How message segmentation can reduce end-to-end delay

Assignment Help Computer Network Security
Reference no: EM131161559

1. Slides 13 and 14 in Chapter 5 notes illustrate through an example how message segmentation can reduce end-to-end delay. In this problem, you are being asked to derive generalized results, including the effect of propagation delay, which was ignored when you solved this problem in Midterm-2. Drawing diagrams would help you answer this problem correctly.

One flip side of message segmentation which was ignored in slides 13 and 14 is the effect of overhead bits. In practice, when a message is segmented into several packets, each packet incurs an overhead because some header and trailer bits need to be appended. Let us define the following parameters:
- M = the size of a message (before segment al ion) in bits,
- N = the number of packets the message is segmented into, and
- H = the number of overhead bits per message (no segmentation) or per packet (with segmentation).
The actual number of bits transmitted when the message is not segmented is therefore
M + H. Conversely, when the message is segmented, the number of bits in each packet is + H, where we have assumed that M (number of data bits in each packet) is an integer. The total number of bits transmitted is therefore N + = M + NH.

(a) Calculate the end-to-end delay when the message is sent without segmentation over L hops, the data rate of each hop being .R bps. Assume that the propagation delay over each hop is tprop. Your answer should be in terms of tprop, M, H, R and L. In the context of slide 13, tprop = 0, M = 3 x 106 bits, H = 0 bits, R= 106 bps, L = 3 hops and the end-to-end delay is 9 seconds.

(b) Calculate the end-to-end delay when the message is segmented into N packets and each packet is transmitted over L hops, the data rate of each hop being R bps. Assume that the propagation delay over each hop is tpro,p. Your answer should be in terms of tprop, M, N, H, R and L. In the context of slide 14, tproi, = 0, M = 3 x 106 bits, N = 3 packets, H = 0 bits, R = 106 bps, L = 3 hops and the end-to-end delay is 5 seconds.

(c) We can now define an end-to-end throughput measure, 7 (in bps), as follows:

number of data bits delivered end-to-end delay

where the numerator is M irrespective of message switching or packet switching. Next, define an end-to-end efficiency measure, n, as follows:

Write down an expression for 77 when packet switching is used.

(d) Using your result in part (c), superimpose the plots of n (in %) vs. N for tprop = 0.1, 0.2, 0.5, 1.0 sec. in one figure (use different line types). Other parameters are as follows: (i) M = 2 Kb, (ii) N = 2 : 2 : 100 in MATLAB notation, (iii) R = 1 Kbps, (iv) H = 100 bits and (iv) L = 5. Be sure to label the axes and provide an appropriate legend. What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop?

(e) Using your result in part (b), plot the end-to-end delay vs. N for H = 100 bits. vs. N for tprop = 0.1, 0.2, 0.5, 1.0 sec. in one figure (use different line types). Other parameters are as follows: (i) M = 2 Kb, (ii) N = 2 : 2 : 100 in MATLAB notation, (iii) R = 1 Kbps, (iv) H = 100 bits and (iv) L = 5. Be sure to label the axes and provide an appropriate legend. What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop? Using engineering judgement, what value of N would you choose considering both efficiency and end-to-end delay?

2. Consider the 6-node network in Fig. 1 where link costs reflect capacities in Mbps. The bottleneck capacity of a path is defined as the minimum of the capacities of the edges constituting the path. For example, the bottleneck capacity of the path (A44.13i4Dt4F) is the minimum of the capacities of (A 44 B), (B D) and (D F) = min(50,10,100) = 10. Quite obviously, we would like to find paths which maximize the bottleneck capacities. Some simple modifications to Dijkstra's algorithm will allow us to solve this problem.

When we are trying to I minimize I the cost of a path, and cost of a path = I sum I of the costs of hops constituting a path, a key step in Dijkstra's algorithm is as follows:

Let p(x, y) denote the best cost of going from node x to y and Cxy denote the (x, y)th element of the link cost matrix. When node j has been 'reached' (label set) at any iteration from node i (the source), the source compares p(i, k), where k is a node 'not yet reached' (label not yet set), to p(i, j) + C3k. If p(i,j) 0 Cik121 (1) the source knows that a *better* route has been found to k, via j, and it updates p(i, k) as follows:

p(i, k) <- p(i, i) II Cjk (2)

Note that the boxed term 'minimize' maps to the `<' sign in eqn. (1) while the boxed term 'sum' maps to the `+' signs on the l.h.s of eqn. (1) and the r.h.s of eqn. (2). Read the previous sentence very, very carefully.

When solving a bottleneck capacity problem, we are seeking to maximize' the cost of a path, and cost of a path = I minimum of the costs of hops constituting a path. How should you modify eqns. (1) and (2) so that you can solve bottleneck capacity type problems?

Two other modifications are necessary for solving bottleneck capacity type problems. Usually, if nodes i and j are not directly connected, we set Cii = oo. Is the oo value still going to work? And finally, at any iteration, we usually set the label of the node which corresponds to the minimum of the distance vector. Is this still going to work?

After you have figured out the necessary modifications, find the set of optimal paths from node B to all other nodes in Fig. 1 such that the bottleneck capacities of the paths are maximized.

You will need to include the following with your test:

786_Q.jpg

(a) How should eqns. (1) and (2) be modified for solving bottleneck capacity type problems? How should Ca, be set if nodes i and j are not directly connected? At any iteration, how should you pick the node whose label is to be set?

(b) The link cost matrix of the network which you used for computing the optimal paths.

(c) Fill in Table 1, which is similar in format to the one shown in slide 38 of Chapter 5 notes.

(d) Fill in Table 2, which shows the optimal paths from the source (node B) to all other nodes, along with the bottleneck capacities of the paths.

Verified Expert

This assignment has solutions to problems from Data link layer and network layer. It has 5 problems. problems are solved using concepts in above two layers. Solution is prepared using Microsoft word document. each question is prepared in individual document.

Reference no: EM131161559

Questions Cloud

Calculate the marginal effects in the logit analysis : Regress the variable COLLEGE defined in Exercise 11.1 on ASVABC, MALE, SM and SF using probit analysis. Calculate the marginal effects and compare them with those obtained using OLS and logit analysis.
Does the information media have social responsibility : Does the information media have social responsibility? If yes, in what ways? If not, why not? What is the role of the information and news media in the shaping of political opinions
Number of business transactions carried out by small company : A number of business transactions carried out by Smalling Manufacturing Company are as follows: -  Borrowed money from a bank.-  Sold land for cash at a price equal to its cost.
What stakeholders require communication : What stakeholders require communication? What will be communicated to them? Who will send the communication? What communication medium will be used?
How message segmentation can reduce end-to-end delay : What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop?
Describe the main purpose of the hajj in the muslim faith : Describe the main purpose of the Hajj in the Muslim faith, and identify two (2) specific aspects of the Hajj that you find fascinating or significant
Comparison of ols and iv estimates confirms your analysis : Investigate analytically the likely direction of the bias in the slope coefficient in the OLS regression, and check whether a comparison of the OLS and IV estimates confirms your analysis.
Apply the next three steps of the nine step : Interpret current equity valuations in order to recommend strategic solutions regarding future financial goals.- Describe external financing needs sufficient to support your ongoing analytical assumptions.
Describe the stages in the risk management process : Explain the terms 'consequence' and 'likelihood' of risk. Describe the stages in the risk management process. Discuss one technique or tool that can be used to identify risk. List the advantages and disadvantages of qualitative risk analysis

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd