COMP2190 - Net Centric Computing - Chapter 3

Ace your homework & exams now with Quizwiz!

Assuming that the congestion window size, cwnd, has not yet reached Wmax, TCP CUBIC will ...

... always have a window size, cwnd, and hence a sending rate, higher than that of AIMD (assuming a given window size, Wmax, at which loss would occur). ... increase its sending rate faster than AIMD when cwnd is far away from Wmax, but increase slower than AIMD when cwnd is closer to Wmax

Which services does UDP provide?

1. A message abstraction, that preserves boundaries between message data sent in different socket send calls at the sender.

Which services does TCP provide?

1. In-order data delivery 2. A congestion control service to ensure that multiple senders do not overload network links. 3. A flow-control service that ensures that a sender will not send at such a high rate so as to overflow receiving host buffers. 4. A byte stream abstraction, that does not preserve boundaries between message data sent in different socket send calls at the sender. 5. Reliable data delivery.

Which of the fields below are in a UDP segment header?

1. Source port number. 2. Destination port number. 3. Length of UDP header + paload. 4. Internet checksum.

What are some reasons for discarding received-but-out-of-sequence packets at the receiver in GBN?

1. The implementation at the receiver is simpler. 2. The sender will resend that packet in any case.

What is meant by transport-layer multiplexing?

Taking data from one socket (one of possibly many sockets), encapsulating a data chuck with header information - thereby creating a transport layer segment - and eventually passing this segment to the network layer.

Why aren't "out-of-order" packets which are already ack'ed by the receiver delivered to the host yet?

There is a packet with a lower sequence number than any of the packets that has yet to be received, so in-order delivery of data in the packets up to the application layer is not possible.

True or False: It is possible for two UDP segments to be sent from the same socket with source port 5723 at a server to two different clients.

True.

Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip propagation delay is 10 ms. What is the maximum channel utilization of a stop-and-wait protocol for this channel?

d(transmission) = 10,000/10,000,000 = 0.001s d(prop) = 0.01s 0.001/0.01 = 0.1

Formula for Estimated RTT:

EstimatedRTTn = (1- a)*EstimatedRTTn-1 + a*SampleRTTn

True or False: When computing the Internet checksum for two numbers, a single flipped bit in each of the two numbers will always result in a changed checksum.

False.

Compute the Internet checksum value for these two 16-bit words: 11110101 11010011 and 10110011 01000100

01010110 11100111 (Carry over the extra 1 back to the first bit and then flip the 1's and 0's)

What are advantages of the streams concept in QUIC?

1. Since each stream has its own error control, if one stream experiences an error (e.g., lost or damaged segment), the other streams are unaffected. 2. Streams allow concurrent retrieval of web objects, while avoiding Head of the Line (HOL) blocking.

Over what set of bytes is the checksum field in the UDP header computed over?

The entire UDP segment, except the checksum field itself, and the IP sender and receive address fields.

Where is transport-layer functionality primarily implemented?

Transport layer functions are implemented primarily at the hosts at the "edge" of the network.

Suppose that a TCP sender is sending segments with 100 bytes of payload. The TCP sender sends five segments with sequence numbers 100, 200, 300, 400, and 500. Suppose that the segment with sequence number 300 is lost. The TCP receiver will buffer correctly-received but not-yet-in-order segments for later delivery to the application layer (once missing segments are later received). 1. After receiving segment 100, the receiver responds with an ACK with value: 2. After receiving segment 200, the receiver responds with an ACK with value: 3. After receiving segment 500, the receiver responds with an ACK with value: 4. After receiving the retransmitted segment 300, the receiver responds with an ACK with value: 5. The TCP receiver does not respond in the example, with an ACK with value:

1. 200 2. 300 3. 300, a duplicate ACK 4. 600 5. 400

What actions are used in network-assisted congestion control (say versus end-end congestion control) to signal congestion?

1. A router marks a field in the datagram header at a congested router. 2. A router sends an ICMP message to a host telling it to slow down its sending rate.

What actions are associated with end-end congestion control (say versus network-assisted congestion control)?

1. A sender decreases its sending rate in response to packet loss detected via its transport-layer ACKing. 2. A router drops a packet at a congested router, which causes the transport-layer sender to infer that there is congestion due to the missing ACK for the lost packet. 3. A datagram experiences delay at a congested network router, which is then measured by the sender and used to decrease the sending rate. 4. The transport-layer sender decreases its sending rate in response to a measured increase in the RTT.

What are advantages of implementing transport-layer functionality in QUIC at the application layer?

1. As an application-layer protocol, QUIC can be updated/modified at "app frequency" rather than at the frequency of operating system updates. 2. QUIC can establish all connection parameters (security, reliability, flow and congestion control)in just one handshake rather than separately in two.

Match a congestion control approach to how the sender detects congestion: 1. The sender infers segment loss from the absence of an ACK from the receiver. 2. Bits are set at a congested router in a sender-to-receiver datagram, and bits are in the returned to the sender in a receiver-to sender ACK, to indicate congestion to the sender. 3. The sender measures RTTs and uses the current RTT measurement to infer the level of congestion.

1. End-end 2. Network-assisted 3. Delay-based

What are some reasons for not discarding received-but- out-of-sequence packets at the receiver in GBN?

1. Even though that packet will be retransmitted, its next retransmission could be corrupted, so don't discard a perfectly well-received packet, silly!

Which of the following statements about TCP's Additive-increase-multiplicative-decrease (AIMD) algorithm are true? 1. AIMD is a network-assisted approach to congestion control. 2. AIMD cuts the congestion window size,cwnd, i to 1 whenever a timeout occurs. 3. AIMD uses the measured RTT delay to detect congestion. 4. AIMD cuts the congestion window size, cwnd, in half whenever loss is detected by a triple duplicate ACK. 5. AIMD uses observed packet loss to detect congestion. 6. AIMD always cuts the congestion window size, cwnd, in half whenever loss is detected. 7. AIMD is a end-end approach to congestion control.

1. False. 2. True. 3. False. 4. True. 5. False. 6. False. 7. True.

Consider the purposes/goals/use of different reliable data transfer protocol mechanisms. For the given purpose/goal/use match it to the RDT mechanism that is used to implement the given purpose/goal/use. 1. Lets the sender know that a packet was NOT received correctly at the receiver. 2. Used by sender or receiver to detect bits flipped during a packet's transmission. 3. Allows for duplicate detection at receiver. 4. Lets the sender know that a packet was received correctly at the receiver. 5. Allows the receiver to eventually receive a packet that was corrupted or lost in an earlier transmission.

1. NAK 2. Checksum 3. Sequence numbers 4. ACK 5. Retransmission

Match the description of a TCP connection management message with the name of the message used to accomplish that function. 1. A message from client to server initiating a connection request. 2. A message from server to client ACKing receipt of a SYN message and indicating the willingness of the server to establish a TCP connection with the client. 3. A message indicating that the sending side is initiating the protocol to terminate a connection. 4. A message sent in response to a request to terminate a connection, ACKing that the side receiving this message is also willing to terminate the connection 5. A general purpose error message used during connection set up or tear down to let the other side know that an error has occurred, and that the referenced connection should be shut down.

1. SYN mesage 2. SYNACK message 3. FIN message 4. FINACK message 5. RESET message

Match the following functions to their respective fields in TCP segments: 1. This field contains the port number associated with the sending socket for this TCP segment. 2. This field contains application data that was written into a socket by the sender of this TCP segment. 3. This field contains the index in the sender-to-receiver byte stream of the first byte of that data in the payload carried in this segment. 4. This field contains the index in the byte stream of the next in-order byte expected at the receiver 5. If set, this segment cumulatively ACKs all data bytes up to, but not including, the byte index in the ACK value field of this segment. 6. This field contains the number of available bytes in the TCP receiver's buffer. 7. This field contains the Internet checksum of the TCP segment and selected fields in the IP datagram header. 8. This field contains the number of bytes in the TCP header.

1. Source port number. 2. Data (or payload). 3. Sequence number 4. ACK number field 5. ACK bit 6. Receiver advertised window 7. Checksum 8. Header length field

For delay-based congestion control, match the sender action to the relationship of the currently measured throughput to the value of cwnd/RTTmin: 1. The currently measured throughput is greater than cwnd/RTTmin 2. The currently measured throughput is equal to or a bit less than than cwnd/RTTmin 3. The currently measured throughput is much less that than cwnd/RTTmin

1. This should never happen. 2. Increase the sending rate. 3. Decrease the sending rate.

Which of the following statements about pipelining are true? 1. With a pipelined sender, there may be transmitted packets "in flight" - propagating through the channel - packets that the sender has sent but that the receiver has not yet received. 2. With pipelining, a packet is only retransmitted if that packet, or its ACK, has been lost. 3. A pipelined sender can have transmitted multiple packets for which the sender has yet to receive an ACK from the receiver. 4. With pipelining, a receiver will have to send fewer acknowledgments as the degree of pipelining increases

1. True 2. False 3. True 4. False

Can a sender get three duplicate ACKs for a segment that in fact has not been lost? Which of the following statements are true? Suppose a channel can lose, but will not corrupt, messages. 1. If the channel can reorder messages, a triple duplicate ACK can occur even though a message is not lost; since it's possible that a message has just been reordered and has not yet arrived when the three duplicate ACKs were generated. 2. If the channel cannot reorder messages, a triple duplicate ACK indicates to the sender that a segment loss has happened for sure. Actually (again assuming the channel cannot corrupt or reorder messages), even a single duplicate ACK would indicate that a segment loss has happed for sure.

1. True. 2. True.

Which of the following statements are true about a checksum? 1. A checksum is computed at a sender by considering each byte within a packet as a number, and then adding these numbers (each number representing a bytes) together to compute a sum (which is known as a checksum). 2. The sender-computed checksum value is often included in a checksum field within a packet header. 3. The receiver of a packet with a checksum field will add up the received bytes, just as the sender did, and compare this locally-computed checksum with the checksum value in the packet header. If these two values are different then the receiverknows that one of the bits in the received packet has been changed during transmission from sender to receiver. 4. The receiver of a packet with a checksum will add up the received bytes, just as the sender did, and compare this locally-computed checksum with the checksum value in the packet header. If these two values are the same then the receiver knowsthat all of the bits in the received packet are correct, i.e., that no bits have been changed during transmission from sender to receiver.

1. True. 2. True. 3. True. 4. False.

Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip propagation delay is 10 ms. What is the channel utilization of a pipelined protocol with an arbitrarily high level of pipelining for this channel?

1.0

Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip propagation delay is 10 ms. How many packets can the sender transmit before it starts receiving acknowledgments back?

10

Compute the Internet checksum value for these two 16-bit words: 01000001 11000100 and 00100000 00101011

10011110 00010000

What is meant by a cumulative acknowledgment, ACK(n)?

A cumulative ACK(n) acks all packets with a sequence number up to and including n as being received.

Why is the UDP header length field needed?

Because the payload section can be of variable length, and this lets UDP know where the segment ends.

Why is it that the receiver sends an ACK that is one larger than the sequence number in the received datagram?

Because the send-to receiver segment carries only one byte of data, and after that segment is received, the next expected byte of data is just the next byte (i.e., has an index that is one larger) in the data stream.

In Selective Repeat (SR), why does the receiver have to acknowledge packets with sequence numbers that are less than (and to the left of) those in its window, which starts at rcv_base?

Because the sender may not have received an ACK for that packet yet.

How is the sending rate typically regulated in a TCP implementation?

By keeping a window of size cwnd over the sequence number space, and making sure that no more than cwnd bytes of data are outstanding (i.e, unACKnowledged). The size of cwnd is regulated by AIMD.

True or False: On the sending side, the TCP sender will take each application-layer chunk of data written into a TCP socket and send it in a distinct TCP segment. And then on the receiving side, TCP will deliver a segment's payload into the appropriate socket, preserving the application-defined message boundary.

False.

True or False: When multiple TCP clients send TCP segments to the same destination port number at a receiving host, those segments (from different senders) will always be directed to the same socket at the receiving host.

False.

Consider the transport-layer flows interacting at a congested link. In the face of such congestion, what happens at this link to a transport-layer flow that does not cut back on its sending rate?

Nothing different from the other flows crossing the congested link.

What is meant by transport-layer demultiplexing?

Receiving a transport-layer segment from the network layer, extracting the payload (data) and delivering the data to the correct socket.

The transport layer sits on top of the network layer, and provides its services using the services provided to it by the network layer. Thus it's important that we know what is meant by the network layer's "best effort" delivery service. True or False: The network layer's best-effort delivery service means that IP makes its "best effort" to deliver segments between communicating hosts, but it makes no guarantees. In particular, it does not guarantee segment delivery, it does not guarantee orderly delivery of segments, and it does not guarantee the integrity of the data in the segments.

True! The network layer's best effort service doesn't really provide much service at all, does it?

True or False: It is possible for two TCP segments with source port 80 to be sent by the sending host to different clients.

True.

True or False: On the sending side, the UDP sender will take each application-layer chunk of data written into a UDP socket and send it in a distinct UDP datagram. And then on the receiving side, UDP will deliver a segment's payload into the appropriate socket, preserving the application-defined message boundary.

True.

True or False: The transport layer provides for host-to-host delivery service?

True.

True or False: When computing the Internet checksum for two numbers, a single flipped bit (i.e., in just one of the two numbers) will always result in a changed checksum.

True.

True or False: When multiple UDP clients send UDP segments to the same destination port number at a receiving host, those segments (from different senders) will always be directed to the same socket at the receiving host.

True.

True or False: with TCP's flow control mechanism, where the receiver tells the sender how much free buffer space it has (and the sender always limits the amount of outstanding, unACKed, in-flight data to less than this amount), it is not possible for the sender to send more data than the receiver has room to buffer.

True.

What best completes this sentence: "In the absence of loss, TCP slow start increases the sending rate ... "?

" ... faster than AIMD. In fact, slowstart increases the sending rate exponentially fast per RTT."


Related study sets

Gynecologic, Obstetrics and Neonatal Care- EMT Chapter Quiz 21 & 31

View Set

Data analysis: Chapter 10: Two Sample Hypothesis Tests

View Set