UNIVERSITY OF OSLO. Faculty of mathematics and natural sciences. INF3190/INF4190 Data Communications. All printed and written material, calculator

Similar documents
Congestion control in TCP

ECE 461 Internetworking. Problem Sheet 6

CSE 123: Computer Networks

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

CPE 548 Exam #1 (50 pts) February 17, 2016

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Answers to Sample Questions on Transport Layer

II. Principles of Computer Communications Network and Transport Layer

Chapter 3 Review Questions

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

EECS 122: Introduction to Communication Networks Final Exam Solutions

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Basic Reliable Transport Protocols

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

EE 122 Fall st Midterm. Professor: Lai Stoica

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

Problem 7. Problem 8. Problem 9

Introduction to Networks and the Internet

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Intro to LAN/WAN. Transport Layer

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

cs/ee 143 Fall

2.993: Principles of Internet Computing Quiz 1. Network

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

CS164 Final Exam Winter 2013

Congestion Control in TCP

CS/ECE 438: Communication Networks Spring Problem Set 7. Title: Congestion control and Performance Analysis

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 653: Computer Networks Mid Term Exam all

UNIT-II 1. Discuss the issues in the data link layer. Answer:

Transport Protocols and TCP: Review

FINAL Tuesday, 20 th May 2008

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

Your Name: Your student ID number:

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Chapter III: Transport Layer

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

Transport Protocols & TCP TCP

CS 5565 Spring CS 5565 Midterm

Computer Networking Introduction

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

Congestion Control. Brighten Godfrey CS 538 January Based in part on slides by Ion Stoica

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Data Communication Networks Final

UNIT IV -- TRANSPORT LAYER

Delhi Noida Bhopal Hyderabad Jaipur Lucknow Indore Pune Bhubaneswar Kolkata Patna Web: Ph:

LABORATORY 3 INTERNETWORKING: FLOW CONTROL ALGORITHMS AND TCP/IP

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP

Computer Networks. Homework #4: No Grading

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Flow and Congestion Control

PLEASE READ CAREFULLY BEFORE YOU START

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more

Introduction to Protocols

Transport Protocols and TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

c. If the sum contains a zero, the receiver knows there has been an error.

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

ECE697AA Lecture 3. Today s lecture

TDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

CS244a: An Introduction to Computer Networks

Programming Assignment 3: Transmission Control Protocol

ECE 333: Introduction to Communication Networks Fall 2001

Reliable Transport I: Concepts and TCP Protocol

TCP Congestion Control

TCP Congestion Control

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

CS 640 Introduction to Computer Networks Spring 2009

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

Inst: Chris Davison

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

Duke University CompSci 356 Midterm Spring 2016

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Question Points Score total 100

Data Link Control Protocols

FINAL May 21, minutes

Transcription:

UNIVERSITY OF OSLO Faculty of mathematics and natural sciences Examination in Day of examination: 2nd June, 2004 Examination hours: 9.00 12.00 This problem set consists of 6 pages. Appendices: Permitted aids: INF3190/INF4190 Data Communications None All printed and written material, calculator Please make sure that your copy of the problem set is complete before you attempt to answer anything. Problem 1 A frame-oriented data communications system operates at a transmission rate of 512 kb/s with a frame length of 512 bytes over a long-distance link which produces a propagation delay of 20 ms. A flow control system is required using a window mechanism. Determine the minimum window size which allows for optimum throughput. Problem 2 A point-to-point satellite transmission link connecting two computers uses a stop-and-wait ARQ strategy and has the following characteristics: Data transmission rate = 64 kb/s Frame size, n = 2048 bytes Information bytes per frame, k = 2043 bytes One-way propagation delay, td = 180 ms Acknowledgement size, a = 10 bytes Two-way processing delay, tp = 25 ms Determine the throughput and link utilization. Problem 3 A cyclic code (CRC) has a generator polynomial x 3 + x + 1. Information bits consisting of 1100 are to be coded and transmitted. Determine: i. the transmitted codeword (Continued on page 2.)

Examination in INF3190/INF4190, 2nd June, 2004 Page 2 ii. the remainder obtained at the receiver if the transmission is error free (show the computation) iii. the remainder obtained at the receiver if an error occurs in bit 4 (counted from the left) Problem 4 A message consisting of 2400 bits is to be passed over an internet. The message is passed to the Transport layer which appends a 150-bit header, followed by the Network layer which uses a 120-bit header. Network layer packets are transmitted via two networks, each of which uses a 26-bit header. The destination network only accepts packets up to 900 bits long. How many bits, including headers, are delivered to the destination network? Problem 5 The computers connected to the small network shown in figure 1 are started at the same time with empty routing tables. They will use original Distance Vector Routing and send routing table updates to their neighbors every 50 ms. The numbers at the edges of the graph in figure 1 are the delays between the nodes that are connected through the edge. i. If you assume that the first routing table update is sent by each node 0 ms after the start of the nodes, what does the routing table at node E look like at time 110 ms after the start? ii. What is the final routing table of node E? iii. What happens to the routing table of node E if node B crashes 500 ms after the start? (Explain) Make the (unrealistic) assumption that a node knows its own distance to a neighbor as soon as it has received the first message from it, but not earlier. Use to symbolize unknown and infinite distance. A 2 2 5 2 B C D E 7 4 F 6 G 11 H Figure 1: Distance Vector Routing Example Answer i. The only trick here is to figure out that the DVR routing updates can not have gone further than 2 hops within 110 ms. Therefore, E can only know about the distance of C, D and H. (Continued on page 3.)

Examination in INF3190/INF4190, 2nd June, 2004 Page 3 Destination Line Estimated delay A * B * C D 7 D D 2 E E 0 F * G * H D 6 The fields marked with a * can contain nothing or D. E doesn t know how to route to the destinations in question, but since it has only one outgoing line, it knows that only D is possible. ii. This is nearly a trick question because the actual route is always going through D. It is not really a trick question because a DVR routing table contains distances. Destination Line Estimated delay A D 11 B D 9 C D 7 D D 2 E E 0 F D 16 G D 17 H D 6 Note: F is reached in 16 ms via E-D-C-B-F. iii. When B crashes, we get a count-to-infinity problems for the nodes A and B. What happens is that C and D will exchange messages every 50 ms. In every exchange, C will believe that it s distance from A and B, respectively, is that reported by D plus 5 ms, and D will believe that it is C s distance plus 5 ms. So every 100 ms, the assumed distance to A and B increases by 10 ms. Via D, E will receive updated distances for A and B every 50 ms, and the distance will always grow by 5 ms until a predefined finite value is reached that is interpreted as. The text does not say anything about a finite value that is considered, so it is not possible to determine how long it takes before E believes that A and B not reachable. Additionally, the route to F is updated. It is 23 ms. Problem 6 A networking interface of a machine has the IPv4 address 9.228.12.18 and the netmask 255.255.255.128. i. What is the class of the network that this IP address belongs to? ii. What is the address of the subnetwork that this IP address belongs to? iii. Why is 255.255.128.128 not a legal netmask? (Continued on page 4.)

Examination in INF3190/INF4190, 2nd June, 2004 Page 4 Answer i. Class A ii. 9.228.12.0 iii. This is a pretty hard, maybe unfair question. We should probably give extra credits when its answered, but make it possible to get 100% if it is not answered. Reasonable answers: Problem 7 Because this netmask must start with an unterinterrupted sequences of ones, end with an uninterrupted sequences of zeros, and can t have anything in between. Because a bitmask can always be alternatively represented by the number of starting 1-bits. After these one bits, only 0-bits follow. Such a representation is not possible for 255.255.128.128. TCP s congestion control mechanism is the most important one in the Internet. Consider a newly established TCP session that is used to transmit 532 kbytes in total and that is terminated after that. Assume that the roundtrip time is a constant 10 ms, the timeout time constant 25 ms, the message size is 1 kbytes, and the congestion window threshold is 64 kbytes. i. You have no packet loss at all in either direction. Draw the development of the TCP congestion window at the sender for the entire session. Use time on the X-axis, and the number of packets that are sent at the same time on the Y-axis. Make sure that the exact number of packets is visible in your drawing. Ignore connection setup and connection teardown. ii. One timeout occurs for the first packet that is sent 70 ms after sending of the first packet of the connection. Explain what happens and draw the transmission of the entire 532 kbytes. iii. If your sender has 10 Gbytes of data to send, and the bandwidth of the network between sender and receiver is as good as infinite (meaning that there is no loss and no additional delay), the speed for sending this amount of data would still be limited. Which other mechanisms besides congestion control can slow the speed of a TCP transmission down? Answer i. The expected solution is shown in figure 2. The congestion window size must start with 1 (packet or kbyte, both is correct), and it must double every round-trip time (10 ms) until it reaches 64. From 64, one packet must be added every round-trip time. 532 kbytes have been transmitted successfully after 120 ms. (Continued on page 5.)

Examination in INF3190/INF4190, 2nd June, 2004 Page 5 70 64 "o7a.data" 32 16 8 4 1 2 0 20 40 60 80 100 120 Figure 2: TCP congestion window development for 7(i) ii. The expected solution is shown in figure 3. The most important details are (1) that the congestion window size restarts at 1 after the timeout, (2) that the transmission after timeout begins with a slow start phase, and (3) that the transmission after timeout leaves the slow start phase. Things to consider: The congestion window threshold should be halved after a timeout. Therefore, the congestion window should grow exponentially after the timeout until time 155 ms. Afterwards TCP should leave slow start and the congestion window should grow linearly. If someone gets wrong when he leaves slow start, it should not be heavily punished. The text says that the timeout is 25 ms. It should not matter if students get that wrong. One way of getting this wrong would be sending 1 packet at time 80 instead of time 95. When the threshold is halved after sending 65 packets, the students can choose 32 or 33 as the new value. 33 is right, but the other option should be allowed. The text says that there is a timeout for the first packet that is sent at 70 ms. This implies in fact that no packets of that sequence arrives at the receiver. Therefore, the total number of bytes sent should be 532+65=597. It should not matter if students get this wrong. iii. Reasonable answers that I can think of right now are: Flow control (complete answer) Sliding window size (nearly complete answer) Limited number of available sequence numbers (nearly complete answer) Credit mechanism (nearly complete answer) (Continued on page 6.)

Examination in INF3190/INF4190, 2nd June, 2004 Page 6 64 "o7b.data" 32 16 8 4 2 1 0 50 100 150 200 250 Figure 3: TCP congestion window development for 7(ii) Receiver speed and available sequence numbers (complete answer with extras)