Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 3 ( a ) For a particular TCP session the current round - trip time, R T T c u r , is 5

Question 3
(a) For a particular TCP session the current round-trip time, RTTcur, is 50ms, and at a particular
moment of time the measured acknowledgement from a data segment is after 42ms.
(i) Apply the Jacobson algorithm to find the updated value RTTupd. Assume in [10%]
calculations the smoothing factors ==0.875.
(ii) Determine the values of the current Dcur and the updated Dupd mean deviations if the
calculated updated value of the Retransmission Time-Out RTOupd is 57ms.
(b) The dependence of the congestion window Wc(in kilobytes) on the transmission time t(in
units of RTT) for a lightly loaded internet is shown in Figure 3.1, where it was assumed
that the maximum segment size MSS =1 kilobyte. Draw schematically a similar
dependence for a congested internet in which the following scenario was observed:
Between t=0 and t=25 RTT no disruptions of the transmission take place.
At t=25 RTT the first three duplicate acknowledgements (ACKs) have been received by
the sender host.
At t=45 RTT the first RTO (Retransmission Time-Out) of the sender's acknowledgement
clock has occurred.
Between t=45RTT and t=60RTT the network operates without disruptions.
Explain the obtained dependence. You need to draw the dependence of Wc on time t for the
time interval from t=0 to t=60 RTT.
Question 3(continued)
(c) A server sends a burst of W=600 kilobytes of data to another host located at a distance of
L=3000km over an optical fibre link operating at B=1Gbs. The speed of light in optical
fibre is c=200,000kms.
(i) Calculate the upper bound of the link efficiency (LEUB) for this transmission.
(ii) What should be the size of the data burst W in order to achieve LEUB=50%?
Explain the obtained result and the reason why this leads to an increase of the link
efficiency LEUB.
(d) Two businesses B1 and B2 intend to connect five nodes using different structural
networking models: peer-to-peer networking and client-server networking. B1 requires a
network with a good resource sharing function and low cost. B2 needs high network
security and good data back-up.
(i) What structural model should be employed by each business? Explain why.
(ii) Draw schematics of each of these networks.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro SQL Server Wait Statistics

Authors: Enrico Van De Laar

1st Edition

1484211391, 9781484211397

More Books

Students also viewed these Databases questions

Question

3-7. What is free trade?

Answered: 1 week ago

Question

What are the current HRM challenges in the textile industry?

Answered: 1 week ago