Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016
|
|
- Kelley Neil Murphy
- 5 years ago
- Views:
Transcription
1 Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice question answer sheet. Marks for each part of each question are indicated in square brackets Calculators are permitted Part ONE 1. Ethernet, the Capture Effect, and TCP Recall that Ethernet resolves collisions using binary exponential backoff (BEB). a. Fully describe Ethernet s BEB scheme, including its effect on Ethernet s transmissions, how it behaves after both collision-free transmissions and collisions, and any limits on BEB s behavior. [5 marks] b. Suppose three hosts, X, Y, and Z, are attached to the same Ethernet network. X and Y both attempt to transmit their respective frames for the first time and collide. When X and Y contend to retry their transmissions, Y transmits next and no collision occurs. X still needs to retry its transmission. Suppose that while Y is still transmitting, Z s Ethernet interface finds that it has a new frame to send, and Z senses Y s carrier. And suppose that Y has no further frames to transmit. Which Ethernet host, X or Z, is more likely to send next after Y? What is the probability that each of X and Z will send first without a collision, and the probability that X and Z will collide? Derive your answer based on the relevant details of the Ethernet MAC protocol (including any relevant details of BEB). COMPGZ01 1 TURN OVER
2 c. As described in 3035/GZ01 Coursework 2, the capture effect occurs in Ethernet when senders X and Y collide, sender X wins in contention to retransmit (i.e., X retransmits before Y ), X then tries to send its next frame, and in doing so collides with Y s retransmission of its original frame. In this scenario, X will draw its backoff from a shorter range of durations than Y with the result that X is more likely to send a new frame than Y is to retransmit a frame that suffered a collision. This pattern is likely to repeat for subsequent collisions, such that X obtains a much greater fraction of the Ethernet s capacity than Y. Suppose that X and Y are the only two hosts on an Ethernet, and that X uses the Transmission Control Protocol (TCP) to send data to Y over this Ethernet. And suppose the capture effect occurs on this Ethernet, such that TCP sender X has far more opportunities to send packets over the Ethernet than TCP receiver Y. Assume that X s congestion window size (cwnd) has already reached a value of 64 packets, that there are 64 packets already in flight between X and Y, and that Y s advertised received window does not limit the number of packets in flight between X and Y. How will the capture effect affect the TCP transfer from X to Y? Refer to any relevant details of the TCP protocol in your answer. [3 marks] d. Your 3035/GZ01 classmate Mac Phair proposes the following change to the Ethernet MAC protocol with the intent of preventing the capture effect: Suppose an Ethernet sender X sends its first frame successfully (without a collision), then attempts to send its second frame, but detects a collision. In this specific case, X should use a modified BEB as follows. X backs off two slot times before attempting to retransmit the frame that experienced the collision. If this retransmission also collides, then before attempting its next retransmission of the same (second) frame, X backs off zero slot times before this second retransmission. If this second retransmission also collides, then X reverts to the standard BEB for this and all subsequent retransmissions. In all other cases, senders use Ethernet s usual unmodified BEB. Suppose you have a two-node Ethernet consisting of sender hosts X and Y. Suppose that both X and Y have long queues of frames to send with their Ethernet interfaces. Does your classmate s proposed change to the Ethernet MAC protocol eliminate the capture effect for such two-node networks? Why or why not? In your answer, assume that all Ethernet frames transmitted are many Ethernet slottimes in duration. [8 marks] COMPGZ01 2 CONTINUED
3 e. Suppose you have an Ethernet of more than two nodes, where each node has a long queue of frames to send with its Ethernet interface. Does your classmate Mac Phair s proposed change to the Ethernet MAC protocol eliminate the capture effect for such networks with more than two nodes? Why or why not? Again, in your answer, assume that the length of all frames transmitted is many Ethernet slot times. f. Upon hearing about Mac Phair s suggested change to the Ethernet MAC protocol, another of your 3035/GZ01 classmates, Sharon Doughty, worries that Ethernet senders using Phair s changed BEB will choose different mean backoffs after collisions than Ethernet senders using unmodified BEB. Consider a scenario where there are only two senders on an Ethernet, X and Y, both with long queues of frames to send. Consider the case where an unmodified sender X (without Phair s BEB change) encounters two successive collisions as it attempts to transmit a frame. Then consider the case where a modified sender (with Phair s BEB change) has transmitted one frame successfully, then encounters two successive collisions on the next frame it attempts to transmit. What are the expected mean backoff intervals (in slots) for the unmodified sender X and the modified sender X? In this scenario only (two senders only, each with infinitely many frames to send), will modified and unmodified Ethernet senders choose different mean backoffs after two collisions? Justify your answer by referring to the relevant details of stock Ethernet BEB and Phair s modified Ethernet BEB. [5 marks] [Question 1: Total 33 marks] COMPGZ01 3 TURN OVER
4 2. TCP a. The TCP sender retransmits data segments (packets) for which it does not receive ACKs. It also samples the elapsed round-trip time (RTT) between the sending of a data packet and the return of the ACK for that sequence number, as input to its estimate of the connection s RTT. Suppose the TCP sender retransmits a data packet, and subsequently receives an ACK for that packet. Why should the TCP sender not use RTT samples for retransmitted packets in its RTT estimate? b. Suppose you make repeated file transfers using TCP between two hosts on the Internet, A and B, where A acts as the sender and B as the receiver. You notice that the TCP throughput you are obtaining is quite poor, and decide to investigate. Your 3035/GZ01 classmate tells you that even if the Internet path(s) between A and B drops no packets, but merely reorders them, it s quite possible that you will observe very low-throughput TCP data transfers. Is your classmate correct? Justify your answer by either explaining precisely why TCP would suffer low throughput under packet reordering, or by explaining why it would not. Refer to the relevant specific details of the TCP protocol in your answer. [4 marks] c. Your 3035/GZ01 classmate tells you that you can determine whether the Internet path(s) between a TCP sender and receiver is (are) reordering data packets by detecting duplicate data packets (i.e., for the same TCP sequence number) that arrive at the receiver. He says that when significant reordering occurs, the receiver will receive duplicate data packets. Is your classmate correct? Justify your answer by referring to the relevant details of the TCP protocol. [4 marks] d. Suppose that a TCP sender has exited slow start and is in steady state, such that its congestion window consists of many dozens of packets, and is approximately equal to the bandwidth-delay product of the Internet path between itself and the TCP receiver. Suppose further that a single TCP ACK is dropped en route from the TCP receiver to the TCP sender. Your classmate predicts that the dropping of this TCP ACK will cause the TCP sender to experience a retransmit timeout (since the lost ACK won t arrive before the retransmit timer for the corresponding TCP data packet expires). Is your classmate correct? Justify your answer by referring to the relevant details of the TCP protocol. [4 marks] COMPGZ01 4 CONTINUED
5 e. Consider the below graph, which plots a TCP sender s congestion window size in segments (packets) vs. time measured in RTTs. Referring to the above graph, answer all the following questions: i. During which time periods is TCP slow start operating? [2 marks] ii. During which time periods is the TCP sender engaging in additive increase? [2 marks] COMPGZ01 5 TURN OVER
6 iii. Is the change in congestion window between RTT 14 and RTT 15 a fast retransmit or a timeout, what about the points at RTT 14 and RTT 15 lets you make that determination, and what observation at the sender triggers this change in congestion window? [3 marks] iv. Suppose the TCP sender experienced a retransmit timeout at RTT 18 (this is not shown in the figure; while answering this part of this question, disregard the points on the graph at RTTs 18 and greater). If a timeout occurred at RTT 18, how big would the TCP sender s congestion window need to grow before the TCP sender would exit slow start? Justify your answer by referring to the relevant details of the TCP congestion control algorithm. [2 marks] f. The system administrator at a large company wants to block malicious Internet traffic from reaching end hosts within the company s network. He adds a rule to the company s firewall (which sits at the one gateway link between the company s network and the rest of the Internet) that blocks all Internet Control Message Protocol (ICMP) packets arriving inbound to the company s network from the Internet, because ICMP packets are often malicious (e.g., sent by attackers attempting a denial of service (DOS) attack on the company s network). To his surprise, shortly after the system administrator adds this rule to the company s firewall, he receives a huge number of support requests from users of computers on the company s network. The users who send these support requests all say that when they attempt to send a large file to a destination elsewhere on the Internet with TCP, the connection hangs that is, the receiver elsewhere on the Internet stops receiving any data packets at all on the user s TCP connection, and the sender stops receiving any ACKs on the user s TCP connection. i. Why did the installation of this firewall rule cause this problem with outbound TCP data transfers? Justify your answer by referring specifically to the mechanism that this firewall rule breaks, and why the rule breaks that mechanism. [3 marks] ii. While leaving this same firewall rule in place (and not allowing any additional packets to traverse the firewall inbound), propose a change to the sender s TCP and IP protocol implementations that will fix the problem the users are reporting. Explain why this change fixes this problem, and comment on any undesirable side-effects that this fix may have. [3 marks] [Question 1: Total 33 marks] COMPGZ01 6 CONTINUED
7 3. BGP a. A tier-1 Internet service provider (ISP), A and its customer, a tier-2 ISP, B, connect at a site in London and a site in Germany. Each has an extensive international backbone. Say that UCL is ISP A s customer, and Volkswagen (in Germany) is ISP B s customer. If a host at UCL sends a packet to a host at Volkswagen, the packet must cross from A s backbone onto B s backbone at some connection point. i. What typical routing policy will determine where the packet crosses from ISP A s network onto ISP B s, where will this policy tend to make the crossing take place, and what is the economic motivation for this policy? [4 marks] ii. Suppose ISP B would like to force ISP A to carry packets bound for ISP B (and its customers) all the way to their connection point in Germany on ISP A s own infrastructure. What BGP mechanism would ISP B use to accomplish this goal, how would ISP B use it, and how would it affect BGP s behavior? [8 marks] b. When the network topology changes, does BGP ever find a route containing a loop among ASes? If so, give an example showing this behavior; if not, explain why it cannot. [3 marks] c. An AS may hear a prefix for the same destination announced in BGP via a provider, customer, and/or peer. What is the order of preference among these three, and why? d. In a typical tier-1 ISP, all routers run an interior gateway protocol (IGP), such as Link-State routing, and an exterior gateway protocol (EGP), such as ibgp. To forward packets to all of the Internet s destination prefixes, a router must have a forwarding table entry for every one of these prefixes. Describe how a router combines the information it learns from its IGP with that it learns from its EGP to produce this complete routing table, with one entry for every Internet destination prefix. e. Unlike distance-vector routing, BGP does not send periodic announcements of the contents of its routing table. Why did the designers of BGP make this choice, and how does BGP ensure that routers hold up-to-date routing tables without such periodic updates? Refer to the details of BGP s route propagation scheme in your answer. [Question 3: Total 33 marks] COMPGZ01 7 TURN OVER
8 Part TWO Multiple Choice Answer ALL questions in this section. The questions in this section are True/False. For each statement, mark the one appropriate box below ON YOUR EXAM PAPER. Using an HB pencil, fill in the rectangle on the Form A multiple choice answer sheet corresponding to whether each statement in each question is true ( T ) or false ( F ). Fill in D if you don t know. DO NOT GUESS. You will be awarded one mark for each statement correctly classified as true or false, but you will lose one mark for each choice incorrectly classified as true or false. You will neither gain nor lose marks if you fill in don t know. Statements for which you do not fill in an answer will be classified as don t know. Final results will be normalized across the class. 1. TCP Congestion Control Consider the Transmission Control Protocol (TCP) and its congestion control mechanisms. Which of the following statements are true? A. When two TCP flows compete at a single bottleneck and both experience the same packet loss rate, but have different round-trip times (RTTs), the flow with the shorter RTT will achieve a greater throughput. B. A TCP sender relies on ICMP packets from routers signaling in-network congestion to learn when to reduce its congestion window size. C. As the packet loss rate on a path increases, TCP s throughput decreases linearly in the packet loss rate. D. A retransmit timeout reduces TCP s congestion window by half. E. TCP s congestion control ensures that when a TCP flow and a non-tcp, non-congestioncontrolled flow compete at a bottleneck link, the TCP flow will always get a fair share of the bottleneck link s capacity. 2. Error Correction Which of the following are true statements about the various error detection and correction codes we have learned about? A. A 2 1 -rate repetition code can correct one bit error in a byte of data. B. A two-dimensional parity check can correct one bit error (assuming the receiver knows at most one bit is incorrect). C. A two-dimensional parity check can detect all three-bit errors (assuming the receiver knows at most three bits are incorrect). D. The Internet checksum can detect any two-bit error in a frame. E. With appropriate choice of polynomial, the cyclic redundancy check can detect any two-bit error in a frame. COMPGZ01 8 CONTINUED
9 3. MACAW/ MAC Which of the following statements about the MACAW and wireless MAC protocols are true? A. MACAW s request-to-send (RTS) and clear-to-send (CTS) mechanism mitigates the exposed terminal problem. B. The MAC protocol s inclusion of link-layer reliability is a flagrant violation of the end-to-end argument. C. The MACAW and MAC protocols require all nodes to listen with their radios at all times (except while they are sending). D. Carrier sense causes the hidden terminal problem (i.e., the hidden terminal problem would not exist if MACAW did not use carrier sense). E. Carrier sense causes the exposed terminal problem (i.e., the exposed terminal problem would not exist if MACAW did not use carrier sense). 4. BGP Which of the following are true statements about the Border Gateway Protocol (BGP)? A. A BGP router may peer with another BGP router that is more than one physical hop away. B. A network running BGP that hears a route from a customer AS will normally forward it on to a neighbouring provider AS. C. A network running BGP that hears a route from a provider AS will normally forward it on to another different neighbouring provider AS. D. A network running BGP that hears a route from a peer AS will normally forward it on to another different neighbouring peer AS. E. A BGP router will that hears two copies of a route from two different neighbouring ASes will normally prefer the route from a customer AS over that from a provider AS. COMPGZ01 9 TURN OVER
10 5. TCP Protocol and Congestion Control A. TCP practices self-clocking transmission by using a timer at the sender to pace packet transmissions at a perfectly smooth rate. B. Over a network that can drop packets, the TCP protocol ensures using FIN messages that once both endpoints of a TCP connection decide to end the connection, they will always both reach agreement that both have reached this decision. C. For very short transfers of fewer than 4 packets, TCP cannot invoke fast retransmit to recover from losses. D. In normal operation, a TCP sender repeatedly provokes loss of its packets at one or more queues along the path between sender and receiver. E. TCP begins new connections with an initial sequence number of zero. 6. Spanning Tree Protocol Which of the following are true statements about the Ethernet Spanning Tree Protocol (STP)? A. All switches in an extended Ethernet that is running STP will eventually agree on a single root switch. B. When the STP converges, all links out of the root switch will be in the root state. C. When the STP converges, no switch will have all its ports in the designated state. D. Switches compare configuration messages first based on lower distance to root, then based on lower root identifier. E. Link failures can briefly introduce forwarding loops until configuration messages time-to-live fields expire. COMPGZ01 10 CONTINUED
11 7. BGP Routing Which of the following statements about the Border Gateway Protocol (BGP) are correct? A. BGP may choose routes that contain loops immediately after a topology change. B. Given three autonomous systems (ASes), A, B, and C, consider the round-trip time (RTT) of the path selected by BGP between A and B with the sum of the round-trip times of the paths selected by BGP between A and C and between C and B. BGP never selects paths such that the RTT of the former path (A B) is greater than the sum of the RTTs of the latter paths (A B and B C). C. If one tier-1 ISP stops peering with another tier-1 ISP, no customers of either ISP will become partitioned from one another, because BGP will then begin to route traffic between these two tier-1 ISPs via some third tier-1 ISP. D. BGP routers in an AS must honor multi-exit discriminator (MED) attributes advertised by routers in neighboring ASes. E. Under BGP, routers not on an AS s border (i.e., those connected only to other routers within the same AS, with no links to routers in other ASes) need not store routing tables with entries for all destination prefixes in the global Internet MAC Consider the IEEE medium access control (MAC) protocol. Which of the following statements are true? A. Request to Send (RTS) and Clear to Send (CTS) packets are of no use in mitigating the hidden terminal problem when senders attempt to send very short data packets. B senders use collision detection to share the wireless medium more efficiently. C. Suppose two senders, A and C, wish to send concurrently to two receivers, B and D, respectively. Carrier sense may reduce the aggregate throughput achieved by A and C in some topologies, as compared with the aggregate throughput achieved when neither uses carrier sense. D. Address Resolution Protocol (ARP) request packets sent on networks are always acknowledged at the link layer. E. An sender backs off exponentially before retransmitting when it does not receive a link-layer acknowledgement (ACK) for its unicast data transmission. [Total 40 marks, after normalization of marks] END OF PAPER COMPGZ01 11
Part ONE
Networked Systems, COMPGZ0, 0 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice question answer sheet.
More informationCSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012
CSE 473 Introduction to Computer Networks Jon Turner Exam 2 Your name here: 11/7/2012 1. (10 points). The diagram at right shows a DHT with 16 nodes. Each node is labeled with the first value in its range
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More information6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long
6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationECE 610: Homework 4 Problems are taken from Kurose and Ross.
ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose
More informationCarnegie Mellon Computer Science Department Spring 2016 Midterm Exam
Carnegie Mellon Computer Science Department. 15-744 Spring 2016 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 13 pages (numbered at the bottom). Make sure you have all of them. Please write your
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationTransport Layer PREPARED BY AHMED ABDEL-RAOUF
Transport Layer PREPARED BY AHMED ABDEL-RAOUF TCP Flow Control TCP Flow Control 32 bits source port # dest port # head len sequence number acknowledgement number not used U A P R S F checksum Receive window
More informationCOMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes
More informationSwitch Configuration message sent 1 (1, 0, 1) 2
UNIVESITY COLLEGE LONON EPATMENT OF COMPUTE SCIENCE COMP00: Networked Systems Problem Set istributed: nd November 08 NOT ASSESSE, model answers released: 9th November 08 Instructions: This problem set
More informationCarnegie Mellon Computer Science Department Spring 2015 Midterm Exam
Carnegie Mellon Computer Science Department. 15-744 Spring 2015 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 7 pages (numbered at the bottom). Make sure you have all of them. Please write your
More informationReliable Transport II: TCP and Congestion Control
Reliable Transport II: TCP and Congestion Control Brad Karp UCL Computer Science CS 3035/GZ01 31 st October 2013 Outline Slow Start AIMD Congestion control Throughput, loss, and RTT equation Connection
More informationCSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS
CSE 47 Introduction to Computer Networks Roch Guérin Final Exam Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS 1. [10 points] Bob has been provided with the following pair of
More informationHomework #4. Due: December 2, 4PM. CWND (#pkts)
Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationCommunication Networks
Communication Networks Spring 2018 Q&A Session Rüdiger Birkner Tobias Bühler https://comm-net.ethz.ch/ ETH Zürich August 6 2018 Old exam from 2016 3 hours instead of 2.5 Topics which we did not discuss
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationReliable Transport II: TCP and Congestion Control
Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question
More informationCSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100
CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationCS BGP v4. Fall 2014
CS 457 - BGP v4 Fall 2014 Autonomous Systems What is an AS? a set of routers under a single technical administration uses an interior gateway protocol (IGP) and common metrics to route packets within the
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationCOMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)
COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be
More information6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2005 Quiz II There are 17 questions and 10 pages in this quiz
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationEE122 MIDTERM EXAM: Scott Shenker, Ion Stoica
EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e
More informationUniversity of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.
University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2010 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: B Calculator: Type 2 There are a total of 10 problems.
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationReview problems (for no credit): Transport and Network Layer
Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets
More informationImportant Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)
Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be
More informationInternet Networking recitation #10 TCP New Reno Vs. Reno
recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006
Email Address ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Name (Print) Prof. John A. Copeland Practice for April 11, 2006 Tel.: 404-894-5177 E-Mail: copeland@ece.gatech.edu RULES.
More informationAnswers to Sample Questions on Transport Layer
Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationComputer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am
15-744 Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am (please submit through e-mail to zhuoc@cs.cmu.edu and srini@cs.cmu.edu) Name: A Congestion Control 1. At time t, a TCP connection
More informationCS244a: An Introduction to Computer Networks
Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete
More information15-441: Computer Networks Spring 2017 Homework 3
15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page
More informationCS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding
More informationLecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren
Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati
More informationComputer Networks (Fall 2011) Homework 2
5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A
More informationImpact of transmission errors on TCP performance. Outline. Random Errors
Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2 Solutions
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2011 Quiz 2 Solutions There are 11 questions and 12 pages in this
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa
More informationOutline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure
Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure
More informationMidterm Review. EECS 489 Computer Networks Z. Morley Mao Monday Feb 19, 2007
Midterm Review EECS 489 Computer Networks http://www.eecs.umich.edu/courses/eecs489/w07 Z. Morley Mao Monday Feb 19, 2007 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Adminstrivia
More informationTransport Protocols and TCP: Review
Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationCOMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class
Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes
More information8. TCP Congestion Control
8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control
More informationCOMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key
COMP 361 Computer Communications Networks all Semester 2003 inal Examination: Solution key Date: Dec 15, 2003, ime 8:30am - 11:30am, venue Rm 3007 Name: Student ID: Email: Instructions: 1. his examination
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationDepartment of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III
6.02 Spring 2010, Quiz 3 Page 1 of 11 Name: Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.02 Spring 2010 Quiz III There are 12 questions (many with multiple
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationLecture 4: Congestion Control
Lecture 4: Congestion Control Overview Internet is a network of networks Narrow waist of IP: unreliable, best-effort datagram delivery Packet forwarding: input port to output port Routing protocols: computing
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationCS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online
1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.
More informationCS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control
: Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And
More informationThere are 10 questions in total. Please write your SID on each page.
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationCS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.
CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationBandwidth Allocation & TCP
Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative
More informationCMPE150 Midterm Solutions
CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching
More informationLecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage
Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection
More informationMIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E
MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE
More informationCongestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?
Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver
More informationEXAM TCP/IP NETWORKING Duration: 3 hours
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2017 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to
More informationCS244a: An Introduction to Computer Networks
Grade: MC: 7: 8: 9: 10: 11: 12: 13: 14: Total: CS244a: An Introduction to Computer Networks Final Exam: Wednesday You are allowed 2 hours to complete this exam. (i) This exam is closed book and closed
More informationNext Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points
Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies
More informationCS244a: An Introduction to Computer Networks
Name: Grade: S MC: L MC: 15: 16: 17: Total: CS244a: An Introduction to Computer Networks Midterm Exam: Thursday You are allowed 1 hour to complete this exam. (i) This exam is closed book and closed notes.
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationTCP/IP Performance ITL
TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationIndian Institute of Technology, Kharagpur
Indian Institute of Technology, Kharagpur End-Autumn Semester 2018-19 Date of Examination: 27-11-2018 Session: FN (9-12 pm) Duration: 3 hrs Subject No.: IT30037 Subject: INTRODUCTION TO INTERNET Department/Center/School:
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationCS321: Computer Networks Congestion Control in TCP
CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a
More informationCS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm
CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: SUNet ID: @stanford.edu Check if you would like exam routed back via SCPD:
More informationCongestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources
Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationCS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA
CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationCSE 461. TCP and network congestion
CSE 461 TCP and network congestion This Lecture Focus How should senders pace themselves to avoid stressing the network? Topics Application Presentation Session Transport Network congestion collapse Data
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More information