EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem R14RQ
Program Plan Intro
First In First Out (FIFO):
- FIFO scheduling is a type of container used to perform FIFO operation in data items.
- The process of removing an element from the FIFO queue returns the element that has been in the queue for longer time.
- For example, consider people standing in the line to pay cash in a bank.
- Here, based on a first-in-first-out operation the person who is standing first will serve first.
Priority:
- Priority scheduling is another type of queue in which each item contains “priority” related with it.
- The process of removing an element from the priority queue returns the item with the highest priority.
- For example, consider people standing in the line to buy a coupon ticket in a shopping mart.
- Here, each person assigned a priority based on their customer review point, so the person with highest priority serves first, apart from order of arrival.
Round Robin (RR):
- Round robin is a preemptive
algorithm . - It is used to process each job based on the predetermined time slice called time quantum
- It helps to share the CPU (Central Processing Unit) equally for all jobs.
- The jobs in the READY queue are processed in the order in which it arrives for the required amount of time quantum and place the job to the end of the queue when the job processing is not completed.
Weighted Fair Queuing (WFQ):
Weighted Fair Queuing is an algorithm which has information of queuing process related to data packets in the network. It is also termed as Packet-by-Packet network because all the packets are scheduled on after the other.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A frame containing http request is sent from Computer (A) [in whichever subnet it is now, make sure to show it in your figure], to the access point it is associated with. Draw the address fields (1, 2, and 3) of the frame travelling from Computer A to AP and the source and destination addresses of the frame travelling from AP to R1.
The MAC addresses of AP1, AP2, and AP3 are M1, M2, and M3 respectively, and the Router R1’s MAC address connected to this Switch/AP is MRA. IP address values are already given, and the port addresses could also be used as given. The Router’s MAC address facing WAN side is MRW.
3. Consider the M/M/1 queue discussed in class. Assume that packets arrive to a queue with
average arrival rate A [pkts/s]. The average service rate of the queue is denoted by u [pkts/s].
(a) Write expressions for: (i) the mean time between packet arrivals to the queue, i.e., the
average inter-arrival time; and (ii) the mean service time, i.e., the average time needed
to transmit a packet onto the outgoing link.
(b) Let N denote the number of packets in the system in steady-state. Suppose A = 850
and u
1000. Find the smallest value of B such that P(N > B) < e = 10¬4. Hint: Use
MATLAB or some other computational tool (you could even use an Excel spreadsheet)
to test different values of B.
4. Consider the M/M/1 queue from Problem 3.
(a) Find an expression for E[N], i.e., the average number of packets in the system in steady-
state. For the values of A and µ specified in Problem 4(b), compute the value of E[N].
What happens when A→ µ?
(b) Find an expression for Var[N], i.e., the variance…
3. Consider the M/M/1 queue discussed in class. Assume that packets arrive to a queue with
average arrival rate A [pkts/s]. The average service rate of the queue is denoted by u [pkts/s].
(a) Write expressions for: (i) the mean time between packet arrivals to the queue, i.e., the
average inter-arrival time; and (ii) the mean service time, i.e., the average time needed
to transmit a packet onto the outgoing link.
(b) Let N denote the number of packets in the system in steady-state. Suppose A
and u =
850
%3D
1000. Find the smallest value of B such that P(N > B) < € = 10-4. Hint: Use
MATLAB or some other computational tool (you could even use an Excel spreadsheet)
to test different values of B.
Chapter 4 Solutions
EBK COMPUTER NETWORKING
Ch. 4 - Lets review some of the terminology used in this...Ch. 4 - Prob. R2RQCh. 4 - Prob. R3RQCh. 4 - Prob. R4RQCh. 4 - Prob. R5RQCh. 4 - Prob. R6RQCh. 4 - Prob. R7RQCh. 4 - Prob. R8RQCh. 4 - Prob. R9RQCh. 4 - Prob. R10RQ
Ch. 4 - Prob. R11RQCh. 4 - Prob. R12RQCh. 4 - Prob. R13RQCh. 4 - Prob. R14RQCh. 4 - Prob. R15RQCh. 4 - Prob. R16RQCh. 4 - Prob. R17RQCh. 4 - Prob. R18RQCh. 4 - Prob. R19RQCh. 4 - Prob. R20RQCh. 4 - Prob. R21RQCh. 4 - Prob. R22RQCh. 4 - Prob. R23RQCh. 4 - Prob. R24RQCh. 4 - Prob. R25RQCh. 4 - Prob. R26RQCh. 4 - Prob. R27RQCh. 4 - Prob. R28RQCh. 4 - Prob. R29RQCh. 4 - Prob. R30RQCh. 4 - Prob. R31RQCh. 4 - Prob. R32RQCh. 4 - Prob. R33RQCh. 4 - Prob. R34RQCh. 4 - Prob. R35RQCh. 4 - Prob. P1PCh. 4 - Prob. P2PCh. 4 - Prob. P3PCh. 4 - Consider a datagram network using 32-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Prob. P8PCh. 4 - Prob. P9PCh. 4 - Prob. P10PCh. 4 - Prob. P11PCh. 4 - Prob. P12PCh. 4 - Consider sending a 2400-byte datagram into a link...Ch. 4 - Prob. P15PCh. 4 - Prob. P16PCh. 4 - Prob. P17PCh. 4 - Prob. P18PCh. 4 - Prob. P19PCh. 4 - Prob. P20PCh. 4 - Prob. P21PCh. 4 - Prob. P22P
Knowledge Booster
Similar questions
- Deficit round-robin is a scheduling scheme that operates as follows. The scheduler visits the queues inround-robin fashion. A deficit counter is maintained for each queue. When the scheduler visits a queue,the scheduler adds a quantum of service to the deficit counter, and compares the resulting value to thelength of the packet at the head of the line. If the counter is larger, the packet is served and the counter isreduced by the packet length. If not, the deficit is saved for the next visit. Suppose that a system has fourqueues and that these contain packets of length 16, 10, 12 and 8 and that the quantum is 4 units. Show thedeficit counter at each queue as a function of time and indicate when the packets are transmitted.arrow_forwardProvide a brief description of the distance – vector algorithm as used for routing. For the following network, indicate node “C” learns when it gets the initial distance vector from node A , and then the initial distance vector from node B and then the initial distance vector from node D. What does C’s routing table look like at that point?arrow_forwardDemonstrate the benefits of hierarchical routing in terms of scalability and administrative autonomy by implementing a sample application. Recognize the differences in behaviour between an intra-AS routing algorithm and an inter-AS routing algorithm. So, what exactly is hot potato routing, and why has it gained such widespread popularity?arrow_forward
- When Bob wants to send Alice a message M on the Internet, he breaks M into n data packets, numbers the packets consecutively, and injects them into the network. When the packets arrive at Alice’s computer, they may be out of order, so Alice must assemble the sequence of n packets in order before she can be sure she has the entire message. Describe an efficient scheme for Alice to do this. What is the running time of this algorithm? From Data Structures and Algorithms C-7.56arrow_forwardIn the discussion of ARQ protocol in Section 3.3.3, a scenario was outlined that resulted in the receiver accepting two copies of the same frame due to a loss of acknowledgement frame. Is it possible that a receiver may accept multiple copies of the same frame when none of the frames (message or acknowledgement) are lost?arrow_forward6.4-4. Self Learning Switches (a). Consider the network below with six nodes, star-connected into an Ethernet switch. Suppose that A sends a frame to A, A' replies to A, then B sends a message to B' and B' replies to B. Enter the values that are present in the switch's forwarding table after B'-to-B frame is sent and received. Assumed that the table is initially empty and that entries are added to the table sequentially. Answer the questions below from the pulldown list. C' B' S A 3 A' B What is the first entry added to the table? [Choose ] [Choose ] B,2 What is the second entry added to the table? C,6 What is the third entry added to the table? What is the fourth entry added to the table? C,3 A,4 B₁,5 A,1 [Choose ] <arrow_forward
- Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled A through Fare star connected into an Ethernet switch. Suppose that (i) B sends a frame to E, (ii) E replies with a frame to B, (i) A sends a frame to B, (iv) B replies with a frame to A. The switch table is initially empty. Show the state of the switch table before and after each of these events. For each of these events, identify the link(s) on which the transmitted frame will be forwarded, and briefly justify your answers.arrow_forwardLet’s consider the operation of a learning switch in the context of a network in which 6 nodes labeled A through F are star connected into an Ethernet switch. Suppose that (i) B sends a frame to E, (ii) E replies with a frame to B, (iii) A sends a frame to B, (iv) B replies with a frame to A. The switch table is initially empty. Show the state of the switch table before and after each of these events. For each of these events, identify the link(s) on which the transmitted frame will be forwarded, and briefly justify your answers.arrow_forwardConsider a Wi-Fi access point (AP) servicing downstream traffic using a CSMA-like (random access) MAC protocol. Assume that the inter-arrival time between any two consecutive frames arriving at the AP is exponentially distributed with mean 1/A=0.5 minute. When a frame arriving to the AP finds the AP busy serving other frames that arrived ahead of it, the frame is queued. When the frame reaches the head of the queue, it then gets served/transmitted using the random access protocol. Assume that the time it takes to service one frame is exponentially distributed with mean 1/μ = 1 minute. Let T; denote the amount of time frame i spends in the Wi-Fi network; that is, T, consists of the queueing delay plus the service/transmission delay. In this problem, we are interested in estimating, using simulations, the parameter of interest 0 = E[W] where W = T₁+T₂+...+T₂ and p = 10. A simulation run would then consist of (1) simulating the system for some time until the first p frames are serviced,…arrow_forward
- IN PYTHON Given the following six-node wide area network for which the numbers attached to the links are a measure of the “delay” in using that link (e.g., some lines could be more heavily used than others and therefore have a longer wait time), answer the following question. What is the shortest path from node A to node D, where shortest path is defined as the path with the smallest sum of the delays on each individual link? Explain exactly how you went about finding that path.arrow_forwardIn a data communication system, several messages that arrive at a node are bundled into a packet before they are transmitted over the network. Assume that the messages arrive at the node according to a Poisson process with rate 30 messages per minute (0.5 per second). Five messages are used to form a packet.What is the mean time until a packet is formed, that is, until five messages arrive at the node?arrow_forwardConsider an Information system, of a frame size of (5 million) bits are being sent on a path with (10 routers) each having a queuing time of (2 µs) and a processing time of (1 µs). The length of the path is (2000 Km). Acknowledgement frame size is (10 bytes) and the speed of light inside the link is (2 *10^8 m/s). Every link on the path has a bandwidth of (5 Mbps), then the total delay (latency) for this frame is........... O 0.000016 sec. O 0.000020 sec. O 0.000010 sec. O 1.020046 sec. O 0.01 sec.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education