Tutorials 4

advertisement
Internet Technologies Tutorial 4 Questions
1.
Describe the working principle of the Leaky Bucket Algorithm.
–
Leaky Bucket algorithm is a mechanism that turns and uneven flow of packets
form the user processes inside the host into an even flow of packets onto the
network. The working principle are as follows:
– each host connected to the network has an interface containing a
"leaky bucket” (a queue)
– Packets can arrive at any rate
– Packets are discarded when the bucket overflows.
– Packets depart at a constant rate.
2.
Describe the working principle of the Token Bucket Algorithm. What are the
main differences between Token Bucket Algorithm and Leaky Bucket
Algorithm?
–
In the token bucket algorithm, the leaky bucket holds tokens, generated by a
clock at the rate of one token every DT second. When a packet is to be
transmitted, a token must be captured and destroyed. If there is no token in
the bucket, the algorithm can not transmit any packet. Idle hosts can save up
permission (tokens) to send bursts later. The maximum number of tokens
allowed to be saved is n Token bucket algorithm does not discard packets.
The main differences are:
1. The leaky bucket algorithm does not allow idle hosts to save up
permission to send large bursts later. The token bucket algorithm does
allow saving, up to the maximum size of the bucket, n. This property
means that bursts of up to n packets can be sent at once, allowing some
burstiness in the output stream and giving faster response to sudden
bursts of input.
2. Token bucket algorithm throws away token (i.e., transmission capacity)
when the bucket fills up but never discards packets. In contrast, the
leaky bucket algorithm discards packets when the bucket fills up.
3. Imagine a flow specification that has a maximum packet size of 1000 bytes, a
token bucket rate of 10 million bytes/sec, a token bucket size of 1 million
bytes, and a maximum transmission rate of 50 million bytes/sec. How long
can a burst at maximum speed last?
4. The current standard for IPv6 has no header checksum. What are the
advantages and disadvantages of this approach?
5. The Protocol field used in the IPv4 header is not present in the fixed IPv6
header. Why not?
6. How to encode an IPv4 address in an IPv6 address?
1/7
0000 . . . 0000
FFFF IPv4 Address
80 bits
16 bits 32 bits
Internet Technologies Tutorial 4 Questions
7.
Describe, with suitable diagrams, the general form of an IPv6 datagram with
multiple headers, the format of the IPv6 base header. What are the main
changes introduced by IPv6 comparing with IPv4?
Main changes:
 Larger addresses. The addresses size changes from 32 bits to 128 bits
 Extended Address Hierarchy. IPv6 uses the larger address space to
create additional levels of addressing hierarchy.
 Flexible Header Format.
 Improved Options.
 Provision for protocol extension
 Support for auto-configuration and renumbering
 Support for Resource allocation.
2/7
Download