国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫Understanding TCP Congestion Control

時間:2024-02-02  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Exercise 1: Understanding TCP Congestion Control
using ns-2
We have studied the TCP congestion control algorithm in detail in the lecture (and
Section 3.6 of the text). You may wish to review this before continuing with this exercise.
Recall that, each TCP sender limits the rate at which it sends traffic as a function of
perceived network congestion. We studied three variants of the congestion control
algorithm: TCP Tahoe, TCP Reno and TCP new Reno.
We will first consider TCP Tahoe (this is the default version of TCP in ns-2). Recall that
TCP Tahoe uses two mechanisms:
• A varying congestion window, which determines how many packets can be sent
before the acknowledgment for the first packet arrives.
• A slow-start mechanism, which allows the congestion window to increase
exponentially in the initial phase, before it stabilises when it reaches threshold
value. A TCP sender re-enters the slow-start state whenever it detects
congestion in the network.
The provided script, tpWindow.tcl implements a simple network that is illustrated in the
figure below.
Node 0 and Node 1 are connected via a link of capacity 1 Mbps. Data traffic will only
flow in the forward direction, i.e. from Node 0 to Node 1. Observe that packets from
node 0 are enqueued in a buffer that can hold 20 packets. All packets are of equal size
and are equal to the MSS.
The provided script accepts two command line arguments:
• the maximum value of the congestion window at start-up in number of packets
(of size MSS).
• The one-way propagation delay of the link
You can run the script as follows:
$ns tpWindow.tcl <max_cwnd> <link_delay>
NOTE: The NAM visualiser is disabled in the script. If you want to display the NAM
window (graphical interface), then uncomment the fifth line of the 'finish' procedure (i.e.
remove the "#"):
proc finish {} {
 global ns file1 file2
 $ns flush-trace
 close $file1
 close $file2
 #exec nam out.nam &
 exit 0
}
We strongly recommend that you read through the script file to understand the
simulation setting. The simulation is run for 60 seconds. The MSS for TCP segments is
500 bytes. Node 0 is configured as a FTP sender which transmits a packet every 0.01
second. Node 1 is a receiver (TCP sink). It does not transmit data and only
acknowledges the TCP segments received from Node 0.
The script will run the simulation and generate two trace files: (i) Window.tr, which keeps
track of the size of the congestion window and (ii) WindowMon.tr , which shows several
parameters of the TCP flow.
The Window.tr file has two columns:
time congestion_window_size
A new entry is created in this file every 0.02 seconds of simulation time and records the
size of the congestion window at that time.
The WindowMon.tr file has six columns:
time number_of_packets_dropped drop_rate throughput queue_size avg_tp
ut
A new entry is created in this file every second of simulation time.
The number_of_packets_dropped , drop_rate and throughputrepresent the
corresponding measured values over each second. The queue_size indicates the size of
the queue at each second, whereas avg_tput is the average throughput measured since
the start of the simulation.
Question 1 : Run the script with the max initial window size set to 150 packets and the
delay set to 100ms (be sure to type "ms" after 100). In other words, type the following:
$ns tpWindow.tcl 150 100ms
To plot the size of the TCP window and the number of queued packets, we use the
provided gnuplot script Window.plot as follows:
$gnuplot Window.plot
What is the maximum size of the congestion window that the TCP flow reaches in this
case? What does the TCP flow do when the congestion window reaches this value?
Why? What happens next? Include the graph in your submission report.
Question 2: From the simulation script we used, we know that the payload of the
packet is 500 Bytes. Keep in mind that the size of the IP and TCP headers is 20 Bytes,
each. Neglect any other headers. What is the average throughput of TCP in this case?
(both in number of packets per second and bps)
You can plot the throughput using the provided gnuplot script WindowTPut.plot as
follows:
$gnuplot WindowTPut.plot
This will create a graph that plots the instantaneous and average throughput in
packets/sec. Include the graph in your submission report.
Question 3 : Rerun the above script, each time with different values for the max
congestion window size but the same RTT (i.e. 100ms). How does TCP respond to the
variation of this parameter? Find the value of the maximum congestion window at which
TCP stops oscillating (i.e., does not move up and down again) to reach a stable behaviour.
What is the average throughput (in packets and bps) at this point? How does the actual
average throughput compare to the link capacity (1Mbps)?
TCP Tahoe vs TCP Reno
Recall that, so far we have observed the behaviour of TCP Tahoe. Let us now observe
the difference with TCP Reno. As you may recall, in TCP Reno, the sender will cut the
window size to 1/2 its current size if it receives three duplicate ACKs. The default
version of TCP in ns-2 is TCP Tahoe. To change to TCP Reno, modify the Window.tcl
OTcl script. Look for the following line:
set tcp0 [new Agent/TCP]
and replace it with:
set tcp0 [new Agent/TCP/Reno]
Question 4 : Repeat the steps outlined in Questions 1 and 2 (NOT Question 3) but for
TCP Reno. Compare the graphs for the two implementations and explain the
differences. (Hint: compare the number of times the congestion window goes back to
zero in each case). How does the average throughput differ in both implementations?
Note: Remember to include all graphs in your report.
Exercise 2: Flow Fairness with TCP
In this exercise, we will study how competing TCP flows with similar characteristics
behave when they share a single bottleneck link.
The provided script, tp_fairness.tcl generates 5 source-destination pairs which all share
a common network link. Each source uses a single TCP flow which transfers FTP traffic
to the respective destination. The flows are created one after the other at 5-second
intervals (i.e., flow i+1 starts 5 seconds after flow i for i in [1,4] ). You can invoke the
script as follows
$ns tp_fairness.tcl
The figure below shows the resulting topology; there are 5 sources (2,4,6,8,10), 5
destinations (3,5,7,9,11), and each source is sending a large file to a single destination.
Node 2 is sending a file to Node 3, Node 4 is sending a file to Node 5, and so on.
The script produces one output file per flow; farinessMon i .tr for each i in [1,5] . Each of
these files contains three columns:
time | number of packets delivered so far | throughput (packets per second)
You can plot the throughput as a function of time using the provided gnuplot
script, fairness_pps.plot , as follows:
$gnuplot fairness_pps.plot
NOTE: The NAM visualiser is disabled in the script. If you want to display the NAM
window (graphical interface), modify tp_fairness.tcl and uncomment the fifth line of the
'finish' procedure:
proc finish {} {
 global ns file1 file2
 $ns flush-trace
 close $file1
 close $file2
 #exec nam out.nam &
 exit 0
}
Run the above script and plot the throughput as a function of time graph and answer the
following questions:
Question 1 : Does each flow get an equal share of the capacity of the common link (i.e.,
is TCP fair)? Explain which observations lead you to this conclusion.
Question 2. What happens to the throughput of the pre-existing TCP flows when a new
flow is created? Explain the mechanisms of TCP which contribute to this behaviour.
Argue about whether you consider this behaviour to be fair or unfair.
Note: Remember to include all graphs in your report.
Exercise 3: TCP competing with UDP
In this exercise, we will observe how a TCP flow reacts when it has to share a bottleneck
link that is also used by a UDP flow.
The provided script, tp_TCPUDP.tcl , takes a link capacity value as a command line
argument. It creates a link with the given capacity and creates two flows which traverse
that link, one UDP flow and one TCP flow. A traffic generator creates new data for each
of these flows at a rate of 4Mbps. You can execute the simulation as follows,
$ns tp_TCPUDP <link_capacity>
After the simulation completes, you can plot the throughput using the provided gnuplot
script, TCPUDP_pps.plot , as follows,
$gnuplot TCPUDP_pps.plot
Question 1: How do you expect the TCP flow and the UDP flow to behave if the
capacity of the link is 5 Mbps?
Now, you can use the simulation to test your hypothesis. Run the above script as
follows,
$ns tp_TCPUDP.tcl 5Mb
The script will open the NAM window. Play the simulation. You can speed up the
simulation by increasing the step size in the right corner. You will observe packets with
two different colours depicting the UDP and TCP flow. Can you guess which colour
represents the UDP flow and the TCP flow respectively?
You may disable the NAM visualiser by commenting the "exec nam out.nam &' line in
the 'finish' procedure.
Plot the throughput of the two flows using the above script (TCPUDP_pps.plot) and
answer the following questions:
Question 2: Why does one flow achieve higher throughput than the other? Try to
explain what mechanisms force the two flows to stabilise to the observed throughput.
Question 3: List the advantages and the disadvantages of using UDP instead of TCP for
a file transfer, when our connection has to compete with other flows for the same link.
What would happen if everybody started using UDP instead of TCP for that same
reason?
Note: Remember to include all graphs in your report.
BONUS Exercise: Understanding IP Fragmentation
(Optional: If you attempt this and Include it in your report, you may get bonus marks
(max of 2 marks). We will add these bonus marks to your Lab total with the condition
that the total obtained marks for the labs cannot exceed 20)
We will try to find out what happens when IP fragments a datagram by increasing the
size of a datagram until fragmentation occurs. You are provided with a Wireshark trace
file ip_frag that contains trace of sending pings with specific payloads to 8.8.8.8. We
have used ping with option ( – s option on Linux) to set the size of data to be carried in
the ICMP echo request message. Note that the default packet size is 64 bytes in Linux
(56 bytes data + 8 bytes ICMP header). Also note that Linux implementation for ping
also uses 8 bytes of ICMP time stamp option leaving 48 bytes for the user data in the
default mode. Once you have send a series of packets with the increasing data sizes, IP
will start fragmenting packets that it cannot handle. We have used the following
commands to generate this trace file.
Step 1: Ping with default packet size to the target destination as 8.8.8.8
ping -c 10 8.8.8.8
Step 2: Repeat by sending a set of ICMP requests with data of 2000.
ping -s 2000 -c 10 8.8.8.8
Step 3: Repeat again with data size set as 3500
ping -s 3500 -c 10 8.8.8.8
Load this trace file in Wireshark, filter on protocol field ICMP (you may need to clear the
filter to see the fragments) and answer the following questions.
Question 1: Which data size has caused fragmentation and why? Which host/router has
fragmented the original datagram? How many fragments have been created when data
size is specified as 2000?
Question 2: Did the reply from the destination 8.8.8.8. for 3500-byte data size also get
fragmented? Why and why not?
Question 3: Give the ID, length, flag and offset values for all the fragments of the first
packet sent by 192.168.1.103 with data size of 3500 bytes?
Question 4: Has fragmentation of fragments occurred when data of size 3500 bytes has
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CSCI203、代寫Python/c++編程語言
  • 下一篇:代寫指標 代寫期貨策略 指標代寫
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 suno 豆包網頁版入口 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    精品国产一区二区三区四区精华 | 欧美牲交a欧美牲交aⅴ免费真| 欧美激情视频网站| 久久综合国产精品台湾中文娱乐网| 国产精品久久久久9999| www.日韩不卡电影av| 色狠狠久久aa北条麻妃| 国产成人精品视频免费看| 国产精品视频中文字幕91| 国产精品久久精品| 伊人久久在线观看| 天天人人精品| 欧美综合第一页| 黄色一级视频片| 国产欧美日韩最新| 国产精品一区二区三区在线播放| 成人动漫在线视频| 久久久久国产精品视频| 色婷婷综合久久久久中文字幕1| 色噜噜狠狠色综合网图区| 色伦专区97中文字幕| 国产精品第二页| 宅男噜噜99国产精品观看免费| 亚洲激情一区二区| 欧美在线观看网址综合| 国产欧美在线播放| 国产大片精品免费永久看nba| 久草视频这里只有精品| 国产精品视频一区国模私拍| 中文字幕日本最新乱码视频| 午夜久久资源| 极品美女扒开粉嫩小泬| 欧美不卡福利| 91久久精品国产| 久久精品国产99国产精品澳门| 国产精品成人国产乱一区| 在线不卡视频一区二区| 日韩免费一区二区三区| 国产免费高清一区| 日韩视频在线免费观看| 一区二区在线观看网站| 日韩av免费一区| 国产一区免费视频| 国产黄视频在线| 国产高清精品一区| 精品国产一二| 日韩精品在线中文字幕| 国产精品一区二区性色av| 久久久久久久久久久久av| 欧美精品成人在线| 欧美做受高潮1| av动漫在线播放| 国产精品青青草| 天堂精品一区二区三区| 国产毛片久久久久久国产毛片| 久久久久久尹人网香蕉| 欧美精品999| 欧美高清视频一区| 久久精品国产精品亚洲精品色| 中文字幕精品—区二区日日骚| 欧美精品一区二区三区久久 | 久久免费在线观看| 欧美成人性色生活仑片| 天堂一区二区三区| 国产精品一区二区三区毛片淫片| 色琪琪综合男人的天堂aⅴ视频| 亚洲女人毛片| 高清国语自产拍免费一区二区三区 | 久在线观看视频| 精品国产乱码久久久久久丨区2区 精品国产乱码久久久久久郑州公司 | 国产精品日韩一区二区免费视频| 偷拍视频一区二区| av资源一区二区| 欧美精品在线免费播放| 欧美精品久久久| 久久久久网址| 日本亚洲精品在线观看| 91久久精品一区| 亚洲综合最新在线| 国产精品一区二区性色av| 国产精品加勒比| 黄色大片在线免费看| 国产精品无码av在线播放| 欧美在线观看日本一区| 日韩视频免费中文字幕| 日韩美女在线观看| www.日韩不卡电影av| 日韩国产欧美精品| 精品国产区一区二区三区在线观看| 日本精品在线视频| 日韩在线国产精品| 欧美一二三不卡| 国产精品视频专区| 免费一级特黄毛片| 欧美美最猛性xxxxxx| 国产免费一区二区| 亚洲一区二区三区加勒比| 成人精品视频一区二区| 亚洲午夜激情| 91精品国产91久久久久久久久 | 亚洲a在线播放| 91传媒视频免费| 日本在线播放一区| 色狠狠久久aa北条麻妃 | 国产一区视频在线播放| 九九精品视频在线| 成人精品视频久久久久| 婷婷五月色综合| 日韩中文字幕亚洲| 国产一区免费在线观看| 亚洲综合自拍一区| 久久久久久香蕉| 人妻无码一区二区三区四区| 国产精品视频色| 国产精品一区二区久久久| 川上优av一区二区线观看| 色777狠狠综合秋免鲁丝| 国产一区二区丝袜高跟鞋图片| 欧美激情一级二级| 国产成人一区二区| 精品无人乱码一区二区三区的优势 | 色婷婷av一区二区三区在线观看| 男女猛烈激情xx00免费视频| 精品国产福利| 91精品国产综合久久久久久丝袜| 午夜dv内射一区二区| 久久精品视频va| 成人av在线亚洲| 奇米影视首页 狠狠色丁香婷婷久久综合| 国产精品美乳在线观看| 99视频精品全部免费看| 欧美综合一区第一页| 中文字幕日韩精品久久| 久久久久久久久久久久久久久久久久av | 国产精品视频福利| 99久热re在线精品视频| 欧美在线视频观看| 亚洲综合五月天| 久久天堂av综合合色| 国产精品一区二区免费看 | 日韩亚洲精品视频| 国产一区深夜福利| 天堂资源在线亚洲视频| 国产精品美女免费| 68精品久久久久久欧美| 蜜臀av性久久久久蜜臀av| 少妇免费毛片久久久久久久久| 国产精品久久久精品| 久久久精品有限公司| 国产日韩欧美影视| 欧美亚洲免费在线| 一区二区三区四区免费观看| 国产成人手机视频| 久久这里精品国产99丫e6| 精品婷婷色一区二区三区蜜桃| 日韩免费视频在线观看| 亚洲综合自拍一区| 精品国产一区三区| 国产精品免费看久久久香蕉| 国产精华一区| 国产日韩在线播放| 欧美精品一区二区三区四区五区| 欧美一区二区三区综合| 亚洲一区二区精品在线| 精品久久久久久一区| 国产精品日韩精品| zzijzzij亚洲日本成熟少妇| 国产传媒久久久| 91精品国产91久久久久久久久| 国产欧美一区二区白浆黑人| 国内精品久久久久久久| 欧美在线中文字幕| 日韩精品国内| 日本亚洲欧洲色α| 色噜噜色狠狠狠狠狠综合色一| 亚洲天堂av免费在线观看| 欧美激情在线观看视频| 九九热精品视频| 久久国产视频网站| 九九热在线精品视频| 欧美激情视频网| 中文字幕乱码一区二区三区| 欧美激情亚洲精品| 中文字幕欧美人妻精品一区| 一区二区三区在线观看www| 精品久久中出| 欧美激情中文字幕在线| 中文精品视频一区二区在线观看| 欧美精品制服第一页| 国产精品久久久久999| 久久伊人精品一区二区三区| 久久成年人视频| 久久91亚洲精品中文字幕奶水| 国产99在线免费| 亚洲视频小说| 午夜精品一区二区三区av| 丁香六月激情网| 日韩亚洲欧美精品| 欧美韩国日本精品一区二区三区| 欧美日韩一级在线|