EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem R16RQ
Program Plan Intro
Round Robin (RR):
- Round robin is a preemptive
algorithm . - It is used to process each job based on the predetermined time slice called time quantum
- It helps to share the CPU (Central Processing Unit) equally for all jobs.
- The jobs in the READY queue are processed in the order in which it arrives for the required amount of time quantum and place the job to the end of the queue when the job processing is not completed.
Weighted Fair Queuing (WFQ):
Weighted Fair Queuing is an algorithm which has information of queuing process related to data packets in the network. It is also termed as Packet-by-Packet network because all the packets are scheduled on after the other.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is an essential different between RR and WFQ packet scheduling? Is there a case (Hint Consider the WFQ weights) where RR and WFQ will behave exactly the same?
1. What is the difference between packet fragmentation (i.e., at network layer) and frame frag-
mentation (i.e., at link layer) in terms of purpose?
2. Suppose that host A is connected to a router R1, R1 is connected to another router, R2, and
R2 is connected to host B. Suppose that a TCP message that contains 800 bytes of data and
20 bytes of TCP header is passed to the IP function at host A for delivery to B. Show the
Total length, DF, MF, and Fragment offset fields of the IP header in each packet transmitted
over the three links. (Assume that link A-R1 can support a maximum frame size of 1024
bytes including a 14-byte frame header, link R1-R2 can support a maximum frame size of 512
bytes, including an 8-byte frame header, and link R2-B can support a maximum frame size
of 432 bytes including a 12-byte frame header.)
(*hint: the Fragment offset field is denominated by 8-bytes, not bytes)
3. What is the purpose of the path MTU discovery process (see textbook Figure 5-42) and why
does…
What's an important difference between packet programming for RR and WFQ?
Is there a scenario (consider WFQ weights) where RR and WFQ are going to be
the same?
Chapter 4 Solutions
EBK COMPUTER NETWORKING
Ch. 4 - Lets review some of the terminology used in this...Ch. 4 - Prob. R2RQCh. 4 - Prob. R3RQCh. 4 - Prob. R4RQCh. 4 - Prob. R5RQCh. 4 - Prob. R6RQCh. 4 - Prob. R7RQCh. 4 - Prob. R8RQCh. 4 - Prob. R9RQCh. 4 - Prob. R10RQ
Ch. 4 - Prob. R11RQCh. 4 - Prob. R12RQCh. 4 - Prob. R13RQCh. 4 - Prob. R14RQCh. 4 - Prob. R15RQCh. 4 - Prob. R16RQCh. 4 - Prob. R17RQCh. 4 - Prob. R18RQCh. 4 - Prob. R19RQCh. 4 - Prob. R20RQCh. 4 - Prob. R21RQCh. 4 - Prob. R22RQCh. 4 - Prob. R23RQCh. 4 - Prob. R24RQCh. 4 - Prob. R25RQCh. 4 - Prob. R26RQCh. 4 - Prob. R27RQCh. 4 - Prob. R28RQCh. 4 - Prob. R29RQCh. 4 - Prob. R30RQCh. 4 - Prob. R31RQCh. 4 - Prob. R32RQCh. 4 - Prob. R33RQCh. 4 - Prob. R34RQCh. 4 - Prob. R35RQCh. 4 - Prob. P1PCh. 4 - Prob. P2PCh. 4 - Prob. P3PCh. 4 - Consider a datagram network using 32-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Prob. P8PCh. 4 - Prob. P9PCh. 4 - Prob. P10PCh. 4 - Prob. P11PCh. 4 - Prob. P12PCh. 4 - Consider sending a 2400-byte datagram into a link...Ch. 4 - Prob. P15PCh. 4 - Prob. P16PCh. 4 - Prob. P17PCh. 4 - Prob. P18PCh. 4 - Prob. P19PCh. 4 - Prob. P20PCh. 4 - Prob. P21PCh. 4 - Prob. P22P
Knowledge Booster
Similar questions
- 4. The original HTTP protocol used TCP/IP as the underlying protocol. For each page, graphic, or applet, a separate TCP connection was constructed, used, and terminated. This caused several problems: one referred to as the elephant and mice problem and two aspects of connection overhead. Describe both problems. Why were separate connections used? Would UDP rather than TCP be a good alternative? What solution would you propose to these problems to improve HTTP performance?arrow_forwardA packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the packet arrives, one other packet is halfway done being transmitted on this outbound link and four other packets are waiting to be transmitted. Packets are transmitted in order of arrival. Suppose all packets are 1,500 bytes and the link rate is 2 Mbps. What is the queuing delay for the packet? More generally, what is the queuing delay when all packets have length L, the transmission rate is R, x bits of the currently-being-transmitted packet have been transmitted, and n packets are already in the queue?arrow_forwardThe maximum transmission unit on an Ethernet link is 4500 bytes. This means that the IP packets sent over Ethernet cannot be larger than 4500 bytes including the IP header. Suppose the application layer sends a 6500-byte message. The transport layer uses TCP with no options. The network layer is using IP version 4. Obviously, the IP layer will have to fragment the data. Provide the length of new datagrams (after fragmentation). Provide the Flag and offset of each of the new datagrams.arrow_forward
- See what makes SMTP different from HTTP in this analysis of application protocols.What does the acronym HTTP stand for, and how does it work?I need to know what port it uses for transmission.Both Transmission Control Protocol and User Datagram Protocol may be abbreviated to TCP or UDP. In each of these cases, what factors must be considered?So, how many distinct varieties of 'network' are there? Give a succinct summary of what you know about each.arrow_forwardSuppose host A is sending a large file to host B over a TCP connection. The two end hosts are 10 msec apart (20 msec RTT) connected by a 1 Gbps link. Assume that they are using a packet size of 1000 bytes to transmit the file. For simplicity, ignore ack packets. At least how big would the window size (in packets) have to be for the channel utilization to be greater than 80%?arrow_forwardTCP session sends 50 packets per second over an Ethernet Local Area Network (LAN). Each packet consists 2280B (excluding the preamble and cyclic redundancy check (CRC)). Calculate the size of the headers, and hence the TCP payload data. What therefore is the TCP throughput of the session?arrow_forward
- An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most signi cant bits are used as a network ID, and the 16 least signi cant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?arrow_forwardIt is theoretically feasible for two hosts to communicate with one another by sending packets back and forth over the same connection. Please enumerate all of the components that are responsible for the overall amount of time required to process a single packet, starting to end. Is it to be anticipated that one of the delays will continue for a certain amount of time, while the duration of the other delay will be more unpredictable?arrow_forwardConsidering each of the TCP/IP protocol stack layers and rank them in the order you feel they are most important. Can one or more of these layers be combined or separated? Would your ordering be affected based upon what type of data is being transmitted, why or why not? Defend why your choice of ordering is the way you have stated. Use the following scale: 1=most important and 5= least important.arrow_forward
- A 3200 bit long TCP message is transmitted to the IP layer and becomes a datagram after adding a 160 bit header. The following Internet is connected by two LANs through routers. But the data part of the longest data frame that the second LAN can transmit is only 1200 bits. Therefore, datagrams must be segmented in the router. How many bits of data does the second LAN transmit to its upper layer?arrow_forwardConsider each layer of the TCP/IP protocol stack and order them from most important to least. Can one or more of these layers be combined or separated? Would the kind of information being sent affect how you order, and if so, why or why not? Why did you decide to place your order that way? To assist you, use the following scale: The most important component is represented by 1, while the least important factor is represented by 5.arrow_forwardOne, why do protocols like HTTP, FTP, SMTP, and POP3 use TCP instead than UDP? When comparing Routing and Forwarding, what are the key distinctions? Three, explain HOL blocking. Which ports, input or output, are affected?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning