CMSC 417
Midterm #2 (Fall 1997)- Solutions
Values of a
packet sequence numbers that are not permitted since it is impossible to
distinguish a new packet from and old one. (3 points)
Transport
service access point. A end-point for communication at the transport layer.
This is generally specified with a host name and port. (3 points)
The problem
that two generals can’t agree when to attack over a channel that looses messages.
This is analogous to the problem of having two parties agree to shutdown a
transport level connection. (3 points)
Classless
Inter-Domain Routing: A replacement for the class A,B,C networks used on the
Internet. It is designed to reduce routing table size and internal
fragmentation of the IP address space. (3 points)
A way to
combine multiple samples that assigns a greater weight to recent values than
older ones. Avg = a Sample + (1- a ) Avg (3 points)
The problem
is that sleep is a blocking call, and it would be difficult to wakeup a
sleeping process when the ack arrives. It is a specific instance of the problem
that is experienced when trying to have a thread wait on the OR of two or more
conditions.
The initial
time stamp is used in the connect request and connect ack packets. Once the
initial sequence number has been agreed upo,. it can’t be re-used until the
maximum lifetime of the packet on the network has been exceeded to prevent a
stale packet form being confused with a new one. However, once the connection
is established, any sequence number can be used for each packet as long as the
sequence number is not repeated within the maximum lifetime of a packet. (10
points)
If the tick
rate is too fast, it will role over before the maximum packet lifetime and
could cause an old connection request to be confused with a current one. If it
is too slow, it will limit the rate at which connections can be made (10
points)
To
efficiently use the network, a protocol must be able to have a window size at
least as large as the end-to-end delay bandwidth product. The TCP option to
shift the bits of the window size to permit more outstanding bytes is one way
to meet this need. (9 points)
Since more
data can be transferred in the same roundtrip time, making requests and
responses larger can reduce the apparent latency of a message. For example, a
directory protocol could request the contents of the entire directory rather
than one file at a time. (9 points)
Leaky bucket
permits a network device to accept a large burst of data and then slowly
transmit it onto the network. A token bucket permits the burst to go directly
onto the network (if there are tokens available). Either approach will ensure
that the average traffic rate will be maintained. (108 points)
Per
connection traffic shaping is useful when there are several different classes
of traffic using the same link and hosts. By performing shaping on a per
connection basis, applications with different (even conflicting) resource
requirements can be accommodated. (5 points)
Per host
traffic shaping is useful when two connections represent traffic that must
travel over the same resource constrained link. By shaping the traffic as a
unit, we can ensure that the capacity of the single link is not exceeded. (5
points)
Selective-repeat is good for communication channels
with high probability of packet corruption or loss since it conserves bandwidth
by only re-transmitting the damaged packet. Go-back-n is useful for more
reliable links since it permits the receiver side to have only one buffer since
all packets will arrive in order even after a loss. Go-back-n has less
efficient utilization of link bandwidth since packets that were received
correctly may still need to be re-transmitted. With go-back-n, packets will
arrive in-order so the receive window is reduced to one.