SlideShare a Scribd company logo
1 of 2
Download to read offline
Computer Network
Assignment 2

Submission Deadline : Sunday, Nov 13 Mid Night

Q1. Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then Timeout for the
connection will necessarily be set to a value >= 1 sec.

Q2. Write down the equation to calculate EstimateRTT?

Q3. For congestion control in TCP, if a timer expires, would timer value be set to one half of its
previous value? (We didn't discuss this in the class. I want you to find out the answer of this
quesiton. For reference, refer to the following book written by Douglas E. Comer, Internetworking
with TCP/IP Vol.1 4th edition, page no. 226, topic name is Timeout and Retransmission. I know
there have few copies of this book in the library)

Q4. Recall the lecture on Sequence Number in TCP Protocol? Is it represent the byte-numbered
position relative to the start of the file or the first byte of segment?

Q5. How does TCP Reno respond for a loss event detected by triple duplicate ACK
(a) cuts its congestion window to 1 Maximum Segment Size (MSS).
(b) goes to fast recovery phase.
(c) goes to slow-start phase.
(d) Both (a) and (c).

Q6. To calculate the timeout interval in TCP, which parameter(s) is/are used?
(a) Sample Round Trip Time (RTT).
(b) RTT Estimate.
(c) Average congestion window size.
(d) Both (a) and (b).

Q7. Host A wants to send a file to host B as fast as possible (as less delay as possible). Which
transport protocol is recommended?
(a) TCP.
(b) UDP.
(c) FTP.
(d) HTTP.

Q8. Which of the following is true for FTP in-context of Transport Layer.
(a) FTP usually uses more bandwidth than HTTP or SMTP.
(b) FTP uses two UDP connections simultaneously.
(c) FTP uses two TCP connections simultaneously.
(d) Both (a) and (b).
(e) Both (a) and (c).

Q9. What information, from the following, does a process running on Host A need to identify
another process running on Host B.
(a) The data rate between Host A and Host B in bits/sec.
(b) IP address of Host B.
(c) Port number of Host B.
(d) Both (b) and (c).
(e) All of the above.

Q10. Why is circuit-switched network superior to packet-switched network?
(a) It can support wireless connections.
(b) It can be implemented over fiber-optic link.
(c) It can provide the same services with less overhead.
(d) It can guarantee a certain amount of end-to-end bandwidth.
(e) All of the above.
Q11. Among the following, what does TCP doesnt need to keep track of?
(a) Local port.
(b) Number of open connections.
(c) Sequence numbers.
(d) Congestion window size.

Q12. Consider 2 hosts A and B sepearted by l routers, Each router has transmission rate of
R bps, refer figure below




(Fig : Note that there are l (not one, but letter L) routers.).

We assume that the links are not congested and hence there are no queuing delays.
Host A has a file of size P bits to send. Host A divides the file into n segments, each segment of size
M bits, such that P = n * M. Host A then adds X bits, as header, to each segment and makes a packet
of size M+X bits.

For what value of M, is the delay of sending the file from A to B is minimum.

(Hint: You would require to use differentiation to calculate the minimum – recall differentiation
from calculus. Also recall how do you find minimum and maximum.)

Q12. Input the sequence numbner, acknowledgment number, and segment length entries in Table 1
for the following TCP connection illustration.




You can make the following assumptions:
   1.Receiver never timeouts.
   2.Sender starts transmission at time t1.
   3.Data flows in both direction i.e. The connection is full duplex.
   4.Acknowledgemnts are not delayed.

Q13. What would be the timout value, in Fig above, for the segment with the sequence number 140.

More Related Content

What's hot

CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
Raj Gupta
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
Abhishek Datta
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
Abdo sayed
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
Anthony-Claret Onwutalobi
 

What's hot (20)

Mid term
Mid termMid term
Mid term
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
Example problems
Example problemsExample problems
Example problems
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
 
performance evaluation of TCP varients in Mobile ad-hoc Network
performance evaluation of TCP varients in Mobile ad-hoc Networkperformance evaluation of TCP varients in Mobile ad-hoc Network
performance evaluation of TCP varients in Mobile ad-hoc Network
 
Chap4 slides
Chap4 slidesChap4 slides
Chap4 slides
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Week8 lec1-bscs1
Week8 lec1-bscs1Week8 lec1-bscs1
Week8 lec1-bscs1
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
 
Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Analysis of TCP variants
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Week8 lec2-bscs1
Week8 lec2-bscs1Week8 lec2-bscs1
Week8 lec2-bscs1
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
Lect9
Lect9Lect9
Lect9
 

Viewers also liked (11)

Guía de aplicación
Guía de aplicaciónGuía de aplicación
Guía de aplicación
 
08 22-12 lecture
08 22-12 lecture08 22-12 lecture
08 22-12 lecture
 
Slajd nr 14 i wow we
Slajd nr 14   i wow weSlajd nr 14   i wow we
Slajd nr 14 i wow we
 
Name
NameName
Name
 
Pagamento de salário da saúde
Pagamento de salário da saúdePagamento de salário da saúde
Pagamento de salário da saúde
 
NVMBR
NVMBRNVMBR
NVMBR
 
H enfoque-asep-del área de ciencias naturales
H enfoque-asep-del área de ciencias naturalesH enfoque-asep-del área de ciencias naturales
H enfoque-asep-del área de ciencias naturales
 
Privacy
PrivacyPrivacy
Privacy
 
منى مبارك القبيسي - البرنامج الانتخابي النهائي
منى مبارك القبيسي - البرنامج الانتخابي النهائيمنى مبارك القبيسي - البرنامج الانتخابي النهائي
منى مبارك القبيسي - البرنامج الانتخابي النهائي
 
The value of art
The value of artThe value of art
The value of art
 
Presentation of Gender in Fight Club Final (2)
Presentation of Gender in Fight Club Final (2)Presentation of Gender in Fight Club Final (2)
Presentation of Gender in Fight Club Final (2)
 

Similar to Assignment cn tl

Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)
NYversity
 
Lecture1, TCP/IP
Lecture1, TCP/IPLecture1, TCP/IP
Lecture1, TCP/IP
csyuhk
 

Similar to Assignment cn tl (20)

Computer Networking Assignment Help
Computer Networking Assignment HelpComputer Networking Assignment Help
Computer Networking Assignment Help
 
04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt
 
MK-PPT Chapter 5.ppt advanced computer networks
MK-PPT Chapter 5.ppt advanced computer networksMK-PPT Chapter 5.ppt advanced computer networks
MK-PPT Chapter 5.ppt advanced computer networks
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)
 
Cn mid feb 2014
Cn mid feb 2014Cn mid feb 2014
Cn mid feb 2014
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Computer Networking Assignment Help
Computer Networking Assignment HelpComputer Networking Assignment Help
Computer Networking Assignment Help
 
Transport layer
Transport layer   Transport layer
Transport layer
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Lecture1, TCP/IP
Lecture1, TCP/IPLecture1, TCP/IP
Lecture1, TCP/IP
 
Tcp periodic modeling
Tcp periodic modelingTcp periodic modeling
Tcp periodic modeling
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
KandR_TCP (1).ppt notes for congestion control
KandR_TCP (1).ppt    notes for congestion controlKandR_TCP (1).ppt    notes for congestion control
KandR_TCP (1).ppt notes for congestion control
 
Tcpip
TcpipTcpip
Tcpip
 
計概
計概計概
計概
 
What is tcp
What is tcpWhat is tcp
What is tcp
 
Mcseminar
McseminarMcseminar
Mcseminar
 

More from H K (20)

Assignment4
Assignment4Assignment4
Assignment4
 
Assignment3
Assignment3Assignment3
Assignment3
 
Induction
InductionInduction
Induction
 
Solution3
Solution3Solution3
Solution3
 
Solution2
Solution2Solution2
Solution2
 
Mid-
Mid-Mid-
Mid-
 
Assignment4
Assignment4Assignment4
Assignment4
 
Assignment4
Assignment4Assignment4
Assignment4
 
Dm assignment3
Dm assignment3Dm assignment3
Dm assignment3
 
Proof
ProofProof
Proof
 
Resolution
ResolutionResolution
Resolution
 
Assignment description
Assignment descriptionAssignment description
Assignment description
 
Dm assignment2
Dm assignment2Dm assignment2
Dm assignment2
 
Set
SetSet
Set
 
Dm assignment1
Dm assignment1Dm assignment1
Dm assignment1
 
Logic
LogicLogic
Logic
 
Introduction
IntroductionIntroduction
Introduction
 
Assignment 2 sol
Assignment 2 solAssignment 2 sol
Assignment 2 sol
 
Assignment sw solution
Assignment sw solutionAssignment sw solution
Assignment sw solution
 
Violinphoenix
ViolinphoenixViolinphoenix
Violinphoenix
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Assignment cn tl

  • 1. Computer Network Assignment 2 Submission Deadline : Sunday, Nov 13 Mid Night Q1. Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then Timeout for the connection will necessarily be set to a value >= 1 sec. Q2. Write down the equation to calculate EstimateRTT? Q3. For congestion control in TCP, if a timer expires, would timer value be set to one half of its previous value? (We didn't discuss this in the class. I want you to find out the answer of this quesiton. For reference, refer to the following book written by Douglas E. Comer, Internetworking with TCP/IP Vol.1 4th edition, page no. 226, topic name is Timeout and Retransmission. I know there have few copies of this book in the library) Q4. Recall the lecture on Sequence Number in TCP Protocol? Is it represent the byte-numbered position relative to the start of the file or the first byte of segment? Q5. How does TCP Reno respond for a loss event detected by triple duplicate ACK (a) cuts its congestion window to 1 Maximum Segment Size (MSS). (b) goes to fast recovery phase. (c) goes to slow-start phase. (d) Both (a) and (c). Q6. To calculate the timeout interval in TCP, which parameter(s) is/are used? (a) Sample Round Trip Time (RTT). (b) RTT Estimate. (c) Average congestion window size. (d) Both (a) and (b). Q7. Host A wants to send a file to host B as fast as possible (as less delay as possible). Which transport protocol is recommended? (a) TCP. (b) UDP. (c) FTP. (d) HTTP. Q8. Which of the following is true for FTP in-context of Transport Layer. (a) FTP usually uses more bandwidth than HTTP or SMTP. (b) FTP uses two UDP connections simultaneously. (c) FTP uses two TCP connections simultaneously. (d) Both (a) and (b). (e) Both (a) and (c). Q9. What information, from the following, does a process running on Host A need to identify another process running on Host B. (a) The data rate between Host A and Host B in bits/sec. (b) IP address of Host B. (c) Port number of Host B. (d) Both (b) and (c). (e) All of the above. Q10. Why is circuit-switched network superior to packet-switched network? (a) It can support wireless connections. (b) It can be implemented over fiber-optic link. (c) It can provide the same services with less overhead. (d) It can guarantee a certain amount of end-to-end bandwidth. (e) All of the above.
  • 2. Q11. Among the following, what does TCP doesnt need to keep track of? (a) Local port. (b) Number of open connections. (c) Sequence numbers. (d) Congestion window size. Q12. Consider 2 hosts A and B sepearted by l routers, Each router has transmission rate of R bps, refer figure below (Fig : Note that there are l (not one, but letter L) routers.). We assume that the links are not congested and hence there are no queuing delays. Host A has a file of size P bits to send. Host A divides the file into n segments, each segment of size M bits, such that P = n * M. Host A then adds X bits, as header, to each segment and makes a packet of size M+X bits. For what value of M, is the delay of sending the file from A to B is minimum. (Hint: You would require to use differentiation to calculate the minimum – recall differentiation from calculus. Also recall how do you find minimum and maximum.) Q12. Input the sequence numbner, acknowledgment number, and segment length entries in Table 1 for the following TCP connection illustration. You can make the following assumptions: 1.Receiver never timeouts. 2.Sender starts transmission at time t1. 3.Data flows in both direction i.e. The connection is full duplex. 4.Acknowledgemnts are not delayed. Q13. What would be the timout value, in Fig above, for the segment with the sequence number 140.