Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

Size: px
Start display at page:

Download "Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016"

Transcription

1 Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice question answer sheet. Marks for each part of each question are indicated in square brackets Calculators are permitted Part ONE 1. Ethernet, the Capture Effect, and TCP Recall that Ethernet resolves collisions using binary exponential backoff (BEB). a. Fully describe Ethernet s BEB scheme, including its effect on Ethernet s transmissions, how it behaves after both collision-free transmissions and collisions, and any limits on BEB s behavior. [5 marks] b. Suppose three hosts, X, Y, and Z, are attached to the same Ethernet network. X and Y both attempt to transmit their respective frames for the first time and collide. When X and Y contend to retry their transmissions, Y transmits next and no collision occurs. X still needs to retry its transmission. Suppose that while Y is still transmitting, Z s Ethernet interface finds that it has a new frame to send, and Z senses Y s carrier. And suppose that Y has no further frames to transmit. Which Ethernet host, X or Z, is more likely to send next after Y? What is the probability that each of X and Z will send first without a collision, and the probability that X and Z will collide? Derive your answer based on the relevant details of the Ethernet MAC protocol (including any relevant details of BEB). COMPGZ01 1 TURN OVER

2 c. As described in 3035/GZ01 Coursework 2, the capture effect occurs in Ethernet when senders X and Y collide, sender X wins in contention to retransmit (i.e., X retransmits before Y ), X then tries to send its next frame, and in doing so collides with Y s retransmission of its original frame. In this scenario, X will draw its backoff from a shorter range of durations than Y with the result that X is more likely to send a new frame than Y is to retransmit a frame that suffered a collision. This pattern is likely to repeat for subsequent collisions, such that X obtains a much greater fraction of the Ethernet s capacity than Y. Suppose that X and Y are the only two hosts on an Ethernet, and that X uses the Transmission Control Protocol (TCP) to send data to Y over this Ethernet. And suppose the capture effect occurs on this Ethernet, such that TCP sender X has far more opportunities to send packets over the Ethernet than TCP receiver Y. Assume that X s congestion window size (cwnd) has already reached a value of 64 packets, that there are 64 packets already in flight between X and Y, and that Y s advertised received window does not limit the number of packets in flight between X and Y. How will the capture effect affect the TCP transfer from X to Y? Refer to any relevant details of the TCP protocol in your answer. [3 marks] d. Your 3035/GZ01 classmate Mac Phair proposes the following change to the Ethernet MAC protocol with the intent of preventing the capture effect: Suppose an Ethernet sender X sends its first frame successfully (without a collision), then attempts to send its second frame, but detects a collision. In this specific case, X should use a modified BEB as follows. X backs off two slot times before attempting to retransmit the frame that experienced the collision. If this retransmission also collides, then before attempting its next retransmission of the same (second) frame, X backs off zero slot times before this second retransmission. If this second retransmission also collides, then X reverts to the standard BEB for this and all subsequent retransmissions. In all other cases, senders use Ethernet s usual unmodified BEB. Suppose you have a two-node Ethernet consisting of sender hosts X and Y. Suppose that both X and Y have long queues of frames to send with their Ethernet interfaces. Does your classmate s proposed change to the Ethernet MAC protocol eliminate the capture effect for such two-node networks? Why or why not? In your answer, assume that all Ethernet frames transmitted are many Ethernet slottimes in duration. [8 marks] COMPGZ01 2 CONTINUED

3 e. Suppose you have an Ethernet of more than two nodes, where each node has a long queue of frames to send with its Ethernet interface. Does your classmate Mac Phair s proposed change to the Ethernet MAC protocol eliminate the capture effect for such networks with more than two nodes? Why or why not? Again, in your answer, assume that the length of all frames transmitted is many Ethernet slot times. f. Upon hearing about Mac Phair s suggested change to the Ethernet MAC protocol, another of your 3035/GZ01 classmates, Sharon Doughty, worries that Ethernet senders using Phair s changed BEB will choose different mean backoffs after collisions than Ethernet senders using unmodified BEB. Consider a scenario where there are only two senders on an Ethernet, X and Y, both with long queues of frames to send. Consider the case where an unmodified sender X (without Phair s BEB change) encounters two successive collisions as it attempts to transmit a frame. Then consider the case where a modified sender (with Phair s BEB change) has transmitted one frame successfully, then encounters two successive collisions on the next frame it attempts to transmit. What are the expected mean backoff intervals (in slots) for the unmodified sender X and the modified sender X? In this scenario only (two senders only, each with infinitely many frames to send), will modified and unmodified Ethernet senders choose different mean backoffs after two collisions? Justify your answer by referring to the relevant details of stock Ethernet BEB and Phair s modified Ethernet BEB. [5 marks] [Question 1: Total 33 marks] COMPGZ01 3 TURN OVER

4 2. TCP a. The TCP sender retransmits data segments (packets) for which it does not receive ACKs. It also samples the elapsed round-trip time (RTT) between the sending of a data packet and the return of the ACK for that sequence number, as input to its estimate of the connection s RTT. Suppose the TCP sender retransmits a data packet, and subsequently receives an ACK for that packet. Why should the TCP sender not use RTT samples for retransmitted packets in its RTT estimate? b. Suppose you make repeated file transfers using TCP between two hosts on the Internet, A and B, where A acts as the sender and B as the receiver. You notice that the TCP throughput you are obtaining is quite poor, and decide to investigate. Your 3035/GZ01 classmate tells you that even if the Internet path(s) between A and B drops no packets, but merely reorders them, it s quite possible that you will observe very low-throughput TCP data transfers. Is your classmate correct? Justify your answer by either explaining precisely why TCP would suffer low throughput under packet reordering, or by explaining why it would not. Refer to the relevant specific details of the TCP protocol in your answer. [4 marks] c. Your 3035/GZ01 classmate tells you that you can determine whether the Internet path(s) between a TCP sender and receiver is (are) reordering data packets by detecting duplicate data packets (i.e., for the same TCP sequence number) that arrive at the receiver. He says that when significant reordering occurs, the receiver will receive duplicate data packets. Is your classmate correct? Justify your answer by referring to the relevant details of the TCP protocol. [4 marks] d. Suppose that a TCP sender has exited slow start and is in steady state, such that its congestion window consists of many dozens of packets, and is approximately equal to the bandwidth-delay product of the Internet path between itself and the TCP receiver. Suppose further that a single TCP ACK is dropped en route from the TCP receiver to the TCP sender. Your classmate predicts that the dropping of this TCP ACK will cause the TCP sender to experience a retransmit timeout (since the lost ACK won t arrive before the retransmit timer for the corresponding TCP data packet expires). Is your classmate correct? Justify your answer by referring to the relevant details of the TCP protocol. [4 marks] COMPGZ01 4 CONTINUED

5 e. Consider the below graph, which plots a TCP sender s congestion window size in segments (packets) vs. time measured in RTTs. Referring to the above graph, answer all the following questions: i. During which time periods is TCP slow start operating? [2 marks] ii. During which time periods is the TCP sender engaging in additive increase? [2 marks] COMPGZ01 5 TURN OVER

6 iii. Is the change in congestion window between RTT 14 and RTT 15 a fast retransmit or a timeout, what about the points at RTT 14 and RTT 15 lets you make that determination, and what observation at the sender triggers this change in congestion window? [3 marks] iv. Suppose the TCP sender experienced a retransmit timeout at RTT 18 (this is not shown in the figure; while answering this part of this question, disregard the points on the graph at RTTs 18 and greater). If a timeout occurred at RTT 18, how big would the TCP sender s congestion window need to grow before the TCP sender would exit slow start? Justify your answer by referring to the relevant details of the TCP congestion control algorithm. [2 marks] f. The system administrator at a large company wants to block malicious Internet traffic from reaching end hosts within the company s network. He adds a rule to the company s firewall (which sits at the one gateway link between the company s network and the rest of the Internet) that blocks all Internet Control Message Protocol (ICMP) packets arriving inbound to the company s network from the Internet, because ICMP packets are often malicious (e.g., sent by attackers attempting a denial of service (DOS) attack on the company s network). To his surprise, shortly after the system administrator adds this rule to the company s firewall, he receives a huge number of support requests from users of computers on the company s network. The users who send these support requests all say that when they attempt to send a large file to a destination elsewhere on the Internet with TCP, the connection hangs that is, the receiver elsewhere on the Internet stops receiving any data packets at all on the user s TCP connection, and the sender stops receiving any ACKs on the user s TCP connection. i. Why did the installation of this firewall rule cause this problem with outbound TCP data transfers? Justify your answer by referring specifically to the mechanism that this firewall rule breaks, and why the rule breaks that mechanism. [3 marks] ii. While leaving this same firewall rule in place (and not allowing any additional packets to traverse the firewall inbound), propose a change to the sender s TCP and IP protocol implementations that will fix the problem the users are reporting. Explain why this change fixes this problem, and comment on any undesirable side-effects that this fix may have. [3 marks] [Question 1: Total 33 marks] COMPGZ01 6 CONTINUED

7 3. BGP a. A tier-1 Internet service provider (ISP), A and its customer, a tier-2 ISP, B, connect at a site in London and a site in Germany. Each has an extensive international backbone. Say that UCL is ISP A s customer, and Volkswagen (in Germany) is ISP B s customer. If a host at UCL sends a packet to a host at Volkswagen, the packet must cross from A s backbone onto B s backbone at some connection point. i. What typical routing policy will determine where the packet crosses from ISP A s network onto ISP B s, where will this policy tend to make the crossing take place, and what is the economic motivation for this policy? [4 marks] ii. Suppose ISP B would like to force ISP A to carry packets bound for ISP B (and its customers) all the way to their connection point in Germany on ISP A s own infrastructure. What BGP mechanism would ISP B use to accomplish this goal, how would ISP B use it, and how would it affect BGP s behavior? [8 marks] b. When the network topology changes, does BGP ever find a route containing a loop among ASes? If so, give an example showing this behavior; if not, explain why it cannot. [3 marks] c. An AS may hear a prefix for the same destination announced in BGP via a provider, customer, and/or peer. What is the order of preference among these three, and why? d. In a typical tier-1 ISP, all routers run an interior gateway protocol (IGP), such as Link-State routing, and an exterior gateway protocol (EGP), such as ibgp. To forward packets to all of the Internet s destination prefixes, a router must have a forwarding table entry for every one of these prefixes. Describe how a router combines the information it learns from its IGP with that it learns from its EGP to produce this complete routing table, with one entry for every Internet destination prefix. e. Unlike distance-vector routing, BGP does not send periodic announcements of the contents of its routing table. Why did the designers of BGP make this choice, and how does BGP ensure that routers hold up-to-date routing tables without such periodic updates? Refer to the details of BGP s route propagation scheme in your answer. [Question 3: Total 33 marks] COMPGZ01 7 TURN OVER

8 Part TWO Multiple Choice Answer ALL questions in this section. The questions in this section are True/False. For each statement, mark the one appropriate box below ON YOUR EXAM PAPER. Using an HB pencil, fill in the rectangle on the Form A multiple choice answer sheet corresponding to whether each statement in each question is true ( T ) or false ( F ). Fill in D if you don t know. DO NOT GUESS. You will be awarded one mark for each statement correctly classified as true or false, but you will lose one mark for each choice incorrectly classified as true or false. You will neither gain nor lose marks if you fill in don t know. Statements for which you do not fill in an answer will be classified as don t know. Final results will be normalized across the class. 1. TCP Congestion Control Consider the Transmission Control Protocol (TCP) and its congestion control mechanisms. Which of the following statements are true? A. When two TCP flows compete at a single bottleneck and both experience the same packet loss rate, but have different round-trip times (RTTs), the flow with the shorter RTT will achieve a greater throughput. B. A TCP sender relies on ICMP packets from routers signaling in-network congestion to learn when to reduce its congestion window size. C. As the packet loss rate on a path increases, TCP s throughput decreases linearly in the packet loss rate. D. A retransmit timeout reduces TCP s congestion window by half. E. TCP s congestion control ensures that when a TCP flow and a non-tcp, non-congestioncontrolled flow compete at a bottleneck link, the TCP flow will always get a fair share of the bottleneck link s capacity. 2. Error Correction Which of the following are true statements about the various error detection and correction codes we have learned about? A. A 2 1 -rate repetition code can correct one bit error in a byte of data. B. A two-dimensional parity check can correct one bit error (assuming the receiver knows at most one bit is incorrect). C. A two-dimensional parity check can detect all three-bit errors (assuming the receiver knows at most three bits are incorrect). D. The Internet checksum can detect any two-bit error in a frame. E. With appropriate choice of polynomial, the cyclic redundancy check can detect any two-bit error in a frame. COMPGZ01 8 CONTINUED

9 3. MACAW/ MAC Which of the following statements about the MACAW and wireless MAC protocols are true? A. MACAW s request-to-send (RTS) and clear-to-send (CTS) mechanism mitigates the exposed terminal problem. B. The MAC protocol s inclusion of link-layer reliability is a flagrant violation of the end-to-end argument. C. The MACAW and MAC protocols require all nodes to listen with their radios at all times (except while they are sending). D. Carrier sense causes the hidden terminal problem (i.e., the hidden terminal problem would not exist if MACAW did not use carrier sense). E. Carrier sense causes the exposed terminal problem (i.e., the exposed terminal problem would not exist if MACAW did not use carrier sense). 4. BGP Which of the following are true statements about the Border Gateway Protocol (BGP)? A. A BGP router may peer with another BGP router that is more than one physical hop away. B. A network running BGP that hears a route from a customer AS will normally forward it on to a neighbouring provider AS. C. A network running BGP that hears a route from a provider AS will normally forward it on to another different neighbouring provider AS. D. A network running BGP that hears a route from a peer AS will normally forward it on to another different neighbouring peer AS. E. A BGP router will that hears two copies of a route from two different neighbouring ASes will normally prefer the route from a customer AS over that from a provider AS. COMPGZ01 9 TURN OVER

10 5. TCP Protocol and Congestion Control A. TCP practices self-clocking transmission by using a timer at the sender to pace packet transmissions at a perfectly smooth rate. B. Over a network that can drop packets, the TCP protocol ensures using FIN messages that once both endpoints of a TCP connection decide to end the connection, they will always both reach agreement that both have reached this decision. C. For very short transfers of fewer than 4 packets, TCP cannot invoke fast retransmit to recover from losses. D. In normal operation, a TCP sender repeatedly provokes loss of its packets at one or more queues along the path between sender and receiver. E. TCP begins new connections with an initial sequence number of zero. 6. Spanning Tree Protocol Which of the following are true statements about the Ethernet Spanning Tree Protocol (STP)? A. All switches in an extended Ethernet that is running STP will eventually agree on a single root switch. B. When the STP converges, all links out of the root switch will be in the root state. C. When the STP converges, no switch will have all its ports in the designated state. D. Switches compare configuration messages first based on lower distance to root, then based on lower root identifier. E. Link failures can briefly introduce forwarding loops until configuration messages time-to-live fields expire. COMPGZ01 10 CONTINUED

11 7. BGP Routing Which of the following statements about the Border Gateway Protocol (BGP) are correct? A. BGP may choose routes that contain loops immediately after a topology change. B. Given three autonomous systems (ASes), A, B, and C, consider the round-trip time (RTT) of the path selected by BGP between A and B with the sum of the round-trip times of the paths selected by BGP between A and C and between C and B. BGP never selects paths such that the RTT of the former path (A B) is greater than the sum of the RTTs of the latter paths (A B and B C). C. If one tier-1 ISP stops peering with another tier-1 ISP, no customers of either ISP will become partitioned from one another, because BGP will then begin to route traffic between these two tier-1 ISPs via some third tier-1 ISP. D. BGP routers in an AS must honor multi-exit discriminator (MED) attributes advertised by routers in neighboring ASes. E. Under BGP, routers not on an AS s border (i.e., those connected only to other routers within the same AS, with no links to routers in other ASes) need not store routing tables with entries for all destination prefixes in the global Internet MAC Consider the IEEE medium access control (MAC) protocol. Which of the following statements are true? A. Request to Send (RTS) and Clear to Send (CTS) packets are of no use in mitigating the hidden terminal problem when senders attempt to send very short data packets. B senders use collision detection to share the wireless medium more efficiently. C. Suppose two senders, A and C, wish to send concurrently to two receivers, B and D, respectively. Carrier sense may reduce the aggregate throughput achieved by A and C in some topologies, as compared with the aggregate throughput achieved when neither uses carrier sense. D. Address Resolution Protocol (ARP) request packets sent on networks are always acknowledged at the link layer. E. An sender backs off exponentially before retransmitting when it does not receive a link-layer acknowledgement (ACK) for its unicast data transmission. [Total 40 marks, after normalization of marks] END OF PAPER COMPGZ01 11

Part ONE

Part ONE Networked Systems, COMPGZ0, 0 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice question answer sheet.

More information

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012 CSE 473 Introduction to Computer Networks Jon Turner Exam 2 Your name here: 11/7/2012 1. (10 points). The diagram at right shows a DHT with 16 nodes. Each node is labeled with the first value in its range

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

Carnegie Mellon Computer Science Department Spring 2016 Midterm Exam

Carnegie Mellon Computer Science Department Spring 2016 Midterm Exam Carnegie Mellon Computer Science Department. 15-744 Spring 2016 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 13 pages (numbered at the bottom). Make sure you have all of them. Please write your

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Transport Layer PREPARED BY AHMED ABDEL-RAOUF Transport Layer PREPARED BY AHMED ABDEL-RAOUF TCP Flow Control TCP Flow Control 32 bits source port # dest port # head len sequence number acknowledgement number not used U A P R S F checksum Receive window

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

Switch Configuration message sent 1 (1, 0, 1) 2

Switch Configuration message sent 1 (1, 0, 1) 2 UNIVESITY COLLEGE LONON EPATMENT OF COMPUTE SCIENCE COMP00: Networked Systems Problem Set istributed: nd November 08 NOT ASSESSE, model answers released: 9th November 08 Instructions: This problem set

More information

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam

Carnegie Mellon Computer Science Department Spring 2015 Midterm Exam Carnegie Mellon Computer Science Department. 15-744 Spring 2015 Midterm Exam Name: Andrew ID: INSTRUCTIONS: There are 7 pages (numbered at the bottom). Make sure you have all of them. Please write your

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Brad Karp UCL Computer Science CS 3035/GZ01 31 st October 2013 Outline Slow Start AIMD Congestion control Throughput, loss, and RTT equation Connection

More information

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS CSE 47 Introduction to Computer Networks Roch Guérin Final Exam Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS 1. [10 points] Bob has been provided with the following pair of

More information

Homework #4. Due: December 2, 4PM. CWND (#pkts)

Homework #4. Due: December 2, 4PM. CWND (#pkts) Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Q&A Session Rüdiger Birkner Tobias Bühler https://comm-net.ethz.ch/ ETH Zürich August 6 2018 Old exam from 2016 3 hours instead of 2.5 Topics which we did not discuss

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100 CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

CS BGP v4. Fall 2014

CS BGP v4. Fall 2014 CS 457 - BGP v4 Fall 2014 Autonomous Systems What is an AS? a set of routers under a single technical administration uses an interior gateway protocol (IGP) and common metrics to route packets within the

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.

6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC. Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2005 Quiz II There are 17 questions and 10 pages in this quiz

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e

More information

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J. University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2010 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: B Calculator: Type 2 There are a total of 10 problems.

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Review problems (for no credit): Transport and Network Layer

Review problems (for no credit): Transport and Network Layer Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets

More information

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP) Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be

More information

Internet Networking recitation #10 TCP New Reno Vs. Reno

Internet Networking recitation #10 TCP New Reno Vs. Reno recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Email Address ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006 Name (Print) Prof. John A. Copeland Practice for April 11, 2006 Tel.: 404-894-5177 E-Mail: copeland@ece.gatech.edu RULES.

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

ECE 653: Computer Networks Mid Term Exam all

ECE 653: Computer Networks Mid Term Exam all ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers

More information

CSCI Spring Final Exam Solution

CSCI Spring Final Exam Solution CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and

More information

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am 15-744 Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am (please submit through e-mail to zhuoc@cs.cmu.edu and srini@cs.cmu.edu) Name: A Congestion Control 1. At time t, a TCP connection

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete

More information

15-441: Computer Networks Spring 2017 Homework 3

15-441: Computer Networks Spring 2017 Homework 3 15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page

More information

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

Computer Networks (Fall 2011) Homework 2

Computer Networks (Fall 2011) Homework 2 5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2 Solutions

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2 Solutions Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2011 Quiz 2 Solutions There are 11 questions and 12 pages in this

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure

More information

Midterm Review. EECS 489 Computer Networks Z. Morley Mao Monday Feb 19, 2007

Midterm Review. EECS 489 Computer Networks  Z. Morley Mao Monday Feb 19, 2007 Midterm Review EECS 489 Computer Networks http://www.eecs.umich.edu/courses/eecs489/w07 Z. Morley Mao Monday Feb 19, 2007 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Adminstrivia

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

8. TCP Congestion Control

8. TCP Congestion Control 8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control

More information

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key COMP 361 Computer Communications Networks all Semester 2003 inal Examination: Solution key Date: Dec 15, 2003, ime 8:30am - 11:30am, venue Rm 3007 Name: Student ID: Email: Instructions: 1. his examination

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III 6.02 Spring 2010, Quiz 3 Page 1 of 11 Name: Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.02 Spring 2010 Quiz III There are 12 questions (many with multiple

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100 NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

Lecture 4: Congestion Control

Lecture 4: Congestion Control Lecture 4: Congestion Control Overview Internet is a network of networks Narrow waist of IP: unreliable, best-effort datagram delivery Packet forwarding: input port to output port Routing protocols: computing

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

There are 10 questions in total. Please write your SID on each page.

There are 10 questions in total. Please write your SID on each page. Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2017 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Grade: MC: 7: 8: 9: 10: 11: 12: 13: 14: Total: CS244a: An Introduction to Computer Networks Final Exam: Wednesday You are allowed 2 hours to complete this exam. (i) This exam is closed book and closed

More information

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Name: Grade: S MC: L MC: 15: 16: 17: Total: CS244a: An Introduction to Computer Networks Midterm Exam: Thursday You are allowed 1 hour to complete this exam. (i) This exam is closed book and closed notes.

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Indian Institute of Technology, Kharagpur

Indian Institute of Technology, Kharagpur Indian Institute of Technology, Kharagpur End-Autumn Semester 2018-19 Date of Examination: 27-11-2018 Session: FN (9-12 pm) Duration: 3 hrs Subject No.: IT30037 Subject: INTRODUCTION TO INTERNET Department/Center/School:

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: SUNet ID: @stanford.edu Check if you would like exam routed back via SCPD:

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

CSE 461. TCP and network congestion

CSE 461. TCP and network congestion CSE 461 TCP and network congestion This Lecture Focus How should senders pace themselves to avoid stressing the network? Topics Application Presentation Session Transport Network congestion collapse Data

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information