Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Similar documents
Computer Networks - CS132/EECS148 - Spring

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

First Midterm for ECE374 03/24/11 Solution!!

Final for ECE374 05/06/13 Solution!!

First Midterm for ECE374 03/09/12 Solution!!

Data Networks Summer 2007 Homework #3

Transport Layer Protocols

First Midterm for ECE374 02/25/15 Solution!!

This sequence diagram was generated with EventStudio System Designer (

Outline. TCP connection setup/data transfer Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

Internet Packets. Forwarding Datagrams

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

(Refer Slide Time: 02:17)

2 TCP-like Design. Answer

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Transport Layer. Chapter 3.4. Think about

Computer Networks. Chapter 5 Transport Protocols

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter.

Ethernet. Ethernet. Network Devices

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

IP Subnetting and Addressing

Lecture Computer Networks

TCP in Wireless Mobile Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Instructor Notes for Lab 3

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Transport and Network Layer

Data Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

IP address format: Dotted decimal notation:

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

IP Addressing Introductory material.

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

A Transport Protocol for Multimedia Wireless Sensor Networks

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Visualizations and Correlations in Troubleshooting

Policy Based Forwarding

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Networking Basics for Automation Engineers

IP addressing and forwarding Network layer

GATE CS Topic wise Questions Computer Network

CS268 Exam Solutions. 1) End-to-End (20 pts)

Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford

HOST AUTO CONFIGURATION (BOOTP, DHCP)

1. How many unique network IDs are there in class A addresses? # of unique hosts?

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit

IP Addressing. IP Addresses. Introductory material.

Quick Note 15. Quality of Service (QoS) on a TransPort router

Computer Networks Homework 1

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

First Semester Examinations 2011/12 INTERNET PRINCIPLES

La couche transport dans l'internet (la suite TCP/IP)

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Future Internet Technologies

Subnetting,Supernetting, VLSM & CIDR

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data

High-Speed TCP Performance Characterization under Various Operating Systems

Exam 1 Review Questions

Exercises TCP/IP Networking. Solution. With Solutions

Networking Test 4 Study Guide

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

Chapter 19 Network Layer: Logical Addressing 19.1

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Link Load Balancing :50:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Chapter 6 Congestion Control and Resource Allocation

Written examination in Computer Networks

15-441: Computer Networks Homework 2 Solution

Operating Systems and Networks Sample Solution 1

Sample Network Analysis Report

Firewall Implementation

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

TCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Route Discovery Protocols

Network layer: Overview. Network layer functions IP Routing and forwarding

Troubleshooting Tools

La couche transport dans l'internet (la suite TCP/IP)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Computer Networks. Data Link Layer

TCP loss sensitivity analysis ADAM KRAJEWSKI, IT-CS-CE

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

ICS 351: Today's plan

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Computer Networks Practicum 2015

IST 220 Exam 3 Notes Prepared by Dan Veltri

Linux TCP Implementation Issues in High-Speed Networks

Transcription:

Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted? How long does it take to transmit the file over a 10 Mbps link? Ignore flow control and congesnon control so A can pump segments out back to back connnuously.

SoluNon You can transfer up to 2^32 2 bytes without wrapping over (we have a 32 bit sequence number, SYN and FIN both count as one byte of the sequence number space in TCP) Let: L = length of file = 2^32 2 bytes H = size of header = 1460 bytes R = transfer rate = (10*10^6 / 8) bytes per second Then: Total payload = L Total headers = ceil(l/h) * H So total Nme = (L + ceil(l/h)*h) / R

Prefix AggregaNon Company X and Company Y connect to the same ISP, and they are assigned the prefixes: X: 121.77.80/26 Y: 121.77.64/18 The ISP has a single 3 port router: port 1 connects to the rest of the Internet, port 2 connects to X, and port 3 connects to Y. Write a rounng table for this router, filling out as many fields as possible. What aggregated prefix can the ISP advernse to the rest of the Internet for companies X and Y?

SoluNon Part A Network Prefix Subnet Mask Next Hop Outgoing Interface 0.0.0.0 0.0.0.0 IP default route 1 121.77.80.0 255.255.255.192 IP x 2 121.77.64.0 255.255.192.0 IP y 3 The first entry is the default route: all IPs will match a 0.0.0.0/0 entry. 121.77.80/26 specifies a range such that IP dst & mask == 121.77.80 & mask, where the mask starts with 26 zeros. So the network prefix is 121.77.80.0 and the netmask in binary is 11111111.11111111.11111111.11000000 = 255.255.255.192 The third entry can be calculated in the same manner. We don t know the IPs of any of the routers we re connected to, so we just lek them as free variables (IP x, IP y, etc.)

SoluNon Part B 121.77.80.0/26 = 01111001.01001101.01010000.00000000 121.77.64.0/18 = 01111001.01001101.01010000.00000000 Aggregate prefix is the bolded secnon, as it fully encloses both ranges but doesn t include any addinonal addresses: 01111001.01001101.01010000.00000000 = 121.77.64.0/18 Note: You can t always get an aggregated prefix between two address ranges (for example, if there is a hole between the regions)

CongesNon Control Suppose a hardware error causes one out of every 100 packets to drop (99 packets sent correctly, then one drops, then 99 packets sent correctly, then one drops ). Assume we amempt to use TCP with simple AIMD over this link (W halved at a loss event, otherwise W++ for every RTT) How many RTTs can we expect between successive packet losses? With 1000 byte TCP segments (including header) over a 1 Gbps link with 100 ms RTT, what is the maximum throughput of the connecnon?

IllustraNon of Steady State Behavior Window Size Drop aker 100 packets; window size halved 2x x n RTTs in each cycle Window size increases by 1 for each RTT Time

SoluNon For every cycle in the sawtooth, 100 segments are sent. For each RTT, the # segments sent is the window size, which starts at x. The window size increases by 1 for each RTT. Aker n RTTs, we have: x + (x+1) + (x+2) + (x+(n 1)) = nx + (n*(n 1))/2 = 100 Also, when we get a loss event aker n RTTs, the window size will have doubled: Final window size = x + (n 1) = 2x Solving the simultaneous equanon for n and x, we get: # RTTs = n = 8.68 9 RTTs IniNal window size = x = 7.68 8 segments

Sequence Numbers (3 P18) Consider a GBN protocol with a window size of 3 and sequence number range of 1024. Suppose at Nme t, the next in order packet that the receiver is expecnng has a sequence number k. Also assume the network does not re order messages. What are the possible sets of sequence numbers inside the sender s window at Nme t? What are all possible values of the ACK field in all possible messages currently propaganng back to the sender that could affect the sender window?

SoluNon (Part A) Sender window = max # of unack d packets outstanding Ack # = next sequence # expected (receiver has received connguous bytes up to ack 1) In this problem, ack = k Worst case: receiver is just sending ack k ( ack k 1 and ack k 2 are lost or in flight). Then sender s window is full and it has just sent us [k 3, k 2, k 1]. See the diagram below. Best case: sender has just received ack k, and therefore starts to send send off [k, k+1, k+2]. Draw out the diagram to convince yourself. If you vary the sequence of dropped acks, you will see that the sender can have this set of sequence numbers in its window: [k 3, k 2, k 1] Send k 3 [k 2, k 1, k] [k 1, k, k+1] Send k 2 Ack k 2 in flight or lost [k, k+1, k+2] Send k 1 Ack k 1 in flight or lost Worst case scenario Ack k in flight or lost

SoluNon (Part B) If the receiver is expecnng to receive k next, then the largest ack that can be in the network can be at most k by defininon. However, from the diagram on the last page, clearly acks of k 1 and k 2 can snll be in flight, due to the sender window of size 3. Acks of seq #s < k 2 are possible in the network, but won t affect the sender window, since it has already advanced to at least k 2. Therefore, there can be ack messages acking the seq #s [k 2, k 1, and k] in the network which will affect the sender window.

Reliable Transfer (3 P19) Suppose we have two network ennnes, A and B. B has a supply of data messages that will be sent to A according to the following convennons: When A gets a request from the app to get the next data message from B, it sends a request message to B B then responds with the data message A then delivers exactly one copy of this message to the client Link from A to B is lossy, but does not corrupt or duplicate packets Link from B to A is perfectly reliable Give an FSM descripnon of a protocol that incorporates only the needed mechanisms to guarantee reliable, in order message passing to the app given these constraints.

SoluNon Sender Reset Seq = 0 Wait App App Requests Data Send Req to B Tagged with Seq Wait B Timeout Resend Req to B Tagged with Seq Receiver Receive from B Send Data to App Invert Seq We use a single sequence number that alternates between 0 and 1 to disnnguish retransmissions from new requests. Reset Seq = 0 Wait A Receive Request Tagged with Seq Send Next Data to A Invert Seq