Solutions: Homework #12



Similar documents
Transport Layer Protocols

CS268 Exam Solutions. 1) End-to-End (20 pts)

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Computer Networks. Chapter 5 Transport Protocols

Final for ECE374 05/06/13 Solution!!

Computer Networks Homework 1

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

Per-Flow Queuing Allot's Approach to Bandwidth Management

Component 4: Introduction to Information and Computer Science

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

- Hubs vs. Switches vs. Routers -

Question: 3 When using Application Intelligence, Server Time may be defined as.

Multimedia Communications Voice over IP

Requirements of Voice in an IP Internetwork

Solving the Big Dilemma of Big Data

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

VOICE OVER IP AND NETWORK CONVERGENCE

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Visualizations and Correlations in Troubleshooting

Digital Audio and Video Data

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

The Impact of QoS Changes towards Network Performance

Access Control: Firewalls (1)

Encapsulating Voice in IP Packets

Protocols. Packets. What's in an IP packet

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

First Midterm for ECE374 03/24/11 Solution!!

[Prof. Rupesh G Vaishnav] Page 1

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Transport and Network Layer

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

What is Network Latency and Why Does It Matter?

Protocols and Architecture. Protocol Architecture.

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Advanced satellite infrastructures in future global Grid computing: network solutions to compensate delivery delay ISTI CNR

Network Simulation Traffic, Paths and Impairment

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Tutorial.

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

technology standards and protocol for ip telephony solutions

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Mobile Communications Chapter 9: Mobile Transport Layer

Frequently Asked Questions

Video Streaming Without Interruption

Unit 23. RTP, VoIP. Shyam Parekh

Internet Protocol: IP packet headers. vendredi 18 octobre 13

15-441: Computer Networks Homework 2 Solution

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Operating Systems and Networks Sample Solution 1

WAN Data Link Protocols

VoIP QoS. Version 1.0. September 4, AdvancedVoIP.com. Phone:

Configuring an efficient QoS Map

Improved Digital Media Delivery with Telestream HyperLaunch

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

28 Networks and Communication Protocols

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

TCP for Wireless Networks

Network Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Computer Networks - CS132/EECS148 - Spring

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

(Refer Slide Time: 01:46)

Computer Networks UDP and TCP

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Network Layer: Network Layer and IP Protocol

Introduction VOIP in an Network VOIP 3

Advanced Computer Networks Project 2: File Transfer Application

Introduction, Rate and Latency

IP-Telephony Real-Time & Multimedia Protocols

The Conversion Technology Experts. Quality of Service (QoS) in High-Priority Applications

Understanding Latency in IP Telephony

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC

Based on Computer Networking, 4 th Edition by Kurose and Ross

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Ethernet. Ethernet. Network Devices

Distributed Systems 3. Network Quality of Service (QoS)

Troubleshooting VoIP and Streaming Video Problems

Region 10 Videoconference Network (R10VN)

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Computer Networks CS321

Clearing the Way for VoIP

Chapter 5. Data Communication And Internet Technology

Data Link Layer. Flow Control. Flow Control

White paper. Latency in live network video surveillance

Transcription:

Solutions: Homework #12 (Compendium of student submissions) 11.13 a. Video on demand: packet latency: If the video is not live, low packet latency may not be a requirement. With sufficient buffering, video on demand can suffer a certain amount of latency without impacting the quality of the video. packet loss: The importance of packet loss to video depends on the packet size. If the packet size is small, in proportion to the amount of data used to reperesent each frame of the video, packet loss is not that big a deal. The video need only be a sufficiently convincing representation of the subject to satisfy the human eye. Limited data loss is acceptable. If the proportion of data in each packet is large however, packet loss may seriously detract from video quality. packet corruption: Packet corruption, like packet loss, is tolerable if the corruption is not substantial. If a few bits in a packet representing a video image are switched, the human eye is not likely to know the difference caused by such a small corruption.. b. Remote conferencing: packet latency: Packet latency is likely to be very detrimental to the experience of remote conferencing users. Propogation and system processing delays already create latency problems for this very latencysensitive application and further latency from network factors must be minimized. packet loss: The impact of packet loss on remote conferencing is likely to be the same as the impact on video (above). packet corruption: The impact of packet corruption on remote conferencing is likely to be the same as the impact on video (above). c. Email: packet latency: As long as the packets eventually arrive, packet latency is not an issue for email. This is a deferred style of communication and users understand and expect slight delays in the delivery of email. packet loss: Packet loss requires that packets be sent again for email messages. The text messages contained in email do not withstand data loss very well. The loss of even a couple of words or even characters can be detrimental to the value of email and should therefore be safeguarded against. packet corruption: For the same reasons that packet loss in email cannot be accepted, packet corruption is not tolerable. d. Chatroom: packet latency: A certain amount of latency in chat applications is acceptable. Still, the acceptable period of latency is probably less than thirty seconds and should average less than about five seconds. Within these approximate limits, packet latency is tolerable. packet loss: Packet loss requires that packets be sent again for chat messages. The written text which comprises chat discussions cannot withstand data loss very well. The loss of even a couple of words or even characters can be detrimental to the value of chat and should therefore be safeguarded against. packet corruption: For the same reasons that packet loss in chat cannot be accepted, packet corruption is not tolerable. e. Web: packet latency: Considering that most Web users wait a maximum of ten of fifteen seconds for a page to load before going on to something different, packet latency for web pages must be kept to a minimum. While some users will wait ten or fifteen seconds, many will not and speedy page loads give website visitors a good impression and experience. Therefore, latency on the web can be very bad.

packet loss: Web content (especially HTML) can be very sensitive to data loss. Pages may not load properly or be intelligible to users if packets are lost and not resent. Therefore, unchecked packet loss is not acceptable. packet corruption: As is true for packet loss, data corruption of web content, even if only very small, can destroy the communication or impair it as to be unusable. Packet corruption is not acceptable on the Web. 11.14 Clothing sales Stock trading Music playback on demand Application QoS Completion time Not so important The price is fixed and the duration of goods relatively long until sold out. Very important The price fluctuates very frequently. The purchase or selling order handled immediatel y. Not important The music file can be deferred. To reduce artifacts in music is more important. Network QoS Throughput Latency Loss Corruption Important It should be able to deal with number of simultaneo us orders from multiple consumers. Very important Large number of orders handled simultaneo usly. Very Important Multiple users able to log on the service simultaneo usly. Tolerable The price and orders would not fluctuate or change during the latency. for accepting the purchase or selling orders. Tolerable for delivering the transaction confirmatio n to customers. Tolerable The service need not be immediate. The content delivered in its integrity. The content delivered in its integrity. to prevent the interruption of the music. Not only the content but also the securityrelated message can be affected. Not only the content but also the security related message can be affected. to prevent noise on music. It can cause a critical distortion on the security-related information for order. 11.22 IIOP supports fully distibuted computing through the establishment of a single TCP connection between two Object-request Brokers (ORBs), with the features of message-with-reply services &

support for remote method invocation (RMI), thus enabling communication between ORBs in the course of distributed object management. Real-time Transport Protocol (RTP) and Real-time Streaming Protocol (RTSP) support real-time multimedia streaming. RTP provides basic support for real-time streaming and defines mixers and translators that can operate with the local network to adjust coding or penetrate firewalls. RTSP supports the applications ability to control multiple RTP sessions, thus enabling complex multimedia broadcasts over the network. Hypertext Transfer Protocol (HTTP). This is a request/response protocol that governs the interaction of a Web browser and a Web server. This protocol involves 4 steps: 1) user activates URL, 2) HHTP request sent to server, 3) HTTP reponse from server, and 4) browser displays document. 11.24 a. If a return acknowledgement message is lost by IP, the source can detect that failure by the absence of an ACK. After waiting in vain for the ACK for a period of time called the time-out, the source will retransmit the TCP packet, again using IP. In fact, the source will repeatedly retransmit the TCP packet until it eventually receives an ACK. The loss can result in increase latency. b. If the source cannot receive an acknowledge message for a packet, it retransmits the packet while transmitting normal packets. Mixing the retransmitted packet with normal packets causes irregular order in delivering TCP packets. c. The flaw can be solved by the use of a message with reply service, such as RMI. A message with reply service has implicit control, since the reply from the recipient provides an implicit acknowledgement that it is ready to receive another message. With this implicit acknowledgement, the source can send another packet to the recipient, even if the number of MaxUnackedPackets is zero. d. Yes. Reducing MaxUnackedPackets (via congestion detection) would reduce offered traffic and the size of queues in packet switches. This is flow control i.e., reducing throughput. 11.26 Feature Old TCP (TCP) New TCP (NTCP) Transport Protocol Data 1 9 Unit (TPDU) Connection collision 1 connection 2 connection Quality of Service Specific Options Open ended Important Data Expedited Urgent Explicit flow control Always Sometimes 1.NTCP uses nine different TPDU types whereas TCP only has one. This difference results in TCP being simpler, but it also needs a larger header, because all fields must be present in al TPDUs. The minimum size of the TCP header is 20 bytes; the minimum size of the NTCP header is 5 bytes.

2.A second difference regards what happens if two processes simultaneously attempt to set up connections between the same two TSAPs (i.e., a connection collusion). With NTCP, two independent, full-duplex connections are established. With TCP, a connection is identified by a pair of TSAPs, so only one connections is established. 3. The issues of quality of service is also handled differently in the two protocols. NTCP has a rather elaborate and open-ended mechanism for a three-way negotiation of the quality of service. This negotiation involves the calling process, the called process, and the transport service itself. Many parameters can be specified, and both target and minimum acceptable values can be given. TCP, in contrast, does not have a quality of service field at all, but the underlying IP service has an 8-bit field that allows a choice to be made out of a limited combination of speed and reliability. 4.This concerns how important data that need special processing are dealt with. NTCP has two independent message streams, regular data and expedited data, multiplexed together. Only one expedited message may be outstanding at any instant. TCP uses the Urgent field to indicate that some number of bytes within the current TPDU are special and processed out of order. 5.TCP always uses an explicit flow control mechanism with the window size specified in each TPDU. NTCP can use a credit scheme, but it can also rely on the window scheme of the network layer to regulate the flow. There may be problems if the grant of a large window and its subsequent retraction arrive in the wrong order. In TCP there is no solution to this problem. In NTCP it is solved by the sequence number that is included in the retraction, thus allowing the sender to determine that the small window followed, rather than preceded, the large one. 11.29 a. The amount of space in a queue is limited. If a packet arrives at a host whose buffer is full, then the packet must be discarded. The larger the buffer, the longer queue is possible and fewer packets will be discarded. Similarly, faster processing of received packets and the consequent faster emptying of the buffer will also reduce the number of packets lost. b. When a packet is discarded because the queue has reached its maximum length, then that packet must be retransmitted. Each such retransmission artificially increases the traffic offered to the system. c. The queue size affects the maximum latency of packets delivered during periods of congestion because latency is defined to include the time that the packets are waiting in a queue. As the length of the queue increases so does the message latency. d. If the queue is not sufficiently large to handle all packets, then some packets will be discarded and need to be re-transmitted. This is a situation to be avoided because it reduces the overall efficiency of the network and, as a result, creates a cascading effect of even further congestion. Packets received and stored in a queue do not need to be retransmitted. Message latency is reduced because network congestion is reduced. The message latency is still affected by the packets waiting in the queue for processing, however. 12.10 Bitrate = meters 1 bits bits megabits 2 x10^8 6.67x10^7 = 66.67 second 3 meters second second

12.11 a. Problem Areas Possible Problems Solutions Computer The computer hardware and software are slow and can not read or send at speeds acceptable to the Modem and ISP There are several possible solutions: 1. Upgrade the software which will optimize your connection speeds 2. Control the number of applications being run on the machine. An increase in the number of processes will decrease the total time allocated for each time slice. Thus, on slow processors the send/receive process will receive Modem Internet Service Provider ISP (phone) Distance to service provider Protocol used with service provider The modem is sending and receiving data too slow. There are several possible problems: The ISP s software is slow to reply to your requests due to congestion The ISP does not have enough modems due to the number of calls The propagation delay of the signal is a hard upper limit regardless of the protocol The connection to the ISP may be slow such as phone. Upgrading to Cable/DSL or Fiber Optics will speed up the connection. Also, the protocol used with each of these connection types will determine the speed. relatively few CPU cycles. Upgrade the modem. This is not a complete solution since Modems have a relatively low bandwidth upper limit of 56 KBPS Change service providers or pay more to the current service provider to guarantee a better connection Move closer to the ISP Upgrading could cause significant price increases and introduce large setup costs laying new wires. b.

Problem Areas Internet Remote site Unreasonable expectations Possible Problems Internet in general is congested Remote requested website can not handle the number of requests is receives or it is using slow technology. Technology can only go so fast. You might have to readjust expectations since there are hard limits to this communication. c. Without spending money Try the communication at different times of the day. If the speed remains the same then it is most likely your problem since speed problems outside your control are usually intermittent and dependant on the time of day. Try the communication on a machine with a supposedly faster connection (like from SIMS). If the communication is relatively the same then it is most likely the remote webserver. Spending money Upgrade the modem. If this does not fix the problem you can always return it! Try a different service provider. Buy a new computer 12.13 Bitrate (bits/sec) Delay (sec) Bitrate delay product Msg size (bits) Limited by Comments a) 2.88E+04 4.00E-02 1.15E+03 8.00E+03 bitrate because message is greater than the bitrate-delay product b) 2.88E+04 4.00E-02 1.15E+03 3.20E+02 propagation delay because message is smaller than the bitrate-delay product c) 4.50E+07 1.00E-02 4.50E+05 7.20E+06 bitrate same as a) d) 4.50E+07 1.00E-02 4.50E+05 1.12E+07 bitrate same as a)