CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

Similar documents
CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS244a: An Introduction to Computer Networks

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

ADVANCED COMPUTER NETWORKS

II. Principles of Computer Communications Network and Transport Layer

FACULTY OF COMPUTING AND INFORMATICS

Real-Time Protocol (RTP)

CSCI Spring Final Exam Solution

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

Student ID: CS457: Computer Networking Date: 3/20/2007 Name:

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

UNIT 2 TRANSPORT LAYER

Reliable Transport I: Concepts and TCP Protocol

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Reliable Transport II: TCP and Congestion Control

CMPE150 Midterm Solutions

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Communication Networks

UNIT IV -- TRANSPORT LAYER

Unit 2 Packet Switching Networks - II

CS164 Final Exam Winter 2013

Lecture 14: Congestion Control"

Tutorial 8 : Congestion Control

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Network Management & Monitoring

Bandwidth Allocation & TCP

CS321: Computer Networks Congestion Control in TCP

TCP Congestion Control

CS519: Computer Networks. Lecture 5, Part 5: Mar 31, 2004 Queuing and QoS

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Congestion control in TCP

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm

Quality of Service (QoS)

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

CSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Congestion in Data Networks. Congestion in Data Networks

Quality of Service in the Internet

Congestion Control 3/16/09

CSE 123A Computer Networks

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

CS244a: An Introduction to Computer Networks

Multimedia Networking

image 3.8 KB Figure 1.6: Example Web Page

There are 10 questions in total. Please write your SID on each page.

Computer Science 461 Midterm Exam March 14, :00-10:50am

CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm

Problem 7. Problem 8. Problem 9

of-service Support on the Internet

ECE 333: Introduction to Communication Networks Fall 2001

ATM Quality of Service (QoS)

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Quality of Service in the Internet

Answers to Sample Questions on Transport Layer

DualRTT: Enhancing TCP Performance During Delay Spikes

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Introduction to IP QoS

Computer Networks - Midterm

Flow Control. Flow control problem. Other considerations. Where?

Reliable File Transfer

Computer Networks (Fall 2011) Homework 2

CS 640: Introduction to Computer Networks

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Chapter III. congestion situation in Highspeed Networks

ETSF10 Internet Protocols Transport Layer Protocols

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

Chapter 24 Congestion Control and Quality of Service 24.1

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Chapter 24. Transport-Layer Protocols

PRACTICE QUESTIONS ON RESOURCE ALLOCATION

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Avoidance

CS 557 Congestion and Complexity

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Congestion Avoidance and Control. Rohan Tabish and Zane Ma

Transport Protocols and TCP: Review

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

Sequence Number. Acknowledgment Number. Data

Computer Networking. Queue Management and Quality of Service (QOS)

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

Advanced Computer Networks

Basics (cont.) Characteristics of data communication technologies OSI-Model

Question Points Score total 100

Example questions for the Final Exam, part A

Transcription:

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question 7 is only for 444 students Page 1

Question 1 (10 pt) (a) (5 pt) Explain the End to End argument. Do not implement functionality that can be implemented at the edges, in the core of the network unless it can be perfectly implemented and it does not create overhead for applications that don t need it. (b) (5 pt) What is the special role of IP in the Internet protocol stack? How has this special role helped innovation in applications and physical transmission technologies? While multiple protocols exist above and below IP there is only IP at the network layer of the Internet architecture. This feature has enabled the develop of new applications and new transmission technologies because IP provides a compatibility layer. Question 2 (10 Points) Which of the following are true statements: a. The Slow-Start algorithm increases a source s rate of transmission faster than "additive increase". b. A source s retransmission timeout value (RTO) is always set equal to the measured RTT. c. If the RTO is too small, this might lead to unnecessary retransmissions. d. A source s retransmission timeout value is set to a value that increases with the variance in measured RTT values. e. TCP segments can only be lost when router queues overflow. f. There is no performance benefit to having a window size (measured in seconds) larger than the RTT. g. A receiver reduces the advertised window size in response to congestion at routers along the path. Page 2

h. RED is tolerant of bursts because it never drops consecutive packets from the same flow. i. RED always drops packets, with probability 1, when the router s average queue length is greater than the maximum threshold value. j. If two flows, one TCP and one UDP, share a "RED" router, the RED algorithm will ensure that both flows receive an identical share of the outgoing link. Question 3 (20 points) TCP Congestion Control. In this question we ll find approximate equations for the throughput of the TCP AIMD mechanism. (a.) (5 points) Why does TCP use additive increase rather than multiplicative increase? Multiplicative increase would cause the network to be unstable. The graph below shows the "sawtooth" evolution of the TCP sender s window size as a function of time. W is the maximum window size (measured in packets). In this question, assume that all packets are P bits long, and that exactly one packet is dropped every time the window size reaches W. (c.) (5 points) If we ignore the "slow-start" phase at the beginning of the flow, show that the average rate at which the transmitter sends packets is given by: packets per second RTT is the round-trip time, which we will assume is constant. Each transmitter sends one window's worth of data each RTT. The window size increases linearly from W/2 to W. So average length of transmit window. Page 3

(c.) (5 points) Show that the fraction of packets dropped, L, is given by the following expression: Hint: Remember that we re assuming that exactly one packet is dropped every time the window size reaches W. In each period of the sawtooth, one packet is lost, and the transmitter sends windows of packets; and the average window size is. Therefore, 1 packet is lost for every that are transmitted. (d.) (5 points) Using your answers to (b) and (c), and assuming that W is very large, show that the average rate at which the transmitter sends is given by: bits per second Rearrange (c) to get packets, and substitute W into (b) to get: Question 4 (20 points) Consider a connection-oriented streaming data protocol that transmits voice over the network. Assume losses can be tolerated, delay and jitter are important, the stream should be sent at the highest quality that the network could support, and that the protocol is well behaved with respect to congestion. It works as follows. The sender establishes a connection with a receiver. The sender samples very high quality audio (64 kbps) and selectively produces packetized downsampled streams at low (8 kbps), medium (16 kbps), and high quality (32 kbps). The receiver measures the received stream rate, and reports this back to the sender periodically. Using this information, the sender determines Page 4

that it is experiencing congestion and sustaining losses to the receiver if the reported received rate is less than the transmitted rate. It responds to such congestion detection by moving to the next lower quality rate. Occasionally the sender attempts to move up in quality if the network can sustain a higher rate without encountering congestion. Logically, the basic protocol event flows are as follows: a. (5 points) What is the most critical advantage of this scheme compared with using TCP? This scheme reacts the congestion b. (5 points) What is the most critical advantage of this scheme compared with using UDP? This scheme reacts to packet losses c. (5 points) Briefly describe a method to compute the received rate. How frequently would you report the rate to the sender, and is there any reason for limiting the frequency such rate reports? Over a defined fixed time interval, compute the number of packets received and the number of payload bits in those packets. # bits / time = transmission rate in bps (1 point). Report the rate one in every few received packets (1 in 20 say) or once every few seconds (1 point). Reason is that we need several packets worth of data to get a reasonable rate calculation and also to limit the return bandwidth demand. d. (5 points) Briefly describe a method to determine when to increase the sending rate. What concern should you have about the pace at which you increase this? Set a threshold, say 10%, of the current sending rate. If received rate as reported back is less than or equal to sending rate threshold, then reduce sending rate. Only Page 5

increase sending rate again if the network can successful transmit the current rate for several (say five) packets, as indicated by the returned rate reports (in other words, do not double the rate based only one packet getting through successfully!) Question 5 (20 points) a. (5 points) A large percentage of the DNS requests that arrive at the root DNS servers are requests for DNS domains that don t exist (e.g. www.cs.jhu.edui). One way to reduce the load experienced by the root nameservers would be to use negative caching, that is the negative response returned by the nameserver would be cached at the local nameserver so subsequent requests would be answered locally. Explain the costs of this solutions and why it would not sufficiently reduce the load on the root nameservers due to non-existing domains. The hit rate would be very small. The cost is all the additional storage at the caching server required to cache all the bogus names. b. (5 points) What are the benefits of the hierarchical namespace in DNS? Scalability, matching organization structure and name conflict resolution. c. (5 points) A domain in DNS is served by multiple nameservers. Describe the two main benefits from having multiple nameservers. What factors determine whether these multiple nameservers will in practice deliver these benefits? Scalability and redundancy in the face of server and network failures. The multiple servers should fail independently and therefore should be located in different geographic locations and have separate connections to the Internet. d. (5 points) Denial of Service attacks against the root nameservers is a major problem these days. Given that no more than 13 IP addresses can be allocated for the root nameservers describe a solution to minimize the impact of DoS attacks. Anycast Question 6 (20 points) Consider the network shown below in which horizontal lines represent transit providers and numbered vertical lines are inter-provider links. Page 6

A 1 Provider Q 2 4 Provider P B 3 Provider R (a) (10 points) Suppose Q and P adopt the policy that outbound traffic is routed to the closest link to the destination's provider, thus minimizing their own cost. What paths will traffic from host A to host B and from host B to host A take? The traffic from A to B will cross link 1, while traffic from B to A will cross link 2. (b) (10 points) What could Q do to have the B A traffic use the closer link 1? Provider Q would have to effectively block the announcement from A that arrives through inter-domain link 2. This can be done by setting a local policy (e.g. precedence) that the announcement from link 1 is preferred over the announcement from link 2. Question 7 (20 points) Weighted Fair Queueing. The figure below shows n leaky-bucket flows multiplexed together onto a link at rate C bytes per second. The i-th leaky-bucket contains at most k i tokens; and new tokens arrive at rate r i tokens per second. One token is required for each byte transmitted into the network. Each flow has its own FCFS queue. Flow is served with weight w i by a WFQ scheduler. (a) (10 points) Assuming that the WFQ scheduler serves one byte at a time, prove that no queue will overflow if, and only if, (for all i): Page 7

Queue i is served at least at rate (possibly higher if some queues are empty). So long as the arrival rate is less than the service rate, the queue will not overflow. The arrival rate is constrained by the leaky bucket to be no greater than r i. Hence: (b) (10 points) Assuming that no queue overflows, show that the maximum queueing delay encountered by a byte is given by: Maximum queuing delay = max occupancy/min service rate. The minimum service rate was found in part (a). The maximum occupancy is determined by the leaky-bucket, which constraints the size of the instantaneous burst to k i. Page 8