Determine congestion window sizes after milliseconds

Assignment Help Computer Networking
Reference no: EM1383977

Let the simpli ed TCPs AIMD algorithm where congestion window size is measured in number of segments, not in bytes. In additive increase, congestion window size increases by one segment in each RTT. In multiplicative reduce, congestion window size decreases by half (if result is not integer, round down to nearest integer). Assume that two TCP connections, C1and C2, share single congested link of speed 30 segments per second. Suppose that both C1 and C2 are in congestion avoidance phase. Connection C1s RTT is 100 ms and connection C2s RTT is 200 ms. Suppose that when data rate in link exceeds links speed, all TCP connections experience data segment loss.

a. If both C1 and C2 at time t0 have congestion window of 10 segments, determine their congestion window sizes after 2200 msec?

b. In long run, will these two connections get same share of the bandwidth of congested link? Describe.

Reference no: EM1383977

Questions Cloud

Ethics in psychological research : The need for increasing oversight in psychological research is altering as demand for ethical practices and complexities of research are challenged.
Determining world of psychological research : In world of psychological research the experiment is highly valued, as it is one of the main processes we can employ to determine cause and effect.
What is the expected value of information : The Super Cola Company must decide whether or not to introduce a new diet soft drink. Management feels that if it does introduce the diet soda it will yield a profit of $1 million
Internal and external threats to validity : Analyzing the internal and external threats to validity. Can you help me recognize and define those threats that are related to measurement, and the threats that are related to sampling issues.
Determine congestion window sizes after milliseconds : If both C1 and C2 at time t0 have congestion window of 10 segments, determine their congestion window sizes after 2200 msec?
Proper techniques for researching texting : Why is survey appropriate techniques for researching texting and the impact it has on communication and why are other research methods not appropriate?
What is the eoq for raspberry syrup : What is the EOQ for raspberry syrup? If Meyer orders the EOQ quantity each time, what will be the inventory turnover rate for raspberry syrup?
Determining the relevant pi groups : The break up of a liquid jet into droplets of diameter d depends on the jet diameter D, the jet velocity V, viscosity Mu, density rho, and surface tension sigma. a) Determine the relevant pi groups.
Finding map distance between the loci : In parrots, language spoken is determined through one gene, and the allele, N, for Norwegian, is completely dominant to n, Danish.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining significant obstacle to encryption

It is significant to know what issues are for encrypting data in the database. Comment on what you think is most significant obstacle to encryption. Describe your position.

  Design ip addressing scheme for five departments

You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.

  Explain client-server architecture for serving client on pc

When people explain client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, reverse is frequently the case. Explain

  Explain systems security certifications consortium web site

What are the areas addressed in CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

  Design lan with operation over a distance

You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics.

  Analogous steps in dimensioning computer network

Write down the analogous steps in dimensioning a computer network?

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Explaining dns resolver queries

When a DNS resolver queries the name server, does case of the domain name affect response?

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Explaining ethical or unethical actions

Should Iris have placed CD back at coffee station and forgotten entire thing? Describe why that action would have been ethical or unethical.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd