestion control Theory Macroscopic behavior TCP
More informationNetworked Systems and Services, Fall 2018 Chapter 3
Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other
More informationCS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm
CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: SUNet ID: @stanford.edu Check if you would like exam routed back via SCPD:
More informationNetworked Systems and Services, Fall 2017 Reliability with TCP
Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery
More informationECE 610: Homework 4 Problems are taken from Kurose and Ross.
ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose
More informationComputer Network Fundamentals Spring Week 10 Congestion Control Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 10 Congestion Control Andreas Terzis Outline Congestion Control TCP Congestion Control CS 344/Spring08 2 What We Know We know: How to process packets in a
More informationC 6. Congestion Control and Resource Allocation. Copyright 2010, Elsevier Inc. All rights Reserved
C 6 Congestion Control and Resource Allocation Copyright 2010, Elsevier Inc. All rights Reserved Congestion Control and Resource Allocation Resources Bandwidth of the links Buffers at the routers and switches
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationThe Netwok 15 Layer IPv4 and IPv6 Part 3
1 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok 15 Layer IPv4 and IPv6 Part 3 Jean Yves Le Boudec 2015 Contents 1. Fragmentation 2. Interworking h4 h6 with NATs 3. Proxy ARP Textbook Chapter 5: The
More informationComputer Networks Principles
Computer Networks Principles Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Contents Introduction protocols and layered architecture encapsulation interconnection structures performance
More informationSwitching and Forwarding - continued
Fall 9/7 CptS/EE 555 Fall 9/7 CptS/EE 555 4 Housekeeping Look at select system call See homework solutions on the Lecture Notes web page for answer to the probability difficulties we (I) had last time
More information