High Speed Internet Access Using Satellite-Based DVB Networks

Size: px
Start display at page:

Download "High Speed Internet Access Using Satellite-Based DVB Networks"

Transcription

1 High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE, UK. Abstract Digital Video Broadcasting (DVB) provides the opportunity for high-speed Internet delivery direct to user s homes and offices. Most applications require full duplex communication, and the return path from the user to the Internet will be provided using lower speed terrestrial connections. Two challenges are presented when using DVB for high-speed Internet access: the poor performance of TCP over network paths with a high bandwidth delay product (LFN) and the impact of asymmetric network paths. The second effect is most significant and results in a problem, which we have termed ACK congestion. The performance of TCP using a DVB satellite link is analysed through simulation and a set of techniques is proposed which provide significant improvement. 1 Introduction The growing use of multimedia-capable personnel computers to access the Internet and in particular, the use of world wide web, has resulted in a growing demand for Internet bandwidth. The emphasis has moved from basic Internet access to the expectation that connectivity may be provided whatever the location. This presents fresh challenges to the networking community, particularly as users become familiar with the benefits of high speed connectivity. Along with an increased use of the Internet, there has also been a revolution in television transmission, with the emergence of Digital Video Broadcasting (DVB) [1, 2]. Recent developments will allow packet data services to provide high speed transmission using a DVB satellite hub station (6-34 Mbps) to transmit packet data to the same small satellite dish as used for TV distribution. In many cases, the available low speed terrestrial infrastructure (e.g., dial-up modem, ISDN connection) may be used for the return link. This results in a network connection in which the capacity to a remote server differs from that from the server. Such an asymmetry in the network paths may be suited to user needs, since most Internet connections receive much more data than they need to send [3]. However, a high degree of asymmetry in the forward and return paths introduces a potential bottleneck in performance. Figure 1 shows individual users and a remote Local Area Network (LAN) accessing a data server (located in the Internet or at a DVB hub site) using the DVB link. A client sends requests for data transfer (and later acknowledgments as the session progresses) through the terrestrial network, while the server transfers the data to the client through the higher speed satellite link. A client networking device (the client computer itself or the router) has two network interfaces; one connected to the receive DVB link and the other connected by an Internet Service Provider to the terrestrial network. DVB MUXs and Satellite Modem HUB Server Data Server Up link Station HUB Router Terrestrial Internet / ISDN Client Router /Gateway Set-TOP Box L A N Client Figure 1: Configuration showing connection via a DVB satellite network Most current Internet applications use TCP [4] for reliable data transfer. This has fundamental limitations (e.g., insufficient window size) which prevent an application achieving high throughput over a high bandwidth satellite network. This paper compares the performance of standard TCP with that using the Long Fat Network (LFN) extensions [5]. The need for and the benefit of the SACK extension is also examined. The particular case of asymmetric delivery is then reviewed and a set of potential extensions identified. The extensions have been implemented in a TCP/IP which contains a full implementation of TCP and a model for the DVB link [6-9]. 2 TCP over Satellite Links Since TCP was first introduced in early 1980, it has been improved to provide efficient and reliable operation over a variety of transmission media. This has lead to a series of TCP reference implementations. A satellite 23

2 link has distinguishable characteristics, not normally found in other transmission media, which adversely impact TCP performance. These are (i) long propagation delay, (ii) a large bandwidth-delay product, and (iii) bandwidth asymmetry. The congestion control (Slow Start) and congestion avoidance (multiplicative decrease) procedures [10-11] were first introduced by the Tahoe TCP implementation. This allows a TCP transmitter to transmit a limited number of bytes determined by the smallest value of the receiver advertised window or the congestion window (cwnd). The algorithm also uses a variable to keep the threshold value of the send window (ssthresh) which is set to one half of the current cwnd (multiplicative decrease) when a packet is lost. The cwnd is set to one segment when the slow start phase begins (when either the connection first starts or the retransmission timer expires), and increased by one segment (exponential increase) whenever an Acknowledgment (ACK) is received, until it reaches the ssthresh. At this point, the algorithm switches to the congestion avoidance (linear increase) phase. The high delay of a satellite link significantly slows the growth of the congestion window. Each ACK is delayed by the round-trip time over the satellite link, and only when received, does it allow the sender to increase the cwnd by one segment (MSS [11]), during the slow start phase, and by a fraction of the MSS (equivalent to one MSS per round trip delay) during the linear increase phase. The Slow Start procedure [10] was introduced to achieve network stability under Internet congestion. It is however, known to be unduly conservative [11], since on detection of congestion, it drains the pipe (i.e., waits until all transmitted packets have left the network by setting the cwnd to one segment) before transmission of any more data. The Fast Retransmission and Recovery algorithms [11] introduced by the Reno TCP implementation improve performance by draining only one half of the pipe and then recommencing transmission, assuming the reception of each duplicate ACK is an indication of a packet leaving the network. If two or more packets have been lost from the transmitted data (window), these algorithms use partial ACKs (which do not cover all data sent, when the packet lost is first detected) to recover multiple packet losses without waiting for retransmission time out [12, 8]. 3 TCP Extensions for a LFN The standard TCP does not perform efficiently over a LFN due to: (i) insufficient window size, (ii) inaccuracy of the round trip delay estimation, (iii) inefficient packet loss recovery, and (iv) an inability to provide reliability at high transfer rates due to sequence number wrapping [5]. The IETF has recently standardised a set of TCP extensions to overcome these limitations [5]. These are: a window scale option, a time stamp option, Selective ACK (SACK), and an extension to Protect Against Wrapped Sequence numbers (PAWS) [5, 13]. The PAWS extension is only important for high speed transmission (e.g., >140Mbps) [9]. The TCP time stamp option adds an additional overhead (increasing the ACK packet size by 25%) [7]. This increase may be significant for a terrestrial return link in a DVB network. 3.1 The Window Scale Option Each TCP sender and receiver allocates a buffer space (typically up to 64KB). When receiving data, the receiver returns ACKs (using the 16 bit window field in the TCP packet header) advertising the available buffer space. This advertised value constrains the amount of data that the sender may transmit. To achieve optimum performance, a sender should transmit an amount of data equivalent to the bandwidth delay product of the network path. In a LFN, the maximum supported window size (2 16 ) may not be adequate for the sender to fully utilize the network. The window scale option [5] expands the TCP window size by using a scale factor without changing the TCP header. The scale factor is negotiated by an option in the initial (SYN) segment at the connection setup and maintained for the rest of the connection. When using the extension, both the send and receive windows are implemented using a 32 bit number. The window size advertised by a receiver is right shifted by the scale factor before being encoded in each out-going TCP header. When the packet is received, the window value is left shifted by the scale factor before updating the send window. A 34Mbps satellite link (figure 1) was simulated to investigate the need for using the window scale option. TCP was configured to use an MSS of 1024 bytes. Table 1 shows the average throughput of 3 simultaneous sessions for different window sizes: the maximum window size without using 24

3 window scaling (64 KB) and a range of windows with window scaling. (N.B. the limited bandwidth on the return is not considered here (see section 4), and all paths are assumed symmetrical). Table 1: TCP performance for different window sizes and different terrestrial delays (satellite delay is 280ms) Window [KB] Delay [ms] TCP Throughput [kbps] The results in table 1 suggest that TCP may transmit data from a server at the hub site at a throughput <1.3Mbps without using window scaling. The throughput would be correspondingly decreased when the data was sent from a remote Internet site (i.e. increasing the overall round trip delay). Figure 2 shows the variation with time of cwnd, ssthresh, maximum send and receive window size, and the number of bytes in transit at a time (only two cases were illustrated for simplicity). In both cases, the cwnd has been increased exponentially (slow start) up to ssthresh (section 2) before starting linear growth. If the data transfer does not last longer than the initial slow start period for a 64 Kbytes cwnd (i.e. for small transfers), the window size has no impact. Congestion Window, etc [Bytes] (B) (F) (A) (C) (E) (B) (F) (G) (A) (C) (E) (G) (D) (H) (H) (D) Figure 2: Window scaling and adequate buffer space improve TCP performance. For the 64 KB case, the transmitter rapidly uses up all the window space which then constrains the throughput. There is no such constraint for a window size of 720 Kbytes (approximately equivalent to the bandwidth delay product of a session). In this case, both curves for the cwnd and the number of bytes in transit overlap, showing that the receiver always advertises a sufficient window (i.e. greater than the estimated cwnd). Window scaling improves performance over an LFN when the bandwidth delay product exceeds 64 KB and the volume of data to be transferred is also more than 126 KB. It may therefore be useful for ftp and similar bulk transfer applications over DVB network. 3.2 Selective Acknowledgment Option The probability of multiple packet loss in a window is much greater for a LFN, where more packets are in flight. Although the new TCP implementations (e.g., Reno) are capable of recovering multiple packet losses without waiting for expiry of the retransmission timer, frequent packet loss may still not be efficiently recovered using such an implementation. The Selective ACKnowledgement (SACK) extension [13] has been recently proposed to improve TCP performance over such a network [8], but has not yet been widely implemented. The SACK option is triggered when the receiver buffer holds in-sequence data segments following a packet loss. The receiver then sends duplicate ACKs bearing the SACK option to inform the transmitter which segments have been correctly received. When the third duplicate ACK is received, a SACK TCP transmitter retransmits the lost packets starting with the sequence number acknowledged by the duplicate ACKs, and followed by any subsequent unacknowledged segments. The Fast Retransmission and Recovery algorithms are also modified to avoid retransmitting already SACKed segments. The explicit information carried by SACKs also enables the transmitter to accurately estimate the number of transmitted data packets that have left the network [8, 13]. Table 2: The SACK extension reduces number of retransmission and improves the TCP throughput (even a single retransmission is significant, since sender loses hardly earned cwnd with satellite delay). Queue size (packets) Throughput [kbps] SACK Retransmission [%] Throughput [Mbps] Reno Retransmission [%] A 34Mbps DVB network (with 280ms satellite delay and 100ms terrestrial network 25

4 delay) (figure 1) was simulated to investigate the need for using the SACK option. The maximum number of packets that can be held in the bottleneck router was restricted to the values shown in table 2 to simulate different congestion conditions in the network. TCP was configured to use an MSS of 1024 bytes, and had transmit and receive buffer sizes of 720 KB (sufficient for the DVB link). Table 2 compares the TCP performance (average throughput of 3 simultaneous sessions and the number of retransmissions per 100 transmitted packets) using Reno against SACK (i.e. Reno with the SACK option). A SACK transmitter selectively retransmits only the packets lost during the transmission resulting in few retransmissions of packets compared to Reno (table 2). It is also able to calculate the pipe size accurately using SACKed information to improve the transmission rate [8]. Therefore, the SACK option is able to sustain a high throughput over a network subject to high packet loss and is therefore desirable for bulk transfers over a DVB network. 4 TCP Extensions for Asymmetry A TCP receiver normally sends an ACK for each received packet which the TCP sender uses for two purposes. First, it indicates a previously transmitted packet has left the network, so the sender may increase the cwnd allowing it to transmit more data. Second, it indicates the receiver will accept more data. Therefore, the TCP throughput of a DVB link (figure 1) may become constrained by the rate at which the sender receives ACKs through the low speed return path (a phenomena we call ACK Congestion ). During the slow start phase, the transmission rate is constrained by the first factor, and when the cwnd is sufficiently open, the transmission rate is constrained only by the second factor. TCP could be modified to overcome this limitation. Since TCP ACKs are cumulative [11], the throughput can be improved by reducing the number of ACKs generated by the receiver by delaying the transmission of each (cumulative) ACK until a number of packets arrive at the receiver (this is called ACK_delay, and usually delays only one packet [11]). However, this also reduces the growth of the cwnd during the initial phase. The problem of slow growth of the cwnd over a satellite network may be overcome using a larger initial cwnd [14] or using the byte count of the ACKed sequence numbers rather than ACK count itself to increase cwnd. However, these modifications are not widely accepted, since they may impact the stability of TCP over a large network [15]. In addition, since TCP implementations exist on end systems (i.e., a part of the installed software on all user computers), modifications are undesirable and difficult to manage. Therefore, alternative solutions to reduce ACK Congestion are needed to suit the characteristics of a DVB Network. 4.1 TCP Header Compression TCP header compression [16] is widely used on modem links and may compress the TCP/IP header. An ACK packet may be reduced by 70% over the return link. However, this compression ratio may not be sufficient to prevent ACK congestion when the asymmetric ratio is higher than ACK Suppression Another way to avoid ACK congestion is to delete ACKs from the queue which builds up at the return interface. This technique is called ACK Suppression [17, 18]. Such a scheme may be implemented in the data link layer of the equipment at the user premises (similar to implementation of header compression [11]). Implementation at the user premises may also reduce any interaction with security and encryption procedures. The extra processing overhead performing ACK Suppression may be compensated for by avoiding modifications to standard TCP. To perform ACK suppression, each incoming packet forwarded to the link interfere queue is classified by flow (TCP packets are identified by the protocol types of the IP header, and TCP port numbers and IP addresses which uniquely identify a flow). The suppressor tags each packet with a flow identifier, and keeps a packet count for each flow. The queue of packets for each flow is allowed to increase up to a threshold value for suppression. A suitable limit (set according to the asymmetric ratio) improves the TCP performance, allowing the first ACKs of a flow to be received without suppression, allowing the sender to open the cwnd quickly. When the session exceeds the threshold value, packets belonging to this session will be deleted from the front of the queue (oldest ACK) leaving a single (cumulative) ACK. Some ACK packets also have other functions in the TCP protocol and must not be deleted to ensure normal operation of TCP. The suppressor must therefore not delete an ACK packet which carries any data, or has any 26

5 other TCP flags set (sync, reset, urgent, and final). In addition, the suppressor should avoid deleting a series of 3 duplicate ACKs which indicate the need for Fast Retransmission (section 2). ACK Suppression reduces the level of ACK Congestion. However, the throughput may still remain low. This is because the cwnd grows slowly, due to the small number of ACKs received - even though all data has been cumulatively acknowledged. (The sender congestion avoidance algorithm only increases cwnd on reception of an ACK and does not consider the cumulative nature). This is particularly significant, since most Internet connections are short lived [3] and therefore are always constrained by the cwnd ACK Compaction A new ACK Compaction technique is proposed which eliminates the effect of ACK Congestion, but maintains an acceptable arrival rate of ACKs at the sender. A data link layer compactor first establishes an IP tunnel to a remote expander (e.g., at the hub site or an Internet Service Provider s premises). IP tunneling (or encapsulating an IP packet with another IP header) is a commonly implemented technique in the Internet (e.g., MBONE [11] and DirectPC [18]). Tunneling may also be desirable for asymmetric networking [18] when the return packets of a connection are routed through a different network path than used to send the forward data (asymmetric routing). In the DVB case, a packet from the user (with the IP source of the user s satellite interface) is encapsulated with an IP header (with the IP source address of the terrestrial interface and an IP destination address of the remote expander). The remote end of the tunnel extracts the encapsulated packet and forwards it through the Internet as if it were routed through the satellite link. The expander must also validate the received IP addresses to prevent spoofing. ACK Compaction uses the ACK Suppression technique with several modifications. When packets are deleted, the transmitter appends information to the remaining packet which is later used by the expander. The information contains the number of deleted ACKs (one byte) and the average number of bytes acknowledged (two bytes). The expander is stateless (i.e. processes each received packet independently of previously received packets). It uses the 3 bytes of prefixed information together with the acknowledgment field in the TCP header of the received ACK to produce a burst of ACKs equivalent to the number of ACKs previously deleted by the compactor. These ACKs are then forwarded to the original destination (i.e. the TCP sender). This process is simple to implement and requires little modification to the tunneling software at the remote site. 4.4 Comparison of Techniques A DVB link was simulated to understand the impact of ACK Congestion and the performance of the three techniques. For simplicity a single session was considered limited to a maximum of 10 Mbps over the DVB channel. Most European telephone networks support 9.6kbps modems, although high speed modems are now widely used in some countries. This study considers a 9.6 kbps return link to analyse a network with asymmetric ratio of ~1000:1. TCP was configured to use an MSS of 1024 bytes, and had transmit and receive buffer sizes of 720 KB sufficient for the DVB link (see section 3.1). Figure 3 shows the variation of the cwnd with time for a data transfer from the hub server to a client. Figure 4 shows the time required to transfer a number of bytes over the DVB link. Congestion Window [Kbyts] Unmodified Using Compression Using Suppression Using Compaction Using Suppression Unmodified Time [sec] Figure 3: The variation of the cwnd with time. ACK Congestion results when unmodified TCP is used, resulting in a slow increase in cwnd (figure 3) and a low TCP throughput (i.e. large transmission time) (figure 4). In addition, the large queuing delay causes the TCP timers at the sender to expire indicating potential data loss and triggering unnecessary retransmission of data. The TCP congestion control algorithms also trigger, reducing the transmission rate, and therefore throughput. Since ACKs arrive at the sender more quickly using header compression, the cwnd may grow more rapidly [16] (figure 3). However, 27

6 the compression ratio is not enough to eliminate ACK Congestion for a DVB network, which results in expiry of the TCP retransmission timer, and subsequent slow start. This results in only a small improvement in TCP throughput (figure 4). Number of Bytes Transmitted [Mbyts] Unmodified - (A) Using Compression - (B) Using Suppression - (C) Using Compaction - (D) (D) (A) Time [sec] Figure 4: First sequence number of the transmitted packet against time ACK Suppression achieves higher TCP performance compared to header compression by significantly reducing the queuing delay. The suppressor may inhibit suppression until the queue builds up to a threshold value (60 packets in this simulation). However, since the actual number of ACKs received by the sender is significantly reduced (constrained by the bottleneck speed), the growth of the cwnd still limits the throughput (figure 4). When compared with header compression, there is an initial slow growth of the cwnd (for first 6 secs) for ACK Compaction. This arises since compressed ACKs are received more rapidly than the initially non-compacted ACKs. Once ACK Compaction starts to take place, performance rapidly exceeds header compression and completely eliminates ACK Congestion. This therefore avoids TCP timer expiry. TCP throughput has therefore been significantly improved (figure 4). 5 Conclusions A DVB network may provide low cost universal Internet access at high speed. Throughput as high as 216 kbps may be achieved using unmodified TCP protocols and a 9.6 kbps return link. This performance is predominantly constrained by the effect of ACK Congestion on the slow speed return link. A number of extensions have been investigated which reduce or eliminate the effect of ACK Congestion resulting in significant performance improvement (up to 1.3 Mbps for a non-congested network). (C) (B) Further increases in throughput require the use of the TCP window scaling option. Network congestion has a serious impact on connections with a high bandwidth and delay. This effect may be significantly reduced by using the TCP SACK extension. 6 References 1. ETSI, DVB Specification for Data Broadcasting', Draft EN V1.1.1, DVB project, 'The Global Solution for Digital Television', hhtp:// V. Paxson, 'End-to-End Internet Packet Dynamics, SIGCOMM, ACM, France, (1997). 4. J. Postel, 'Transmission Control Protocol', Information Sciences Institute, RFC 793, Sep V. Jacobson, et al., 'TCP Extensions for High Performance', IETF-DRAFT, May N. Samaraweera, et al., 'Robust Data Link Protocols for Connection-less Service over Satellite Links', Int J. Sat Coms, 14(5), (1996). 7. N. Samaraweera and G. Fairhurst, 'Explicit Loss Indication and Accurate RTO Estimation for TCP Error Recovery using Satellite Links', IEE Proceedings - Coms, 144(1), (1997). 8. N. Samaraweera and G. Fairhurst, 'Reinforcement of TCP Error Recovery for Wireless Communication', To be published in Computer Communication Review, ACM SIGCOMM, 28(2), N. Samaraweera and G. Fairhurst, Integration of Internet Traffic with Digital Video, Fifteenth UK Teletraffic Symposium, IEE, UK, March V. Jacobson, 'Congestion Avoidance and Control', SIGCOMM, ACM, USA, (1988). 11. W. R. Stevens, TCP/IP Illustrated: The Protocols, Vol:1, Addison Wesley, New York, J. C. Hoe, 'Improving the Start-up Behavior of a Congestion Control Scheme for TCP', SIGCOMM, ACM, USA, (1996). 13. M. Mathis et al., 'TCP Selective Acknowledgment Options', IETF, RFC 2018, October S. Floyd et al., 'Increasing TCP's Initial Window', IETF-DRAFT, July T. Shepard and C. Partridge, 'When TCP Starts Up With Four Packets Into Only Three Buffers', IETF-DRAFT, V. Jacobson, 'Compressing TCP/IP Headers for Low-Speed Serial Links', IETF, RFC1144,Feb R.Durst, et al., TCP Extensions for Space Comms', MOBICOMM, ACM, (1996). 18. A. D Falk, et al., Hybrid Internet Access, NASA Centers for Commercial Development of Space. American Institute of Physics, USA,1995. Acknowledgments The Authors wish to thank the European Space Agency (ESA), and R Donadio (ESA), P. Glover (ESA), K. Hodson, R Heron (Delta Communication), R. Eley and C. Yildez (Globecast Northern Europe) for their contribution to this project. 28

7 29

8 30

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Ina Minei Reuven Cohen. The Technion. Haifa 32000, Israel. e-mail: faminei,rcoheng@cs.technion.ac.il. Abstract

Ina Minei Reuven Cohen. The Technion. Haifa 32000, Israel. e-mail: faminei,rcoheng@cs.technion.ac.il. Abstract High Speed Internet Access Through Unidirectional Geostationary Satellite Channels Ina Minei Reuven Cohen Computer Science Department The Technion Haifa 32000, Israel e-mail: faminei,rcoheng@cs.technion.ac.il

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which

More information

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

TCP/IP Over Lossy Links - TCP SACK without Congestion Control Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

An Improved TCP Congestion Control Algorithm for Wireless Networks

An Improved TCP Congestion Control Algorithm for Wireless Networks An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA khurshi1@illinois.edu Md. Humayun

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Analysis of TCP Performance Over Asymmetric Wireless Links

Analysis of TCP Performance Over Asymmetric Wireless Links Virginia Tech ECPE 6504: Wireless Networks and Mobile Computing Analysis of TCP Performance Over Asymmetric Kaustubh S. Phanse (kphanse@vt.edu) Outline Project Goal Notions of Asymmetry in Wireless Networks

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

What is Network Latency and Why Does It Matter?

What is Network Latency and Why Does It Matter? What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

TCP Adaptation for MPI on Long-and-Fat Networks

TCP Adaptation for MPI on Long-and-Fat Networks TCP Adaptation for MPI on Long-and-Fat Networks Motohiko Matsuda, Tomohiro Kudoh Yuetsu Kodama, Ryousei Takano Grid Technology Research Center Yutaka Ishikawa The University of Tokyo Outline Background

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

STUDY OF TCP VARIANTS OVER WIRELESS NETWORK

STUDY OF TCP VARIANTS OVER WIRELESS NETWORK STUDY OF VARIANTS OVER WIRELESS NETWORK 1 DEVENDRA SINGH KUSHWAHA, 2 VIKASH K SINGH, 3 SHAIBYA SINGH, 4 SONAL SHARMA 1,2,3,4 Assistant Professor, Dept. of Computer Science, Indira Gandhi National Tribal

More information

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection V. Anil Kumar 1 and Dorgham Sisalem 2 1 CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India 2 Fraunhofer

More information

Linux 2.4 Implementation of Westwood+ TCP with rate-halving: A Performance Evaluation over the Internet

Linux 2.4 Implementation of Westwood+ TCP with rate-halving: A Performance Evaluation over the Internet Linux. Implementation of TCP with rate-halving: A Performance Evaluation over the Internet A. Dell Aera, L. A. Grieco, S. Mascolo Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari Via Orabona,

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

A Study of Internet Packet Reordering

A Study of Internet Packet Reordering A Study of Internet Packet Reordering Yi Wang 1, Guohan Lu 2, Xing Li 3 1 Department of Electronic Engineering Tsinghua University, Beijing, P. R. China, 100084 wangyi@ns.6test.edu.cn 2 China Education

More information

ATM and the Internet Over Satellite Networks

ATM and the Internet Over Satellite Networks ATM and the Internet Over Satellite Networks Prakash Chitre COMSAT Laboratories Clarksburg, MD 20871 (301) 428-4167 e-mail: prakash.chitre@comsat.com ATM & INTERNET 7/99 1 ATM and Internet Via Satellite

More information

A Study on TCP Performance over Mobile Ad Hoc Networks

A Study on TCP Performance over Mobile Ad Hoc Networks 215 A Study on TCP Performance over Mobile Ad Hoc Networks Shweta Sharma 1, Anshika Garg 2 1 School of Computing Science and Engineering, Galgotias University, Greater Noida 2 School of Computing Science

More information

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large

More information

Parallel TCP Data Transfers: A Practical Model and its Application

Parallel TCP Data Transfers: A Practical Model and its Application D r a g a n a D a m j a n o v i ć Parallel TCP Data Transfers: A Practical Model and its Application s u b m i t t e d t o the Faculty of Mathematics, Computer Science and Physics, the University of Innsbruck

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Advanced satellite infrastructures in future global Grid computing: network solutions to compensate delivery delay ISTI CNR

Advanced satellite infrastructures in future global Grid computing: network solutions to compensate delivery delay ISTI CNR Advanced satellite infrastructures in future global Grid computing: network solutions to compensate delivery delay Blasco Bonito, Alberto Gotta and Raffaello Secchi ISTI CNR Outline Introduction Grid Networks

More information

THE Internet provides a convenient and cost-effective

THE Internet provides a convenient and cost-effective 522 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 4, APRIL 2007 An Overview of Packet Reordering in Transmission Control Protocol (TCP): Problems, Solutions, and Challenges Ka-Cheong

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network V. Anil Kumar 1 and Dorgham Sisalem 2 (anil@cmmacs.ernet.in, sisalem@fokus.fhg.de) 1 CSIR Centre

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

SCTP over Satellite Networks

SCTP over Satellite Networks 1 SCTP over Satellite Networks Shaojian Fu Mohammed Atiquzzaman School of Computer Science University of Oklahoma, Norman, OK 73019-6151. William Ivancic Satellite Networks & Architectures Branch NASA

More information

TCP Window Size for WWAN Jim Panian Qualcomm

TCP Window Size for WWAN Jim Panian Qualcomm TCP Window Size for WWAN Jim Panian Qualcomm June 17, 2004 PCCA 1 TCP Window Size for WWAN Role of TCP Windowing Calculation of Optimum Window Size WWAN Window Size Requirements WWAN and Long Fat Networks

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

TCP Westwood for Wireless

TCP Westwood for Wireless TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Chaoyang University of Technology, Taiwan, ROC. {changb,s9227623}@mail.cyut.edu.tw 2 Department of Computer Science and Information Engineering

Chaoyang University of Technology, Taiwan, ROC. {changb,s9227623}@mail.cyut.edu.tw 2 Department of Computer Science and Information Engineering TCP-Taichung: A RTT-based Predictive Bandwidth Based with Optimal Shrink Factor for TCP Congestion Control in Heterogeneous Wired and Wireless Networks Ben-Jye Chang 1, Shu-Yu Lin 1, and Ying-Hsin Liang

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

TTC New Reno - Consistent Control of Packet Traffic

TTC New Reno - Consistent Control of Packet Traffic IMPROVE PERFORMANCE OF TCP NEW RENO OVER MOBILE AD-HOC NETWORK USING ABRA Dhananjay Bisen 1 and Sanjeev Sharma 2 1 M.Tech, School Of Information Technology, RGPV, BHOPAL, INDIA 1 bisen.it2007@gmail.com

More information

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of

More information

Measured Performance of GSM HSCSD and GPRS

Measured Performance of GSM HSCSD and GPRS Measured Performance of GSM HSCSD and Jouni Korhonen Olli Aalto Andrei Gurtov Heimo Laamanen Sonera Corporation P.O.Box 97 51 Helsinki, Finland Abstract In this paper we present results of measurements

More information

Performance evaluation of TCP connections in ideal and non-ideal network environments

Performance evaluation of TCP connections in ideal and non-ideal network environments Computer Communications 24 2001) 1769±1779 www.elsevier.com/locate/comcom Performance evaluation of TCP connections in ideal and non-ideal network environments Hala ElAarag, Mostafa Bassiouni* School of

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

TCP Behavior of a Busy Internet Server: Analysis and Improvements

TCP Behavior of a Busy Internet Server: Analysis and Improvements TCP Behavior of a Busy Internet Server: Analysis and Improvements Hari Balakrishnan*, Venkata N. Padmanabhan*, Srinivasan Seshan+, Mark Stemm*, Randy H. Katz* {hari,padmanab,stemm,randy}@cs.berkeley.edu,

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc.

The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc. The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc. Abstract Packet reordering in the Internet is a well-known phenomenon. As

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information

Multipath TCP under Massive Packet Reordering

Multipath TCP under Massive Packet Reordering Multipath TCP under Massive Packet Reordering Nathan Farrington UC San Diego farrington@cs.ucsd.edu Abstract Conventional wisdom states that TCP performs poorly when packets arrive out of order. Reordered

More information

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 When you buy a broadband Wide Area Network (WAN) you want to put the entire bandwidth capacity to

More information

Random Early Detection Gateways for Congestion Avoidance

Random Early Detection Gateways for Congestion Avoidance Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson Lawrence Berkeley Laboratory University of California floyd@eelblgov van@eelblgov To appear in the August 1993 IEEE/ACM

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

TCP Fast Recovery Strategies: Analysis and Improvements

TCP Fast Recovery Strategies: Analysis and Improvements To appear in INFOCOM 98 TCP Fast Recovery Strategies: Analysis and Improvements Dong Lin and H.T. Kung Division of Engineering and Applied Sciences Harvard University Cambridge, MA 02138 USA Abstract This

More information