Datagram Congestion Control Protocol
|
|
- Alexis Jackson
- 7 years ago
- Views:
Transcription
1 Datagram Congestion Control Protocol Daniel Hein Advanced Computer Networks May 4th,
2 Outline Motivation Overview Connection Model Options and Features Headers and Associated Capabilities Connection Life Cycle Congestion Control Current Research - Performance 2
3 Motivation Problem: No congestion control => possible network congestion collapse Ratio of congestion controlled (TCP) and uncontrolled traffic (UDP) is changing New applications have arisen that prefer timeliness over reliability and thus use UDP Examples Video Streaming Internet Telephony Static preferable to echo Massive Multi-Player Online Games Only the latest information is important 3
4 Motivation Increase in not congestion controlled traffic threatens Internet stability Congestion control is difficult to implement Especially on the application layer Reinventing the wheel for every application Consequently, many applications that rely heavily on UDP do not implement congestion control 4
5 Overview - Features Unreliable datagrams with acknowledgments Connection oriented Reliable feature negotiation Selection of different congestion control strategies CCID2 TCP-like congestion control CCID3 TFRC congestion control Selective acknowledgment ECN support Designed for robustness against primitive attacks No state for unacknowledged connections Path MTU discovery Integrated support for mobility 5
6 Overview - Deliberate Omissions DCCP design is deliberately minimalistic it does not support: Flow Control No receive window Difficult to get right Selective Reliability No retransmitting of data packets Easily layered on top of DCCP Streams Packet, not byte oriented Trivial to implement on top of DCCP Multicasts Difficult to produce a one size fits all solution DCCP's design does not lend itself to multicasting 6
7 Connection Model A Request Response Ack Data/Ack/DataAck CloseReq Close Reset B DCCP connections are abstracted into two logical half connections AB and BA Half-connection: Data + corresponding acks Features: Set per halfconnection (including congestion control) Example: AB uses CCID2 BA uses CCID3 7
8 Options and Features Options All packets may contain options Appended after generic header Sample Options: Feature negotiation Init cookie Ack vector Timestamp Features Set of parameters specific to a half-connection Reliable, features requests are retransmitted Features other than congestion control include Sequence number parameters Checksum related parameters 8
9 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 9
10 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 10
11 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 11
12 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 12
13 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Checksum Depending on CsCov Protects the header and optionally also the data 4-bit Type Currently nine different types defined 13
14 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Checksum Depending on CsCov Protects the header and optionally also the data 4-bit Type Currently nine different types defined 14
15 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 0 Sequence Number DCCP supports two different Sequence Number and header lengths Connection establishment and tear-down with 48-bit Sequence Numbers Data may use shorter 24-bit Sequence Numbers to reduce overhead 15
16 DCCP Headers and Associated Capabilities Generic DCCP Header (12 bytes) with Type=2 (DCCP-Data) Options / [Padding]. Data. Sample Header: DCCP-Data Generic short sequence number header Options, e.g. a feature request Must be 32-bit aligned (padded) Data 16
17 DCCP Headers and Associated Capabilities Generic DCCP Header (12 bytes) with Type=2 (DCCP-Data) Options / [Padding]. Data. Sample Header: DCCP-Data Generic short sequence number header Options, e.g. a feature request Must be 32-bit aligned (padded) Data 17
18 DCCP Headers and Associated Capabilities Generic DCCP Header (12 bytes) with Type=2 (DCCP-Data) Options / [Padding]. Data. Sample Header: DCCP-Data Generic short sequence number header Options, e.g. a feature request Must be 32-bit aligned (padded) Data 18
19 Connection Life Cycle - Establishment Client Request Response Ack Data/Ack/DataAck Server Client sends DCCP-Request Request MUST contain Service code 48-Bit sequence number Request MAY contain Feature requests Data CloseReq Close Reset 19
20 Connection Life Cycle - Establishment Client Request Response Ack Data/Ack/DataAck CloseReq Close Reset Server Server answers with DCCP- Response Response must contain Service code 48-bit sequence number Acknowledgment number subheader Request may contain Feature confirmation and request Data 20
21 Connection Life Cycle - Establishment Client Request Response Ack Server Clients responds with a DCCP- Ack and establishes connection Data/Ack/DataAck CloseReq Close Reset 21
22 Connection Life Cycle Data Transfer Client Request Response Ack Data/Ack/DataAck Server Both half-connections can send data DCCP-Data, DCCP-Ack, DCCP- DataAck packets may Use short packet headers Contain options CloseReq Close Reset 22
23 Connection Life Cycle Tear Down Client Request Response Ack Data/Ack/DataAck Server Server transmits a DCCP- CloseReq Starts connection tear down Only server can send CloseReq, Client can use DCCP-Close Server does not want to hold timewait state Must use long sequence numbers CloseReq Close Reset 23
24 Connection Life Cycle Tear Down Client Request Response Ack Server Client acknowledges request with DCCP-Close Again a long sequence number header is mandatory Data/Ack/DataAck Client can always initiate connection tear down on its own with a DCCP-Close CloseReq Close Reset 24
25 Connection Life Cycle Tear Down Client Request Response Ack Data/Ack/DataAck Server DCCP-Reset unconditionally shuts down connection Client holds timewait state to allow remaining packets to clear network CloseReq Close Reset 25
26 Congestion Control Congestion control algorithm depends on application is selected via Congestion Control ID is negotiated upon at connection startup Two congestion control mechanisms have currently been developed CCID2 - TCP-like congestion control CCID3 - TFRC congestion control 26
27 Congestion Control CCID2 TCP-like congestion control, similar behaviour to TCP Abrupt rate changes Fast adaption to rapid fluctuations in available bandwidth Uses Ack Vector Option Equivalent to TCP SACK Uses congestion window Capable to detect reverse path congestion Uses Ack Ratio Feature to control rate of acknowledgment 27
28 Congestion Control CCID3 Suitable for applications that have a more or less constant send rate (voice) Uses sending rate instead of a congestion window Feedback (loss event rate) approx. once per RTT Sender uses loss event rate to set sending rate Must protect against misbehaving receivers Loss interval Uses CCVal header field as timestamp 28
29 Current Research - Performance Most research concentrated on performance DCCP coupled with efficient API performs well for video data on bandwidth limited channels in comparison to UDP Video applications using DCCP-CCID3 fare well against TCP and other TFRC flows, but it is not ideally suited for video because of slow response to rate changes Evaluation of burst traffic using DCCP-CCID2 shows that it works well in most cases, but fairness between DCCP/TCP and DCCP/DCCP is not yet perfect 29
30 E. Kohler, M. Handley, S. Floyd References RFC 4340: Datagram Congestion Control Protocol, March S. Floyd, M. Handley, E. Kohler RFC 4336: Problem Statement for Datagram Congestion Control Protocol, March S. Floyd, E. Kohler RFC 4341: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion Control, March S. Floyd, E. Kohler, J. Padhye RFC 4342: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 3: TCP-Friendly Rate Control (TFRC) 30
31 E. Kohler, M. Handley, S. Floyd References Designing DCCP: Congestion Control Without Reliability SIGCOMM'06, September 11-15, 2006, Pisa, Italy, E. Kohler, S. Floyd Datagram Congestion Control Protocol (DCCP) Overview, July Junwen Lai, E. Kohler Efficiency and Late Data Choice in a User-Kernel Interface for Congestion- Controlled Datagrams Proc. 12 th Annual SPIE Conference on Multimedia Computing and Networking (MMCN'05) 31
32 References J. Van Velthoven, K.Spaey and C.Blondia Performance of Constant Quality Video Applications using the DCCP Transport Protocol Local Computer Networks, Proceedings st IEEE Conference on Nov Page(s): Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi Performance Evaluations of DCCP for Bursty Traffic in Real-time Applications Applications and the Internet, Proceedings. The 2005 Symposium on 31 Jan.-4 Feb Page(s): Burak Görkemli, M. Reha Civanlar SVC Coded Video Streaming over DCCP Multimedia, ISM'06. Eighth IEEE International Symposium on Dec Page(s):
33 Thank you for your attention! Questions? 33
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationIAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659
IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationChapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationChapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationInternet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationVoice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
More informationAdvanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
More informationB-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
More informationA Multi-level Security Mechanism for Secure Data Transmission in SCTP
Research Journal of Applied Sciences, Engineering and Technology 7(10): 2123-2128, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 6, 2013 Accepted: September
More informationTCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationRequirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationAsynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
More informationRTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos
Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationCongestion Control Overview
Congestion Control Overview Problem: When too many packets are transmitted through a network, congestion occurs t very high traffic, performance collapses completely, and almost no packets are delivered
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationDistributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
More informationWe will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
More informationCOMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
More informationNetwork congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationAusarbeitung Anwendungen 2 SS2011. Fabian Jäger Scalable Videocodec in a Video Conference
Ausarbeitung Anwendungen 2 SS2011 Fabian Jäger Scalable Videocodec in a Video Conference Fakultät Technik und Informatik Department Informatik Faculty of Engineering and Computer Science Department of
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More information920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
More informationUser Datagram Protocol - Wikipedia, the free encyclopedia
Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers
More informationMeasuring DCCP for Linux against TCP and UDP With Wireless Mobile Devices
Measuring DCCP for Linux against TCP and With Wireless Mobile Devices Leandro Melo de Sales, Hyggo Oliveira, Angelo Perkusich Embedded Systems and Pervasive Computing Lab {leandro,hyggo,perkusic}@embedded.ufcg.edu.br
More informationTCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
More informationVOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet
VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice
More informationQUIC. Quick UDP Internet Connections. Multiplexed Stream Transport over UDP. IETF-88 TSV Area Presentation 2013-11-7
QUIC Quick UDP Internet Connections Multiplexed Stream Transport over UDP Presentation by Jim Roskind Google Corp IETF-88 TSV Area Presentation 2013-11-7 What is QUIC? Effectively replaces TLS and
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationResearch on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
More informationPerformance Comparison of SCTP and TCP over Linux Platform
Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationAn Empirical Study of the Congestion Response of RealPlayer, Windows MediaPlayer and Quicktime
An Empirical Study of the Congestion Response of RealPlayer, Windows MediaPlayer and Quicktime Sven Hessler Institute of Computer Science University of Innsbruck 62 Innsbruck, Austria sven.hessler@uibk.ac.at
More information1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationEmbedded Systems Transport Protocol Choosing for Modelling over the SpaceWire Model
Embedded Systems Transport Protocol Choosing for Modelling over the SpaceWire Model Ilya Korobkov St-Petersburg State University of Aerospace Instrumentation 190000, St-Petersburg, Bolshaya Morskaya 67,
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationProtagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationAn Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol
An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol School of Engineering and Science International University Bremen May 26 Vlad Balan Review Committee: Jürgen
More information13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
More informationHow To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationAn architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT
An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for
More informationApplication-level QoS : Improving Video Conferencing Quality through Sending the Best Packet Next
Application-level QoS : Improving Video Conferencing Quality through Sending the Best Packet Next Ian McDonald and Richard Nelson School of Computing and Mathematical Sciences, University of Waikato, Hamilton,
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationMultimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
More informationActive Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu (sryu@eng.buffalo.edu) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
More informationIperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH
Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?
More information2.1 Introduction. 2.2 Voice over IP (VoIP)
2.1 Introduction In this section can provide the necessary background on the structure of VoIP applications and on their component, and the transmission protocols generally used in VoIP. 2.2 Voice over
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationSCTP over Satellite Networks
1 SCTP over Satellite Networks Shaojian Fu Mohammed Atiquzzaman School of Computer Science University of Oklahoma, Norman, OK 73019-6151. William Ivancic Satellite Networks & Architectures Branch NASA
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationMoven Studio realtime. streaming
Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax
More informationAn Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol
An Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol Horia Vlad Balan International University Bremen h.balan@iu-bremen.de Lars Eggert Nokia Research Center lars.eggert@nokia.com
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationTEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au
TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to
More informationAn Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol
An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol School of Engineering and Science International University Bremen May 26 Vlad Balan Review Committee: Jürgen
More informationPerformance of VoIP with DCCP for Satellite Links
Performance of VoIP with DCCP for Satellite Links Golam Sarwar, Roksana Boreli, Emmanuel Lochin To cite this version: Golam Sarwar, Roksana Boreli, Emmanuel Lochin. Performance of VoIP with DCCP for Satellite
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationEffect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
More information