II2025 Exercise 3B
II2025 Exercise 3B
Exercise 3B
In this non-mandatory part of the course,
Welcome to you will learn to
calculation - answer concrete, numerical questions on the subject
matter
9, repeating the units after exactly nine time units discount time stamp, all packages arrive on time
1,2,3,4,6,6,7,8
TIME t=0 t=1 t=2 t=3 t=4 t=5 t=6 t=7 t=8
PACKETS 0+3 1+1 1+1 1+1 1+0 0+0 0+2 0+2 0+0
SENT (#) 2 (1,2) 1 (3) 1 (4) 1 (5) 1 (6) 0 2 (7,8) 1 (9) 1 (10)
SENT (WAIT) 2(0) 4(0) 6(0) 1(3) 3(3) 8(0) 5(3) 10(0) 12(0) 7(6) 9(5) 11(3)
(0+0+0+3+3+0+3+0+0+6+5+3)/12 = 1.917
4. A router is using a token bucket algorithm for congestion control. It has a capacity (C) of 250 KB and the maximum output rate (M) of 25 MB/s.
Tokens are inserted into the bucket at rate (r) of 2 MB/s. What is the maximum burst length (T)? C = token bucket capacity (B) = 250KB = 250,000 B
Round your answer to milliseconds with no decimals. r = token arrival rate (B/s) = 2MB/s = 2,000,000 B/s
T=250KB/(25MB/s-2MB/s)=0.010869 s = 11ms M = maximum output rate (B/s) = 25MB/s = 25,000,000B/s
T = burst length (s) = C/(M-r)
5. A host needs to send 1MB of burst data, but the router is using the token bucket algorithm described in question #4. Assume that the bucket is
already full, so M*T of the data is transmitted during the burst. How long does it take to transmit the rest of the data? Write your answer in ms
without decimals.
1MB-275KB=725KB, use token arrival rate to calculate 725KB / 2MB/s=362.5ms
44100*2*2B/1024B=172,3
7. In a multimedia system, errors can be corrected using Forward Error Correction (FEC) methods. The system in question implements error detection
and correction by introducing redundancy into the system by encoding 4 bit data words into 7 bit data words (e.g., using Hamming(7,4)). Choose the
correct statements - how the chosen FEC method affect the network traffic characteristics:
8. In a multimedia system, errors can be detected and corrected using FEC methods. The system in question transmits 8 bit data words to the receiver.
The error correction is implemented by computing a third packet: a parity packet from the two data packets, which can be used to recover one
packet of the two packets using the other packet and the parity packet (see the picture).
Choose the correct statements - how does the FEC method affect the network traffic
characteristics?
- Quality does not degrade until the communication channel experiences major packet loss, which causes significant degradation in quality (original n
chunks can be reconstructed if there is at most one lost chunk from the n+1 chunks)
- In order to playout media chunk, all three packets have to arrive; therefore, playout delay increases (playout delay needs to be fixed to the time to receive
all n+1 packets!)
b) Now, divide the incoming packets as follows: odd numbered packets are from class A and even-numbered
packets are from class B. Class A has a WFQ weight of 2, while class B has WFQ weight of 1. What are the
average delays experienced by classes A and B compared to the total average?
521150A Introduction to Internet 2025: Exercise 3B University of Oulu
Problem #13
Consider the packet arrival sequence of RTP packets (PCM µlaw encoded audio) below, consisting of two talk
spurts. RTP audio sampling clock rate is 8000Hz.
RTP sequence number RTP timestamp network delay (seconds)
1 160 0.40
2 320 0.30
3 480 0.35
4 800 0.32
5 960 0.27
6 1120 0.45
Assume that the first packet is transmitted at time zero. Create the following table minimising the playout delay
without losing any packets. You can work non-causally, i.e., may look ahead in time. Meaning, that you know in
advance the network delay of future packets.