Exam 2 Paper Review Questions Flashcards
What causes congestion collapse to occur?
Dropped packets and excessive queueing delays exacerbate the problem. Not only do dropped packets cause additional traffic, spurious retransmissions occur. It is not the normal traffic that causes collapse but the extra traffic caused by congestion.
What is a spurious retransmission?
Spurious retransmission occurs when there is a timeout that causes retransmission, but the packet retransmitted was only delayed and not lost.
What is efficiency in a congestion control scheme?
Efficiency is how much of the available bandwidth is used. (i.e. can we leave little or no bandwidth wasted?)
What is fairness in a congestion control scheme?
Fairness is how the bandwidth is allocated between different flows. Two common definitions of fair are that all flows get equal throughput, or that all flows get throughput proportionate to their demand.
What is the difference between fairness and efficiency in a congestion control scheme?
Efficiency is how much of the available bandwidth is used, i.e., efficient congestion control leaves little or no bandwidth wasted. (Some definitions of efficiency may refer specifically to bandwidth used to do “productive work”, thus excluding overhead traffic.) Fairness is how bandwidth is allocated between different flows. Two common definitions of fair are that all flows get equal throughput, or that all flows get throughput proportionate to their demand.
Why might you build a video-calling service on top of UDP in-place of using TCP?
Latency is critical & retransmissions are pointless. The call is real-time and so the delivery guarantee of TCP is not necessary. Again, dropped frames are not a big deal as the next frame will advance the video state before a retransmitted frame could arrive anyway. Congestion control and flow control provided by TCP can cause unacceptable delays.
Why does the linear growth rate of TCP-Reno (1/RTT) perform poorly for short lived flows in networks with large bandwidth and delay products?
The time period required for the congestion window to reach its maximum value is very large (on the order of minutes and hours) for TCP-Reno in paths with large bandwidth-delay products. Short lived flows may never reach a congestion event, meaning the flow unnecessarily transmitted slower than necessary over its entire lifetime to avoid congestion.
What kinds of web traffic stand to benefit most from utilizing the TFO option?
Short lived TCP connections (small data sizes) on links with large propagation delays. The performance of these flows are dominated by RTT. Using TFO removes 1 RTT of delay. This reduction in RTT penalty incurred by 3WHS is highly beneficial.
How does TFO prevent a source address spoof attack?
An attacker can send many HTTP GET requests for large resources to a victim server, spoofing a victim host address as the requestor. The victim server would then perform the expensive data fetch operations and transmit large volumes of data to a victim host. The result is a denial of service attack on both viticims. TFO prevents this by using an encrypted cookie that must be requested by the requestor before initiating requests. The server uses this cooke to verify that the requested address is not a forgery.
How can a trivial implementation of TCP Fast Open be exploited to mount a source address spoof attack?
An attacker can send many HTTP GET requests for large resources to a victim server, spoofing a victim host address as the requestor. The victim server would then perform the expensive data fetch operations and transmit large volumes of data to a victim host. This results in a denial of service attack on both victims.
What two categories do we typically classify traffic sources into?
constant bit rate (CBR) and variable bit rate (VBR) sources.
How do we shape CBR traffic?
According to peak rate typically
How do we shape VBR traffic?
VBR traffic is often shaped according to an average rate, and a peak rate.
Would you use a leaky bucket or a token bucket to shape a constant bit rate (CBR) audio stream?
CBR is not burst and so the traffic shaping mechanism need not handle bursts. The leaky bucket would suffice to keep the stream smooth and even out any bursts.
Why is traffic shaping necessary?
burst traffic in data networks need to be handled because they can fill buffers and cause packets to be lost.