Internet Protocol Stack. TCP: Transmission Control Protocol
|
|
- Beverly Harmon
- 7 years ago
- Views:
Transcription
1 Internet Protocol tack application: supporting network applications HTTP, MTP, FTP, etc transport: endhost-endhost data transfer TCP, UP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements Ethernet, WiFi physical: bits on the wire application transport network link physical TCP: Transmission Control Protocol Provides reliability on connectionless datagram network: Link layer already provides sequencing and error control Why do we need to provide reliability again at the transport layer?
2 Need for EE Reliability EE Reliability Causes of unreliable delivery re-routed packets bit error dropped/lost packets (due to congestion) system reboots How to achieve reliable delivery? Reliable delivery requires tools:
3 equence Number With ARQ, packets must be numbered, why? equence number space is finite Issues: sequence space size sequence number wrap around 3 initial sequence number (IN) equence Number pace ize If we had only bits to keep track of sequence numbers: new? or rexmit? T MPL: Max Pkt Lifetime MPL A What prevention? 3
4 equence Number pace ize Let: A: time taken by receiver to ACK packet T: time sender continues retransmitting if ACK not received Maximum eqment Lifetime (ML): MPL + T + A Want: no seq number may be duplicated within an ML equence Number Wrap Around equence space is finite and sequence number can wrap around: pkt 3 queued/ delayed which is newer? Assuming s and s are not more than N/ apart, s > s if either: 0 N s > s and s s < N/, or s < s and s s > N/ 0 N 4
5 Required equence Number ize Require that if s > s, s and s are not more than N/ apart ( s s < N/) within an ML Let µ be the transmission bandwidth For TCP, N = 3 -, ie, seq number size n = 3 bits, want µ < (N/)/ML or n > µ*ml Example: F-NY MPL is 5 msec Let ML = min, for n = 3 bits, µ must be < 78 MB/s (43 Mbps) 0 N 0 N Initial equence Number (IN) In case a connection got reincarnated, we must choose an initial sequence number that will not cause packets from the old connection to interfere How can a connection be reincarnated? Possible solutions: 3 5
6 IN from ystem Clock Assume clock keeps ticking even when machine is down Want: no seq number may be duplicated within an ML eq # sequence # wraps around n Forbidden Region ML fast xmission wait for ML resynchronize slow xmission last time this seq# may be used connection start time clock tick What to do on hitting forbidden region? wait for ML before resuming transmission resynchronize sequence number either case, connection stalled TCP s Handling of IN Connection identified by both addresses and port numbers and initial sequence number Connection cannot be reused for ML time on connection tear-down, wait for ML (TIME-WAIT state) bind: Address already in use on reboot, do not create connection for ML ( minutes) on reboot, starts global IN from IN carried in YNchronization packet during connection establishment 6
7 Connection Establishment First try: ender estination reboot YN IN=X YN IN=Z Z+ Z+ Expected eq # EN = X+, ETABLIHE discard dropped, but connection with EN = X+ still ETABLIHE Lesson: connection request must be ACKed Connection Establishment econd try: ender estination discard stray YN IN=X YN IN=Y ACK X+ EN = X+ ETABLIHE Y+ Lesson: connection ACK must be ACKed or rejected 7
8 Connection Establishment Three-way handshake: ender EN = Y+ ETABLIHE YN IN=Y ACK X+ YN IN=X ACK Y+ estination EN = X+ ETABLIHE X+ YN uses a seq# Three-Way Handshake How three-way handshake solves the original problems: reboot YN IN=Z ender RT Y YN IN=X estination YN IN=Y ACK X+ RT Z discard ender stray YN IN=X YN IN=Y ACK X+ RT Y estination EN = X+ ETABLIHE 8
9 Connection Tear-down When to release a connection? Ie, how do you know the other side is done sending and all sent packets have arrived? Use 3-way handshake to tear-down connection: ender FIN X estination ACK X+ FIN Y FIN also uses a seq# ACK Y+ Connection Tear-down If the other side still has data to send: ender FIN X estination ACK X+ More data pkts from FIN Y ACK Y+ Why not send ACK X+ along with FIN Y? 9
10 Connection Tear-down till depends on timeout: ender estination ender estination FIN X FIN X ACK X+ FIN Y X FIN X ACK Y+ X ACK X+ FIN Y ACK X+ FIN Y times out and tears down connection unilaterally ACK Y+ Connection Tear-down till depends on timeout: ender FIN X estination after n attempts tears down connection unilaterally ACK X+ FIN Y X FIN X X FIN X ACK X+ FIN Y X times out and tears down connection unilaterally TCP connection tear-down depends on timers for correctness, but uses 3-way handshake for performance improvement 0
11 TCP Connection Management FM TCP client lifecycle TCP server lifecycle Mao W07 TCP Header 3 bits RT, YN, FIN: connection establishment (setup, teardown) number of 3-bit fields in header URG: urgent data pointer valid (generally not used) ACK: ACK # valid PH: push data now (like fflush()) required source port # dest port # sequence number acknowledgement number head not U A P R F len used checksum window size application data (variable length) urg data pointer options (variable length) counting by bytes of data (not segments!) receiver window size (rwnd, in bytes) end of urgent data, eg, ^C Maximum egment ize negotiation, default (minimum required) 536 bytes data
12 TCP Header Fields equence number: data is sent in segments (= packets with seq#) sequence numbers count bytes sent ACK may be piggy-backed on data packet Checksum: checksum computed including pseudo IP header (containing source and destination IP addresses, protocol, segment length) computed with all 0 s in the checksum field s complement of result stored in checksum field (aka Internet checksum) when checksum is computed at receiver, result is 0 Internet Checksum Example When adding numbers, a carryout from the most significant bit needs to be added to the result Example: add two 6-bit integers wraparound s complement sum s complement Internet Checksum Incremental update of checksum, eg, updating ttl: ~ (~checksum + ~ttl + ttl )
13 TCP Cumulative ACK ACKs the last byte received in-order tells sender the next-expected seq#, ie, if bytes 0 to i have been received, ACK says i+ subsequent out-of-order packets generate the same cumulative ACK: 8 bytes: seq# 0 0 bytes: seq# 8 0 bytes: seq# 8 0 bytes: seq# 8 ender x estination ack 8 ack 8 Advantage: lost ACK can be covered by later ACKs isadvantage: size of gap between two pkts not known to sender TCP Connection Establishment emo % sudo tcpdump i en host wwweecsumichedu 3
14 TCP Flow Control receive side of TCP connection has a receive buffer: flow control sender won t overflow receiver s buffer by transmitting too much, too fast application process may be slow at reading from the buffer Receiver advertises buffer space available by including the current value of rwnd in TCP header ender limits unacked data to rwnd guarantees receiver buffer doesn t overflow TCP Flow Control Problems Two flow-control problems: receiver too slow (silly-window syndrome) sender s data comes in small amount (Nagle s algorithm) illy-window syndrome: receiver window opens only by a small amount, hence sender can send only a small amount of data at a time ender 0 (size 000) 000 (000) 000 (500) estination w = 500 application reads out byte w = Why is this not good? 500 () 50 () application reads out byte w = 4
15 olution to illy-window yndrome on t advertise window until it opens significantly (> ½*M or ½*rwnd) Implementation alternatives: ACK with rwnd=0: sender probes after persistence timer goes off delayed ACK, but not more than 500 ms, or ACK every other segment (why?) persist timer ender 0 (000) 000 (000) 000 (500) probe 499 () estination w = 500 application reads out byte w = 0 w = 000 TCP elayed ACK Generation Event at Receiver Arrival of in-order segment with expected seq # All data up to expected seq # already ACKed Arrival of in-order segment with expected seq # One other segment has ACK pending Arrival of out-of-order segment higher-than-expect seq # Gap detected Arrival of segment that partially or completely fills gap TCP Receiver action elayed ACK Wait up to 500ms for next segment If no next segment, send ACK Immediately send single cumulative ACK, ACKing both in-order segments Immediately send duplicate ACK, indicating seq # of next expected byte Immediately send ACK, provided that segment starts at lower end of gap 5
16 Characteristics of Interactive Applications User sends only a small amount of data, eg, telnet sends one character at a time Problem: 40-byte header for every byte sent! olution: clumping, sender clumps data together, ie, sender waits for a reasonable amount of time before sending How long is reasonable? Nagle Algorithm send first segment immediately accumulate data until ACK returns, or ½ sender window or ½ M amount of data has been accumulated Advantages: bulk transfer is not held up data sent as fast as network can deliver Can be disabled by setsockopt(tcp_noelay) 6
17 Nagle Algorithm Nagle sends data as fast as network can deliver: round-trip time () ender 3 w pkts ACKs Receiver R 3 w round-trip time () ender to w+ Receiver R to w+ w+ bytes in s w+ bytes in s Retransmission Timeout ARQ depends on retransmission to achieve reliability Retransmission timeout (RTO) computed from roundtrip time (RTT) On the Internet, RTT of a path varies over time, due to: Varying RTT complicates the computation of: retransmission timeout (RTO) optimal sender s window size round-trip time () retransmission timeout ()!! ender 3 4 ACKs Pkts Receiver R 3 4 7
18 Implications of Bad RTO RTO too small: unnecessary retransmissions: RTO too big: lower throughput: ender Router R estination ender Router R estination A A X A Estimating RTT RTO must adapt to actual AN current RTT samplertt: time between when a segment is transmitted and when its ACK is received estimatedrtt computed by exponential weighted average estimatedrtt = α *currentrttestimate + (-α) *samplertt, where α is the weight: α : each sample changes the estimate only a little bit α 0: each sample influences the estimate heavily α is typically ⅞ (-½ 3, which allows for fast implementation) 8
19 Example RTT Estimation How to Compute RTO? First try: RTO = β RTT, with β typically or 3 Two problems: which packet to associate with an ACK in case of retransmission? ender pkt i pkt i estination? ack i RTTs spread too wide pdf pkts with these must be rexmitted mean = samples 9
20 ACK Ambiguity Which retransmitted packet to associate with an ACK? original packet: RTO can grow unbounded retransmitted packet: RTO shrinks ender 0 X estination ender 0 estination 0 X 0 X There is a feedback loop between RTO computation and RTT estimate ACK Ambiguity: Karn s Algorithm Karn s algorithm: adjust RTT estimate only from non-retransmitted samples however, ignoring retransmissions could lead to insensitivity to long delays so, back off RTO upon retransmission: RTO new = γ RTO old, γ typically = 0
21 RTT pread Too Wide RTT estimate computed using exponential weighted average gives only a good mean pdf pkts with these must be rexmitted = mean Jacobson s algorithm: estimate the variance in samplertt use the deviation in samplertt () in RTO computation new = α old + (-α) samplertt estimatedrtt compute new estimatedrtt RTO = estimatedrtt + 4 samples Timers Used in TCP TIME_WAIT: * ML persistence timer 3 RTO 4 keep-alive timer: probe if connection idle too long may be turned on/off and idle period may be set using setsockopt()
TCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery
TCP Flow Control Computer Networks The receiver side of a TCP connection maintains a receiver buffer: Lecture : Flow Control, eliable elivery application process may be slow at reading from the buffer
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationOutline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationB-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
More informationTCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationCOMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans
More informationChapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationChapter 6 Congestion Control and Resource Allocation
Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;
More informationHigher Layer Protocols: UDP, TCP, ATM, MPLS
Higher Layer Protocols: UDP, TCP, ATM, MPLS Massachusetts Institute of Technology Slide 1 The TCP/IP Protocol Suite Transmission Control Protocol / Internet Protocol Developed by DARPA to connect Universities
More informationCSE331: Introduction to Networks and Security. Lecture 9 Fall 2006
CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More information1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
More informationTransport Layer and Data Center TCP
Transport Layer and Data Center TCP Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 5, 2014 Slides used and adapted judiciously
More informationApplication Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
More informationPrefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?
More informationTCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
More informationq Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user
Transport service characterization The Transport Layer End-to-End Protocols: UDP and TCP Connection establishment (if connection-oriented) Data transfer Reliable ( TCP) Unreliable / best effort ( UDP)
More informationA Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationSimulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
More informationMidterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationTransport layer protocols for ad hoc networks
Transport layer protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ Which transport layer protocol? Classification of transport
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationTCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationCS551 End-to-End Internet Packet Dynamics [Paxson99b]
CS551 End-to-End Internet Packet Dynamics [Paxson99b] Bill Cheng http://merlot.usc.edu/cs551-f12 1 End-to-end Packet Dynamics How do you measure Internet performance? Why do people want to know? Are ISPs
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationTCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology
TCP/IP Networking for Wireless Systems Integrated Communication Systems Group Ilmenau University of Technology Content Internet Protocol Suite Link Layer: Ethernet, PPP, ARP, MAC Addressing Network Layer:
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationTransport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationArchitecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationData Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 6 Main Theme Reliable Data Transfer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationThis sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationCHAPTER 1 PRINCIPLES OF NETWORK MONITORING
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,
More informationComputer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
More informationExercises TCP/IP Networking. Solution. With Solutions
Exercises TCP/IP Networking Solution. With Solutions Jean-Yves Le Boudec Fall 2010 Exercises marked with a were given at exams in the past. 1 Module 1: TCP/IP Architecture Exercise 1.1 Elaine is setting
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationTCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationPig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data
Pig Laboratory This laboratory is dedicated to Hadoop Pig and consists of a series of exercises: some of them somewhat mimic those in the MapReduce laboratory, others are inspired by "real-world" problems.
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationWhat is a DoS attack?
CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: guan@ee.iastate.edu October
More informationCOMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationCongestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationHomework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15
1 Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
More informationNetworks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationCongestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
More information2 TCP-like Design. Answer
Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationTCP, Active Queue Management and QoS
TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationMultipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationInternet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationNETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements
NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements Charles Robert Simpson, Jr. and George F. Riley Georgia Institute of Technology (Georgia Tech), Atlanta Georgia,
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationMODBUS MESSAGING ON TCP/IP IMPLEMENTATION GUIDE V1.0b CONTENTS
MODBUS MESSAGING ON TCP/IP IMPLEMENTATION GUIDE V1.0b CONTENTS 1 INTRODUCTION... 2 1.1 OBJECTIVES... 2 1.2 CLIENT / SERVER MODEL... 2 1.3 REFERENCE DOCUMENTS... 3 2 ABBREVIATIONS... 3 3 CONTEXT... 3 3.1
More informationNetwork Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
More informationOptimization of Communication Systems Lecture 6: Internet TCP Congestion Control
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP
More information15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
More information