EE 122 Fall st Midterm. Professor: Lai Stoica

Similar documents
ECEN Final Exam Fall Instructor: Srinivas Shakkottai

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 12, minutes

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Exercises TCP/IP Networking With Solutions

FINAL May 21, minutes

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

CS244a: An Introduction to Computer Networks

Homework #4. Due: December 2, 4PM. CWND (#pkts)

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

There are 10 questions in total. Please write your SID on each page.

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

Review Questions for Midterm Exam-2 Fall 2016

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

FACULTY OF COMPUTING AND INFORMATICS

CPE 548 Exam #1 (50 pts) February 17, 2016

ECE 653: Computer Networks Mid Term Exam all

2.993: Principles of Internet Computing Quiz 1. Network

ECE 461 Internetworking. Problem Sheet 6

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

8. TCP Congestion Control

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

CS244a: An Introduction to Computer Networks

TCP Congestion Control

TCP Congestion Control

Computer Networks - Midterm

Final Exam for ECE374 05/03/12 Solution!!

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Computer Communication Networks Midterm Review

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: Fall 2003

a. (4pts) What general information is contained in a LSR-PDU update that A might send?

Solutions for Homework #4

CPE 448 Exam #2 (50 pts) April Name Class: 448

Congestion control in TCP

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

CSCI 466 Midterm Networks Fall 2011

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2007

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes

UNIVERSITY OF OSLO. Faculty of mathematics and natural sciences. INF3190/INF4190 Data Communications. All printed and written material, calculator

Review Materials: Set B EE122 Fall 2012

CS268: Beyond TCP Congestion Control

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

CMPE 257: Wireless and Mobile Networking

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

CMPE150 Midterm Solutions

Problem 7. Problem 8. Problem 9

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

Q23-5 In a network, the size of the receive window is 1 packet. Which of the follow-ing protocols is being used by the network?

>>> SOLUTIONS <<< Answer the following questions regarding the basics principles and concepts of networks.

CS244a: An Introduction to Computer Networks

Tutorial 8 : Congestion Control

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Multiple Access Protocols

NETWORK PROBLEM SET Solution

Housekeeping. Fall /5 CptS/EE 555 1

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

Wireless TCP Performance Issues

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

CS 5565 Spring CS 5565 Midterm

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

TCP Performance. EE 122: Intro to Communication Networks. Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim

CS244a: An Introduction to Computer Networks

EECS 122: Introduction to Communication Networks Final Exam Solutions

ECE697AA Lecture 3. Today s lecture

Reminder: Datalink Functions Computer Networking. Datalink Architectures

EECS489 Computer Networks, Take-home Makeup Midterm (Winter 2007) due in class Wednesday 3/28

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2008

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

DualRTT: Enhancing TCP Performance During Delay Spikes

c. If the sum contains a zero, the receiver knows there has been an error.

CS457 Transport Protocols. CS 457 Fall 2014

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

NETWORK PROBLEM SET Due Date 6/28/2014

EE st Term Exam Date: October 9, 2002

a) Adding the two bytes gives Taking the one s complement gives

Answers to Sample Questions on Transport Layer

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

CS 6543 Computer Networks

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Your Name: Your student ID number:

Bandwidth Allocation & TCP

ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. D. Raychaudhuri & M. Ott

Transcription:

EE 122 Fall 2001 1 st Midterm Professor: Lai Stoica Question 1 (15 pt) Layering is a key design principle in computer networks. Name two advantages, and one disadvantage to layering. Explain. Use no more than three sentences to describe each advantage or disadvantage. Answer 1 Any two of the advantages and any of the disadvantages listed below: Advantages: (1) modularity: protocols easier to manage and maintain (2) abstract functionality: lower levels can be changed without affecting upper layers (3) reuse: upper layers can reuse the functionality provided by lower layers Disadvantages: (1) information hiding: make hard to optimize higher level protocols. For example, IP does not reveal the exact cause of dropping a packet, which makes it very difficult for the TCP to work across different communication media. As a result TCP works well on top of wired networks, but not on top of wireless networks. (2) inefficiency: each layer adds his own processing overhead; some applications may not need some functionality provided by a particular layer, case in which that functionality is pure overhead (e.g., TCP reliability for video/audio traffic).

Question 2 (20 pt) Let l = 1000 bit be the minimum size of an Ethernet packet. Let c=2*10^8 m/sec be the speed of light in the Ethernet cable. The Ethernet has a bandwidth of 10 Mbps. What is the maximum distance d between two end-hosts on an Ethernet cable? Justify your answer. Answer 2 Suppose hosts A and B are at the opposite ends of the Ethernet segment, and that host A sends a packet of minimum size l to B at time t. Host B receives A's packet at time t+d. Suppose that just before it receives the packet, host B sends its own packet. This packet reaches A at time t+2d. At this point A should still be in the process of sending the packet; otherwise it will not be able to detect the collision. Thus, the transmission time of the packet, l/b, should be such that l/b = 2*d; where B is the Ethernet bandwidth. Let L be the distance between A and B. Then, we have l/b = 2*L/c --> L = l*c/(2*b) = 10^3 *2 * 10^8 / (2*10^7) = 10,000 m

Question 3 (20 pt) (a) Explain the TCP slow-start. What is its goal and how does it work? (8pt) (b) Assuming that the available link capacity and the receiver window are infinite how many round-trip times does it take in TCP to send the first 10 packets? In general, how many round-trip times does it take to send the first k packets? (12pt) Answer 3 The goal of the TCP slow-start is to find the available bandwidth on the congested link as soon as possible. With the TCP slow-start, a sender starts with a congestion window (cwnd) of 1, and then increments it by 1 each time it receives an acknowledgement. This results in effectively doubling cwnd every round-trip time RTT. After 2 RTTs the TCP flow sends 1+2+4=7 packets. After the third RTT, the TCP's cwnd becomes 8. As a result, the TCP will send the remaining 3 packets. THus the TCP needs 3 RTTs to send 10 packets by using the slow-start protocol. In general, given k packets, it takes m RTTs to send them, where m is such that 1+2^1 + 2^2 +...2^(m-1) < k <= 1 + 2^1 + 2^2 +...2^m, (2^m) - 1 < k <= 2^(m+1) - 1, m-1 < log2(k+1) -1 <= m, m = ceiling(log2(k+1)-1) = ceiling(log2(k+1)) - 1 where ceiling(x) denotes the smallest integer that is greater or equal to x.

Question 4 (15 pt) The sliding window algorithm is used in TCP for error control and flow control. Due to the finite space of sequence numbers, even with infinite link speed and host processing power, the maximum throughput between two hosts is still limited. What is the maximum throughput between two TCP hosts with a round-trip time of 10ms? (Note: Recall that the TCP sequence numbers are 32-bit long.) Answer 4 MaximumWindowSize <= (MaxSeqNum+1)/2 (see textbook, Sec. 2.2, pages 108-109) Throughput = MaximumWindowSize/RTT = (MaxSeqNum+1)/(2*RTT) = (2^32 + 1) bytes / (2*10ms) = 1.6 * 10^12 bps approx. Note: This problem ignores the advertised window size, which is only 16 bits (though it is possible to extend it; see page 395 in textbook). Solutions that have considered the advertised window the limiting factor received full credit.

Question 5 (20 pt) Consider a sliding window flow control protocol between hosts A and B. Suppose the link propagation delay is 1 time unit, the retransmission timeout is 3 time units, and the window size is 3. Assume the link drops every third data packet, i.e., the link drops the 1st, 4th, 7th,... data packets. (Note that here "kth packet" means the kth packet transmitted on the link, and not the sequence number of the packet.) How long does it take to transmit 6 packets between A and B? (Note: Ignore the transmission times and the queueing delay, and assume that no acknowledgements are lost.) Answer 5 (a) represents the time diagram when the receiver sends only 6 data packets; (b) represents the time diagram when the receiver sends more than 6 data packets. Both solutions received full credit. (In addition, due to some apparent misunderstandings during the exam, solutions that assumed that the window size represents the number of un-acknowledged packets at the receiver were also considered, despite the fact that this assumption is wrong.)

Question 6 (20 pt) Token ring is an alternative to Ethernet to arbitrate the access to a shared medium. With token ring, a special packet (called "token") is circulated in the clock-wise direction around a ring to which N hosts are connected. When it receives the token, a node can send one packet, if it has any packets to send. After it sends a packet, the node passes the token to the next node on the circle. If it doesn't have any packets to send, the node passes the token immediately to the next node. Consider the following scenario based on the figure below. Initially, A has the token and has a packet to send. Thus, A sends its packet and then passes the token to B. Suppose B has several packets to send when it receives the token. B sends only one of its packets and then passes the token to C. Suppose C does not have any packet to send, when it receives the token. As a result, C passes the token immediately to D. If D has at least a packet to send when it receives the token, D sends one packet and passes the token to A. This process repeats indefinitely. Suppose the propagation delay along the ring is d, and that the time to process the token is negligible. Thus, when no node has packets to send, it takes the token time d to make a complete round. Let n be the number of hosts connected to the ring that have packets to send, let C be the link capacity, and let l be the packet size (assume all packets have the same size). What is the utilization of the token ring? (Note: Define the utilization as the ratio between the maximum total number of bits that were sent by all hosts during one round and the total number of bits that can be carried by the ring during one round, i.e., C*TRound, where TRound is the time it takes the token to complete a round).

Answer 6 According to the note, we have utilization = n*l/c*tround The time it takes to transmit a packet is l/c. Thus, when all n hosts have packets to send, TRound = d + n*(l/c), utilization = (n*l)/(c*d + n*l)