Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 1: SOLUTIONS Time: 75 min (strictly enforced)

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Intermediate TCP/IP TCP Operation.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Winter 2008CS244a Handout #61 CS244a: An Introduction to Computer Networks Handout 6: The Transport Layer, Transmission Control Protocol (TCP), and User.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4690: Experimental Networking Informal Quiz: TCP Shiv Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 1 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6660: Broadband Networks Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME (1.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Exam 1: SOLUTIONS Time: 60 min (strictly enforced) Points:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Exam 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 3 Time: 90 min (strictly enforced) Points: 50 YOUR NAME: Be.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 2: Solutions Time: 75 min (strictly enforced)
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 ECSE-4670: CCN Quiz 1: Solutions Time: 45 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 2 Time: 60 min (strictly enforced) Points: 50 { 5 questions,
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Quiz 1 SOLUTIONS Time: 60 min (strictly enforced) Points: 50 YOUR.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
1 Transport Layer Computer Networks. 2 Where are we?
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Transport Layer 3-1 Internet Transport Layer Lecture 8 Dr. Najla Al-Nabhan.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 Time: 75 min (strictly enforced) Points: 50.
Transport Layer: Sliding Window Reliability
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 80 min (strictly enforced) [Hint: spend time roughly.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Midterm Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
© 2002, Cisco Systems, Inc. All rights reserved..
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 3: Transport.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Ch 3. Transport Layer Myungchul Kim
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Ch 3. Transport Layer Myungchul Kim
TCP - Part II.
CMPT 371 Data Communications and Networking
6 Transport Layer Computer Networks Tutun Juhana
Transport Layer Unit 5.
Transport Layer Our goals:
Process-to-Process Delivery:
Transport Layer Our goals:
CS4470 Computer Networking Protocols
CPEG514 Advanced Computer Networkst
ECSE-4670: Computer Communications Netwoks Exam 1: SOLUTIONS
The Transport Layer Reliability
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 1: SOLUTIONS Time: 75 min (strictly enforced) Points: 50 YOUR NAME: XXXXXXX Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will not earn (partial) credit. Brief, clear and consistent explanation will.}

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 I. Below, you are given a true or false statement and asked a follow up question. 1. [4 pts] False statement: Connectivity is equivalent to a point-to-point physical link. Qn: Explain how the notion of “connectivity” differs from an equivalent of a “physical link.” Connectivity refers to two hosts being able to communicate. Such communication could be established via a reliable transport protocol which can use underlying layers to reach remote hosts (those that are not directly connected by a physical link). Physical link has well- defined performance, but with connectivity performance is defined on a packet by packet basis. Definition of connectivity and physical link -> 3pts Any one alone -> 2pts Difference is clearly articulated -> 4pts

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 2. (6 pts) False statement: Circuit-switching exploits statistical multiplexing and hence needs to tackle stability issues. Qn: Explain: a) Why circuit switching DOES NOT exploit statistical multiplexing, and b) Why do statistically multiplexed systems (like packet-switched systems) need to tackle stability issues unlike circuit-switched systems. a) Circuit switching involves reserving some fixed bandwidth when the circuit is setup. But statistical multiplexing means sharing a link among various connections depending on the demands posed by the connections. Since circuit switching does not care if individual connections offer any demand and reserves bandwidth, it is clear that it does not use statistical multiplexing. [3pts] b) The statistically multiplexed systems provide gains by trading off delays and queuing of packets. If the system does not estimate the load of the constituent connections properly, there is a possibility that an excess traffic might be admitted. Such a situation can cause unbounded delay and queuing leading to system instability. [3pts]

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 3. (6 pts) True statement: HTTP uses TCP. DNS uses UDP Qn: a) Discuss why HTTP & DNS need TCP and UDP respectively. b) What could happen in DNS if its UDP-based request or response packet is lost? a) DNS is invoked prior to establishing TCP connections and hence response time is important. It cannot tolerate large latencies due to TCP connection setup. Also HTTP typically transfers larger amount of data, and needs a reliable mechanism. DNS requests on the other hand, are short packets which give the IP address for a name and probably some authoritative name server addresses. So the reliable protocol semantics of TCP would be costly in the case of DNS. [3pts] partial is 2pts b) If DNS request packets are lost the resolver would intimate that there is a temporary failure in name resolution or it could stall without any reply. If a retransmit mechanism has been built into it, it could probably retry after a timeout.[3pts] partial is 2pts

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 4. (6 pts) False statement: The checksum (as UDP would compute) of the three numbers: , , is Qn: What is the correct checksum ? Show how you obtained your answer. Correct answer – 6pts. Correct procedure but wrong answer - 4pts. Reasonable attempt – 2pts

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6 5. (6 pts) False statement: Cumulative ACKs, Selective ACKs and NAKs are all equivalent. Qn: Discuss 2 pros and 2 cons EACH of Cumulative ACKs, Selective acks and NAKs. a) Cumulative ACKs, pros: a) Fewer ACKs can be sent for the same number of packets, so there can be a saving in reverse channel bandwidth. b) Sender window can move faster since It does not have to wait for all ACKs b) Cumulative ACKs cons: a) Does not help in reducing retransmissions. Although the receiver might have later packets, it would ACK an earler one if an intermediate packet is lost. b) Can cause bursty transmission, since the window can increase suddenly due to a cumulative ACK. c) Selective ACKs pros: a) Indicates the packets that need to be retransmitted explicitly and avoids unnecessary retransmission. b) Fewer ACKs sent d) Selective ACKs cons: a) Sequence number problems – if sequence numbers wrap there is no way to find out if the ACK is for an older session. b) Higher buffer requirements since out-of-order packets are not discarded. e) NAK pros: a) Indicates only the packets that were not received or corrupted and hence prevents unnecessary retransmissions. b) Fewer “ACK”s, no packets sent to confirm a proper receipt, hence bandwidth saved. f) NAK cons: a) If a NAK for a packet is lost, that packet might never be recovered. b) Higher buffer requirements since out-of-order packets need to be processed. ½ pt for each point in “pro” or “con”

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7 II. [10 pts] Consider a 1 Mbps WAN channel with 10 msec propagation delay. Data packets are 1000 bits long while ACK/NAK packets are negligible in length. Window size (N) = 5 packets, and there are 10 packets to be transmitted. Assume a Selective Repeat ARQ protocol with a new addition: NAKs are sent for packets detected lost at the receiver. a) Assume no errors and no lost packets or ACKs/NAKs. How much time is required to complete the transfer of the 10 pkts and receive the final ack. b) Now assume every 9 th packet which crosses the forward channel is lost. ACKs/NAKs are not lost or corrupted. How much time is required to complete the transfer of the 10 pkts and receive the final ack. a) First packet of first window receives an ACK at 21ms. So first packet of 2 nd window receives an ACK at 42ms and the last packet receives an ACK at 42+4 = 46ms. b) Retransmit caused – so = 67ms are required. c) 5pts each, partial 3pts d) If they consider the 10 th packet as being lost, then they should get the result as given by the following formula:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8 Total = 46+ (Timeout ) The timeout should be greater than 21ms.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9 III. [7 pts] TCP RTT estimation and Timeout Setting Assume a TCP flow has samples of RTT: (1, 3, 2) expressed in units of seconds. What is the Average RTT, Deviation and value of Timeout calculated by TCP when it receives all these samples? Assume that the initial value of Average RTT is 3s, initial value of Deviation is 0. EWMA parameter is 0.1. Diff = RTT - SRTT SRTT[n] = SRTT[n-1] + 1/10 * diff Dev[n] = Dev[n-1] + 1/10 * (|diff| – dev[n-1]) All right -> 7pts, correct procedure -> 5pts, reasonable try -> 3pts IterationRTTDiffSRTT Dev Timeout = *0.262 = 3.786s

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10 IV. [5 pts] a) Why is UDP necessary when IP already provides a connectionless delivery service ? b) Give an example using UDP sockets between the same pair of client and server machines. In your example three of the four fields (IP address1, port1, IP address2, port2) should be the same, but one field should be different. Explain how multiplexing & de- multiplexing is correctly done in this case. a) IP provides protocol multiplexing, while UDP provides port (application) multiplexing. If the application were to receive all IP packets it would have to sort out packets which belong to it which can be both undesirable and time consuming. b) Consider (client, port1, server, port2) and (client, port3, server, port2). There are 2 clients exchanging UDP packets with a server port. The fact that the client side port numbers are different is sufficient for demultiplexing the packets. 2 pts for a) and 3 pts for b).