Solution

advertisement
Exam 2 of Computer Networks (ICE 1230)
2008.4.1
Answer in English and Total 15 points
1. In our rdt protocols, why did we need to introduce sequence
numbers? Also, why did we need to introduce timers? (1 point)
Sequence numbers are required for a receiver to find out whether an arriving packet
contains new data or is a retransmission.
To handle losses in the channel. If the ACK for a transmitted packet is not received
within the duration of the timer for the packet, the packet (or its ACK or NACK) is
assumed to have been lost. Hence, the packet is retransmitted.
2. Answer true or false to the following questions and briefly
justify your answer:
a. With the SR protocol, it is possible for the sender to receive an
ACK for a packet that falls outside of its current window.
True. Suppose the sender has a window size of 3 and sends packets 1, 2, 3 at t0 .
At t1 (t1 > t0) the receiver ACKS 1, 2, 3. At t2 (t2 > t1) the sender times out and
resends 1, 2, 3. At t3 the receiver receives the duplicates and re-acknowledges 1, 2,
3. At t4 the sender receives the ACKs that the receiver sent at t1 and advances its
window to 4, 5, 6. At t5 the sender receives the ACKs 1, 2, 3 the receiver sent at
t2 .These ACKs are outside its window.
b. With GBN, it is possible for the sender to receive an ACK for a
packet that falls outside of its current window.
True. By essentially the same scenario as in (a).
c. The alternating-bit protocol is the same as the SR protocol
with a sender and receiver window size of 1.
True.
d. The alternating-bit protocol is the same as the GBN protocol
with a sender and receiver window size of 1.
True. Note that with a window size of 1, SR, GBN, and the alternating bit protocol
are functionally equivalent. The window size of 1 precludes the possibility of out1
of-order packets (within the window). A cumulative ACK is just an ordinary ACK
in this situation, since it can only refer to the single packet within the window.
(2 points)
3. Consider the following plot of TCP window size as a function of
time.
Assuming TCP Reno is the protocol experiencing the behavior
shown above, answer the following questions. In all cases, you
should provide a short discussion justifying your answer. (2 points)
a. Identify the intervals of time when TCP slow start is operating.
TCP slowstart is operating in the intervals [1,6] and [23,26]
b. Identify the intervals of time when TCP congestion avoidance
is operating.
TCP congestion advoidance is operating in the intervals [6,16] and [17,22]
c. After the 16th transmission round, is segment loss detected by
a triple duplicate ACK or by a timeout?
After the 16th transmission round, packet loss is recognized by a triple duplicate
ACK. If there was a timeout, the congestion window size would have dropped to
1.
d. After the 22nd transmission round, is segment loss detected by
a triple duplicate ACK or by a timeout?
After the 22nd transmission round, segment loss is detected due to timeout, and
2
hence the congestion window size is set to 1.
e. What is the initial value of Threshold at the first transmission
round?
The threshold is initially 32, since it is at this window size that slowtart stops and
congestion avoidance begins.
f. What is the value of Threshold at the 18th transmission round?
The threshold is set to half the value of the congestion window when packet loss
is detected. When loss is detected during transmission round 16, the congestion
windows size is 42. Hence the threshold is 21 during the 18th transmission round.
g. During what transmission round is the 70th segment sent?
During the 1st transmission round, packet 1 is sent; packet 2-3 are sent in the 2nd
transmission round; packets 4-7 are sent in the 3rd transmission round; packets 815 are sent in the 4th transmission round; packets15-31 are sent in the 5th
transmission round; packets 32-63 are sent in the 6th transmission round; packets
64 – 96 are sent in the 7th transmission round. Thus packet 70 is sent in the 7th
transmission round.
h. Assuming a packet loss is detected after the 26th round by the
receipt of a triple duplicated ACK, what will be the values of
the congestion control window size and of Threshold?
The congestion window and threshold will be set to half the current value of the
congestion window (8) when the loss occurred. Thus the new values of the
threshold and window will be 4.
4. Do the routers in both datagram network and virtual-circuit
networks use forwarding tables? If so, describe the forwarding
tables for both classes of networks. (1 point)
Yes, both use forwarding tables. For a VC forwarding table, the columns are :
Incoming Interface, Incoming VC Number, Outgoing Interface, Outgoing VC
Number. For a datagram forwarding table, the columns are: Destination Address,
Outgoing Interface.
5. Consider a datagram network using 8-bit host addresses.
Suppose a router uses longest prefix matching and has the
following forwarding table:
3
Prefix Match
Interface
1
0
11
1
111
2
otherwise
3
For each of the four interfaces, give the associated range of
destination host addresses and the number of addresses in the
range. (1 Point)
Destination Address Range
10000000
through (64 addresses)
10111111
11000000
through(32 addresses)
11011111
11100000
through (32 addresses)
11111111
00000000
through (128 addresses)
Link Interface
0
1
2
3
01111111
6. We saw that there is no network-layer protocol that can be used
to identify the hosts participating in a multicast group. Given this,
how can multicast applications learn the identities of the hosts that
are participating in a multicast group?
(1 point)
The protocol must be built at the application layer. For example, an application may
periodically multicast its identity to all other group members in an application-layer
message.
7. In these days, the Internet needs to include the wireless
communications network in addition to the wired networks. What is
a way to extend the congestion control of TCP in this case? Why?
4
(2 point)
Packet losses occur from network congestion and wireless communication.
Since the wired Internet does not consider the packet loss due to errors in
wireless communication, the congestion control of TCP should be revised. A
way is …
8. The most obvious technique for achieving broadcast is a flooding
approach. What is it? What is a fatal flaw? What could be remedies
(at least two)?
The endless multiplication of broadcast packets result in broadcast storm.
Sequence-number-controlled flooding and reverse path forwarding could be
remedies.
(2 point)
9. Describe the overall steps of Link State Routing algorithm. And
show the technical issues (at least two) and their solutions of its
implementation as Open Shortest Path First.
(2 points)
1.
discover its neighbors and learn their network address.
2. measure the delay or cost to each of its neighbors.
3. construct a packet telling all it has just learned.
4. send this packet to all other routers.
5. compute the shortest path to every other router.
For example, OSPF has an architecture consisting of areas where the link
state packets are flooding inside. Sequence number is with age number in
order to solve …
5
Download