CSE331: Introduction to Networks and Security Homework 1 Fall 2006 Due: 29 Sept. 2006

Similar documents
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Computer Networks Homework 1

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Final for ECE374 05/06/13 Solution!!

Operating Systems and Networks Sample Solution 1

Homework Assignment #1 Solutions

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Transport Layer Protocols

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Network Troubleshooting

RTT 60.5 msec receiver window size: 32 KB

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter.

Introduction, Rate and Latency

GATE CS Topic wise Questions Computer Network

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

15-441: Computer Networks Homework 1

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Wide Area Network Latencies for a DIS/HLA Exercise

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

First Midterm for ECE374 02/25/15 Solution!!

CS268 Exam Solutions. 1) End-to-End (20 pts)

15-441: Computer Networks Homework 2 Solution

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

Exam 1 Review Questions

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Computer Networks. Data Link Layer

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Solutions to the Sample Questions on Introduction

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Queuing Theory. Long Term Averages. Assumptions. Interesting Values. Queuing Model

Introduction to Metropolitan Area Networks and Wide Area Networks

Level 2 Routing: LAN Bridges and Switches

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Routing in packet-switching networks

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

Chapter 6 Congestion Control and Resource Allocation

Internet structure: network of networks

- Hubs vs. Switches vs. Routers -

Based on Computer Networking, 4 th Edition by Kurose and Ross

TCP in Wireless Mobile Networks

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

First Midterm for ECE374 03/09/12 Solution!!

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Troubleshooting Tools

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Computer Networks - CS132/EECS148 - Spring

EECS 489 Winter 2010 Midterm Exam

Frequently Asked Questions

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Visualizations and Correlations in Troubleshooting

Computer Networks: LANs, WANs The Internet

Application Performance Analysis and Troubleshooting

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

CS551 End-to-End Internet Packet Dynamics [Paxson99b]

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Data Networks Summer 2007 Homework #3

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Architecture and Performance of the Internet

Introduction to LAN/WAN. Network Layer

IMPLEMENTING VOICE OVER IP

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

THE UNIVERSITY OF AUCKLAND

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

WAN Data Link Protocols

CSMA/CA. Information Networks p. 1

TCP Westwood for Wireless

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Performance Analysis of the IEEE Wireless LAN Standard 1

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

CS263: Wireless Communications and Sensor Networks

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

TCP Window Size for WWAN Jim Panian Qualcomm

Dynamic Source Routing in Ad Hoc Wireless Networks

Supporting VoIP in IEEE Distributed WLANs

Schedule 2e. Additional terms for Ethernet services

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

A SENSIBLE GUIDE TO LATENCY MANAGEMENT

LESSON Networking Fundamentals. Understand TCP/IP

Low-rate TCP-targeted Denial of Service Attack Defense

Transcription:

CSE331: Introduction to Networks and Security Homework 1 Fall 006 Due: 9 Sept. 006 What to turn in: Submit hardcopy answers to the questions below. Please include your name, e-mail address, and the number of hours you spent working on the assignment. 1. (0 points) Consider a point-to-point link km in length. At what bandwidth would propagation delay (at a speed of 10 8 m/sec) equal transmit delay for 100-byte packets? What about 51-byte packets? 100-byte packets: transmit = propagation = 800 b X b/sec 000 m 10 8 m/sec Setting the two ratios above to be equal, we have: Or, 80Mb/sec. 51-byte packets: transmit = propagation = 000 X = 1600 10 8 X = 0.8 10 8 4096 b X b/sec 000 m 10 8 m/sec Setting the two ratios above to be equal, we have: Or, 409.6MB/sec 000 X = 819 10 8 X = 4.096 10 8. (0 points) A S B Hosts A and B are each connected to a switch S via 10-Mbps links as shown above. The propagation delay on each link is 0µs. S is a store-and-forward device that can send and receive bits simultaneously; it begins retransmitting a received packet 35µs after it has finished receiving it (if it can). Calculate the total time in milliseconds required to transmit 1,000 bits from host A to host B 1

a. As a single packet. Each link contributes a time of 0µs + 1 10 3 bits/(10 10 6 bits/sec) = 0µs + 1 10 4 sec = 1. ms The total times is thus 1. ms + 0.035 ms =.475 ms b. As three 4,000 bit packets sent one right after the other. The two packets take less time. Note that a 4000 bit packet takes 4000 bits/(10 7 bits/sec) = 0.4ms to transmit (not including the propagation delay). 3. (0 points) Host A begins sending the first packet at time 0, and it begins arriving at host S at time 0.0ms. S finishes receiving the first packet at time 0.4msand begins retransmitting the first packet after 35µs, which is time 0.455ms. Host B begins receiving the first packet after 0µs (at time 0.475). Simultaneously, the second packet has been arriving at S. At time 0.8ms, host S finishes receiving the rest of the second packet, but can t yet retransmit it because it is still sending the first packet. S finishes sending the first packet at time 0.855 and starts transmitting the second packet. The third packet follows similarly, so the total time taken is 1.655 ms The utility program ping can be used to estimate the RTT to various Internet hosts. It is available on both Unix systems (/bin/ping) and Windows (c:/winnt/system3/ping). The Unix program traceroute (or the Windows equivalent tracert) can be used to find the sequence of routers through which a message is routed. Using ping and traceroute, estimate the RTT and number of hops to the following hosts. How well does RTT correlate with number of network hops? How well does the number of hops correlate with geographical distance? Test at least three additional hosts to support your claims. Note that your results may vary depending on the time of day and location of the host you use to run the experiment. (Why?) Answers were determined by running the experiment on blue.seas.upenn.edu. RTT does not necessarily correlate well with the number of hops consider a single hop over a long link versus a number of hops over a fast Ethernet link. The number of hops does not necessarily correlate well with the geographic proximity the number of hops from a node on Penn s campus to nodes in Philadelphia, California, and Japan range from 18 1. Time of day influences the answers because Internet traffic (i.e. congestion) may mean more delays and retransmissions there is more traffic during business hours. (People are awake and working or surfing!) To get full credit, you must have checked other likely candidates to test your hypothesis. a. eniac.cis.upenn.edu RTT is approx. 0 ms. # hops is approx. 1. b. www.upenn.edu RTT is approx. 3 ms. # hops is approx. 4.

c. www.merck.com (in New Jersey) RTT is approx. 95 ms. # hops is approx. 16. d. www.cam.ac.uk (in England) RTT is approx. 100 ms. # hops is approx. 19. e. www.kyoto-u.ac.jp (in Japan) RTT is approx. 30 ms. # hops is approx. 1. 4. (0 points) Suppose we want to transmit the message 1001 and protect it from errors using the CRC polynomial z 3 + 1. a. Use polynomial long division to determine the message that should be transmitted. Show your work. 1101 1001000 1011 1000 1100 1010 011 <--- Remainder Transmitted Message = 1001011 3

b. Suppose the first bit of the message is inverted due to noise on the transmission link. What is the result of the receiver s CRC calculation? Show your work. 01000001 0001011 0000 -- 001011 010 <-- Remainder 5. (0 points) Let A and B be two stations attempting to transmit on an Ethernet. Each has a steady queue of frames ready to send. A s frames are numbered A 1, A, and so on; B s frames are numbered similarly. Let T = 51.µs be the exponential backoff base unit. Suppose A and B simultaneously attempt to send frame 1, collide, and happen to choose backoff times of 0 T and 1 T, respectively, meaning A wins the race and transmits A 1 while B waits. At the end of this transmission, B will attempt to retransmit B 1 while A will attempt to transmit A. These attempts will collide, but now A backs off for either 0 T or 1 T, while B backs off for time equal to one of 0 T,..., 3 T. a. Give the probability that A wins this second backoff race immediately. For A to win immediately, it must choose to delay for 0 T seconds, which it does with probability 1. For B not to collide with this event, it must choose to wait for 1 T or longer, which it does with probability 3 4. Multiplying, we get a probability of 3 8 that A wins immediately. (Note that A can still win when it chooses 1 T if B chooses a time > 1 T. This will occur with probability 1 1 = 1 4. So, A will win with probability 3 8 + 1 4 = 5 8 ) b. Suppose A wins the second backoff race. A transmits A 3, and when it is finished, A and B collide again as A tries to transmit A 4 and B tries once more to transmit B 1. Give the probability that A wins this third backoff race immediately. As above, A must choose delay of 0 T, which it does with probability 1. B must choose a delay > 0 T, which it now does with probability 7 8, so the net probability that A wins immediately this time is 7 16. (Note that, as above, A still wins with probability 3 8 even if it chooses 1 T, so the total probability that it wins is 13 16.) c. Give a reasonable lower bound for the probability that A wins the remaining backoff races. In general, for the n th race, the probability that A wins round n is given by the formula: P [A wins n] = 1 (P [C n(b) > 0]) + 1 (P [C n(b) > 1]) 4

Where P [C n (B) > x] is the proability that B s n th backoff choics is greater than x. Since, for the n th race, B chooses a number > 0 with probability P [C n (B) > 0] = n 1 and a n number > 1 with probability P [C n (B) > 1] = n. We have that A will win the n th race n with probability: P [A wins n] = 1 1 (n n ) + 1 (n n ) = n 1 n+1 + n n+1 = n+1 3 n+1 (We can see that the first two answers follow this general case for n = and n = 3.) To get an exact lower bound on A winning the remaining rounds, we would need to calculate: P [A wins 4] P [A wins 5]... P [A wins 9] (P [A wins 10] 7 ) The reason why the last term is (P [A wins 10] 7 is that Ethernet implementations typically try for 16 total rounds, but put a limit of 10 T on the time their willing to wait. One could calculate this number exactly, but it suffices to observe that each term in this sequence is getting slightly larger, so to calculate a reasonable lower bound, we could just take P [A wins 4] 13, which yields a lower bound probability of approximately 0.8. A better estimate is P [A wins 4] P [A wins 5] 1 0.51. An even better estimate is P [A wins 4] P [A wins 5] P [A wins 6] 11 0.67, etc. The exact calculation is: 9 3 61 64 15 18 53 56 509 51 101 104 (045 048 )7 0.8 d. What happens to frame B 1? (This is known as the Ethernet capture effect.) B 1 never gets delivered with probability 0.8. A has captured the link, and B is unlikely to win any of the backoff races. 5