数据通信与网络答案24

CHAPTER 24

Congestion Control and

Quality of Service

Solutions to Odd-Numbered Review Questions and ExercisesReview Questions

1. In congestion control, the load on a network is prevented from exceeding thecapacity. Quality of service refers to the characteristics that a flow of data seeks toattain. If there is good congestion control, then the QoS is also good and viceversa.

3. The average data rate is always less than or equal to the peak data rate.

5. Open-loop congestion control policies try to prevent congestion. Closed-loop con-gestion control policies try to alleviate the effects of congestion.

7. Congestion can be alleviated by back pressure, a choke point, and explicit signal-ing .

9. Frame Relay uses the BECN bit and the FECN bit to control congestion.

11. Scheduling , traffic shaping, admission control, and resource reservation can

improve QoS.

13. Differentiated Services was developed to handle the shortcomings of IntServ. The

main processing was moved from the core of the network to the edge of the net-work. Also, the per-flow service was changed to per-class service.

15. The attributes are access rate, committed burst size, committed information rate,

and excess burst size.

Exercises

17. The bit pattern is 10110000 0001011. The FECN bit is 0 and the BECN bit is 1.

There is no congestion in the forward direction, but there is congestion in the back-ward direction.

19.

Input: (100/60) × 12 + 0 × 48 = 20 gallons

Output: 5 gallons

Left in the bucket: 20 − 5 = 15

1

2

21.

a. The access rate is the rate of T-1 line (1.544 Mbps) that connects the user to thenetwork. Obviously, the user cannot exceed this rate.

b. The user data rate cannot exceed the access rate, the rate of the T-1 line thatconnects the user to the network. The user should stay below this rate (1.544Mbps ).

c. The CIR is 1 Mbps. This means that the user can send data at this rate all thetime without worrying about the discarding of data.

d. The user can send data at the rate of 1.2 Mbps because it is below the accessrate . However, the user sends 6 million bits per 5 seconds, which is above Bc (5million per 5 seconds), but below Bc +Be (6 million per 5 seconds). The networkwill discard no data if there is no congestion, but it may discard data if there iscongestion.

e. The user can send data at the rate of 1.4 Mbps because it is below the accessrate . However, the user sends 7 million bits per 5 seconds, which is above Bc and above Bc +Be (6 million per 5 seconds). In other words, the user rate isbeyond its share. The network will discard some data to limit the data rate. f. To be sure that the network never discard her data, the user should stay at orbelow CIR rate all the time, which means below or at 1 Mbps.

g. If the user can accept possible data discarding in case of congestion, she cansend at a higher rate if the number of bits is below Bc +Be (6 million per 5 sec-onds in this case). This mans that the user can send at 1.2 Mbps all the time ifshe accepts this risk.

23. CTD is the average cell transfer delay. If each cell takes 10 μs to reach the destina-

tion, we can say that CTD = [(10 μs × n ) / n ] in which n is the total number of cellstransmitted in a period of time. This means that CTD = 10 μs

CHAPTER 24

Congestion Control and

Quality of Service

Solutions to Odd-Numbered Review Questions and ExercisesReview Questions

1. In congestion control, the load on a network is prevented from exceeding thecapacity. Quality of service refers to the characteristics that a flow of data seeks toattain. If there is good congestion control, then the QoS is also good and viceversa.

3. The average data rate is always less than or equal to the peak data rate.

5. Open-loop congestion control policies try to prevent congestion. Closed-loop con-gestion control policies try to alleviate the effects of congestion.

7. Congestion can be alleviated by back pressure, a choke point, and explicit signal-ing .

9. Frame Relay uses the BECN bit and the FECN bit to control congestion.

11. Scheduling , traffic shaping, admission control, and resource reservation can

improve QoS.

13. Differentiated Services was developed to handle the shortcomings of IntServ. The

main processing was moved from the core of the network to the edge of the net-work. Also, the per-flow service was changed to per-class service.

15. The attributes are access rate, committed burst size, committed information rate,

and excess burst size.

Exercises

17. The bit pattern is 10110000 0001011. The FECN bit is 0 and the BECN bit is 1.

There is no congestion in the forward direction, but there is congestion in the back-ward direction.

19.

Input: (100/60) × 12 + 0 × 48 = 20 gallons

Output: 5 gallons

Left in the bucket: 20 − 5 = 15

1

2

21.

a. The access rate is the rate of T-1 line (1.544 Mbps) that connects the user to thenetwork. Obviously, the user cannot exceed this rate.

b. The user data rate cannot exceed the access rate, the rate of the T-1 line thatconnects the user to the network. The user should stay below this rate (1.544Mbps ).

c. The CIR is 1 Mbps. This means that the user can send data at this rate all thetime without worrying about the discarding of data.

d. The user can send data at the rate of 1.2 Mbps because it is below the accessrate . However, the user sends 6 million bits per 5 seconds, which is above Bc (5million per 5 seconds), but below Bc +Be (6 million per 5 seconds). The networkwill discard no data if there is no congestion, but it may discard data if there iscongestion.

e. The user can send data at the rate of 1.4 Mbps because it is below the accessrate . However, the user sends 7 million bits per 5 seconds, which is above Bc and above Bc +Be (6 million per 5 seconds). In other words, the user rate isbeyond its share. The network will discard some data to limit the data rate. f. To be sure that the network never discard her data, the user should stay at orbelow CIR rate all the time, which means below or at 1 Mbps.

g. If the user can accept possible data discarding in case of congestion, she cansend at a higher rate if the number of bits is below Bc +Be (6 million per 5 sec-onds in this case). This mans that the user can send at 1.2 Mbps all the time ifshe accepts this risk.

23. CTD is the average cell transfer delay. If each cell takes 10 μs to reach the destina-

tion, we can say that CTD = [(10 μs × n ) / n ] in which n is the total number of cellstransmitted in a period of time. This means that CTD = 10 μs


相关内容

  • 5 电信网络工程师认证考试复习题
  • 第五部分 电信基础知识及业务网部分 一. 单项选择题 1. 通信网络的发展大体上可分为()个阶段. A.2 B.3 C.4 D.5 答案:C 2. 我国固定电话网以从五级网演变成()级网. A.1 B.2 C.3 D.4 答案:C 3. 总线形网是所有节点都连接在()公共传输通道--总线上 A.一个 ...

  • [网络安全与管理(第二版)]网络安全试题3
  • 网络安全试题三 一.判断题(每题1分,共25分) 1. 在网络建设初期可以不考虑自然和人为灾害. 2. 计算机病毒具有破坏性和传染性. 3. 确认数据是由合法实体发出的是一种抗抵赖性的形式. 4. EDS和IDEA是非对称密钥技术. 5. 在非对称密钥密码体制中,发信方与收信方使用相同的密钥. 6. ...

  • 网络安全试题题库
  • 网络安全练习题 一.单项选择题 1. 在以下人为的恶意攻击行为中,属于主动攻击的是 A .身份假冒 B .数据GG C .数据流分析 D .非法访问 (标准答案:A) 2. 在网络攻击的多种类型中,以遭受的资源目标不能继续正常提供服务的攻击形式属于哪 一种? A. 拒绝服务 B. 侵入攻击 C. 信 ...

  • 2017冬计算机网络基础在线作业
  • 您的本次作业分数为:96分单选题 1. [第1章]在OSI 参考模型的7层结构中,实现帧同步功能的是(). A 物理层 B 数据链路层 C 网络层 D 运输层 正确答案:B 单选题 2. [第1章]下列哪一个关于交换的描述是不正确的?() A 电路交换采用存储转发技术 B 分组交换采用存储转发技术 ...

  • 人民银行信息安全知识竞赛题库--整理版
  • 1.杀毒软件能够( ). a .消除已感染的所有病毒b .发现并阻止任何病毒的入侵c .杜绝对计算机的侵害d .发现病毒入侵的某些迹象并及时清除或提醒操作者 正确答案.d 2.关于计算机软件的叙述,错误的是( ). a .软件是一种商品b .软件借来复制也不损害他人利益c .<计算机软件保护条 ...

  • 计算机网络题目及答案
  • 第一章 引论 1.计算机网络的发展可划分为哪几个阶段?每个阶段各有何特点?P1-9 (重点)2.什么是计算机网络?P11-12 3.利用计算机网络可以共享哪些资源?P12 4.计算机网络与分布式计算机系统之间的区别和联系是什么?P13 5.计算机网络由哪些部分组成,什么是通信子网和资源子网?试述这种 ...

  • 网络效应公需课考试卷 001
  • 一.单项选择题 1.在生产领域,互联网使小众商品的生产变得( ). A.简便且廉价 B.复杂且昂贵 C.简便且昂贵 D.复杂且廉价 正确答案:A 2.要做好小众商品销售平台,就不应该( ). A.主观预测应该主打推荐的商品 B.将同一产品的不同种类都放到市场中 C.促使顾客参与到产品或服务的评论当中 ...

  • 电大职业技能实训-电子商务专业
  • 职业技能实训 1.网络实用技术基础 2.电子商务概论 3.Dreamweaver网页设计 4.网络营销与策划 5.电子商务法律法规 友情提示: 1.不保证你所有的问题这里都有答案 可以保证大部分题目都在这里面 2.选项顺序是不一样的,要看清楚答案 3.使用Ctrl+F 把需要搜的问题粘贴到到里面搜索 ...

  • 以太网交换机的配置
  • 以太网交换机的配置 一.单选题(选择一项正确的答案,共10题,每题5分) 1.在交换机中用户权限分为几个级别( ). A.1 B.2 C.3 D.4 考生答案:D 具体得分:5 2.网络管理系统中,管理对象是指( ). A.网络系统中各种具体设备 B.网络系统中各种具体软件 C.网络系统中各类管理人 ...

  • 尔雅 移动互联网时代的信息安全与防护
  • 1.1 1 [单选题]<第35次互联网络发展统计报告>的数据显示,截止2014年12月,我国的网民数量达到了()多人. ∙ ∙ ∙ ∙ A .2亿 B .4亿 C .6亿 D .8亿 我的答案:C 得分: 33.3分 2 [判断题]<第35次互联网络发展统计报告>的数据显示, ...