91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫(xiě)Understanding TCP Congestion Control

時(shí)間:2024-02-02  來(lái)源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



Exercise 1: Understanding TCP Congestion Control
using ns-2
We have studied the TCP congestion control algorithm in detail in the lecture (and
Section 3.6 of the text). You may wish to review this before continuing with this exercise.
Recall that, each TCP sender limits the rate at which it sends traffic as a function of
perceived network congestion. We studied three variants of the congestion control
algorithm: TCP Tahoe, TCP Reno and TCP new Reno.
We will first consider TCP Tahoe (this is the default version of TCP in ns-2). Recall that
TCP Tahoe uses two mechanisms:
• A varying congestion window, which determines how many packets can be sent
before the acknowledgment for the first packet arrives.
• A slow-start mechanism, which allows the congestion window to increase
exponentially in the initial phase, before it stabilises when it reaches threshold
value. A TCP sender re-enters the slow-start state whenever it detects
congestion in the network.
The provided script, tpWindow.tcl implements a simple network that is illustrated in the
figure below.
Node 0 and Node 1 are connected via a link of capacity 1 Mbps. Data traffic will only
flow in the forward direction, i.e. from Node 0 to Node 1. Observe that packets from
node 0 are enqueued in a buffer that can hold 20 packets. All packets are of equal size
and are equal to the MSS.
The provided script accepts two command line arguments:
• the maximum value of the congestion window at start-up in number of packets
(of size MSS).
• The one-way propagation delay of the link
You can run the script as follows:
$ns tpWindow.tcl <max_cwnd> <link_delay>
NOTE: The NAM visualiser is disabled in the script. If you want to display the NAM
window (graphical interface), then uncomment the fifth line of the 'finish' procedure (i.e.
remove the "#"):
proc finish {} {
 global ns file1 file2
 $ns flush-trace
 close $file1
 close $file2
 #exec nam out.nam &
 exit 0
}
We strongly recommend that you read through the script file to understand the
simulation setting. The simulation is run for 60 seconds. The MSS for TCP segments is
500 bytes. Node 0 is configured as a FTP sender which transmits a packet every 0.01
second. Node 1 is a receiver (TCP sink). It does not transmit data and only
acknowledges the TCP segments received from Node 0.
The script will run the simulation and generate two trace files: (i) Window.tr, which keeps
track of the size of the congestion window and (ii) WindowMon.tr , which shows several
parameters of the TCP flow.
The Window.tr file has two columns:
time congestion_window_size
A new entry is created in this file every 0.02 seconds of simulation time and records the
size of the congestion window at that time.
The WindowMon.tr file has six columns:
time number_of_packets_dropped drop_rate throughput queue_size avg_tp
ut
A new entry is created in this file every second of simulation time.
The number_of_packets_dropped , drop_rate and throughputrepresent the
corresponding measured values over each second. The queue_size indicates the size of
the queue at each second, whereas avg_tput is the average throughput measured since
the start of the simulation.
Question 1 : Run the script with the max initial window size set to 150 packets and the
delay set to 100ms (be sure to type "ms" after 100). In other words, type the following:
$ns tpWindow.tcl 150 100ms
To plot the size of the TCP window and the number of queued packets, we use the
provided gnuplot script Window.plot as follows:
$gnuplot Window.plot
What is the maximum size of the congestion window that the TCP flow reaches in this
case? What does the TCP flow do when the congestion window reaches this value?
Why? What happens next? Include the graph in your submission report.
Question 2: From the simulation script we used, we know that the payload of the
packet is 500 Bytes. Keep in mind that the size of the IP and TCP headers is 20 Bytes,
each. Neglect any other headers. What is the average throughput of TCP in this case?
(both in number of packets per second and bps)
You can plot the throughput using the provided gnuplot script WindowTPut.plot as
follows:
$gnuplot WindowTPut.plot
This will create a graph that plots the instantaneous and average throughput in
packets/sec. Include the graph in your submission report.
Question 3 : Rerun the above script, each time with different values for the max
congestion window size but the same RTT (i.e. 100ms). How does TCP respond to the
variation of this parameter? Find the value of the maximum congestion window at which
TCP stops oscillating (i.e., does not move up and down again) to reach a stable behaviour.
What is the average throughput (in packets and bps) at this point? How does the actual
average throughput compare to the link capacity (1Mbps)?
TCP Tahoe vs TCP Reno
Recall that, so far we have observed the behaviour of TCP Tahoe. Let us now observe
the difference with TCP Reno. As you may recall, in TCP Reno, the sender will cut the
window size to 1/2 its current size if it receives three duplicate ACKs. The default
version of TCP in ns-2 is TCP Tahoe. To change to TCP Reno, modify the Window.tcl
OTcl script. Look for the following line:
set tcp0 [new Agent/TCP]
and replace it with:
set tcp0 [new Agent/TCP/Reno]
Question 4 : Repeat the steps outlined in Questions 1 and 2 (NOT Question 3) but for
TCP Reno. Compare the graphs for the two implementations and explain the
differences. (Hint: compare the number of times the congestion window goes back to
zero in each case). How does the average throughput differ in both implementations?
Note: Remember to include all graphs in your report.
Exercise 2: Flow Fairness with TCP
In this exercise, we will study how competing TCP flows with similar characteristics
behave when they share a single bottleneck link.
The provided script, tp_fairness.tcl generates 5 source-destination pairs which all share
a common network link. Each source uses a single TCP flow which transfers FTP traffic
to the respective destination. The flows are created one after the other at 5-second
intervals (i.e., flow i+1 starts 5 seconds after flow i for i in [1,4] ). You can invoke the
script as follows
$ns tp_fairness.tcl
The figure below shows the resulting topology; there are 5 sources (2,4,6,8,10), 5
destinations (3,5,7,9,11), and each source is sending a large file to a single destination.
Node 2 is sending a file to Node 3, Node 4 is sending a file to Node 5, and so on.
The script produces one output file per flow; farinessMon i .tr for each i in [1,5] . Each of
these files contains three columns:
time | number of packets delivered so far | throughput (packets per second)
You can plot the throughput as a function of time using the provided gnuplot
script, fairness_pps.plot , as follows:
$gnuplot fairness_pps.plot
NOTE: The NAM visualiser is disabled in the script. If you want to display the NAM
window (graphical interface), modify tp_fairness.tcl and uncomment the fifth line of the
'finish' procedure:
proc finish {} {
 global ns file1 file2
 $ns flush-trace
 close $file1
 close $file2
 #exec nam out.nam &
 exit 0
}
Run the above script and plot the throughput as a function of time graph and answer the
following questions:
Question 1 : Does each flow get an equal share of the capacity of the common link (i.e.,
is TCP fair)? Explain which observations lead you to this conclusion.
Question 2. What happens to the throughput of the pre-existing TCP flows when a new
flow is created? Explain the mechanisms of TCP which contribute to this behaviour.
Argue about whether you consider this behaviour to be fair or unfair.
Note: Remember to include all graphs in your report.
Exercise 3: TCP competing with UDP
In this exercise, we will observe how a TCP flow reacts when it has to share a bottleneck
link that is also used by a UDP flow.
The provided script, tp_TCPUDP.tcl , takes a link capacity value as a command line
argument. It creates a link with the given capacity and creates two flows which traverse
that link, one UDP flow and one TCP flow. A traffic generator creates new data for each
of these flows at a rate of 4Mbps. You can execute the simulation as follows,
$ns tp_TCPUDP <link_capacity>
After the simulation completes, you can plot the throughput using the provided gnuplot
script, TCPUDP_pps.plot , as follows,
$gnuplot TCPUDP_pps.plot
Question 1: How do you expect the TCP flow and the UDP flow to behave if the
capacity of the link is 5 Mbps?
Now, you can use the simulation to test your hypothesis. Run the above script as
follows,
$ns tp_TCPUDP.tcl 5Mb
The script will open the NAM window. Play the simulation. You can speed up the
simulation by increasing the step size in the right corner. You will observe packets with
two different colours depicting the UDP and TCP flow. Can you guess which colour
represents the UDP flow and the TCP flow respectively?
You may disable the NAM visualiser by commenting the "exec nam out.nam &' line in
the 'finish' procedure.
Plot the throughput of the two flows using the above script (TCPUDP_pps.plot) and
answer the following questions:
Question 2: Why does one flow achieve higher throughput than the other? Try to
explain what mechanisms force the two flows to stabilise to the observed throughput.
Question 3: List the advantages and the disadvantages of using UDP instead of TCP for
a file transfer, when our connection has to compete with other flows for the same link.
What would happen if everybody started using UDP instead of TCP for that same
reason?
Note: Remember to include all graphs in your report.
BONUS Exercise: Understanding IP Fragmentation
(Optional: If you attempt this and Include it in your report, you may get bonus marks
(max of 2 marks). We will add these bonus marks to your Lab total with the condition
that the total obtained marks for the labs cannot exceed 20)
We will try to find out what happens when IP fragments a datagram by increasing the
size of a datagram until fragmentation occurs. You are provided with a Wireshark trace
file ip_frag that contains trace of sending pings with specific payloads to 8.8.8.8. We
have used ping with option ( – s option on Linux) to set the size of data to be carried in
the ICMP echo request message. Note that the default packet size is 64 bytes in Linux
(56 bytes data + 8 bytes ICMP header). Also note that Linux implementation for ping
also uses 8 bytes of ICMP time stamp option leaving 48 bytes for the user data in the
default mode. Once you have send a series of packets with the increasing data sizes, IP
will start fragmenting packets that it cannot handle. We have used the following
commands to generate this trace file.
Step 1: Ping with default packet size to the target destination as 8.8.8.8
ping -c 10 8.8.8.8
Step 2: Repeat by sending a set of ICMP requests with data of 2000.
ping -s 2000 -c 10 8.8.8.8
Step 3: Repeat again with data size set as 3500
ping -s 3500 -c 10 8.8.8.8
Load this trace file in Wireshark, filter on protocol field ICMP (you may need to clear the
filter to see the fragments) and answer the following questions.
Question 1: Which data size has caused fragmentation and why? Which host/router has
fragmented the original datagram? How many fragments have been created when data
size is specified as 2000?
Question 2: Did the reply from the destination 8.8.8.8. for 3500-byte data size also get
fragmented? Why and why not?
Question 3: Give the ID, length, flag and offset values for all the fragments of the first
packet sent by 192.168.1.103 with data size of 3500 bytes?
Question 4: Has fragmentation of fragments occurred when data of size 3500 bytes has
如有需要,請(qǐng)加QQ:99515681 或WX:codehelp

掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
  • 上一篇:代做CSCI203、代寫(xiě)Python/c++編程語(yǔ)言
  • 下一篇:代寫(xiě)指標(biāo) 代寫(xiě)期貨策略 指標(biāo)代寫(xiě)
  • 無(wú)相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷(xiāo)助手小象助手多多出評(píng)軟件
    2025年10月份更新拼多多改銷(xiāo)助手小象助手多
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)/客戶(hù)要求/設(shè)計(jì)優(yōu)化
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
    出評(píng) 開(kāi)團(tuán)工具
    出評(píng) 開(kāi)團(tuán)工具
    挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
    挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
    海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機(jī)場(chǎng)巴士4號(hào)線
    合肥機(jī)場(chǎng)巴士4號(hào)線
    合肥機(jī)場(chǎng)巴士3號(hào)線
    合肥機(jī)場(chǎng)巴士3號(hào)線
  • 短信驗(yàn)證碼 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区
    国产午夜三级一区二区三| 免费在线视频一区| av成人黄色| 亚洲一区在线观看免费| 色婷婷国产精品综合在线观看| 日韩电影一二三区| 4438x亚洲最大成人网| 成人午夜看片网址| 中文字幕欧美三区| 在线综合亚洲| 毛片av一区二区三区| 日韩一区二区视频| 欧美激情第二页| 亚洲另类春色国产| 色偷偷成人一区二区三区91| 国产成人av影院| 国产欧美一区视频| 国产婷婷精品| 国产原创一区二区三区| 26uuu国产在线精品一区二区| 狠狠干成人综合网| 日本亚洲电影天堂| 精品国产制服丝袜高跟| 亚洲精品欧洲精品| 久草在线在线精品观看| 久久色中文字幕| 亚洲在线成人| 风流少妇一区二区| 国产精品久久久久影院老司 | 国产精品一色哟哟哟| 久久久久久黄色| 亚洲欧美高清| 成人av综合在线| **性色生活片久久毛片| 欧美三片在线视频观看 | 国产99久久久国产精品| 亚洲欧洲99久久| 欧美日韩极品在线观看一区| 欧美激情精品久久久六区热门| 性欧美大战久久久久久久久| 欧美r级在线观看| 中国成人在线视频| 春色校园综合激情亚洲| 一区二区欧美视频| 日韩午夜小视频| 国产伦精品一区| 大桥未久av一区二区三区中文| 亚洲激情图片一区| 欧美电影免费提供在线观看| 午夜在线精品偷拍| aaa亚洲精品| 免费久久精品视频| 中文字幕日韩一区| 欧美一二三区在线观看| 免费亚洲网站| 欧美高清视频一区| 国产在线麻豆精品观看| 一区二区在线观看视频在线观看| 欧美白人最猛性xxxxx69交| 久久福利毛片| 国产精品国产亚洲精品看不卡15| 国产一区二区三区免费播放| 一区二区在线观看免费视频播放| 欧美大片日本大片免费观看| 久久久人人人| 亚洲国产一区二区三区高清| 成人网页在线观看| 蜜桃久久av一区| 亚洲午夜影视影院在线观看| 国产女主播一区| 日韩视频免费观看高清完整版| 久久久久久久久久久一区 | 91久久精品网| 国产欧美日本| 欧美三日本三级少妇三99| 国产iv一区二区三区| 免费成人性网站| 亚洲va在线va天堂| 亚洲欧美另类综合偷拍| 精品久久五月天| 欧美男同性恋视频网站| 在线免费一区三区| 香蕉久久国产| 亚洲精选成人| 国模精品娜娜一二三区| 欧美一区在线看| 成a人片国产精品| 大胆亚洲人体视频| 国产精品一区一区三区| 韩国女主播成人在线观看| 香蕉成人啪国产精品视频综合网| 亚洲人精品午夜| 国产精品成人免费| 中文字幕在线免费不卡| 中文一区二区在线观看| 国产欧美日韩一区二区三区在线观看| 日韩美女一区二区三区四区| 欧美一区二区三区免费大片 | 国产午夜三级一区二区三| 久久久青草青青国产亚洲免观| 日韩欧美亚洲一区二区| 日韩亚洲欧美在线| 欧美电视剧在线看免费| 欧美成人高清电影在线| 欧美成人精品1314www| 精品少妇一区二区三区免费观看| 日韩一级二级三级精品视频| 欧美一卡二卡三卡| 日韩一区二区在线观看视频| 日韩午夜三级在线| wwwwww.欧美系列| 久久综合色一综合色88| 久久久精品国产免大香伊| 久久精品人人做人人综合| 国产日韩欧美麻豆| 中文字幕一区二区视频| 亚洲男女一区二区三区| 亚洲黄色免费网站| 天天综合天天综合色| 日本aⅴ亚洲精品中文乱码| 久久国产乱子精品免费女| 国产一区免费电影| 99视频在线观看一区三区| 午夜精品视频在线观看一区二区| 国产精品videosex极品| 日韩亚洲国产欧美| 久久久亚洲人| 91精品一区二区三区在线观看| 日韩美女在线视频| 国产免费成人在线视频| 亚洲精品中文字幕乱码三区| 亚洲一区二区三区四区五区黄| 日本免费新一区视频| 国产河南妇女毛片精品久久久| www.66久久| 亚洲国产午夜| 在线观看一区二区精品视频| 91精选在线观看| 亚洲国产精品成人综合色在线婷婷 | 欧美一区二区三区免费观看视频| 久久综合久久综合九色| 国产精品免费人成网站| 亚洲一区中文在线| 精品影视av免费| 99re热视频这里只精品| 夜久久久久久| 欧美日韩不卡一区二区| 国产喂奶挤奶一区二区三区| 伊人婷婷欧美激情| 国产在线视视频有精品| 国产精品videossex久久发布| 欧美一级网站| 日韩欧美资源站| 亚洲免费av观看| 久草精品在线观看| 欧美色一级片| 欧美性猛交xxxx黑人交| 国产丝袜欧美中文另类| 午夜精品视频一区| 成人动漫av在线| 中文精品在线| 欧美大黄免费观看| 亚洲综合免费观看高清完整版在线| 黑人巨大精品欧美一区| 亚洲无玛一区| 6080国产精品一区二区| 亚洲欧美日韩在线| 国产精品一区二区在线播放 | 欧美最新大片在线看| 国产视频一区不卡| 捆绑紧缚一区二区三区视频 | 黄色另类av| 7777精品伊人久久久大香线蕉| 中文字幕亚洲区| 国产美女在线精品| 99精品热6080yy久久| 欧美videossexotv100| 亚洲电影在线播放| 午夜精品久久| 欧美一区二区二区| 亚洲成人av福利| 午夜欧美理论片| 4438亚洲最大| 舔着乳尖日韩一区| 亚洲午夜激情在线| 日韩一区二区免费电影| 日韩精品电影一区亚洲| 黑人巨大精品欧美一区二区小视频 | 欧美日韩极品在线观看一区| 一区二区三区精品在线| 91一区二区在线| 欧美日韩国产影片| 一区二区三区不卡在线观看 | 国产一区二区三区最好精华液| 在线亚洲美日韩| 国产精品毛片大码女人| 成人av电影在线| 欧美伦理影视网| 日日夜夜免费精品| 一区在线视频|