Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Similar documents
Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

First Midterm for ECE374 03/24/11 Solution!!

Computer Networks - CS132/EECS148 - Spring

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 03/09/12 Solution!!

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

New York University Computer Science Department Courant Institute of Mathematical Sciences

Computer Networks Homework 1

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

Final for ECE374 05/06/13 Solution!!

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

The Application Layer: DNS

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Computer Networks & Security 2014/2015

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Computer Networking LAB 2 HTTP

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

15-441: Computer Networks Homework 1

Data Networks Summer 2007 Homework #3

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

FTP: the file transfer protocol

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Overview of Computer Networks

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

Wireshark Lab: HTTP SOLUTION

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Communications and Networking

CS3250 Distributed Systems

Domain Name System (DNS)

3. The Domain Name Service

DNS and P2P File Sharing

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Transport Layer Protocols

Internet Content Distribution

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Operating Systems and Networks Sample Solution 1

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Solutions to the Sample Questions on Introduction

NETWORKS AND THE INTERNET

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

2 TCP-like Design. Answer

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

CS101 Lecture 19: Internetworking. What You ll Learn Today

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Connecting with Computer Science, 2e. Chapter 5 The Internet

Networking Applications

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Using over FleetBroadband

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

1 Introduction: Network Applications

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

Carnegie Mellon Computer Science Department Spring 2007 Theory Problem Set 2

Domain Name System Richard T. B. Ma

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Data Communication I

Computer Networks CS321

(Refer Slide Time: 02:17)

DNS Basics. DNS Basics

Oracle Discoverer 4i Plus Firewall and SSL Tips. An Oracle White Paper February 2002

Homework Assignment #1 Solutions

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

The Problem with TCP. Overcoming TCP s Drawbacks

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Network Fundamentals Carnegie Mellon University

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

internet technologies and standards

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Wireshark Lab: Assignment 1w (Optional)

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Frequently Asked Questions

2.5 DNS The Internet s Directory Service

Network Technologies

New York University Computer Science Department Courant Institute of Mathematical Sciences

Networks and the Internet A Primer for Prosecutors and Investigators

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Sage ERP Accpac Online

PART-A Questions. 9. What are the two parts of message inside the envelope?

Glossary of Technical Terms Related to IPv6

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data

15-441: Computer Networks Homework 1

Domain Name System (DNS)

Transcription:

1 Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 ote: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your work. If you make a mistake, it will also help the grader show you where you made a mistake. Problem 1: (10 Points) Suppose within your Web browser you click on a link to obtain a web page. The IP address for the associated URL is not cached in your local host, so a DS lookup is necessary to obtain the IP address. Suppose that n DS servers are visited before your host receives the IP address from DS; the successive visits incur an RTT of RTT1,, RTTn. Further suppose that the web page associated with the link contains exactly one object, consisting of a small amount of HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. a. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object? ow assume the HTML file references seven very small objects on the same server. eglecting transmission times, how much time elapses with b. on-persistent HTTP with no parallel TCP connections? c. on-persistent HTTP with the browser configured for 5 parallel connections? d. Persistent HTTP? RTT a. The total amount of time to get the IP address is 1 + RTT2 +! + RTT n. Once the IP address is known, RTTO elapses to set up the TCP connection and another RTTO elapses to request and receive the small object. The total response time is 2RTT o + RTT1 + RTT2 +! + RTTn b. RTT 1 + +RTT n +2RTT O +7*2RTT O = 16* RTT O + RTT 1 + +RTT n. c. RTT 1 + +RTT n +2RTT O +2*2RTT O = 6* RTT O + RTT 1 + +RTT n. d. RTT 1 + +RTT n +2RTT O +RTT O = 3* RTT O + RTT 1 + +RTT n.. Problem 2: (20 Points) Consider the scenario shown in Figure 1 in which a server is connected to a router by a 100Mbps link with a 50ms propagation delay. Initially this router is also connected to two routers, each over a 25Mbps link with a 200ms propagation delay. A 1Gbps link connects a host and a cache (if present) to each of these routers and we assume that this link has 0 propagation delay. All packets in the network are 20,000 bits long.

2 Server 100 Mbps 50 ms 25 Mbps 200 ms 1 Gbps 0 ms Client Cache Figure 1 Client Cache a. What is the end- to- end delay from when a packet is transmitted by the server to when it is received by the client? In this case, we assume there are no caches, there s no queuing delay at the routers, and the packet processing delays at routers and nodes are all 0. b. Here we assume that client hosts send requests for files directly to the server (caches are not used or off in this case). What is the maximum rate at which the server can deliver data to a single client if we assume no other clients are making requests? c. Again we assume only one active client but in this case the caches are on and behave like HTTP caches. A client s HTTP GET is always first directed to its local cache. 60% of the requests can be satisfied by the local cache. What is the average rate at which the client can receive data in this case? d. What is the average end- to- end delay for the case that 60% of the requests can be satisfied by the local cache? a. Answer: If all packets are 20,000 bits long it takes 200 usec to send the packet over the 100Mbps link, 800 usec to send over the 25Mbps link, and 20 usec to send over the 1Gbps link. Sum of the three- link transmission is 1020 usec. Thus, the total end- to- end delay is 251.02 msec. b. Answer: Server can send at the max of the bottleneck link: 25Mbps. c. Answer: We assume that requests are serially satisfied. 40% of the requests can be delivered at 25Mbps and 60% at 1Gbps. So the average rate is 610Mbps. d. Answer: 40% of the requests have a delay of 251.02 msec and 60% of the requests have a delay of 20 usec. So the average delay is (150.61 + 12) 162.61 msec.

3 Problem 3: (15 Points) In this problem, we use the useful dig tool available on Unix and Linux hosts to explore the hierarchy of DS servers. Recall that in slide 67 in Chapter 2, a DS server higher in the DS hierarchy delegates a DS query to a DS server lower in the hierarchy, by sending back to the DS client the name of that lower- level DS server. First read the man page for dig (e.g., http://linux.die.net/man/1/dig), and then answer the following questions. a. Starting with a root DS server (from one of the root servers [a- m].root- servers.net], initiate a sequence of queries for the IP address for your department s Web server (www.ecs.umass.edu) by using dig. Show the list of the names of DS servers in the delegation chain in answering your query. b. Repeat part a) for several popular Web sites, such as google.com, yahoo.com, or amazon.com. Back up your answers with screen shots that show the results of your dig queries. a) The following delegation chain is used for gaia.cs.umass.edu a.root- servers.net E.GTLD- SERVERS.ET ns1.umass.edu(authoritative) First command: dig +norecurse @a.root- servers.net any gaia.cs.umass.edu ;; AUTHORITY SECTIO: edu. 172800 I S E.GTLD- SERVERS.ET. edu. 172800 I S A.GTLD- SERVERS.ET. edu. 172800 I S G3.STLD.COM. edu. 172800 I S D.GTLD- SERVERS.ET. edu. 172800 I S H3.STLD.COM. edu. 172800 I S L3.STLD.COM. edu. 172800 I S M3.STLD.COM. edu. 172800 I S C.GTLD- SERVERS.ET. Among all returned edu DS servers, we send a query to the first one. dig +norecurse @E.GTLD- SERVERS.ET any gaia.cs.umass.edu umass.edu. 172800 I S ns1.umass.edu. umass.edu. 172800 I S ns2.umass.edu. umass.edu. 172800 I S ns3.umass.edu. Among all three returned authoritative DS servers, we send a query to the first one.

4 dig +norecurse @ns1.umass.edu any gaia.cs.umass.edu gaia.cs.umass.edu. 21600 I A 128.119.245.12 b) The answer for google.com could be: a.root-servers.net E.GTLD-SERVERS.ET ns1.google.com(authoritative) Problem 4: (25 Points) Consider distributing a file of F = 25 Gbits to peers. The server has an upload rate of us = 30 Mbps, and each peer has a download rate of di = 2 Mbps and an upload rate of u. a. For = 10, 100, and 1,000 and u = 300 Kbps, 700 Kbps, and 2 Mbps, prepare a chart giving the minimum distribution time for each of the combination of and u for both client- server distribution and P2P distribution. Client Server: u 300 Kbps 700 Kbps 2 Mbps Peer- to- Peer: u 300 Kbps 700 Kbps 2 Mbps b. Assuming you could provide as many servers as you like, what would be the maximum number of servers you would need to reduce the client- server distribution time to its minimum for the cases of = 10, 100, and 1,000? What would the minimum distribution times be in this case?

5 a. For calculating the minimum distribution time for client-server distribution, we use the following formula: D cs = max {F/u s, F/d min } Where, F = 25 Gbits = 25 * 1024 Mbits = 25,600 Mbits u s = 30 Mbps d min = d i = 2 Mbps ote, 300Kbps = 300/1024 Mbps. Client Server 10 100 1000 300 12800 85333.33333 853333.3333 700 12800 85333.33333 853333.3333 2000 12800 85333.33333 853333.3333 Peer to Peer Similarly, for calculating the minimum distribution time for P2P distribution, we use the following formula: D P2P = max{f/u s, F/d min, F/(u s + i= 1 ui)} 10 100 1000 300 12800 43172.59552 79264.63474 700 86687.83069 87174.56616 87268.59322 2000 87278.23592 87278.81088 87278.92121 b. Problem 5: (10 Points) a. Suppose that Alice wants to send an email message to Bob. This will involve four entities: Alice s mail client (for email composition and sending), Alice s outgoing

6 mail server, Bob s incoming mail server, and Bob s mail client (for email retrieval and viewing). Between which of these four entities does the SMTP protocol operate? What about the IMAP protocol? b. How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain. a. Answer: SMTP runs between Alices mail client and her server, and also (separately) between her server and Bob s server. IMAP runs between Bob s server and his mail client to retrieve messages from Bob s server. b. SMTP uses a line containing only a period to mark the end of a message body. HTTP uses Content-Length header field to indicate the length of a message body. o, HTTP cannot use the method used by SMTP, because HTTP message could be binary data, whereas in SMTP, the message body must be in 7-bit ASCII format. Problem 6 (20 Points): Sliding Window Protocols a. Consider the sliding window protocol in Figure 2 to the right. Does this figure indicate that Go- Back- is being used, Selective Repeat is being used, or there is not enough information to tell? Explain your answer briefly. Figure 2 b. Consider the sliding window protocol in Figure 3. Does this figure indicate that Go- Back- is being used, Selective Repeat is being used, or there is not enough information to tell? Explain your answer briefly.. Figure 3 c. Consider Figure 3 again. Suppose the sender and receiver windows are of size = 5 and suppose the sequence number space goes from 0 to 15. Show the position of the sender and receiver windows over this sequence number space at time t (the horizontal dashed line). d. Suppose that it takes 1 ms to send a packet, with a 10 ms one- way propagation

7 delay between the sender and receiver. The sliding windows size is again = 4. What is the channel/link utilization? a. Answer: there is not enough information to tell, since both GB and SR will individually ACK each of the first two messages as they are received correctly. b. Answer: This must be the SR protocol since pkt 3 is acked even though pkt 2 was lost. GB uses cumulative ACKs and so would not generate an ACK 3 if pkt 2 was missing c. Answer: d. Answer: the utilization is 4/(1+20) or 0.19.