TCP transmission control protocol
|
|
- Joan Griffith
- 7 years ago
- Views:
Transcription
1 TCP transmission control protocol Suguru Yamaguchi 2014 Information Network 1 Functions that transport layer provides! Model: inter-process communication Identification of process Communication pair of processes! Interfaces for upper layers Connection oriented (virtual circuit) Connectionless (datagram)! Contention and coordination of network resources Flow control, maximizing peer benefit. Congestion control, maximizing network welfare Information Network 1
2 Transport protocols in Internet protocol suites! TCP Connection-oriented Almost all applications are using. Powerful functions! UDP Connectionless Simple, less overhead. IP + process identification! others Many implementations and standards, SCTP, RTP, DCCP, Information Network 1 Process and connection! Identification of process (IP, port)! Identification of TCP connection (source IP, source port, destination IP, destination port) ( , 1040) ( , 25) 1040 connection connection Information Network
3 port! Port is defined for each transport protocol, separately. TCP/25 is NOT equal to UDP/25 The number has meaning. IANA manages the numbers. Well-known port: www (world wide web) = 80 smtp (simple mail transfer protocol) = 25 Registered port: Registration to IANA Private port: Information Network 1 TCP service model (1)! Connection-oriented! Byte-stream service No explicit boundary among messages Message structure defined by applications! Full duplex Independent stream for sending and receiving! Reliable Managing message order, duplications, discarding, and bit errors. OLLEH OK TCP being viewed as byte-stream service OLLEH OK 2014 Information Network 1
4 Reliable steam, how?! ACK: acknowledgement Active acknowledgement Duplicate ACK = notification of packet drop! Timeout and retransmission In the case the sender does not receive ACK from its receiver, TIMEOUT! Suppose the message transmission did incomplete with some errors, sender does retransmission again for its receiver. Exponential back-off 2014 Information Network 1 ACK Sender Sent and acknowledged Sent but unacknowledged Nara Institute of Science and Technology User data arrives Packet in transit Receiver Nara Insti 2014 Information Network 1
5 Piggybacking: speed up for ACK Sender Receiver Sent and acknowledged Sent but unacknowledged Nara Institute of Science and Technology User data arrives Graduate S Packet in transit Sender Receiver Nara Insti Graduate School of Information Science User data arrives Sent and acknowledged Sent but unacknowledged 2014 Information Network 1 *** Not accurate Duplicate ACK Sender Sent and acknowledged Sent but unacknowledged Nara Institute of Science and Technology User data arrives Packet loss Outstanding packets Receiver Nara Institute o 2014 Information Network 1
6 TCP header IP Header TCP Header TCP segment TCP data 16bit source port 16bit destination port 32bit sequence number 32bit acknowledgment number 20 octets 4bit hlen reserved flags 16bit window size 16bit TCP checksum 16bit urgent pointer (options) (TCP data) 2014 Information Network 1 Nagle algorithm! Q. header (20bytes+20bytes) is too large for 1byte data. How can we deal with this?! Nagle algorithm Only one unacknowledged small segment in the connection If the sending segment is smaller than its receiver buffer, wait until it exceeds, or wait predefined time for transmission Small RTT - small waiting time Large RTT fill up the buffer for good throughput 2014 Information Network 1
7 TCP service model (2)! Buffered transfer Write messages as long as you want No explicit synchronization needed in application layer OS manages status of processes.! Virtual circuit Connection setup & release Detecting disconnection in communication 2014 Information Network 1 Buffered transfer process process write() read() write() read() Send buffer Recv buffer Send buffer Recv buffer TCP connection OS kernel OS kernel 2014 Information Network 1
8 TCP header again Sender port # Receiver port # Sequence # ACK # 20 octets Hdr len rsv Checksum flags Window size Pointer to OOB TCP option FIN SYN RST PSH ACK URG 2014 Information Network 1 TCP connection setup - 3-way Handshake Client (active open) Server (passive open) SYN_SENT ESTABLISHED SYN J SYN K, ACK J+1 ACK K+1 LISTEN SYN_RECEIVED ESTABLISHED 2014 Information Network 1
9 TCP connection release close FIN Ack of FIN FIN close ACK of FIN 2014 Information Network 1 TCP connection reset! RST Abortive release Nonexistent port 2014 Information Network 1
10 Options! TCP options in 3-way handshake Negotiation on options in 3way handshake MSS option Maximum segment Size negotiation Window scale option For huge message buffer, larger than 64k, with bit shift High speed networks Timestamp option More accurate RTT measurement With MSS option Many options available 2014 Information Network 1 TCP state transition appl: passive opem send: <nodata> start CLOSED Server Client LISTEN Passive open SYN_RCVD recv: SYN send: SYN, ACK Simul. open SYN_SENT Active open appl: CLOSE Or timeout recv: CLOSE send: FIN FIN_WAIT_1 recv: FIN send: <nodata> recv: FIN send: ACK ESTABLISHED Data transmission Simul.close CLOSING recv: ACK send: <nodata> recv: FIN send: ACK CLOSE_WAIT recv: CLOSE send: FIN LAST_ACK Passive close recv: ACK send: <nodata> FIN_WAIT_2 recv: FIN send: ACK TIME_WAIT 2MSL Active close 2014 Information Network 1
11 Summary! Functions in transport layer (L4)! Internet transport protocol! TCP service model! High performance: ACK, piggybacking, Nagle algorithm! Connection management 2014 Information Network 1 Tcpdump 3way handshake # tcpdump tcp and host iplab.naist.jp 15:26: IP rm.naist.jp > iplab.naist.jp.http: S : (0) win <mss 1460,nop,wscale 0,nop,nop,timestamp ,sackOK,eol> 15:26: IP iplab.naist.jp.http > rm.naist.jp.64868: S : (0) ack win <mss 1414,nop,wscale 0,nop,nop,timestamp > 15:26: IP rm.naist.jp > iplab.naist.jp. ack 1 win <nop,nop,timestamp > Time src.port > dst.port flag [ from:to(nbytes) ack # ] win # opt 32bit sequence number & acknowledgement number flags 2014 Information Network 1
12 Tcpdump connection release 15:26: IP rm.naist.jp > iplab.naist.jp. ack 5857 win <nop,nop,timestamp > 15:27: IP iplab.naist.jp.http > rm.naist.jp.64868: F 5857:5857(0) ack 430 win <nop,nop,timestamp > 15:27: IP rm.naist.jp > iplab.naist.jp. ack 5858 win <nop,nop,timestamp > 15:27: IP rm.naist.jp > iplab.naist.jp.http: F 430:430(0) ack 5858 win <nop,nop,timestamp > 15:27: IP iplab.naist.jp.http > rm.naist.jp.64868:. ack 431 win <nop,nop,timestamp > 2014 Information Network 1 Play with tcpdump! Tcpdump microscope of TCP communication RST use Packet transmission order TCP option MSS options Window scale options 2014 Information Network 1
13 TCP flow control & congestion control Suguru Yamaguchi 2014 information Network 1 Contention and coordination of resources! Flow control Negotiation of processing performance Recovery from message disorders Recovery from message duplication, discard and bit errors Maximizing performance of data transmission! Congestion control Sharing network bandwidth among connections, suppressing network congestions. Fair sharing Maximizing network welfare
14 Flow control! Stop-and-wait! Go Back N! Selective repeat! Many schemes ARQ (Adaptive Repeat request) Stop-and-wait ARQ Sender t 1 t 5 t 4 t 1 t 2 t 3 Receiver t 1 : transmission delay t 2 : frame transmission time t 3 : frame processing time t 4 : ACK transmission time t 5 : ACK processing time 2014 information Network 1 28
15 Go-back-N ARQ Timeout on frame3!! information Network 1 29 TCP flow control! End to End No global coordination Working with available bandwidth estimation at individual hosts No interference with intermediate routers Implicit signaling through packet drops! Scalable Working at each end host Autonomous less state management Scalable
16 End to end control in TCP Data flow ACK flow - timer & retransmission - packet interval handlings - on-the-fly packet control - buffering for retransmission Possible packet drop in Intermediate routers (both data and ACK) - timer & duplicate ACK - delayed ACKing - window size notification - buffering for reordering packets Many contributions for TCP! Very simple algorithm Macroscopic self-stabilization! No assumption with Greedy nodes No global control system No greedy node for eating bandwidth as much as possible Reject the idea of intermediate policing system! For many data-links General purpose Modest performance on almost all data-links! Long term tuning for last 20 years
17 TCP flow control! Bandwidth usage coordination Sliding window! Sequence number based control Window size! Packet gap control ACK clocking! others Error detection - TCP checksum Discard detection - duplicate ACK, timeout Sliding window Sender Sent and acknowledged Sent but unacknowledged Nara Institute of Science and Technology Window size User data arrives Sequence number Packets in transit (on-the-fly packets, outstanding packets) Receiver Nara Insti 2014 information Network 1
18 Advertisement window size from receivers! Flow control of classic TCP! rwnd: advertisement window Notification from receiver, on maximum receivable packet size Coordination with sender s sliding window size Too sensitive on bottleneck link ACK clocking data Packets in the Bottle neck, with packet gap T Data flow ACK flow Transmission with receiving speed of ACK (bottle neck speed) self clocking in its balancing stituation ACK gen. (gap )
19 TCP congestion control TCP tahoe! Fair-share model: End to end! Increase/decrease of Window size Additive increase Multiplicative decrease For Self-stabilization (Jain, et.al)! Strategy on changing of Window size\! Detect congestion through packet drops More control parameters TCP tahoe! Parameters in sender Cwnd congestion window Init 1 Ssthresh slow start threshold, Init large Tcprecvthresh dup ACK number for fast recovery, Init 3 for many implementations
20 Increasing Window size! Increase congestion window (cwnd) exponentially, by slow start threshold (ssthresh)! Overview of algorithm On receiving an ACK: If (cwnd < ssthresh) { /* slow start */ send 2 packets on every ACK; /* exponentially growth*/ cwnd += 1; } else { } /* congestion avoidance */ send cwnd+1 packets on every ACK, cwnd += 1 / cwnd; /* liner behavior */ Increasing Window size! Slow start Exponential increase! Congestion avoidance Additive increase Liner growth # of packets congestion avoidance slow start T
21 Reducing Window size (idea)! In the case the transmission exceeds maximum throughput Packet drop may occur, because buffer overrun.! In the case of packet drop, Return Duplicate ACK Congested, but not serious (because ACK was traveled) Maybe OK for retransmission Timeout!! Retransmission Time Out (RTO) ACK cannot travel back, so serious heavy congestion. It s better to wait some.. Reducing Window size (overview of algorithm)! On detecting packet drop: If (dup ACK # == tcprecvthresh ) { } /* fast retransmit */ retransmission; ssthresh = cwnd / 2; cwnd = 1; /* again slow start */ If (timeout) { } retransmission; timeout *= 2; /* exponentially backoff */ cwnd = 1;
22 Totally, TCP behaves like this # of packets Max throughput (may change) slow start T RTO Calculation! Err = M A A A+ gerr D D + h( Err -D) RTO = A + 4D A: smoothed RTT D: smoothed mean deviation g: gain for the average (1/8) h: gain for the deviation (1/4)! simply RTO = {average RTT} + 4 {smoothed mean deviation}
23 More improvement TCP reno! Issues Tahoe Too much penalty on doing slow start after Fast retransmit More good control on cwnd! Fast recovery If (dup ACK # == tcprecvthresh) { } retransmission; /* fast retransmit */ ssthresh = cwnd / 2 ; cwnd = cwnd/2 + tcprecvthresh; If (dup ACK # > cwnd/2 ) send new one packet on every dup ACK; If (ACK on retransmission) cwnd = ssthresh ; Less penalty # of packets Maximum throughput (may change) slow start cwnd /2 T
24 More improvement! Selective Acknowledgement (SACK)! Rate flow control TCP vegas! TFRC - TCP Friendly Rate Control (RFC4828)! Explicit Congestion Notification (ECN)! Interaction with RED! TCP extensions for wireless links!. Summary! Flow control Stop-and-Wait Go back N Sliding window! Congestion control Slow start Congestion avoidance Fast retransmit Fast recovery
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationTCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationChapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
More informationB-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationTCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
More informationOutline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
More informationA Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationCongestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationTransport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationTCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
More informationq Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user
Transport service characterization The Transport Layer End-to-End Protocols: UDP and TCP Connection establishment (if connection-oriented) Data transfer Reliable ( TCP) Unreliable / best effort ( UDP)
More informationTCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology
TCP/IP Networking for Wireless Systems Integrated Communication Systems Group Ilmenau University of Technology Content Internet Protocol Suite Link Layer: Ethernet, PPP, ARP, MAC Addressing Network Layer:
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationSimulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationTransport layer protocols for ad hoc networks
Transport layer protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ Which transport layer protocol? Classification of transport
More information1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
More informationTransport Layer and Data Center TCP
Transport Layer and Data Center TCP Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 5, 2014 Slides used and adapted judiciously
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationHigher Layer Protocols: UDP, TCP, ATM, MPLS
Higher Layer Protocols: UDP, TCP, ATM, MPLS Massachusetts Institute of Technology Slide 1 The TCP/IP Protocol Suite Transmission Control Protocol / Internet Protocol Developed by DARPA to connect Universities
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationTCP/IP Inside the Data Center and Beyond. Dr. Joseph L White, Juniper Networks
Dr. Joseph L White, Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationSELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS
SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS by Rajashree Paul Bachelor of Technology, University of Kalyani, 2002 PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF
More informationThis sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
More informationTCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery
TCP Flow Control Computer Networks The receiver side of a TCP connection maintains a receiver buffer: Lecture : Flow Control, eliable elivery application process may be slow at reading from the buffer
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationTCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
More informationTCP Over Wireless Network. Jinhua Zhu Jie Xu
TCP Over Wireless Network Jinhua Zhu Jie Xu Overview 1. TCP congestion control scheme 2. ECN scheme 3. Problems with TCP over wireless network 4. ATCP:TCP for mobile ad hoc networks 5. ptcp: a transport
More informationA Study on TCP Performance over Mobile Ad Hoc Networks
215 A Study on TCP Performance over Mobile Ad Hoc Networks Shweta Sharma 1, Anshika Garg 2 1 School of Computing Science and Engineering, Galgotias University, Greater Noida 2 School of Computing Science
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans
More informationParallel TCP Data Transfers: A Practical Model and its Application
D r a g a n a D a m j a n o v i ć Parallel TCP Data Transfers: A Practical Model and its Application s u b m i t t e d t o the Faculty of Mathematics, Computer Science and Physics, the University of Innsbruck
More informationActive Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu (sryu@eng.buffalo.edu) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More informationLow-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More information2 TCP-like Design. Answer
Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about
More informationEffect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
More informationChapter 6 Congestion Control and Resource Allocation
Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More information8-bit Microcontroller. Application Note. AVR460: Embedded Web Server. Introduction. System Description
AVR460: Embedded Web Server Introduction Intelligent homes will be connected to the Internet and require a microcontroller to communicate with the other network devices. The AVR embedded web server can
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationHigh Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
More informationIntroduction to IP networking
DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture
More informationRecent advances in transport protocols
Recent advances in transport protocols April 12, 2013 Abstract Transport protocols play a critical role in today s Internet. This chapter first looks at the evolution of the Internet s Transport Layer
More information(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationCongestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationApplication Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
More informationHigh-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
More informationStop And Wait. ACK received; transmit frame 2 CS 455 3
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationMeasuring the Evolution of Transport Protocols in the Internet. Alberto Medina Mark Allman Sally Floyd
Measuring the Evolution of Transport Protocols in the Internet Alberto Medina Mark Allman Sally Floyd 1 2 The Internet Protocol Stack Application Presentation Session Transport IP Data link Physical Internet
More informationA Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
More informationTCP Adaptation for MPI on Long-and-Fat Networks
TCP Adaptation for MPI on Long-and-Fat Networks Motohiko Matsuda, Tomohiro Kudoh Yuetsu Kodama, Ryousei Takano Grid Technology Research Center Yutaka Ishikawa The University of Tokyo Outline Background
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationCSE331: Introduction to Networks and Security. Lecture 9 Fall 2006
CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationServicesin ns-3. Outline SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3
SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 Servicesin Outline 1. Services in Sockets UDP TCP Bulk Application FTP On off Application 2.
More informationCHAPTER 1 PRINCIPLES OF NETWORK MONITORING
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,
More informationCommunication Systems Transport Layer - Protocols
Scope Communication Systems Transport Layer - Protocols Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email:
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationOn Inferring TCP Behavior
On Inferring TCP Behavior Jitendra Padhye and Sally Floyd ATT Center for Internet Research at ICSI (ACIRI) padhye@aciri.org, floyd@aciri.org ABSTRACT Most of the traffic in today s Internet is controlled
More informationAnalysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network
Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network V. Anil Kumar 1 and Dorgham Sisalem 2 (anil@cmmacs.ernet.in, sisalem@fokus.fhg.de) 1 CSIR Centre
More informationTitle: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. RAFIQ BIN CHE MAT (2003285011)
Title: DEVELOPING TCP/IP AND UDP TRAFFIC MONITORING TOOL. By RAFIQ BIN CHE MAT (2003285011) A project paper submitted to FACULTY OF INFRMATION TECHNOLOGY AND QUANTITATIVE SCIENCES MARA UNIVERSITY OF TECHNOLOGY
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationHomework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15
1 Homework 3 assignment for ECE374 Posted: 03/13/15 Due: 03/27/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationInternet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More information15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
More informationTCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection
TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection V. Anil Kumar 1 and Dorgham Sisalem 2 1 CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India 2 Fraunhofer
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More information