Practice Questions: Congestion Control and Queuing

Slides:



Advertisements
Similar presentations
Computer Networking Lecture 20 – Queue Management and QoS.
Advertisements

Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
1 TCP Congestion Control. 2 TCP Segment Structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement.
ECE 4450:427/527 - Computer Networks Spring 2015
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Fourth Edition,Peterson.
Introduction 1 Lecture 14 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
TDC365 Spring 2001John Kristoff - DePaul University1 Internetworking Technologies Transmission Control Protocol (TCP)
Transport Layer3-1 Congestion Control. Transport Layer3-2 Principles of Congestion Control Congestion: r informally: “too many sources sending too much.
Networks: Congestion Control1 Congestion Control.
Congestion Control Reading: Sections COS 461: Computer Networks Spring 2011 Mike Freedman
Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Third Ed.,Peterson.
CSEE W4140 Networking Laboratory Lecture 7: TCP flow control and congestion control Jong Yul Kim
Week 9 TCP9-1 Week 9 TCP 3 outline r 3.5 Connection-oriented transport: TCP m segment structure m reliable data transfer m flow control m connection management.
1 Lecture 9: TCP and Congestion Control Slides adapted from: Congestion slides for Computer Networks: A Systems Approach (Peterson and Davis) Chapter 3.
Computer Networks : TCP Congestion Control1 TCP Congestion Control.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
Data Communication and Networks
Networks : TCP Congestion Control1 TCP Congestion Control.
Networks : TCP Congestion Control1 TCP Congestion Control Presented by Bob Kinicki.
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Tutorial: TCP 101 The Transmission Control Protocol (TCP) is the protocol that sends.
Congestion Control Michael Freedman COS 461: Computer Networks
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
Courtesy: Nick McKeown, Stanford 1 TCP Congestion Control Tahir Azim.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
Transport Layer 4 2: Transport Layer 4.
COMT 4291 Communications Protocols and TCP/IP COMT 429.
Principles of Congestion Control Congestion: informally: “too many sources sending too much data too fast for network to handle” different from flow control!
Link Scheduling & Queuing COS 461: Computer Networks
Chapter 12 Transmission Control Protocol (TCP)
1 TCP - Part II Relates to Lab 5. This is an extended module that covers TCP data transport, and flow control, congestion control, and error control in.
Lecture 9 – More TCP & Congestion Control
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Computer Networking Lecture 18 – More TCP & Congestion Control.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Winter 2008CS244a Handout 71 CS244a: An Introduction to Computer Networks Handout 7: Congestion Control Nick McKeown Professor of Electrical Engineering.
1 Computer Networks Congestion Avoidance. 2 Recall TCP Sliding Window Operation.
Advance Computer Networks Lecture#09 & 10 Instructor: Engr. Muhammad Mateen Yaqoob.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Other Methods of Dealing with Congestion
By, Nirnimesh Ghose, Master of Science,
Internet Networking recitation #9
Topics discussed in this section:
Chapter 3 outline 3.1 transport-layer services
COMP 431 Internet Services & Protocols
Congestion Control.
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
ECE 4450:427/527 - Computer Networks Spring 2017
Other Methods of Dealing with Congestion
Other Methods of Dealing with Congestion
Jiyong Park Seoul National University, Korea
Internet Networking recitation #10
CS4470 Computer Networking Protocols
Congestion Control Reasons:
TCP Congestion Control
Transport Layer: Congestion Control
TCP: Transmission Control Protocol Part II : Protocol Mechanisms
Congestion Michael Freedman COS 461: Computer Networks
Lecture 6, Computer Networks (198:552)
Presentation transcript:

Practice Questions: Congestion Control and Queuing COS 461: Computer Networks http://www.cs.princeton.edu/courses/archive/spr13/cos461/

One node on an Ethernet network uses TCP to send data to another node on the same network. If there are no other nodes transmitting on the network, can there be any collisions? Yes No

One node on an Ethernet network uses TCP to send data to another node on the same network. If there are no other nodes transmitting on the network, can there be any collisions? Yes – Can collide with TCP ACKs No

Ben Bitdiddle’s home network connection can upload at 125,000 bytes/second. His router has a 100,000 byte first in first out buffer for packets awaiting transmission. If the buffer is completely full, how long will it take for the buffer to clear? 0.4 seconds 0.6 seconds 0.8 seconds 1 second 1.25 seconds

Ben Bitdiddle’s home network connection can upload at 125,000 bytes/second. His router has a 100,000 byte first in first out buffer for packets awaiting transmission. If the buffer is completely full, how long will it take for the buffer to clear? 0.4 seconds 0.6 seconds 0.8 seconds 1 second 1.25 seconds

Ben Bitdiddle’s home network connection can upload at 125,000 bytes/second. His router has a 100,000 byte first in first out buffer for packets awaiting transmission. At time 0, Ben’s client starts sending 1,000 byte packets at 150 packets/s. When will the first packet be dropped by the router? 2 seconds 3 seconds 4 seconds Buffer will never discard a packet in this case

Ben Bitdiddle’s home network connection can upload at 125,000 bytes/second. His router has a 100,000 byte first in first out buffer for packets awaiting transmission. At time 0, Ben’s client starts sending 1,000 byte packets at 150 packets/s. When will the first packet be dropped by the router? 2 seconds 3 seconds 4 seconds Buffer will never discard a packet in this case

Alyssa P. Hacker and Ben Bitdiddle communicate over a link with capacity of 100 pkts / sec. The latency (RTT) on this link is 100 ms. If a sliding window protocol with acknowledgement packets is used, and there is a FIXED window size of 4 packets, what is the maximum rate of traffic on the link? 20 pkts / s 40 pkts / s 80 pkts / s 100 pkts /s

Alyssa P. Hacker and Ben Bitdiddle communicate over a link with capacity of 100 pkts / sec. The latency (RTT) on this link is 100 ms. If a sliding window protocol with acknowledgement packets is used, and there is a FIXED window size of 4 packets, what is the maximum rate of traffic on the link? 20 pkts / s 40 pkts / s 80 pkts / s 100 pkts /s

Triple Duplicate Ack Slow Start Packet loss Time out TCP CONGESTION CONTROL 1. Name the event at B which occurs that causes the sender to decrease its window Triple Duplicate Ack Slow Start Packet loss Time out

Triple Duplicate Ack Slow Start Packet loss Time out TCP CONGESTION CONTROL 1. Name the event at B which occurs that causes the sender to decrease its window Triple Duplicate Ack Slow Start Packet loss Time out

TCP CONGESTION CONTROL 2. Does the event at B necessitate that the network discarded a packet ? Yes No Don’t know

TCP CONGESTION CONTROL 2. Does the event at B necessitate that the network discarded a packet ? Yes No Don’t know No. It could be due to either reordering or queuing or asymmetric paths.

Triple Duplicate Ack Slow Start Packet loss Time out TCP CONGESTION CONTROL 3. Name the event at D which occurs that causes the sender to decrease its window. Triple Duplicate Ack Slow Start Packet loss Time out

Triple Duplicate Ack Slow Start Packet loss Time out TCP CONGESTION CONTROL 3. Name the event at D which occurs that causes the sender to decrease its window. Triple Duplicate Ack Slow Start Packet loss Time out

TCP CONGESTION CONTROL 4. Does the event at D necessitate that the network discarded a packet Yes No Don’t know

TCP CONGESTION CONTROL 4. Does the event at D necessitate that the network discarded a packet Yes No Don’t know No. Congestion in either direction could cause RTT > RTO (retrans. timeout).

TCP CONGESTION CONTROL 5. For a lightly-loaded network, is the event at D MORE likely or LESS likely to occur when the sender has multiple TCP segments outstanding MORE LESS ALMOST SAME

TCP CONGESTION CONTROL 5. For a lightly-loaded network, is the event at D MORE likely or LESS likely to occur when the sender has multiple TCP segments outstanding MORE LESS ALMOST SAME

TCP CONGESTION CONTROL 6. Consider the curved slope labeled by point A. Why does the TCP window behave in such a manner, rather than have a linear slope? (Put another way, why would it be bad if region A had a linear slope?)

TCP CONGESTION CONTROL 6. Consider the curved slope labeled by point A. Why does the TCP window behave in such a manner, rather than have a linear slope? (Put another way, why would it be bad if region A had a linear slope?) This “slow-start” period quickly discovers the maximum acceptable throughput that the path supports – otherwise, AI (additive increase) could take too long (each a full RTT).

Assume at time 0 the sender attempts to open the connection. TCP CONGESTION CONTROL Assume that the network has an MSS of 1000 bytes and the round-trip-time between sender and receiver of 100 milliseconds. Assume at time 0 the sender attempts to open the connection. Also assume that the sender can “write” a full window’s worth of data instantaneously, so the only latency you need to worry about is the actual propagation delay of the network.

200ms 300ms 400ms 600ms 700ms RTT = 100ms, MSS = 1000 bytes TCP CONGESTION CONTROL RTT = 100ms, MSS = 1000 bytes 7. How much time has progressed by point B ? 200ms 300ms 400ms 600ms 700ms

200ms 300ms 400ms 600ms 700ms RTT = 100ms, MSS = 1000 bytes TCP CONGESTION CONTROL RTT = 100ms, MSS = 1000 bytes 7. How much time has progressed by point B ? 200ms 300ms 400ms 600ms 700ms

800ms 1000ms 1200ms 1400ms RTT = 100ms, MSS = 1000 bytes TCP CONGESTION CONTROL RTT = 100ms, MSS = 1000 bytes 8. How much time has progressed between points C and D? 800ms 1000ms 1200ms 1400ms

800ms 1000ms 1200ms 1400ms RTT = 100ms, MSS = 1000 bytes TCP CONGESTION CONTROL RTT = 100ms, MSS = 1000 bytes 8. How much time has progressed between points C and D? 800ms 1000ms 1200ms 1400ms

400ms 600ms 800ms 900ms RTT = 100ms, MSS = 1000 bytes TCP CONGESTION CONTROL RTT = 100ms, MSS = 1000 bytes 9. How much time has progressed between points E and F? 400ms 600ms 800ms 900ms

400ms 600ms 800ms 900ms RTT = 100ms, MSS = 1000 bytes TCP CONGESTION CONTROL RTT = 100ms, MSS = 1000 bytes 9. How much time has progressed between points E and F? 400ms 600ms 800ms 900ms

TCP CONGESTION CONTROL 10. If the sender shares its network with other clients whose traffic traverses the same IP routers, give one explanation for why point D is higher than point B?

TCP CONGESTION CONTROL 10. If the sender shares its network with other clients whose traffic traverses the same IP routers, give one explanation for why point D is higher than point B? Changing cross-traffic by other concurrent senders across same routers.

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F 2 In steady state, a sender increases its window size by one packet for each acknowledgement

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F 2 In steady state, a sender increases its window size by one packet for each acknowledgement T/F – increases by one MSS for every RTT

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F 2 In steady state, a sender increases its window size by one packet for each acknowledgement T/F – increases by one MSS for every RTT 3 A sender that underestimates the round-trip time of a connection may unnecessarily induce a TCP timeout

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F 2 In steady state, a sender increases its window size by one packet for each acknowledgement T/F – increases by one MSS for every RTT 3 A sender that underestimates the round-trip time of a connection may unnecessarily induce a TCP timeout

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F 2 In steady state, a sender increases its window size by one packet for each acknowledgement T/F – increases by one MSS for every RTT 3 A sender that underestimates the round-trip time of a connection may unnecessarily induce a TCP timeout 4 After detecting packet loss through a timeout, TCP halves its window size as a response to the path congestion

1 In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged T/F 2 In steady state, a sender increases its window size by one packet for each acknowledgement T/F – increases by one MSS for every RTT 3 A sender that underestimates the round-trip time of a connection may unnecessarily induce a TCP timeout 4 After detecting packet loss through a timeout, TCP halves its window size as a response to the path congestion T/F – TCP resets its window size to one MSS

For the following questions, assume that these are always coupled with a FIFO scheduling policy. The full queue problem occurs if routers’ queues are often full. The lockout problem refers to a situation where a small number of flows monopolize the available queue space on a router. Drop-tail solves the full queue problem T/F

For the following questions, assume that these are always coupled with a FIFO scheduling policy. The full queue problem occurs if routers’ queues are often full. The lockout problem refers to a situation where a small number of flows monopolize the available queue space on a router. Drop-tail solves the full queue problem T/F

For the following questions, assume that these are always coupled with a FIFO scheduling policy. The full queue problem occurs if routers’ queues are often full. The lockout problem refers to a situation where a small number of flows monopolize the available queue space on a router. Drop-tail solves the full queue problem T/F RED solves the full queue problem T/F

For the following questions, assume that these are always coupled with a FIFO scheduling policy. The full queue problem occurs if routers’ queues are often full. The lockout problem refers to a situation where a small number of flows monopolize the available queue space on a router. Drop-tail solves the full queue problem T/F RED solves the full queue problem T/F

For the following questions, assume that these are always coupled with a FIFO scheduling policy. The full queue problem occurs if routers’ queues are often full. The lockout problem refers to a situation where a small number of flows monopolize the available queue space on a router. Drop-tail solves the full queue problem T/F RED solves the full queue problem T/F RED solves the lockout problem for TCP flows T/F

For the following questions, assume that these are always coupled with a FIFO scheduling policy. The full queue problem occurs if routers’ queues are often full. The lockout problem refers to a situation where a small number of flows monopolize the available queue space on a router. Drop-tail solves the full queue problem T/F RED solves the full queue problem T/F RED solves the lockout problem for TCP flows T/F

1 Drop-tail has fewer burst losses than RED T/F

1 Drop-tail has fewer burst losses than RED T/F

1 Drop-tail has fewer burst losses than RED T/F 2 Both drop-tail and RED can be used with ECN (explicit congestion notification), so the router can signal congestion to the sender without dropping a packet

1 Drop-tail has fewer burst losses than RED T/F 2 Both drop-tail and RED can be used with ECN (explicit congestion notification), so the router can signal congestion to the sender without dropping a packet

1 Drop-tail has fewer burst losses than RED T/F 2 Both drop-tail and RED can be used with ECN (explicit congestion notification), so the router can signal congestion to the sender without dropping a packet 3 RED drops every incoming packet with some probability P > 0

1 Drop-tail has fewer burst losses than RED T/F 2 Both drop-tail and RED can be used with ECN (explicit congestion notification), so the router can signal congestion to the sender without dropping a packet 3 RED drops every incoming packet with some probability P > 0