Chapter 3 Review Questions

Similar documents
Problem 7. Problem 8. Problem 9

a) Adding the two bytes gives Taking the one s complement gives

Practice Problems: P22, 23, P24, P25, P26, P27, P28, P29, P30, P32, P44 and P45. Hand-in the following: P27, P28, P32, P37, P44

Answers to Sample Questions on Transport Layer

c. If the sum contains a zero, the receiver knows there has been an error.

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

CS321: Computer Networks Error and Flow Control in TCP

PROBLEMSAND EXERCISES

CS Lecture 1 Review of Basic Protocols

Fall 2012: FCM 708 Bridge Foundation I

Computer Communication Networks Midterm Review

Transport Protocols and TCP

32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)

Transport Layer: outline

Homework 3 50 points. 1. Computing TCP's RTT and timeout values (10 points)

Review Questions for Midterm Exam-2 Fall 2016

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Suprakash Datta. Office: CSEB 3043 Phone: ext Course page:

CSC 4900 Computer Networks: TCP

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols

Transport Layer: Outline

CSE 4213: Computer Networks II

Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa

Lecture 5. Transport Layer. Transport Layer 1-1

Lecture 8. TCP/IP Transport Layer (2)

CSCD 330 Network Programming

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

UNIT IV -- TRANSPORT LAYER

CSC 401 Data and Computer Communications Networks

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Chapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management

Preview Test: HW3. Test Information Description Due:Nov. 3

TCP. 1 Administrivia. Tom Kelliher, CS 325. Apr. 2, Announcements. Assignment. Read From Last Time

Lecture 3: The Transport Layer: UDP and TCP

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

Flow and Congestion Control (Hosts)

10 minutes survey (anonymous)

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9

CS457 Transport Protocols. CS 457 Fall 2014

Computer Networking Introduction

TCP. TCP: Overview. TCP Segment Structure. Maximum Segment Size (MSS) Computer Networks 10/19/2009. CSC 257/457 - Fall

Chapter 3- parte B outline

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Chapter 3 Transport Layer

Chapter 3 Transport Layer

COMP 431 Internet Services & Protocols. Transport Layer Protocols & Services Outline. The Transport Layer Reliable data delivery & flow control in TCP

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Transport Protocols and TCP: Review

Computer Networking: A Top Down Approach

TCP Congestion Control

TCP Congestion Control

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018

TCP Congestion Control

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network?

Chapter III: Transport Layer

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

TCP (Part 2) Session 10 INST 346 Technologies, Infrastructure and Architecture

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Outline. CS5984 Mobile Computing

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Question Points Score total 100

Sequence Number. Acknowledgment Number. Data

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

The Transport Layer Reliability

Computer Communication Networks Midterm Review

Chapter 3 Transport Layer

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

FINAL May 21, minutes

COMP/ELEC 429/556 Introduction to Computer Networks

End-to-End Protocols: UDP and TCP. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

CC451 Computer Networks

End-to-End Protocols. Transport Protocols. User Datagram Protocol (UDP) Application Layer Expectations

The Transport Layer: TCP & Reliable Data Transfer

8. TCP Congestion Control

Computer Networking Introduction

CSE/EE 461. TCP congestion control. Last Lecture. This Lecture. Focus How should senders pace themselves to avoid stressing the network?

Chapter III: Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols & TCP TCP

Routers. Session 12 INST 346 Technologies, Infrastructure and Architecture

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

TCP : Fundamentals of Computer Networks Bill Nace

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

CSC 8560 Computer Networks: TCP

COM-208: Computer Networks - Homework 3

CSE 461. TCP and network congestion

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

CSE 473 Introduction to Computer Networks. Midterm Exam Review

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Transcription:

Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications like IP telephony and IP videoconference prefer to avoid TCP s congestion control. Moreover, reliability of telephony and videoconference is not so important as compared to other critical applications. If the receiver does not receive a data or does not understand the data, he or she can always request the sender to retransmit. 5. 6. Application layer. 7. Yes, both segments will be directed to the same socket. For each received segment, at the socket interface, the operating system will provide the process with the IP addresses to determine the origins of the individual segments. 8. For each persistent connection, the Web server creates a separate connection socket. Each connection socket is identified with a four-tuple: (source IP address, source port number, destination IP address, destination port number). When host C receives and IP datagram, it examines these four fields in the datagram/segment to determine to which socket it should pass the payload of the TCP segment. Thus, the requests from A and B pass through different sockets. The identifier for both of these sockets has 80 for the destination port; however, the identifiers for these sockets have different values for source IP addresses. Unlike UDP, when the transport layer passes a TCP segment s payload to the application process, it does not specify the source IP address, as this is implicitly specified by the socket identifier. 9. 0.

. 2. 3. 4. a) false b) false c) true d) false e) true f) false g) false 5. a) 27 bytes b) 65 (assume that the packet before the first one mentioned in the problem is not lost). 6. 7. R/2 8. This is because TCP s congestion control consists of linear (additive) increase in cwnd of MSS per RTT and then a halving (multiplicative decrease) of cwnd on a triple duplicate-ack event. Chapter 3 Problems Problem 3 00000 + 0000 ----------------------------- 0000 0000 + 00000 ----------------------------- 00000 One's complement 000 To detect errors, the receiver adds the four words (the three original words and the checksum). If the sum contains a zero, the receiver knows there has been an error. All

one-bit errors will be detected, but two-bit errors can be undetected (e.g., if the last digit of the first word is converted to a 0 and the last digit of the second word is converted to a ). Problem 5 It takes 9.6 microseconds (or 0.0096 milliseconds) to send a packet, as 200*8/0 9 9.6 microseconds. In order for the sender to be busy 95 percent of the time, we must have util 0.97 (0.0096n) / 30.0096 or n approximately 3032 packets. Problem 23 In order to avoid the scenario of Figure 3.27, we want to avoid having the leading edge of the receiver's window (i.e., the one with the highest sequence number) wrap around in the sequence number space and overlap with the trailing edge (the one with the "lowest" sequence number in the sender's window). That is, the sequence number space must be large enough to fit the entire receiver window and the entire sender window without this overlap condition. So - we need to determine how large a range of sequence numbers can be covered at any given time by the receiver and sender windows. Suppose that the lowest-sequence number that the receiver is waiting for is packet m. In this case, it's window is [m,m+w-] and it has received (and ACKed) packet m- and the w- packets before that, where w is the size of the window. If none of those w ACKs have been yet received by the sender, then ACK messages with values of [m-w,m-] may still be propagating back. If no ACKs with these ACK numbers have been received by the sender, then the sender's window would be [m-w,m-]. Thus, the lower edge of the sender's window is m-w, and the leading edge of the receivers window is m+w-. In order for the leading edge of the receiver's window to not overlap with the trailing edge of the sender's window, the sequence number space must thus be big enough to accommodate 2w sequence numbers. That is, the sequence number space must be at least twice as large as the window size, k 2w.

Problem 26 There are 2 32 4,294,967, 296 possible sequence numbers. a) The sequence number does not increment by one with each segment. Rather, it increments by the number of bytes of data sent. So the size of the MSS is irrelevant -- the maximum size file that can be sent from A to B is simply the number of bytes representable by 2 32 4.9 Gbytes. 2 32 b) The number of segments is 8,388,608. 64 bytes of header get added to each 52 segment giving a total of 536,870,92 bytes of header. The total number of bytes 32 9 transmitted is 2 + 536,870,92 4.832 0 bytes. Thus it would take 249 seconds to transmit the file over a 55 Mbps link. Problem 27 a) In the second segment from Host A to B, the sequence number is 207, source port number is 302 and destination port number is 80. b) If the first segment arrives before the second, in the acknowledgement of the first arriving segment, the acknowledgement number is 207, the source port number is 80 and the destination port number is 302. c) If the second segment arrives before the first segment, in the acknowledgement of the first arriving segment, the acknowledgement number is 27, indicating that it is still waiting for bytes 27 and onwards. d) Host A Host B Seq 27, 80 bytes Timeout interval Seq 207, 40 bytes Ack 207 Seq 27, 80 bytes Ack 247 Timeout interval Ack 247

Problem 30 Either () the receiver immediately discards out-of-order segments (which, as we discussed earlier, can simplify receiver design), or (2) the receiver keeps the out-of-order bytes and waits for the missing bytes to fill in the gaps. Clearly, the latter choice is more efficient in terms of network bandwidth, and is the approach taken in practice. Problem 32 a) Denote (n) EstimatedR TT for the estimate after the nth sample. EstimatedRTT (4) xsamplertt + ( x )[ xsamplertt + 2 ( x)[ xsamplertt3 + ( x) SampleRTT4 ]] xsamplertt ( x xsamplertt + ) 2 + 2 3 ( x) xsamplertt3 + ( x) SampleRTT4 b) n n EstimatedRTT x ( ) j ( x) j SampleRTT j + ( x) n SampleRTT n c) EstimatedR TT ( ) x x j ( x) j SampleRTT j

9 j.9 j SampleRTT The weight given to past samples decays exponentially. j Problem 33 It is desirable to set the timeout equal to the EstimatedRTT plus some margin. The margin should be large when there is a lot of fluctuation in the SampleRTT values; it should be small when there is little fluctuation. All of these considerations are taken into account in TCP s method for determining the retransmission timeout interval: TimeoutInterval EstimatedRTT + 4 DevRTT Problem 40 a) TCP slowstart is operating in the intervals [,6] and [23,26] b) TCP congestion advoidance is operating in the intervals [6,6] and [7,22] c) After the 6 th transmission round, packet loss is recognized by a triple duplicate ACK. If there was a timeout, the congestion window size would have dropped to. d) After the 22 nd transmission round, segment loss is detected due to timeout, and hence the congestion window size is set to. e) The threshold is initially 32, since it is at this window size that slow start stops and congestion avoidance begins. f) The threshold is set to half the value of the congestion window when packet loss is detected. When loss is detected during transmission round 6, the congestion windows size is 42. Hence the threshold is 2 during the 8 th transmission round. g) The threshold is set to half the value of the congestion window when packet loss is detected. When loss is detected during transmission round 22, the congestion windows size is 26. Hence the threshold is 3 during the 24 th transmission round. h) During the st transmission round, packet is sent; packet 2-3 are sent in the 2 nd transmission round; packets 4-7 are sent in the 3 rd transmission round; packets 8-5 are sent in the 4 th transmission round; packets 6-3 are sent in the 5 th transmission round; packets 32-63 are sent in the 6 th transmission round; packets 64 96 are sent in the 7 th transmission round. Thus packet 70 is sent in the 7 th transmission round. i) The threshold will be set to half the current value of the congestion window (8) when the loss occurred and congestion window will be set to the new threshold

value + 3 MSS. Thus the new values of the threshold and window will be 4 and 7 respectively. Threshold is 2, and congestion window size is. j) round 7, packet; round 8, 2 packets; round 9, 4 packets; round 20, 8 packets; round 2, 6 packets; round 22, 2 packets. So, the total number is 52. Problem 4 TCP provides a flow-control service to its applications to eliminate the possibility of the sender overflowing the receiver s buffer. Flow control is thus a speed-matching service matching the rate at which the sender is sending against the rate at which the receiving application is reading. On the other hand, a TCP sender can also be throttled due to congestion within the IP network; this form of sender control is referred to as congestion control.