Transport layer protocols for ad hoc networks
|
|
|
- Elijah Barnett
- 10 years ago
- Views:
Transcription
1 Transport layer protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov
2 Which transport layer protocol? Classification of transport layer protocols; Traditional TCP; Why does not TCP work well in ad-hoc networks? TCP enhancements; Other transport layer protocols. Lecture: Transport layer protocols for ad hoc networks 2
3 1. Which transport layer protocol? TCP dominates in wired Internet with the traffic share in between 80% 90%. It is characterized by the following properties: TCP is reliable; TCP incorporates congestion control mechanism; TCP incorporates end-to-end flow control mechanism. The following observations can be made concerning ad-hoc networks: it is preferable to seamlessly integrate TCP in ad-hoc networks: to enable seamless operation of higher layer protocols such as FTP, SMTP, HTTP. if not, to make as less modifications to TCP as possible: to make wireless and wired TCPs understand each other seamlessly. if not, to split the TCP into wireless and wired part: to concentrate internetworking functions in gateways. Lecture: Transport layer protocols for ad hoc networks 3
4 2. Classification of the transport layer protocols Transport layer protocols for ad-hoc wireless networks TCP modifications Split approaches End-to-end approaches - ACTP; - ATP. Other protocols - Split-TCP. - TCP-ELFN; - TCP-F; - TCP-BuS; - ATCP. Figure 1: Classification of transport layer protocols for ad-hoc networks. Lecture: Transport layer protocols for ad hoc networks 4
5 3. Traditional TCP The major responsibilities of TCP in an active session are to: provide reliable in-order transport of data: to not allow losses of data. control congestions in the networks: to not allow degradation of the network performance. control a packet flow between the transmitter and the receiver: to not exceed the receiver s capacity. In general, we distinguish between the following operational phases in TCP: slow-start phase (also known as exponential start); congestion avoidance phase; congestion control phase; fast retransmit phase; fast recovery. Lecture: Transport layer protocols for ad hoc networks 5
6 1. TCP SEGMENT STRUCTURE 32 bits Source port number Destination port number Sequence number Acknowledgement number Header length Unused U R G A C K P S H R S T S Y N F I N Window size Checksum Pointer to urgent data Options Data Figure 2: TCP segment structure. Lecture: Transport layer protocols for ad hoc networks 6
7 2. TCP CONNECTION ESTABLISHMENT AND TEAR DOWN Sender Receiver Conn. req. SYN segm. (SYN=1, seqnum= x, nodata, ) Conn. OK. SYNACK (SYN=1, seqnum= y, ack=x+1, nodata, ) ACK (SYN=0, seqnum=x+1, ack=y+1, nodata, ) FIN (FIN=1, nodata, ) ACK (nodata, ) FIN (FIN=1, nodata, ) ACK (nodata, ) Figure 3: TCP connection establishment and tear down. Lecture: Transport layer protocols for ad hoc networks 7
8 3. ROUND TRIP TIME AND TIMEOUT Every time TCP sends a segment, it starts a timeout: it must be larger than RTT: to avoid unnecessary retransmission; it should not be much larger than RTT: to not introduce big delays. The following dynamic expression is used for setting a timeout: Timeout = Estimate of RTT + 4 Deviation, where Sample RTT = t(the ACK is received) t(the segment is sent to IP); Estimate of RTT = (1 x) Estimate of RTT + x Sample RTT; x = 0, 125 is mostly chosen given more wait to recent Sample RTT; Deviation = (1 x)deviation + Sample RTT Estimate of RTT ; Note 1: small deviations of Sample RTT: Timeout > Estimate of RTT; Note 2: big deviation of Sample RTT: Timeout Estimate of RTT. Lecture: Transport layer protocols for ad hoc networks 8
9 3.1. Reliable in-order data delivery Reliable in-order data transfer of TCP ensures the following: data stream in the receiver s buffer is uncorrupted; data stream in the receiver s buffer is in order (no gaps, no duplications). TCP at the client: frames application layer data into segments; each time TCP releases a segment to IP layer a timer starts; the following three cases are possible here: if the timer expires and no ACK is received, the TCP retransmits a segment; if ACK is received the TCP should check: this is a first-time ACK: all data up to the acknowledged byte have received correctly and in order. this is a duplicate ACK (DUPACK): some data have been received out of order, retransmit the segment. Lecture: Transport layer protocols for ad hoc networks 9
10 3.2. Flow control rcvbuf data from IP Available space TCP data in the buffer reading rcvwin Figure 4: The receive window (rcvwin) at the receive buffer (rcvbuf). Flow control service is a rate matching provided by TCP using the dynamic rcvwin: rcvwin is sent with every ACK to the sender; initially, rcvwin = rcvbuf; for next ACK the receiver sends: rcvwin = rcvbuf ( lastbytercv lastbyteread ); the sender must ensure that ( lastbytesent lastbyteacked ) rcvwin to not overflow. Lecture: Transport layer protocols for ad hoc networks 10
11 3.3. TCP Tahoe congestion control Every transmission starts with connection setup and followed by slow start phase: the sender starts the session with a congestion window set to maximum segment size (MSS): it sends MSS bytes of data; starts retransmission timeout (RTO) and waits for acknowledgement packet (ACK). if ACK is received in RTO the congestion window is doubled and two MSSs of data are sent; the congestions window is doubled with every ACK until it reaches slow-start threshold; Congestion window size, MSSs time Figure 5: Slow-start phase in TCP. Lecture: Transport layer protocols for ad hoc networks 11
12 The slow-start phase is followed by congestion avoidance phase: when the slow-start threshold is reached, the congestion window grows linearly (AI); if the ACKs are received before timers (RTOs) expire: the congestion window grows until the receiver window advertised in connection setup; (lastbytesent lastbyteacked) rcvwin to NOT allow overflow! Congestion window size, MSSs time Figure 6: Congestion avoidance phase in TCP. Lecture: Transport layer protocols for ad hoc networks 12
13 If the ACK is not received in RTO, TCP assumes the packets is lost (congestion): TCP enters the congestion control phase performing the following: reduces the slow-start threshold to 1/2 of current CW (MD); resets the congestion window to one MSS; activates the slow-start algorithm and resets the timeout. Congestion window size, MSSs time Figure 7: Congestion control phase in TCP. Lecture: Transport layer protocols for ad hoc networks 13
14 3.4. TCP Tahoe with fast retransmit TCP Tahoe uses the fast retransmit procedure to respond to losses: if the sender receives three out-of-order segment with higher than expected seq. number; resend the out-of-order segment before timeout expires and enter slow start phase. Sender Receiver Segment 1 DUPACK Segment 2 timeout out of order DUPACK Segment 3 DUPACK Segment 0 Figure 8: Fast retransmit procedure of TCP Tahoe. Lecture: Transport layer protocols for ad hoc networks 14
15 3.5. TCP Reno DUPACKs are not indication of severe congestion. On arrival of three DUPACKs: TCP Reno enters the fast recovery phase and performs the following actions; retransmits the lost segment and does not enter slow start phase; reduces the slow-start threshold to 1/2 of the current CW ; reduces the CW to a 1/2 of the current CW + 3. increases the CW linearly with reception of subsequent DUPACKs; one MSS per a DUPACK (meaning that one more packet left the network). on reception of ACK (this ACK is due to retransmission) the sender: resets the CW with the slow-start threshold; enters the congestion avoidance similar to TCP Tahoe. More improvements are available: TCP NewReno; TCP SACK. Lecture: Transport layer protocols for ad hoc networks 15
16 Congestion window size, MSSs TCP Reno TCP Tahoe time Figure 9: Fast recovery procedure of TCP Reno. Lecture: Transport layer protocols for ad hoc networks 16
17 4. Why does not TCP work well in ad-hoc networks? The following reasons are behind the poor performance of TCP in ad-hoc networks: Misinterpretation of packet loss: wired networks: packets losses are mainly due to congestions; ad-hoc wireless networks: high packet loss due to: high BER (wired link < 10E 9, wireless link: 10E 5 10E 4 and even higher); collisions due to hidden terminal problem; interference: wired links are well isolated, wireless links interfere; frequent path breaks: wired: due to failures, wireless: mobility; large-scale and small-scale propagation phenomenons. Frequent path breaks: Frequent path path breaks topology changes route reconfigurations; RouteReconf. = f(number of node, Tx, topology, bandwidth, traffic, nature of routing); If RouteRecong. > RTO: TCP enters a slow start phase; Slow start: inefficient use of the resources. Lecture: Transport layer protocols for ad hoc networks 17
18 Effects of contention (dependency on the path length): With the increase in the number of hops in the path throughput decreases exponentially. Throughput Number of hops Figure 10: Throughput as a function of the number of hops. What are the reasons? The probability of the path break is given as: p b = 1 (1 p l ) k, (1) where p l is the probability of the link break. Lecture: Transport layer protocols for ad hoc networks 18
19 Pr of path break Number of hops Figure 11: Probability of path break as a function of the number of hops. Misinterpretation of congestion window: CW is the rate that is acceptable for the network and the receiver. old path: CW reflects its rates; reconfiguration occurs: what are new CW and RTO? new path: old CW may not reflect acceptable rates. Lecture: Transport layer protocols for ad hoc networks 19
20 Asymmetric link behavior: Sometimes wireless links are directional in ad-hoc networks leading to: delivery of a packet to a node and failure in the delivery of ACK back; congestion control algorithm could be invoked due to this; some routing protocols require the forward and backward paths to be the same. Resource contention: both DATA and ACK require RTS-CTS-DATA-ACK at the data-link layer; contention for resources in the same link at forward and backward paths; this contention may not be the same. Multipath routing: Some routing protocols use multiple paths between the source and destination leading to: high number of out-of-order packets leading to DUPACKs; different RTO values leading to unnecessary retransmissions. Lecture: Transport layer protocols for ad hoc networks 20
21 Network partitioning and merging: Figure 12: Partitioning and merging in ad-hoc networks. Lecture: Transport layer protocols for ad hoc networks 21
22 5. TCP enhancements 5.1. Feedback-based TCP (TCP-F) TCP-F requires the following to enhance performance: support of reliable data-link layer protocols; routing support to inform the TCP sender about path breaks; routing protocol is expected to repair the broken path within a reasonable time. The aim of TCP-F: minimize the throughput degradation resulting from path breaks. Receiver Sender Receiver Figure 13: Link break in ad-hoc network. Lecture: Transport layer protocols for ad hoc networks 22
23 In TCP-F an intermediate node upon detection of the link break: obtains information from TCP-F sender s packets routed via this node; generates a route failure notification (RFN) packet; routes this packet to the TCP-F sender; does not forward any packet from this connection; updates its routing table; stores information about generation of a RFN packet. Any intermediate node that forwards the RFN packet: if this node has an alternative route to destination: discards the RFN packet and uses this path to forward other packets: this allows to reduce an overhead involved in route re-establishment! if this node does not alternate route to destination: updates its routing table and forwards the RFN packet to the source. Lecture: Transport layer protocols for ad hoc networks 23
24 When TCP-F sender receives the RFN packet it enters the so-called snooze state: stops sending packet to the destination; cancels all the timers; freezes the congestion window; sets up a route failure timer = f(routing protocol, network size, network dynamic): when failure timer expires TCP-F enters the connected state. If the broken links rejoins or intermediate node obtains a new path to destination: route reestablishment notification (RRN) is sent to TCP-F sender; When the sender receives RRN packet: reactivates all timers and congestion window assuming that the network is back; starts transmitting data available in the buffer; takes care of packets lost due to path break. Lecture: Transport layer protocols for ad hoc networks 24
25 Sender (connected) A B C D Sender (from connected to snooze) A B C D RFN RFN Sender (from snooze to connected) A B C D RRN RRN Figure 14: Operation of TCP-F. Lecture: Transport layer protocols for ad hoc networks 25
26 The following advantages and shortcomings are inherent for TCP-F: +: provides simple feedback to minimize problems due to link breaks; +: still allows congestion control occurring due to buffer overflows; : requires merging of transport and network layer features (at least, cross-layering); : requires ability of nodes to detect path breaks; : requires ability of routing protocols to repair a link within a reasonable time; : requires ability of node to determine the TCP-F sender; : reactivated congestion window may not reflect allowed network rate. TCP-F End-to-end transport IP layer (routing) Routing updates Data-link layer (MAC part) Detection of link failures Figure 15: Communications in the protocol stack as required by TCP-F. Lecture: Transport layer protocols for ad hoc networks 26
27 5.2. TCP with explicit link failure notification (TCP-ELFN) According to TCP-ELFN an explicit link failure notification is used. When an intermediate node detects a link failure: sends an explicit link failure notification (ELFN) to TCP-ELFN sender: either sending an ICMP destination unreachable message (DUR); or inserting info regarding link break in RouteError message of the routing protocol. Once the TCP-ELFN sender receives the ELFN packet: it disables its retransmission timer and CW ; enters a standby state. Being in standby state the TCP-ELFN sender: periodically originates probe packets to see if a new route is established; when ACK for a probe packet is received TCP-ELFN continues to perform as usual. Lecture: Transport layer protocols for ad hoc networks 27
28 Sender (connected) A B C D Sender (standby) A B C D Sender (standby) ICMP(DUP), RouteError A B C D probe probe Sender (connected) A routeok B C D routeok Figure 16: Example of TCP-ELFN. +: provides path break information to the sender; +: does not heavily depend on routing protocol capabilities; : periodic packets consume bandwidth, sometimes it may not help (partitioning); : reactivated congestion window may not reflect the new allowed network rate. Lecture: Transport layer protocols for ad hoc networks 28
29 5.3. TCP with buffering and sequence information (TCP-BuS) TCP-BuS is characterized by the following: protocol tries to notify the source about the path breaks using the feedback info; this protocol is more dependent on routing protocol compared to TCP-F and TCP-ELFN. TCP-BuS was proposed for usage with associativity-based routing (ABR) and uses: localized query (LQ) message of ABR; REPLY message of ABR. Both these messages are modified to carry TCP connection and segment information. Sender intermediate upstream Receiver A B C D E intermediate downstream Figure 17: Basic definitions for TCP-BuS protocol. Lecture: Transport layer protocols for ad hoc networks 29
30 When a link break is detected, intermediate downstream node: generates a route notification (RN) message to TCP-BuS receiver: RN includes the sequence number of packet belonging to that flow in the head of its queue; all packets belonging to this flow are discarded at all intermediate nodes that forward RN. When a link break is detected, intermediate upstream node: generate explicit route disconnection notification (ERDN); when ERDN is received by the sender, it stops sending and freezes timers CW ; all packets in transit nodes are buffered, till new partial path is found by source of ERDN; tries to find a new (partial) route to the TCP-BuS receiver; if it finds, explicit route successful notification packet (ERSN) to the sender is sent. When ERDN is received the following is done at the sender: comparing sequence numbers segments are selectively retransmitted. Lecture: Transport layer protocols for ad hoc networks 30
31 TCP-BuS receiver 12 RN TCP flow 1 5 LQ REPLY 3 9 ERDN ERDN TCP-BuS sender 7 Figure 18: Operation of TCP-BuS connection. Lecture: Transport layer protocols for ad hoc networks 31
32 The following advantages and shortcomings are inherent for TCP-BuS: +: avoidance of retransmissions due to buffering, usage of sequence numbers; +: selective retransmission improves the performance of TCP; : dependency on the routing protocol (ABR); : buffering at intermediate nodes (they could be overflowed, thus, may fail) Ad hoc TCP This is a wise realization of TCP with feedback due to: usage of explicit congestion notification field (currently is under consideration in IETF); usage of intermediate slim layer between traditional TCP and IP layer; only a few functions; does not require a certain routing protocol; adaptation of congestion window to a new path. Aim is the same: to treat path breaks independently from congestion situations. Lecture: Transport layer protocols for ad hoc networks 32
33 Data TCP ATCP tcp_input() atcp_input() tcp_output() atcp_output() IP ip_input() ip_output() Data Figure 19: TCP/IP layered model featuring ATCP. The following are advantages of such a layered structure: ATCP logic is separated from classic TCP; no changes to TCP are required; in principle, ATCP can be realized and installed separately from TCP; simple primitives can be defined between ATCP and TCP layers. Lecture: Transport layer protocols for ad hoc networks 33
34 retransmits a DISCONN segment from a buffer DUPACK/ACK DUR DUR DUR NORMAL DUR: destination unreachable Tx: packet transmission DUPACK: duplicate ACK LOSS 3 DUPACKs ACK ECN ECN Tx CONGESTED Figure 20: ATCP state transition diagram. when a TCP connection is established, ATCP enters the NORMAL state; in the NORMAL state ATCP does not interfere with classic TCP and remains invisible. Lecture: Transport layer protocols for ad hoc networks 34
35 Consider the case when packets are lost or arrive out-of-order at destination: the receiver generate DUPACKs: Traditional TCP (e.g. Tahoe): the sender retransmits the segment; decrease its congestion window accordingly. ATCP: counts, waits if the number of DUPACKs reaches three; if so, it puts ATCP in the LOSS state and does not invoke the congestion control; in the LOSS state ATCP retransmits unacked segments from the sender s buffer. When ATCP is in the LOSS state: if new ACK is received from the receiver ATCP enters the NORMAL state; if ECN is received it enters the CONGESTED state; if ICMP DUR is received it enters the DISCONNECTED state. Lecture: Transport layer protocols for ad hoc networks 35
36 When ATCP is in the NORMAL state: three DUPACKs are received ATCP enters goes to LOSS state; if ECN is received it enters the CONGESTED state and remains invisible for TCP; if ICMP DUP is received it enters the DISCONNECTED state. When ATCP is in the DISCONNECTED state: decrease the congestion window to one; remains in this state; if either ACK or DUPACK is received, it goes into NORMAL state. It is expected that the new route is found and the source is informed. When ATCP is in the CONGESTED state: if ICMP DUR is received it goes into DISCONNECTED state. Lecture: Transport layer protocols for ad hoc networks 36
37 In general, the following is made in ATCP: packet loss due to high BER: retransmits lost packet route reconfiguration delay and transient partitions: stops transmission until the new route has been found out-of-order packet delivery: makes classic TCP unaware of it and retransmits the packet from TCP buffer change in route: recomputes the congestion window The following advantages and shortcomings are inherent: +: compatible with traditional TCP; +: maintains the end-to-end semantics of TCP; : requires support from routing protocol (route changes, partition detection); : requires changes to interface functions. Lecture: Transport layer protocols for ad hoc networks 37
38 5.5. Split TCP The following are two major problems with TCP: degradation of throughput with increase in the path length: Short connections obtain more throughput than long connections. Throughput Number of hops Figure 21: Throughput as a function of the number of hops. Lecture: Transport layer protocols for ad hoc networks 38
39 unfairness among TCP flows: MAC layer contention (IEEE MAC: channel capture effect): lengthy TCP flows more points to contend. Figure 22: Unfairness in TCP flows in ad-hoc networks. Lecture: Transport layer protocols for ad hoc networks 39
40 Split-TCP provides the solution by splitting the TCP functionalities into two aims: congestion control; end-to-end reliability. Why it is possible? congestion control: local phenomenon due to high contention for resources; end-to-end reliability: end-to-end phenomenon. End-to-end delivery Congestions Figure 23: Congestion control and end-to-end reliability. Lecture: Transport layer protocols for ad hoc networks 40
41 Split-TCP splits the connection into a set of concatenated TCP connections. R segment 1 (zone 1) S segment 2 (zone 2) proxy node Figure 24: Splitting of the TCP connection into segments (zones). Proxy node is responsible for: terminating the connection from the sender/precessor proxy node; setting up a connection with receiver/successor node. Lecture: Transport layer protocols for ad hoc networks 41
42 Proxy nodes are chosen using the distributed algorithm: simplest way: packet traversed n hops - behave as a proxy. Transmission control at the TCP sender window is split into: end-to-end CW : it is updated according to arrival of end-to-end ACKs. CW : (CW end-to-end CW ) it is updated according to arrival of local ACKs (LACKs) from the next node. The proxy node behaves as follows: it maintains CW that governs transmission in a segment; when packet arrives from predecessor the LACK is sent back; arrived packet is buffered; the buffered packet is forwarded to the next node. Lecture: Transport layer protocols for ad hoc networks 42
43 R segment 1 (zone 1) S segment 2 (zone 2) proxy node TCP data flow; LACK; end-to-end ACK; network link. Figure 25: Flows in split-tcp. Lecture: Transport layer protocols for ad hoc networks 43
44 The following advantages and shortcomings are inherent for split-tcp: +: improved throughput: reduction in the path length; +: improved throughput fairness: each segment works at the most suitable rate; : requires modifications to TCP; : the end-to-end connection handling is violated; : the failure of proxy nodes may lead to throughput degradation; : security encryption schemes may not work (intermediate nodes have to process). : high resource consumption (buffer space). Lecture: Transport layer protocols for ad hoc networks 44
45 Table 1: Comparison of TCP solutions for ad-hoc networks. Issue TCP-F TCP-ELFN TCP-BuS ATCP Split-TCP loss due to BER TCP TCP TCP no cong. cntrl TCP path break TCP snoozes TCP standby TCP snoozes TCP TCP out-of-order pckts TCP TCP resend reordering TCP congestion TCP TCP TCP ECN notif. TCP path break notif. yes yes yes yes no path reest. notif. yes no yes no no depend. on routing. yes yes yes yes no end-to-end semant. yes yes yes yes no buffer at inter. nodes no no yes no yes Lecture: Transport layer protocols for ad hoc networks 45
46 6. Other transport layer protocols TCP was not developed for wireless links. What are advantageous features of TCP: end-to-end reliability; congestion control due to high traffic contention; end-to-end flow control. What are reasons to deploy TCP in ad-hoc networks: HUGE INSTALLATION BASE; TCP is not a good candidate for wireless mobile ad-hoc environment. New protocol: could be more suitable than TCP for ad-hoc networks and wireless links; could be useful in military/medical or other specific applications. Lecture: Transport layer protocols for ad hoc networks 46
47 6.1. Application controlled transport protocol (ACTP) ACTP is a light-weight transport layer protocol: TCP: High reliability a lot of retransmissions low throughput. UDP: Is not reliable at all a lot of data just lost low reliability. ACTP: Is between TCP and UDP some lost data may be recovered higher performance. ACTP is characterized by the following: it is responsible for feedback to end application; end-to-end reliability is left to applications; priorities of packet are implemented; implementation of priorities is left to lower layers. Lecture: Transport layer protocols for ad hoc networks 47
48 Application layer sendto(delay,message,priority) ACTP layer IP IPoutput() isacked() Figure 26: Interface function used in ACTP is shown here. Each data to be transmitted contains the following information: delay (a maximum tolerable delay); number of the packet; priority of the packet. The delivery status is maintained at ACTP and available to application via isacked(): successful delivery of the packet (ACK was returned); possible loss of the packet (ACK is not returned within a deadline); remaining time for the packet (ACK is not returned but the deadline has not expired); no information available. Lecture: Transport layer protocols for ad hoc networks 48
49 The following peculiarities are used in ACTP: packet lifetime 4 RT O; packet can be retransmitted on a request from application layer; delay 0 high priority packet; packet without a message number is handled as classic UDP packet. The following advantages and shortcomings are inherent for ACTP: +: scalable for large networks (light-weight); +: allows to set priorities to data; +: no congestion window; : congestions are possible; : is not compatible with TCP; : suitable for particular applications only. Lecture: Transport layer protocols for ad hoc networks 49
50 6.2. Ad-hoc transport protocol (ATP) The following are the major difference between ATP and TCP: ATP uses rate based transmission; ATP separates congestion control and reliability: network congestion information is obtained from intermediate nodes; flow control and reliability information is obtained from ATP receiver. ATP uses assisted congestion control; ATP uses selective ACKs (SACKs). ATP uses the information available from underlying layers for: estimation of the initial transmission rate; detection, avoidance and control of congestion; detection of path breaks. Lecture: Transport layer protocols for ad hoc networks 50
51 The congestion information obtained from intermediate node is expressed in terms: weighted average queuing delay D Q : D Q = xd Qnew + (1 x)d Qold, (2) contention delay D C. During the connection setup phase or when ATP recovers from path break: ATP sender determines the transmission rate sending probe packets (quick start phase); intermediate node attaches the rate info in form of D C and D Q ; receiver responds with ACK. At the uplink path the following always occurs: D Q and D C at each intermediate node is included in rate feedback field (ABR); ATP receiver collects D Q and D C and includes them in periodic SACKs. Lecture: Transport layer protocols for ad hoc networks 51
52 When congestion occurs TCP uses: decrease of the CW. Instead, ATP defines three phases: increase: If new rate (R) is higher than the current rate and beyond the threshold γ then: S new = S old + R S old, (3) k is used (increased) where k is the fraction used to avoid rapid fluctuations. decrease: If new rate is lower than current the rate is decreased to a new rate. maintain: if new rate is higher that current but less than the threshold. Lecture: Transport layer protocols for ad hoc networks 52
53 Consider special cases: ATP sender has not received ACK for two consecutive feedback periods: it undergoes multiplicative decrease of the transmission rate. ATP sender has not received ACK for three consecutive feedback periods: it assumes that the connection is lost and enters the connection establishment phase. When path break occurs: the network layer detects it and originated ELFN packet toward ATP sender; the ATP sender freezes the sender state and enters the connection establishment phase; if the connection is established the sender begins transmission again. The following advantages and shortcomings are inherent for ATP: +: improved performance in ad hoc network: decoupling of congestion control and reliability; avoiding fluctuations of the congestion window. : lack of interoperability with TCP. Lecture: Transport layer protocols for ad hoc networks 53
TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Chapter 9 TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS 9.1 INTRODUCTION The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
TCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
TCP Over Wireless Network. Jinhua Zhu Jie Xu
TCP Over Wireless Network Jinhua Zhu Jie Xu Overview 1. TCP congestion control scheme 2. ECN scheme 3. Problems with TCP over wireless network 4. ATCP:TCP for mobile ad hoc networks 5. ptcp: a transport
Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Congestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
STUDY OF TCP VARIANTS OVER WIRELESS NETWORK
STUDY OF VARIANTS OVER WIRELESS NETWORK 1 DEVENDRA SINGH KUSHWAHA, 2 VIKASH K SINGH, 3 SHAIBYA SINGH, 4 SONAL SHARMA 1,2,3,4 Assistant Professor, Dept. of Computer Science, Indira Gandhi National Tribal
TCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
A Survey on Improving TCP Performance over Wireless Networks
A Survey on Improving TCP Performance over Wireless Networks Xiang Chen, Hongqiang Zhai, Jianfeng Wang and Yuguang Fang Dept. of Electrical and Computer Engineering University of Florida, Gainesville,
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
La couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Cours de C. Pham,
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006
CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
An Improved TCP Congestion Control Algorithm for Wireless Networks
An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA [email protected] Md. Humayun
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
TCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
A Study on TCP Performance over Mobile Ad Hoc Networks
215 A Study on TCP Performance over Mobile Ad Hoc Networks Shweta Sharma 1, Anshika Garg 2 1 School of Computing Science and Engineering, Galgotias University, Greater Noida 2 School of Computing Science
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology
TCP/IP Networking for Wireless Systems Integrated Communication Systems Group Ilmenau University of Technology Content Internet Protocol Suite Link Layer: Ethernet, PPP, ARP, MAC Addressing Network Layer:
TCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery
TCP Flow Control Computer Networks The receiver side of a TCP connection maintains a receiver buffer: Lecture : Flow Control, eliable elivery application process may be slow at reading from the buffer
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Chapter 6 Congestion Control and Resource Allocation
Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
La couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
Improved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
Computer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Higher Layer Protocols: UDP, TCP, ATM, MPLS
Higher Layer Protocols: UDP, TCP, ATM, MPLS Massachusetts Institute of Technology Slide 1 The TCP/IP Protocol Suite Transmission Control Protocol / Internet Protocol Developed by DARPA to connect Universities
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Chapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks
A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks Thomas D. Dyer Computer Science Division The Univ. of Texas at San Antonio San Antonio, TX 8249 [email protected]
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
Active Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu ([email protected]) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Data Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Recent advances in transport protocols
Recent advances in transport protocols April 12, 2013 Abstract Transport protocols play a critical role in today s Internet. This chapter first looks at the evolution of the Internet s Transport Layer
Effect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
Distributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
TCP PACKET CONTROL FOR WIRELESS NETWORKS
TCP PACKET CONTROL FOR WIRELESS NETWORKS by Wan Gang Zeng B. Sc. in Computer Science, University of Ottawa, 2000 THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of
The OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS
SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS by Rajashree Paul Bachelor of Technology, University of Kalyani, 2002 PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
TCP in Wireless Environments: Problems and Solutions
TCP in Wireless Environments: Problems and Solutions YE TIAN, KAI XU, AND NIRWAN ANSARI Abstract The Internet provides a platform for rapid and timely information exchange among a disparate array of clients
