Computer Networks (Fall 2011) Homework 2

Similar documents
Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

There are 10 questions in total. Please write your SID on each page.

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Homework #4. Due: December 2, 4PM. CWND (#pkts)

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

15-441: Computer Networks Homework 3

PRACTICE QUESTIONS ON RESOURCE ALLOCATION

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

FINAL May 21, minutes

Mohamed Khedr.

TCP Congestion Control

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

Multiple Access Links and Protocols

CS244a: An Introduction to Computer Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Bandwidth Allocation & TCP

Part ONE

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Congestion Control 3/16/09

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Lecture 14: Congestion Control"

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

CSCI Spring Final Exam Solution

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

6th Slide Set Computer Networks

Reliable Transport II: TCP and Congestion Control

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)

CMPSCI 453 Fall Midterm 10/26/2008

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

Reliable Transport II: TCP and Congestion Control

Exercises TCP/IP Networking With Solutions

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CS268: Beyond TCP Congestion Control

ECE/CSC 570 Section 001. Final test. December 11, 2006

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Congestion control in TCP

UNIT IV -- TRANSPORT LAYER

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

Problem Set 7 Due: Start of Class, November 2

COMP/ELEC 429/556 Introduction to Computer Networks

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Communication Networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

ECE 333: Introduction to Communication Networks Fall 2001

Congestion Control. Tom Anderson

ICE 1332/0715 Mobile Computing (Summer, 2008)

First Exam for ECE671 Spring /22/18

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Medium Access Control Sublayer

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

CSE 461: Wireless Networks

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.

Wireless LANs. ITS 413 Internet Technologies and Applications

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

15-441: Computer Networks Homework 3

CS4700/CS5700 Fundamentals of Computer Networks

MAC. Fall Data Communications II 1

IEEE Medium Access Control. Medium Access Control

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

SENSOR-MAC CASE STUDY

CHAPTER 4 CROSS LAYER INTERACTION

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Advanced Computer Networks

Unit 7 Media Access Control (MAC)

Written Exam in Information Networks TSIN01

Data Communication Networks Final

Lecture 14: Congestion Control"

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

CS3600 SYSTEMS AND NETWORKS

CPE 548 Exam #1 (50 pts) February 17, 2016

Token Rate Bucket Size

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz I

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Problem 7. Problem 8. Problem 9

Transport layer issues

CSE/EE 461 Lecture 16 TCP Congestion Control. TCP Congestion Control

An Efficient Scheduling Scheme for High Speed IEEE WLANs

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Transport Protocols. Raj Jain. Washington University in St. Louis

Lecture 4: Congestion Control

Answers to Sample Questions on Transport Layer

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

Basic Reliable Transport Protocols

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Wireless and Mobile Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

CMPE 257: Wireless and Mobile Networking

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am

Transcription:

5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A typical crossbar-based router uses input queueing so that it can implement sophisticated Quality-of-Service (QoS) processing. B. The islip crossbar scheduling algorithm (a round-robin Parallel Input Matching algorithm) is efficient, but in practice does not fairly allocate time slots. C. High-performance routers can not change the IP packets they forward at all D. High-performance routers use a bus-based achitecture to achieve very high packet forwarding rates. E. In a high-performance router, copies of the forwarding table are kept in the output ports. F. In a high-performance router, copies of the forwarding table are kept in the input ports. Only (f) is correct. 2. Chiu and Jain showed in their paper that AIMD was the only choice of increase/decrease algorithms that converged to a fair and efficient utilization. Briefly explain why XCP is able to get away with using a multiplicative increse algorithm? Because XCP uses an AIMD fairness controller to allocate the increase between flows. B Long Questions 3. The picture above shows the famous TCP saw tooth behavior. We are assuming that fast retransmit and fast recovery always work, i.e. there are no timeouts and there is exactly one packet lost at the end of each tooth. We are assuming that the flow control window is large and that the sender always has data to send, i.e. throughput will be determined by TCP congestion control.

Congestion Window W W/2 Time STT Figure : TCP sawtooth diagram In the picture, W represents the congestion window size at which a congestion packet loss occurs (expressed in maximum transfer units). You can assume that W is large, so feel free to approximate (W-) or (W+) by W. STT represents the saw tooth time expressed in seconds. The aim of this exercise is to derive the average throughput of a TCP connection as a function of the roundtrip time (RTT), the maximum transfer unit (MTU), and the packet loss rate (PLR) for the connection. Please use the notation suggested by the figure, i.e. W and STT, as intermediate values if you need them. (a) Calculate the STT as a function of W, and the RTT. (Hint: the congestion window goes from W/2 to W in one STT, and remember the congestion window is increased by MTU every RTT). To calculate STT, we need to know the slope of the congestion window increase. For TCP, the congestion window is increased MTU every RTT, so STT = RTT * W / 2 (b) How much data is sent in one STT? (Hint: how much data is sent each RTT?) In one RTT, one congestion window worth of data is sent. There are W / 2 RTTs in STT, and the average size of the congestion window is 3 * W / 4, so amount of data = (W / 2) * (3 * W / 4) * MTU (c) What is the average throughput of the connection? The average throughput is the amount of data sent in STT divided by STT, so let us calculate those two entities. How much data is sent in that amount of time? This means that the through put is: T = (3 * W / 4) * MTU / RTT (d) What is the average packet loss rate? (Hint: How many losses occur per STT?) Now, how much is W? Well, we lose one packet for every tooth in the picture, so the PLR is divided by the number of packets sent in STT, which we already calculated above. PLR = / ((W / 2) * (3 * W / 4)) (e) What is the relationship between the throughput and the packet loss rate? which allows us to calculate W as a function of PLR. If we substitute W in T by this value, we get: T =.22 * MTU / (RTT * sqrt(plr))page 2

4. Peter, excited to setup a new adhoc wireless network on campus, uses the following topology with nodes A, B, C, and D. The dotted lines indicate the range of the wireless transmission from each node. For example, C is within transmission range of nodes B and D. In the following question, you will determine the outcome of transmissions that Peter has scheduled to take place in order to test his new network. Also assume that packets are never rescheduled for transmission, i.e., if a packet did not succeed the first time the node does not bother to retransmit it. A B C D (a) In the first set of scheduled transmissions, carrier sense is enabled, but Peter has disabled RTS/CTS. Each transmission has a source, destination, associated relative start time, and total transmission time. For each transmission, briefly state the result and relate it to other transmission numbers if needed to justify your answer. In this section, transmissions are never rescheduled. A result would be success or prevented by...something... (8 points) # Src Dst Start Time Duration Type Result A B 0 5 DATA 2 C B 5 0 DATA 3 C D 20 20 DATA 4 B C 22 8 DATA 5 B A 30 0 DATA # Src Dst Time Length Type Result A B 0 5 DATA Collision with 2 (hidden terminal) 2 C B 5 0 DATA Collision with (hidden terminal) 3 C D 20 20 DATA Successful 4 B C 22 8 DATA Prevented by carrier sense from 3 5 B A 30 0 DATA Prevented by carrier sense from 3 (exposed t.) (b) After the first series of transmissions, Peter enables RTS/CTS on each node and reschedules the same transmissions from part a with the same start and transmission times. For each scheduled transmission give the outcome and any additional transmissions that may result from them. Make sure to specify the type of packet using DATA, RTS, or CTS. Assign new transmission numbers, but consider the times of RTS/CTS packets to be negligible (do not assign times). You may not need all of the blank lines. (Fill in the table on the next page) (7 points) Page 3

# Src Dst Time Length Type Result A B RTS Success 2 B A CTS Success 3 A B 0 5 DATA Success 4 C B 5 0 DATA Prevented: heard CTS#2 # Src Dst Time Length Type Result A B RTS Success 2 B A CTS Success 3 A B 0 5 DATA Success 4 C B 5 0 DATA Prevented: heard CTS (#2) 5 C D RTS Success 6 C D CTS Success 7 C D 20 20 DATA Success 8 B C 22 8 DATA Prevented: heard RTS (#5) 9 B A 30 0 DATA Prevented 5. Bin sets up a wireless AP (access point) at home, and finds the performance to be much poorer than he expected. In this question, you are going to help him figure out possible reasons. (a) First, Bin finds that since the access point is open, some neighbor has also associated with the AP. While Bin is close to the AP and can receive data at Mbps, the neighbor has a much lower signal strength and thus can only receive data at Mbps. Assume the AP always has full-size (500 bytes) packets to send to both Bin and his neighbor, and it uses round-robin to schedule between the two transmissions. If we ignore all overheads (no headers or preambles, no packet loss, no acknowledgements), what is the throughput Bin will get? What if Bin can receive data at 54Mbps? At Mbps, the throughput is + At 54Mbps, the throughput is + 54 = 0.97Mbps. = 0.982Mbps. (b) After finding this out, Bin has used several techniques (enable security, enable MAC address filtering) to prevent his neighbor from using his access point. In the next two questions, we will look at the difference between physical data rate and the TCP throughput. Here is how the 802. MAC protocol works with only one sender and receiver in the network: the sender would sense the channel before transmitting, and if the channel is clear and has been clear for DIFS (Distributed Coordinate Function Interframe Space) time, the sender would send Page 4

out the frame. After receiving the frame, the receiver would wait for SIFS (Short Interframe Space) time and send out a link-layer acknowledgement. 802. protocol also requires a preamble to let the receiver to synchronize with the sender and to be notified that the data is on its way, and the preamble is transmitted at the lowest data rate. Assuming Bin is using 802.b wireless devices, here are the parameters for 802.b: preamble take 92µs, DIFS = 50µs, SIFS = 0µs, payload size = 500 bytes, header size = 30 bytes, TCP ACK frame size (including all headers) = 70 bytes, link layer ACK size = 4 bytes. So what is the TCP throughput if Bin can receive at Mbps physical data rate (i.e., the payload, headers, and link layer ACKs are transmitted at Mbps)? In this problem, you can assume the wireless link is the bottleneck, and ignore TCP slow start, congestion control, round-trip time, delayed ACK. The total time for a TCP exchange is: (50 + 92 + 30 8/ + 500 8/) + (0 + 92 + 4 8/) + (50 + 92 + 70 8/) + (0 + 92 + 4 8/) = 2072µs. Useful data size is 500 bytes. Thus the effective data rate is 500 8/2072 = 5.8Mbps. (c) Bin is now using 802.g devices, with the following parameters: preamble take 20µs, DIFS = 34µs, SIFS = 6µs, payload size = 500 bytes, header size = 30 bytes, TCP ACK frame size (including all headers) = 70 bytes, link layer ACK size = 4 bytes. So what is the TCP throughput if Bin can receive at 54Mbps? The total time for a TCP exchange is: (34 + 20 + 30 8/54 + 500 8/54) + (6 + 20 + 4 8/54) + (34 + 20 + 70 8/54) + (6 + 20 + 4 8/54) = 42.2µs. Useful data size is 500 bytes. Thus the effective data rate is 500 8/42.2 = 28.5Mbps. Page 5