TCP/IP Revisited Computer Science 742 S2C, 2014

Size: px
Start display at page:

Download "TCP/IP Revisited Computer Science 742 S2C, 2014"

Transcription

1 TCP/IP, COMPSCI 742, 2014 p. 1/33 TCP/IP Revisited Computer Science 742 S2C, 2014 Nevil Brownlee, with acknowledgements to Ulrich Speidel

2 UDP TCP/IP, COMPSCI 742, 2014 p. 2/33 UDP is used to send individual datagrams from an application on one computer to another application on a different computer across the network Applications are identified by 16-bit port numbers on either side Delivery is best effort, not guaranteed Applications that require recovery from lost transmissions must implement their own detection and recovery protocol

3 TCP [p 378 / 384] TCP/IP, COMPSCI 742, 2014 p. 3/33 TCP: Transmission Control Protocol, RFC 793 Provides a reliable bi-directional byte stream channel between an application on one computer and another application on a different computer across the network Applications identified by 16-bit port numbers at each end Delivery is guaranteed, i.e. TCP handles error detection and recovery TCP is usually described as connection oriented sender and receiver establish initial state they maintain that state during the connection lifetime state is forgotten when the connection ends contrast that with virtual circuit networking, where connection state is stored in switches throughout the network

4 TCP port assignment TCP/IP, COMPSCI 742, 2014 p. 4/33 Port numbers are the first two 16-bit fields in the TCP header TCP is a symmetric protocol, both ends can send and receive streams of data bytes A client machine connecting to a server will usually attempt to open a TCP connecton to a well-known or System port. It will use a random high-numbered port as its SrcPort Many applications these days use port numbers Port numbers up to may be allocated by IANA as User ports. Port numbers above that are ephemeral, i.e. allocated by the IP stack in response to an incoming connection Note that SrcPort and DestPort do not depend on who is client and who is server, but on the direction in which the datagram travels

5 TCP Sequence number TCP/IP, COMPSCI 742, 2014 p. 5/33 A TCP connection may carry thousands of datagrams (TCP segments) in each direction Must have a way to ensure they arrive in sequence and that we can detect missing ones SeqNum header field carries 32 bit sequence number of first byte in datagram. Sequence numbers apply to their datagram s respective direction Start at a random value. TCP implementations do this so as to make it harder for attackers to guess their initial value Can also be used as SYN cookies, allowing a TCP server to time out an attacker s half-open connections Wrap-around: sequence number is followed by sequence number 0 (assuming one-byte datagrams) TCP sequence numbers use unsigned 32-bit arithmetic

6 TCP acknowledgements TCP/IP, COMPSCI 742, 2014 p. 6/33 The Acknowledgement field contains the sequence number of the next byte that the machine expects to receive The sending machine can use it to determine how many of its transmitted datagrams have been successfully received Field is only valid if ACK flag in flags field is set Timing issues (see later)! Ack packets can carry data bytes, but they usually do not. Many protocols carry most of their data in one direction; can you think of some which carry data in both directions?

7 TCP header length TCP/IP, COMPSCI 742, 2014 p. 7/33 TCP header is not fixed in length can get different size headers depending on use of Options field HdrLen field gives the total size of the TCP header in four-byte units, i.e. length = HdrLen 4 bytes Everything following the header is payload (data that is to be delivered to the application)

8 TCP flags (1) TCP/IP, COMPSCI 742, 2014 p. 8/33 Eight bits in the TCP header are used for flags: SYN: Set when the client sends its first datagram to the server, and in the server s acknowledgement of that datagram. Basically, it marks the connection request/confirmation ACK: Indicates that the Acknowledgement field contains a valid segment number. Remember that we can t set no value in a 32 bit field! SYN and ACK flags are enough to get a connection established

9 TCP flags (2) TCP/IP, COMPSCI 742, 2014 p. 9/33 Flags which terminate a connection: FIN: Signals that a host has finished with a connection. The other host should finish too RESET: Shuts down the connection immediately. Intended for use in case of errors should not see this normally, but some applications use it to close a TCP connection in a hurry Other flags: PUSH: Indicates receiver should pass all data in its buffer to application. Not very useful these days URG: Poorly defined, seldom (if ever) used ECE, CWR: Are part of ECN (Explicit Congestion Notification) CWR: Congestion Window Reduced ECE: ECN-Echo (sender should reduce send window size)

10 TCP connection handshake (simplest case) TCP/IP, COMPSCI 742, 2014 p. 10/33 Host A sends datagram with SYN flag set and an initial sequence number, say 382 in its Sequence field Host B responds with datagram that has SYN+ACK set, Ack field contains 383, Sequence field is, say, Host A sends datagram that has ACK set, Ack field contains Client now regards the connection as established, sequence number is still 383 Note that: the SYN flag counts as one byte host A s second datagram completes the connection handshake. It could also carry data, e.g. an HTTP GET request any of these opening packets can be lost, in which case they will be re-sent

11 TCP acknowledgement TCP/IP, COMPSCI 742, 2014 p. 11/33 One side (host A) sends one-byte datagram with sequence number, say 387 Other side (host B) responds with datagram that has ACK set. Acknowledgement field contains number 388, its own sequence number is, say, Host A now knows that host B has received all bytes from host A up to and including number 387 note: ACK carries the sequence number of the next byte B expects to recieive If a datagram is lost on the way from A to B, next ACK from B contains an earlier sequence number After an appropriate timeout, A resends the missing datagram(s) Problem: What is an appropriate waiting time?

12 TCP flow control: sliding window TCP/IP, COMPSCI 742, 2014 p. 12/33 Receiver advertises a window in its datagrams that have the ACK flag set: the number of bytes left in its receive buffer for the connection this is the number of bytes it can still receive Sender must ensure that there is at most this amount of unacknowledged data on the connection Problem: If receiver advertises window size 0, the sender will not know when the window size increases again Solution: sender sends small (ack) frame every so often; that evokes a response from receiver advertising the current window size

13 Adaptive retransmission (1) TCP/IP, COMPSCI 742, 2014 p. 13/33 Problem: datagrams in transit between sender and receiver are not included in the advertised window. By the time the advertised window size arrives at the sender, it is out of date How big is the problem? Depends on bandwidth-delay product. On a connection between NZ and the US that terminates in 100 Mb/s Ethernet either side and has 100 ms latency, it s no less than 10 Mb, i.e., about 1 MB of payload data! A big problem indeed, especially for people in NZ! Need some sort of algorithm that can handle this data in transit

14 Adaptive retransmission (2) TCP/IP, COMPSCI 742, 2014 p. 14/33 Time each frame: measure time between transmission of the datagram and arrival of its corresponding ACK. Use that as estimate of round-trip time (RTT) Sending side computes capacity of receiver buffers plus channel and can (conservatively) transmit data until this capacity is reached Problem: ACKs are not associated with a particular copy of a datagram is it for the original or the resend? Can t compute RTT values for such cases Karn/Partridge: double RTT timeout every time a datagram needs to be resent ( exponential backoff ). Only do calculation for packets that are not resent Karels/Jacobson: compute RTT timeout more closely based on RTT statistics

15 TCP state diagram (RFC 793) TCP/IP, COMPSCI 742, 2014 p. 15/33 Active Open SYN CLOSE FIN CLOSE SYN_SENT CLOSE_WAIT LAST_ACK CLOSED ACK (of FIN) ACK ACK Active SEND SYN SYN+ACK ACK FIN ACK Send remaining data in buffer TIMEOUT (2x MSL) CLOSED CLOSE LISTEN ESTABLISHED CLOSING ACK (of FIN) TIME_WAIT Passive Open ACK ACK Legend: SYN SYN+ACK SYN ACK Normal operation ACK (of SYN) CLOSE FIN FIN+ACK ACK Receive remaining data from other side's buffer ACK ACK FIN ACK COMMAND from application FLAG received FLAG sent SYN_RECV CLOSE FIN FINWAIT_1 ACK (of FIN) FINWAIT_2

16 TCP Congestion Management [p 468 / 474] TCP/IP, COMPSCI 742, 2014 p. 16/33 Feedback scheme Idea is to use Acks to clock packets onto link RFC 2581 Sender maintains congestion window, never sends more than min(cwin, rwin) bytes Slow Start Begin by sending 1..3 packets Increment cwin each Ack segment until a segment is lost Halve cwin, switch to AI/MD

17 TCP Congestion Management (2) TCP/IP, COMPSCI 742, 2014 p. 17/33 Additive increase / multiplicative decrease (AI/MD) increment cwin once per RTT until a segment is lost halve cwin and repeat Note that (endogenous) packet loss is forced as part of TCP s congestion management; it s quite different to exogenous losses due to transmission errors, e.g. those caused by interference on wireless links RFC 2309 Recommendations on Queue Management and Congestion Avoidance in the Internet

18 TCP errors, etc. TCP/IP, COMPSCI 742, 2014 p. 18/33 Error handling Lost segment detected by timeout, or by receiving three duplicate Acks Fast retransmit: re-send segment starting with Ack byte (only re-send one segment) Half-open connections From host which crashed (without sending FINs) Keepalive packets Some implementations send these, and close connections if no data bytes are sent during the timeout interval This is not part of the TCP protocol, sessions stay open until they are closed by FIN or RST

19 Algorithms used in TCP Implementation TCP/IP, COMPSCI 742, 2014 p. 19/33 When to send data Nagle: if (< mss bytes && unacked bytes) wait; else send Measuring RTT Karn/Partridge: don t time retransmitted segments Jacobson/Karels: allow for variance in RTTs Congestion Management Slow Start: set cwind = IW (usually 1..3 segments), increment by mss each ACK up to ssthresh (init 65535) Congestion Avoidance: AI/MD Fast Retransmit: resend after third duplicate ACK Fast Recovery: don t Slow Start after Fast Retransmit

20 Congestive collapse TCP/IP, COMPSCI 742, 2014 p. 20/33 In case of congestion on data networks, there is a condition called congestive collapse Under TCP, when datagrams do not get through, TCP s RTT will back off exponentially can reach total inactivity pretty quickly! Back-off is designed to relieve pressure on resources Only works fairly if everyone keeps to the rules (no DoS attacks). Even so, retries create extra traffic Congestive collapse occurs when almost the entire traffic consists of retransmissions that don t get through as a result of the congestion, in turn generating retries No back-off in other protocols, e.g. UDP

21 Synchronisation of TCP connections TCP/IP, COMPSCI 742, 2014 p. 21/33 Traffic on an Ethernet segment is self-similar, i.e. it s bursty, at all time scales Thats less true for low-volume Internet traffic, but becomes more apparent for volumes above about 40 Mb/s Several papers have suggested that s because concurrent TCP connections often share (parts of) the same path if that path is congested, any or all of the TCP connections may drop a packet at full buffer queues The effect is that concurrent TCP connections tend to synchronise, especially if their paths have the same RTT

22 Flavours of TCP (1) TCP/IP, COMPSCI 742, 2014 p. 22/33 P&D [494] say that TCP is defined by an implementation We look (briefly) at the best-known implementations: Tahoe: the original BSD implementation of TCP (BNR1) begins in slow start, reaches ssthresh then switches to congestion avoidance detects loss by timeout before getting an ACK set cwin to one and switch back to slow start Reno: added more algorithms to improve data transfer rate fast retransmit: three duplicate acks indicate packet loss; resend the missing segment, halve cwin, switch to fast recovery fast recovery: if no ACK for resent segment, switch to slow start delayed ACKs: only send an ACK for every second packet the most widely-deployed TCP implementation

23 Flavours of TCP (2) TCP/IP, COMPSCI 742, 2014 p. 23/33 Vegas: mid-90 s[495] observe data rate using RTTs for recent packets, detect changes in rate adjust cwin up or down, attempting to match the observed rate to the expected rate idea is to keep enough bits on the wire, without getting lots of bits (packets) backed up in router buffers, i.e. use queueing delay instead of loss probability to detect congestion not widely deployed Long Fat pipes consider a 1 Gb/s path with 200 ms round-trip time (RTT) assuming ~1 kb TCP segments, we can get about 200 of them on the wire in additive increase mode, it would take about 20 s before TCP s congestion window fills the path

24 Flavours of TCP (3) TCP/IP, COMPSCI 742, 2014 p. 24/33 BIC: 2004 Binary Increase Congestion Control for Fast Long-Distance Networks, Xu, Harfoush and Rhee, March 2004 BIC grows its congestion window faster than linearly, while trying to be fair to other TCP connections CUBIC: 2008 CUBIC: a new TCP-friendly high-speed TCP variant, Ha, Rhee and Xu, March 2008 cubic function for congestion window growth fairer than BIC to other TCP connections implemented in Linux kernel Note: new implementations of TCP must interwork properly with existing ones! both BIC and CUBIC have a minimum window size, below that they use classic TCP behaviour

25 Further reading TCP/IP, COMPSCI 742, 2014 p. 25/33 RFCs covering TCP implementation RFC 2581: TCP Congestion Control READ THIS ONE! It s quite short, it explains TCP s four intertwined algorithms (for congestion control) very clearly RFC 3390: Increasing TCP s Initial Window Congestion in the Internet RFC 2309: Recommendations on Queue Management and Congestion Avoidance Simulation-based comparisons of Tahoe, Reno and SACK TCP, Kevin Fall, Sally Floyd, CACM, vol 26, pp5-21, All these are on the 742 Resources web page

26 TCP Steady State Throughput Formula TCP/IP, COMPSCI 742, 2014 p. 26/33 Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi, Teunis Ott, The Macroscopic Behaviour of the TCP Congestion Avoidance Algorithm, SIGCOMM, July 1997

27 TCP Throughput Formula (2) TCP/IP, COMPSCI 742, 2014 p. 27/33 Data delivered = area under sawtooth, i.e. 3/8 W 2 Each cycle delivers 1/p packets (p is the packet loss rate) data per cycle BW = time per cycle = MSS RTT C p, and C = p 3/2 Note that BW is inversely proportional to p i.e. need low loss rates to get high bandwidth This is a very simple model of TCP behaviour, many other papers about TCP behaviour have been published Some authors suggest that a TCP sender sends packets in flights, and use those flights to measure RTT

28 A different model of TCP TCP/IP, COMPSCI 742, 2014 p. 28/33 In 2003, Allen Downey (Boston University) published a paper summarising his observations of TCP behaviour, and presented a Markov Model based on them Allen s work was published as: (D96) An Empirical model of TCP transfers, Allen B. Downey, Olin College Technical Report, January 14, 2003 That paper is on the 742 resources web page Downey s model begins in slow start, and has three other states: congestion avoidance buffer limited self clocking We ll look at a few slides from one of Allen s talks...

29 Downey s model (1) TCP/IP, COMPSCI 742, 2014 p. 29/33

30 Downey s model (2) TCP/IP, COMPSCI 742, 2014 p. 30/33

31 Downey s model (3) TCP/IP, COMPSCI 742, 2014 p. 31/33

32 Downey s model, summary TCP/IP, COMPSCI 742, 2014 p. 32/33 Based on observation of data transfers Observations were used to build distributions of TCP window sizes Three steady-state behaviours Self-clocking seemed to be fairly common

33 Measuring bulk transfer capacity (BTC) TCP/IP, COMPSCI 742, 2014 p. 33/33 Many web pages offering download speed tests they usually do this by downloading a big file to your host, and measuring the time that download takes Unfortunately, a running TCP transfer establishes a dynamic equilibrium! Remember the MSMO equation? BW = MSS C RTT p RTT is fixed for a connection MSS may vary, assume it s 1460 also assume that the exogenous drop rate p is negligible TCP will generate endogenous drops so as to set p that will determine the observed BW In short, the measurement perturbs the system we can t make a reliable, accurate measurement this way! See Why is BTC so hard? at

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes: Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

On Inferring TCP Behavior

On Inferring TCP Behavior On Inferring TCP Behavior Jitendra Padhye and Sally Floyd ATT Center for Internet Research at ICSI (ACIRI) padhye@aciri.org, floyd@aciri.org ABSTRACT Most of the traffic in today s Internet is controlled

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans

More information

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

TCP/IP Over Lossy Links - TCP SACK without Congestion Control Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Parallel TCP Data Transfers: A Practical Model and its Application

Parallel TCP Data Transfers: A Practical Model and its Application D r a g a n a D a m j a n o v i ć Parallel TCP Data Transfers: A Practical Model and its Application s u b m i t t e d t o the Faculty of Mathematics, Computer Science and Physics, the University of Innsbruck

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

TCP Performance Management for Dummies

TCP Performance Management for Dummies TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

THE UNIVERSITY OF AUCKLAND

THE UNIVERSITY OF AUCKLAND COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Measuring the Evolution of Transport Protocols in the Internet. Alberto Medina Mark Allman Sally Floyd

Measuring the Evolution of Transport Protocols in the Internet. Alberto Medina Mark Allman Sally Floyd Measuring the Evolution of Transport Protocols in the Internet Alberto Medina Mark Allman Sally Floyd 1 2 The Internet Protocol Stack Application Presentation Session Transport IP Data link Physical Internet

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user Transport service characterization The Transport Layer End-to-End Protocols: UDP and TCP Connection establishment (if connection-oriented) Data transfer Reliable ( TCP) Unreliable / best effort ( UDP)

More information

Active Queue Management (AQM) based Internet Congestion Control

Active Queue Management (AQM) based Internet Congestion Control Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu (sryu@eng.buffalo.edu) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control

More information

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006 CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next

More information

17: Queue Management. Queuing. Mark Handley

17: Queue Management. Queuing. Mark Handley 17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Transport Layer. Chapter 3.4. Think about

Transport Layer. Chapter 3.4. Think about Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

TCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery

TCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery TCP Flow Control Computer Networks The receiver side of a TCP connection maintains a receiver buffer: Lecture : Flow Control, eliable elivery application process may be slow at reading from the buffer

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

2 TCP-like Design. Answer

2 TCP-like Design. Answer Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about

More information

Advanced Computer Networks Project 2: File Transfer Application

Advanced Computer Networks Project 2: File Transfer Application 1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application

More information

High Speed Internet Access Using Satellite-Based DVB Networks

High Speed Internet Access Using Satellite-Based DVB Networks High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,

More information

Networking part 3: the transport layer

Networking part 3: the transport layer Networking part 3: the transport layer Juliusz Chroboczek Université de Paris-Diderot (Paris 7) September 2011 Summary of the previous episodes Episode 1: switching, packet switching and the Internet.

More information

TCP Over Wireless Network. Jinhua Zhu Jie Xu

TCP Over Wireless Network. Jinhua Zhu Jie Xu TCP Over Wireless Network Jinhua Zhu Jie Xu Overview 1. TCP congestion control scheme 2. ECN scheme 3. Problems with TCP over wireless network 4. ATCP:TCP for mobile ad hoc networks 5. ptcp: a transport

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC

More information

TCP/IP Inside the Data Center and Beyond. Dr. Joseph L White, Juniper Networks

TCP/IP Inside the Data Center and Beyond. Dr. Joseph L White, Juniper Networks Dr. Joseph L White, Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data Pig Laboratory This laboratory is dedicated to Hadoop Pig and consists of a series of exercises: some of them somewhat mimic those in the MapReduce laboratory, others are inspired by "real-world" problems.

More information

TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology

TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology TCP/IP Networking for Wireless Systems Integrated Communication Systems Group Ilmenau University of Technology Content Internet Protocol Suite Link Layer: Ethernet, PPP, ARP, MAC Addressing Network Layer:

More information

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson) Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet

More information

Iperf Bandwidth Performance Testing

Iperf Bandwidth Performance Testing Iperf Bandwidth Performance Testing TABLE OF CONTENTS What Is Iperf?... 2 Why Would A Hacker Use Iperf?... 2 Iperf Demonstration.... 3 Final Conclusions.... 8 What Is Iperf? In really simple terms, Iperf

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements

NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements Charles Robert Simpson, Jr. and George F. Riley Georgia Institute of Technology (Georgia Tech), Atlanta Georgia,

More information

Network and Services Discovery

Network and Services Discovery A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Recent advances in transport protocols

Recent advances in transport protocols Recent advances in transport protocols April 12, 2013 Abstract Transport protocols play a critical role in today s Internet. This chapter first looks at the evolution of the Internet s Transport Layer

More information

Analytic Models for the Latency and Steady-State Throughput of TCP Tahoe, Reno and SACK

Analytic Models for the Latency and Steady-State Throughput of TCP Tahoe, Reno and SACK REVISION 1 1 Analytic Models for the Latency and Steady-State Throughput of TCP Tahoe, Reno and SACK B. Sikdar, S. Kalyanaraman and K. S. Vastola Dept. of ECSE, Rensselaer Polytechnic Institute Troy, NY

More information

The present and the future of TCP/IP

The present and the future of TCP/IP The present and the future of TCP/IP David Espina Project in Electronics dea09001@student.mdh.com Dariusz Baha Computer science dba04002@student.mdh.se ABSTRACT The Transport Control Protocol (TCP) and

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

TCP, Active Queue Management and QoS

TCP, Active Queue Management and QoS TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

The Fundamentals of Intrusion Prevention System Testing

The Fundamentals of Intrusion Prevention System Testing The Fundamentals of Intrusion Prevention System Testing New network-based Intrusion Prevention Systems (IPS) complement traditional security products to provide enterprises with unparalleled protection

More information

Linux 2.4 Implementation of Westwood+ TCP with rate-halving: A Performance Evaluation over the Internet

Linux 2.4 Implementation of Westwood+ TCP with rate-halving: A Performance Evaluation over the Internet Linux. Implementation of TCP with rate-halving: A Performance Evaluation over the Internet A. Dell Aera, L. A. Grieco, S. Mascolo Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari Via Orabona,

More information

Analysis of Congestion Models for TCP Networks

Analysis of Congestion Models for TCP Networks Analysis of Congestion Models for TCP Networks by Robert J. Kilduff The Hamilton Institute National University of Ireland Maynooth Co. Kildare A dissertation submitted to the National University of Ireland

More information

TCP Westwood for Wireless

TCP Westwood for Wireless TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract

More information

Performance evaluation of TCP connections in ideal and non-ideal network environments

Performance evaluation of TCP connections in ideal and non-ideal network environments Computer Communications 24 2001) 1769±1779 www.elsevier.com/locate/comcom Performance evaluation of TCP connections in ideal and non-ideal network environments Hala ElAarag, Mostafa Bassiouni* School of

More information

STUDY OF TCP VARIANTS OVER WIRELESS NETWORK

STUDY OF TCP VARIANTS OVER WIRELESS NETWORK STUDY OF VARIANTS OVER WIRELESS NETWORK 1 DEVENDRA SINGH KUSHWAHA, 2 VIKASH K SINGH, 3 SHAIBYA SINGH, 4 SONAL SHARMA 1,2,3,4 Assistant Professor, Dept. of Computer Science, Indira Gandhi National Tribal

More information