![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem P20P
Program Plan Intro
Leaky Bucket:
The request that are available at the wide range are stored and organized such that the rate of the output packet is set for the transfer that happens to the network is called as leaky bucket
Working of leaky bucket:
- Leaky bucket consists of a bucket that can hold up to b tokens.
- Tokens are being added to the bucket.
- The tokens are generated at the rate r token per second.
- The bucket gets filled when it contains b less than tokens
- The new tokens are added into the bucket.
- If the bucket is full newly generated tokens are being ignored.
- The token bucket remains full with b tokens.
Policing the packet flow:
- Consider a packet is transmitted into the network, a token needs to be removed from the token bucket.
- If the token bucket is empty, the packets are required to wait for the token.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Trending nowThis is a popular solution!
![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
In the scenario shown in Figure below, A is sending a frame to A' and after receiving
that frame, A' sends a frame back to A. Explain the steps that are carried out by A, A',
and the switch to populate its table such that packets from A can be switched to A'
and vice versa.
A
C'
B
3
B'
A'
5.
We consider a noisy communication link in which the message is encoded into binary digits (0,1) (bits)before being transmitted. We will denote the length of the encoded message by n. Since the channel isnoisy, the bits can get flipped; a 0 to 1 or a 1 to 0. We will assume that each bit is flipped independently withprobability p. In order to be able to detect that the received message is in error, a simple method is to add aparity bit at the transmitter. There can two types of parity - even parity and odd parity. If even (odd) parityis used , the parity bit is set such that total number of 1s in the encoded message is even (odd). For the sakeof this problem, we will only consider even parity. Here are a few examples1) message: 0001 + parity bit: 1 --> encoded message: 000112) message: 0101 + parity bit: 0 --> encoded message: 010103) message: 0111 + parity bit: 1 --> encoded message: 01111At the receiver, the parity bit is computed from the message bits. If the received parity…
When Bob wants to send Alice a message M on the Internet, he breaks M into n data packets, numbers the packets consecutively, and injects them into the network. When the packets arrive at Alice’s computer, they may be out of order, so Alice must assemble the sequence of n packets in order before she can be sure she has the entire message. Describe an efficient scheme for Alice to do this. What is the running time of this algorithm?
From Data Structures and Algorithms C-7.56
Chapter 9 Solutions
EBK COMPUTER NETWORKING
Ch. 9 - Prob. R1RQCh. 9 - Prob. R2RQCh. 9 - Prob. R3RQCh. 9 - Prob. R4RQCh. 9 - Prob. R5RQCh. 9 - Prob. R6RQCh. 9 - Prob. R7RQCh. 9 - Prob. R8RQCh. 9 - Prob. R9RQCh. 9 - Prob. R10RQ
Ch. 9 - Prob. R11RQCh. 9 - Prob. R12RQCh. 9 - Prob. R13RQCh. 9 - Prob. P1PCh. 9 - Prob. P2PCh. 9 - Prob. P3PCh. 9 - Prob. P4PCh. 9 - Prob. P5PCh. 9 - Prob. P6PCh. 9 - Prob. P7PCh. 9 - Prob. P8PCh. 9 - Prob. P9PCh. 9 - Prob. P10PCh. 9 - Prob. P11PCh. 9 - Prob. P12PCh. 9 - Prob. P13PCh. 9 - Prob. P14PCh. 9 - Prob. P15PCh. 9 - Prob. P16PCh. 9 - Prob. P17PCh. 9 - Prob. P18PCh. 9 - Prob. P19PCh. 9 - Prob. P20PCh. 9 - Prob. P21PCh. 9 - Prob. P22P
Knowledge Booster
Similar questions
- In the generic SR protocol, the sender transmits a message as soon as it is available (if it is in the window) without waiting for an acknowledgment. Suppose now that we want an SR protocol that sends messages two at a time. That is, the sender will send a pair of messages and will send the next pair of messages only when it knows that both messages in the first pair have been received correctly.Supposethat the channel may lose messages but will not corrupt or reorder messages. i) Outline an error-control protocol for the unidirectional rdt of messages. ii) Give an FSM description of the sender and receiver. iii) Describe the format of the packets sent between sender and receiver and vice versa. iv) If you use any procedure calls other than those in SR protocol (for example, udt_send(), start_timer(), rdt_rcv(), and so on),clearly state their actions. v) Give an example (a timeline trace of sender and receiver) showing how your protocol recovers from a lost packetarrow_forwardWrite a program to simulate routing using ooding. Each packet should contain a counter that is decremented on each hop. When the counter gets to zero, the packet is discarded. Time is discrete, with each line handling one packet per time interval. Make three versions of this program: all lines are flooded, all lines except the input line are flooded, and only the (statically chosen) best k lines are flooded. Compare flooding with deterministic routing (k=1) in terms of both delay and the bandwidth used.arrow_forwardPlease solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (d) What will be the window size of PC A after receiving only the first segment from webserver? (e)…arrow_forward
- Please solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (a) What will be the sequence number of the third TCP handshake signal send from PC to webserver?…arrow_forwardMaterial must be played out in a specific time intervals in order to be correctly interpreted by the recipient. Real-time protocols take varying transit times to get from source to destination. Even if packets are sent with the correct intervals, they will arrive at the other end with varying arrival times. Jitter is referred to as a fluctuation of pause time. We can buffer the packets for jitter reduction Let us say that, for the sake of argument, the noise is random, and the buffer is adequate. Armed with this knowledge, tell us what other difficulties are there?arrow_forwardMaterial must be played out in a specific time intervals in order to be correctly interpreted by the recipient. Real-time protocols take varying transit times to get from source to destination. Even if packets are sent with the correct intervals, they will arrive at the other end with varying arrival times. Jitter is referred to as a fluctuation of pause time. We can buffer the packets for jitter reduction Let us say that, for the sake of argument, the noise is random, and the buffer is adequate. Armed with this knowledge, tell us what other difficulties we can face.arrow_forward
- Give outcome for given scenario:A source had sent five packets and suddenly pause the animation before those packets had reached its destination. Now kill the first packet's ACK after it reaches its destination.arrow_forwardThe token bucket algorithm is a popular method for traffic shaping (recapthe algorithm in textbook Ch. 5.3.2). A computer uses a token bucket with a capacity of 400megabytes (MB), and a rate of 10 MB per second. The machine starts generating 20 MB persecond continuously when the bucket contains 200 MB. How long will it take to send 1000 MB?arrow_forwardAn input string S of length N is transferred through the network using a special protocol. The protocol can send the string through a series of operations. In one operation, we can choose a lowercase english alphabet and do one of the following: Transfer 1 copy of C through the network. Transfer 2 copies of C through the network. Each of the above transfers take 1 unit of time. Find the minimum time in which we can transfer the entire string S through the network. Note: Please Answer Python only Input 1 5 cbcdc Output 5arrow_forward
- Asaparrow_forwardIn an RPC-like protocol, where numerous requests can be active at the same time and responses can be given in any sequence, the following is possible: Pretend requests are sequentially numbered, and that ACK[N] confirms the receipt of reply[N]. Should the number of ACKs be cumulative? If not, what should happen in the event that an ACK is not received?arrow_forwardQ.No.2. In a network, at physical layer, the sender sends the data in continuous binary stream towards receiver, the receiver get confused about how many bits to combine in order to make the frame because the frames are not of fixed size. What you will suggest to make it work properly, suggest a solution that works on any given string. Please give the help of example also. Note: This question is from computer network.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education