SlideShare a Scribd company logo
1 of 2
Download to read offline
EE 333, Communication Networks
Final Exam (2014-15S)
Maximum Marks = 50 Time = 3 hours
1. In the system shown, S transmits on a wireless link.
Therefore, a packet transmitted by S may be received
by both A and B simultaneously. The links A-D and B-
D are wired links. The probability of successful packet
reception for each link is as shown. Assume β1> β2 and
α1= α2= α and that these values are known to A.
Assume that ACKs are error free and the overhead
associated with ACKs can be neglected.
Our measure of system performance N* is the mean of the total number of times a packet has to be
transmitted overall (i.e. by S and by A and/or B) for it to successfully reach D. The following transmission
strategy is used - “S retransmits the packet if it is not received by either A or B. If only one (out of A and
B) receives it then that node is required to forward it to D. If the packet is received by both A and B, then
S selects one of them randomly (equally likely choice) to forward the packet to D.”
(a) Find N* when the above transmission strategy is used. [3]
(b) Consider a modified system, where if both (A and B) receive the packet, then S chooses the one which
would be a better forwarder and asks it to forward the packet to D. Find N* for this. [3]
(c) Consider another modified version of the original system where if both (A and B) receive the packet,
they both transmit to D until the packet is correctly received by the destination. Find N* for this system.
(Hint: Think back to Problem 1 of Quiz-1 to derive the additional result of how many times A and B will
transmit if both have the packet and both transmit.) [4]
2. Consider a single server queue with an infinite buffer where the service times are exponentially
distributed with mean 1/µ. Arrivals to this queue come in batches where each batch always has two
customers and the batches themselves come from a Poisson process with rate λ. Define the system
state as the number in the system. Use ρ=λ/µ for notational purposes.
(a) Draw the state transition diagram [2]
(b) Write the balance equations. [2]
(It would be useful to rewrite them once more in terms of ρ, for later use.)
(c) Find p0 directly from the set of balance equations (infinite set) and the normalization condition.
(Hint: You do not need to find the individual state probabilities explicitly for doing this.) [3]
(d) Use the balance equations to find the generating function P(z) of the system state defined as
0
( ) k
k
k
P z p z


  . Confirm the result of (c) by using 1
( ) 1z
P z 
 [4]
[Hint: Do this by multiplying the kth
equation by zk
, summing both sides for k=1,…,∞ and using
0
1
( ) k
k
k
P z p p z


   ]
(e) Find the Mean Number in the System, N, using P(z) [2]
(f) What is the Mean Time Spent in System, W, by a customer? [2]
3. (a) Apply Dijkstra’s Algorithm to the network
shown to find the least cost paths from Node A to all
the other nodes of the network. Show all the steps of
the procedure in detail (cost and path at each step)
and draw the corresponding tree from Node A to the
other nodes of the network. Give the forwarding
table that Node A will finally use to send packets to
the other nodes. [4+2+2]
(b) If Node A wants to multicast to all the other
nodes, what would be the cost of doing this using the
router set up of (a)? [1]
(c) After finding the shortest path from the source (say Node X) to a selected destination (say Node Y),
you want to provide a back-up path which can be used if the any of the links in the shortest path fail.
How would you obtain the best back-up path for achieving this? [1]
4. Give brief answers to each of the following. [1.5x10]
(Remember it is the “quality” rather than the “quantity” which counts. Avoid long-winded answers as
marks will only be given for writing just the key points. 1.5 marks will be given for writing the correct
answer. No part marks will be given!)
(a) Why is Fragmentation and Reassembly incorporated in IPv4?
(b) In IPv4, even though intermediate routers can do fragmentation, reassembly is only done at the
destination. Why?
(c) Why is a NAT useful in configuring an organization’s network?
(d) A NAT violates the principle that the network layers should be kept separate from each other. Why?
(e) What is the “Silly Window Syndrome”?
(f) What is “Slow Start” in TCP?
(g) Why does TCP’s Three-Way Handshake for connection setup make the destination node vulnerable
to a Denial of Service (DOS) attack?
(h) Graceful termination of a TCP connection requires both sides to terminate separately. Why?
(i) What problem does the Nagle Algorithm try to tackle?
(j) TCP’s congestion control mechanism makes a distinction between a “time out” event and the event
of receiving three duplicate ACKs. Why?

More Related Content

What's hot

PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMIJCNCJournal
 
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
TWO STAGE NETWORKS
TWO STAGE NETWORKSTWO STAGE NETWORKS
TWO STAGE NETWORKSAakankshaR
 
Wondimu mobility increases_capacity
Wondimu mobility increases_capacityWondimu mobility increases_capacity
Wondimu mobility increases_capacityWondimu K. Zegeye
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
 
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...ijwmn
 
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...butest
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmfarimoin
 
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONREDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONcsandit
 
Data and computer communication exam lll
Data and computer communication exam lllData and computer communication exam lll
Data and computer communication exam lllAndrew Ibrahim
 

What's hot (20)

PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
 
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
TWO STAGE NETWORKS
TWO STAGE NETWORKSTWO STAGE NETWORKS
TWO STAGE NETWORKS
 
Wondimu mobility increases_capacity
Wondimu mobility increases_capacityWondimu mobility increases_capacity
Wondimu mobility increases_capacity
 
Data miningpresentation
Data miningpresentationData miningpresentation
Data miningpresentation
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
 
Chap9 slides
Chap9 slidesChap9 slides
Chap9 slides
 
ECE 565 FInal Project
ECE 565 FInal ProjectECE 565 FInal Project
ECE 565 FInal Project
 
Birch1
Birch1Birch1
Birch1
 
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
 
Deep Learning for Computer Vision: Software Frameworks (UPC 2016)
Deep Learning for Computer Vision: Software Frameworks (UPC 2016)Deep Learning for Computer Vision: Software Frameworks (UPC 2016)
Deep Learning for Computer Vision: Software Frameworks (UPC 2016)
 
Birch
BirchBirch
Birch
 
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Chap11 slides
Chap11 slidesChap11 slides
Chap11 slides
 
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONREDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
 
Chap4 slides
Chap4 slidesChap4 slides
Chap4 slides
 
Data and computer communication exam lll
Data and computer communication exam lllData and computer communication exam lll
Data and computer communication exam lll
 
Chap3 slides
Chap3 slidesChap3 slides
Chap3 slides
 

Similar to End sem

4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
ECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docxECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docxtidwellveronique
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemCSCJournals
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlationijdpsjournal
 
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...ijdpsjournal
 
Parallel Computing 2007: Bring your own parallel application
Parallel Computing 2007: Bring your own parallel applicationParallel Computing 2007: Bring your own parallel application
Parallel Computing 2007: Bring your own parallel applicationGeoffrey Fox
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptxhariprasad279825
 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionIJCNCJournal
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayCSCJournals
 

Similar to End sem (20)

Mid term
Mid termMid term
Mid term
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Computer Networking Assignment Help
Computer Networking Assignment HelpComputer Networking Assignment Help
Computer Networking Assignment Help
 
ECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docxECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docx
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
 
Notes
NotesNotes
Notes
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
 
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Parallel Computing 2007: Bring your own parallel application
Parallel Computing 2007: Bring your own parallel applicationParallel Computing 2007: Bring your own parallel application
Parallel Computing 2007: Bring your own parallel application
 
Cnetwork
CnetworkCnetwork
Cnetwork
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptx
 
Lecture 06 - Chapter 4 - Communications in Networks
Lecture 06 - Chapter 4 - Communications in NetworksLecture 06 - Chapter 4 - Communications in Networks
Lecture 06 - Chapter 4 - Communications in Networks
 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistribution
 
routing algo n
routing algo                                nrouting algo                                n
routing algo n
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
 
2nd Semester M Tech: Structural Engineering (June-2015) Question Papers
2nd  Semester M Tech: Structural Engineering  (June-2015) Question Papers2nd  Semester M Tech: Structural Engineering  (June-2015) Question Papers
2nd Semester M Tech: Structural Engineering (June-2015) Question Papers
 

More from Gopi Saiteja

More from Gopi Saiteja (20)

Trees gt(1)
Trees gt(1)Trees gt(1)
Trees gt(1)
 
Topic11 sortingandsearching
Topic11 sortingandsearchingTopic11 sortingandsearching
Topic11 sortingandsearching
 
Heapsort
HeapsortHeapsort
Heapsort
 
Hashing gt1
Hashing gt1Hashing gt1
Hashing gt1
 
Ee693 sept2014quizgt2
Ee693 sept2014quizgt2Ee693 sept2014quizgt2
Ee693 sept2014quizgt2
 
Ee693 sept2014quizgt1
Ee693 sept2014quizgt1Ee693 sept2014quizgt1
Ee693 sept2014quizgt1
 
Ee693 sept2014quiz1
Ee693 sept2014quiz1Ee693 sept2014quiz1
Ee693 sept2014quiz1
 
Ee693 sept2014midsem
Ee693 sept2014midsemEe693 sept2014midsem
Ee693 sept2014midsem
 
Ee693 questionshomework
Ee693 questionshomeworkEe693 questionshomework
Ee693 questionshomework
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Cs105 l15-bucket radix
Cs105 l15-bucket radixCs105 l15-bucket radix
Cs105 l15-bucket radix
 
Chapter11 sorting algorithmsefficiency
Chapter11 sorting algorithmsefficiencyChapter11 sorting algorithmsefficiency
Chapter11 sorting algorithmsefficiency
 
Answers withexplanations
Answers withexplanationsAnswers withexplanations
Answers withexplanations
 
Sorting
SortingSorting
Sorting
 
Solution(1)
Solution(1)Solution(1)
Solution(1)
 
Pthread
PthreadPthread
Pthread
 
Open mp
Open mpOpen mp
Open mp
 
Introduction
IntroductionIntroduction
Introduction
 
Cuda
CudaCuda
Cuda
 
Vector space interpretation_of_random_variables
Vector space interpretation_of_random_variablesVector space interpretation_of_random_variables
Vector space interpretation_of_random_variables
 

End sem

  • 1. EE 333, Communication Networks Final Exam (2014-15S) Maximum Marks = 50 Time = 3 hours 1. In the system shown, S transmits on a wireless link. Therefore, a packet transmitted by S may be received by both A and B simultaneously. The links A-D and B- D are wired links. The probability of successful packet reception for each link is as shown. Assume β1> β2 and α1= α2= α and that these values are known to A. Assume that ACKs are error free and the overhead associated with ACKs can be neglected. Our measure of system performance N* is the mean of the total number of times a packet has to be transmitted overall (i.e. by S and by A and/or B) for it to successfully reach D. The following transmission strategy is used - “S retransmits the packet if it is not received by either A or B. If only one (out of A and B) receives it then that node is required to forward it to D. If the packet is received by both A and B, then S selects one of them randomly (equally likely choice) to forward the packet to D.” (a) Find N* when the above transmission strategy is used. [3] (b) Consider a modified system, where if both (A and B) receive the packet, then S chooses the one which would be a better forwarder and asks it to forward the packet to D. Find N* for this. [3] (c) Consider another modified version of the original system where if both (A and B) receive the packet, they both transmit to D until the packet is correctly received by the destination. Find N* for this system. (Hint: Think back to Problem 1 of Quiz-1 to derive the additional result of how many times A and B will transmit if both have the packet and both transmit.) [4] 2. Consider a single server queue with an infinite buffer where the service times are exponentially distributed with mean 1/µ. Arrivals to this queue come in batches where each batch always has two customers and the batches themselves come from a Poisson process with rate λ. Define the system state as the number in the system. Use ρ=λ/µ for notational purposes. (a) Draw the state transition diagram [2] (b) Write the balance equations. [2] (It would be useful to rewrite them once more in terms of ρ, for later use.) (c) Find p0 directly from the set of balance equations (infinite set) and the normalization condition. (Hint: You do not need to find the individual state probabilities explicitly for doing this.) [3] (d) Use the balance equations to find the generating function P(z) of the system state defined as 0 ( ) k k k P z p z     . Confirm the result of (c) by using 1 ( ) 1z P z   [4] [Hint: Do this by multiplying the kth equation by zk , summing both sides for k=1,…,∞ and using 0 1 ( ) k k k P z p p z      ] (e) Find the Mean Number in the System, N, using P(z) [2] (f) What is the Mean Time Spent in System, W, by a customer? [2]
  • 2. 3. (a) Apply Dijkstra’s Algorithm to the network shown to find the least cost paths from Node A to all the other nodes of the network. Show all the steps of the procedure in detail (cost and path at each step) and draw the corresponding tree from Node A to the other nodes of the network. Give the forwarding table that Node A will finally use to send packets to the other nodes. [4+2+2] (b) If Node A wants to multicast to all the other nodes, what would be the cost of doing this using the router set up of (a)? [1] (c) After finding the shortest path from the source (say Node X) to a selected destination (say Node Y), you want to provide a back-up path which can be used if the any of the links in the shortest path fail. How would you obtain the best back-up path for achieving this? [1] 4. Give brief answers to each of the following. [1.5x10] (Remember it is the “quality” rather than the “quantity” which counts. Avoid long-winded answers as marks will only be given for writing just the key points. 1.5 marks will be given for writing the correct answer. No part marks will be given!) (a) Why is Fragmentation and Reassembly incorporated in IPv4? (b) In IPv4, even though intermediate routers can do fragmentation, reassembly is only done at the destination. Why? (c) Why is a NAT useful in configuring an organization’s network? (d) A NAT violates the principle that the network layers should be kept separate from each other. Why? (e) What is the “Silly Window Syndrome”? (f) What is “Slow Start” in TCP? (g) Why does TCP’s Three-Way Handshake for connection setup make the destination node vulnerable to a Denial of Service (DOS) attack? (h) Graceful termination of a TCP connection requires both sides to terminate separately. Why? (i) What problem does the Nagle Algorithm try to tackle? (j) TCP’s congestion control mechanism makes a distinction between a “time out” event and the event of receiving three duplicate ACKs. Why?