Datagram Congestion Control Protocol

Size: px
Start display at page:

Download "Datagram Congestion Control Protocol"

Transcription

1 Datagram Congestion Control Protocol Daniel Hein Advanced Computer Networks May 4th,

2 Outline Motivation Overview Connection Model Options and Features Headers and Associated Capabilities Connection Life Cycle Congestion Control Current Research - Performance 2

3 Motivation Problem: No congestion control => possible network congestion collapse Ratio of congestion controlled (TCP) and uncontrolled traffic (UDP) is changing New applications have arisen that prefer timeliness over reliability and thus use UDP Examples Video Streaming Internet Telephony Static preferable to echo Massive Multi-Player Online Games Only the latest information is important 3

4 Motivation Increase in not congestion controlled traffic threatens Internet stability Congestion control is difficult to implement Especially on the application layer Reinventing the wheel for every application Consequently, many applications that rely heavily on UDP do not implement congestion control 4

5 Overview - Features Unreliable datagrams with acknowledgments Connection oriented Reliable feature negotiation Selection of different congestion control strategies CCID2 TCP-like congestion control CCID3 TFRC congestion control Selective acknowledgment ECN support Designed for robustness against primitive attacks No state for unacknowledged connections Path MTU discovery Integrated support for mobility 5

6 Overview - Deliberate Omissions DCCP design is deliberately minimalistic it does not support: Flow Control No receive window Difficult to get right Selective Reliability No retransmitting of data packets Easily layered on top of DCCP Streams Packet, not byte oriented Trivial to implement on top of DCCP Multicasts Difficult to produce a one size fits all solution DCCP's design does not lend itself to multicasting 6

7 Connection Model A Request Response Ack Data/Ack/DataAck CloseReq Close Reset B DCCP connections are abstracted into two logical half connections AB and BA Half-connection: Data + corresponding acks Features: Set per halfconnection (including congestion control) Example: AB uses CCID2 BA uses CCID3 7

8 Options and Features Options All packets may contain options Appended after generic header Sample Options: Feature negotiation Init cookie Ack vector Timestamp Features Set of parameters specific to a half-connection Reliable, features requests are retransmitted Features other than congestion control include Sequence number parameters Checksum related parameters 8

9 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 9

10 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 10

11 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 11

12 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Port Numbers, similar to TCP and UDP 8-bit Data Offset => Up to 1020 bytes for options 4-bit CCval reserved for congestion control algorithm 4-bit Checksum coverage Defines packet corruption handling policy Sometimes corrupt data is preferable to no data (telephony, video) Packages with corrupt header are always discarded! 12

13 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Checksum Depending on CsCov Protects the header and optionally also the data 4-bit Type Currently nine different types defined 13

14 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) DCCP uses 16-bit Checksum Depending on CsCov Protects the header and optionally also the data 4-bit Type Currently nine different types defined 14

15 DCCP Headers and Associated Capabilities Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 1 Reserved Sequence Number (high bits) Sequence Number (low bits) Source Port Destination Port Data Offset CCVal CsCov Checksum Res. Type 0 Sequence Number DCCP supports two different Sequence Number and header lengths Connection establishment and tear-down with 48-bit Sequence Numbers Data may use shorter 24-bit Sequence Numbers to reduce overhead 15

16 DCCP Headers and Associated Capabilities Generic DCCP Header (12 bytes) with Type=2 (DCCP-Data) Options / [Padding]. Data. Sample Header: DCCP-Data Generic short sequence number header Options, e.g. a feature request Must be 32-bit aligned (padded) Data 16

17 DCCP Headers and Associated Capabilities Generic DCCP Header (12 bytes) with Type=2 (DCCP-Data) Options / [Padding]. Data. Sample Header: DCCP-Data Generic short sequence number header Options, e.g. a feature request Must be 32-bit aligned (padded) Data 17

18 DCCP Headers and Associated Capabilities Generic DCCP Header (12 bytes) with Type=2 (DCCP-Data) Options / [Padding]. Data. Sample Header: DCCP-Data Generic short sequence number header Options, e.g. a feature request Must be 32-bit aligned (padded) Data 18

19 Connection Life Cycle - Establishment Client Request Response Ack Data/Ack/DataAck Server Client sends DCCP-Request Request MUST contain Service code 48-Bit sequence number Request MAY contain Feature requests Data CloseReq Close Reset 19

20 Connection Life Cycle - Establishment Client Request Response Ack Data/Ack/DataAck CloseReq Close Reset Server Server answers with DCCP- Response Response must contain Service code 48-bit sequence number Acknowledgment number subheader Request may contain Feature confirmation and request Data 20

21 Connection Life Cycle - Establishment Client Request Response Ack Server Clients responds with a DCCP- Ack and establishes connection Data/Ack/DataAck CloseReq Close Reset 21

22 Connection Life Cycle Data Transfer Client Request Response Ack Data/Ack/DataAck Server Both half-connections can send data DCCP-Data, DCCP-Ack, DCCP- DataAck packets may Use short packet headers Contain options CloseReq Close Reset 22

23 Connection Life Cycle Tear Down Client Request Response Ack Data/Ack/DataAck Server Server transmits a DCCP- CloseReq Starts connection tear down Only server can send CloseReq, Client can use DCCP-Close Server does not want to hold timewait state Must use long sequence numbers CloseReq Close Reset 23

24 Connection Life Cycle Tear Down Client Request Response Ack Server Client acknowledges request with DCCP-Close Again a long sequence number header is mandatory Data/Ack/DataAck Client can always initiate connection tear down on its own with a DCCP-Close CloseReq Close Reset 24

25 Connection Life Cycle Tear Down Client Request Response Ack Data/Ack/DataAck Server DCCP-Reset unconditionally shuts down connection Client holds timewait state to allow remaining packets to clear network CloseReq Close Reset 25

26 Congestion Control Congestion control algorithm depends on application is selected via Congestion Control ID is negotiated upon at connection startup Two congestion control mechanisms have currently been developed CCID2 - TCP-like congestion control CCID3 - TFRC congestion control 26

27 Congestion Control CCID2 TCP-like congestion control, similar behaviour to TCP Abrupt rate changes Fast adaption to rapid fluctuations in available bandwidth Uses Ack Vector Option Equivalent to TCP SACK Uses congestion window Capable to detect reverse path congestion Uses Ack Ratio Feature to control rate of acknowledgment 27

28 Congestion Control CCID3 Suitable for applications that have a more or less constant send rate (voice) Uses sending rate instead of a congestion window Feedback (loss event rate) approx. once per RTT Sender uses loss event rate to set sending rate Must protect against misbehaving receivers Loss interval Uses CCVal header field as timestamp 28

29 Current Research - Performance Most research concentrated on performance DCCP coupled with efficient API performs well for video data on bandwidth limited channels in comparison to UDP Video applications using DCCP-CCID3 fare well against TCP and other TFRC flows, but it is not ideally suited for video because of slow response to rate changes Evaluation of burst traffic using DCCP-CCID2 shows that it works well in most cases, but fairness between DCCP/TCP and DCCP/DCCP is not yet perfect 29

30 E. Kohler, M. Handley, S. Floyd References RFC 4340: Datagram Congestion Control Protocol, March S. Floyd, M. Handley, E. Kohler RFC 4336: Problem Statement for Datagram Congestion Control Protocol, March S. Floyd, E. Kohler RFC 4341: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion Control, March S. Floyd, E. Kohler, J. Padhye RFC 4342: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 3: TCP-Friendly Rate Control (TFRC) 30

31 E. Kohler, M. Handley, S. Floyd References Designing DCCP: Congestion Control Without Reliability SIGCOMM'06, September 11-15, 2006, Pisa, Italy, E. Kohler, S. Floyd Datagram Congestion Control Protocol (DCCP) Overview, July Junwen Lai, E. Kohler Efficiency and Late Data Choice in a User-Kernel Interface for Congestion- Controlled Datagrams Proc. 12 th Annual SPIE Conference on Multimedia Computing and Networking (MMCN'05) 31

32 References J. Van Velthoven, K.Spaey and C.Blondia Performance of Constant Quality Video Applications using the DCCP Transport Protocol Local Computer Networks, Proceedings st IEEE Conference on Nov Page(s): Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi Performance Evaluations of DCCP for Bursty Traffic in Real-time Applications Applications and the Internet, Proceedings. The 2005 Symposium on 31 Jan.-4 Feb Page(s): Burak Görkemli, M. Reha Civanlar SVC Coded Video Streaming over DCCP Multimedia, ISM'06. Eighth IEEE International Symposium on Dec Page(s):

33 Thank you for your attention! Questions? 33

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659 IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Advanced Networking Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus

More information

A Multi-level Security Mechanism for Secure Data Transmission in SCTP

A Multi-level Security Mechanism for Secure Data Transmission in SCTP Research Journal of Applied Sciences, Engineering and Technology 7(10): 2123-2128, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 6, 2013 Accepted: September

More information

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Unit 23. RTP, VoIP. Shyam Parekh

Unit 23. RTP, VoIP. Shyam Parekh Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005 Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Congestion Control Overview

Congestion Control Overview Congestion Control Overview Problem: When too many packets are transmitted through a network, congestion occurs t very high traffic, performance collapses completely, and almost no packets are delivered

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Ausarbeitung Anwendungen 2 SS2011. Fabian Jäger Scalable Videocodec in a Video Conference

Ausarbeitung Anwendungen 2 SS2011. Fabian Jäger Scalable Videocodec in a Video Conference Ausarbeitung Anwendungen 2 SS2011 Fabian Jäger Scalable Videocodec in a Video Conference Fakultät Technik und Informatik Department Informatik Faculty of Engineering and Computer Science Department of

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

User Datagram Protocol - Wikipedia, the free encyclopedia

User Datagram Protocol - Wikipedia, the free encyclopedia Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers

More information

Measuring DCCP for Linux against TCP and UDP With Wireless Mobile Devices

Measuring DCCP for Linux against TCP and UDP With Wireless Mobile Devices Measuring DCCP for Linux against TCP and With Wireless Mobile Devices Leandro Melo de Sales, Hyggo Oliveira, Angelo Perkusich Embedded Systems and Pervasive Computing Lab {leandro,hyggo,perkusic}@embedded.ufcg.edu.br

More information

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

TCP/IP Over Lossy Links - TCP SACK without Congestion Control Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer

More information

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice

More information

QUIC. Quick UDP Internet Connections. Multiplexed Stream Transport over UDP. IETF-88 TSV Area Presentation 2013-11-7

QUIC. Quick UDP Internet Connections. Multiplexed Stream Transport over UDP. IETF-88 TSV Area Presentation 2013-11-7 QUIC Quick UDP Internet Connections Multiplexed Stream Transport over UDP Presentation by Jim Roskind Google Corp IETF-88 TSV Area Presentation 2013-11-7 What is QUIC? Effectively replaces TLS and

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Performance Comparison of SCTP and TCP over Linux Platform

Performance Comparison of SCTP and TCP over Linux Platform Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

An Empirical Study of the Congestion Response of RealPlayer, Windows MediaPlayer and Quicktime

An Empirical Study of the Congestion Response of RealPlayer, Windows MediaPlayer and Quicktime An Empirical Study of the Congestion Response of RealPlayer, Windows MediaPlayer and Quicktime Sven Hessler Institute of Computer Science University of Innsbruck 62 Innsbruck, Austria sven.hessler@uibk.ac.at

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Embedded Systems Transport Protocol Choosing for Modelling over the SpaceWire Model

Embedded Systems Transport Protocol Choosing for Modelling over the SpaceWire Model Embedded Systems Transport Protocol Choosing for Modelling over the SpaceWire Model Ilya Korobkov St-Petersburg State University of Aerospace Instrumentation 190000, St-Petersburg, Bolshaya Morskaya 67,

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol

An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol School of Engineering and Science International University Bremen May 26 Vlad Balan Review Committee: Jürgen

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT

An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for

More information

Application-level QoS : Improving Video Conferencing Quality through Sending the Best Packet Next

Application-level QoS : Improving Video Conferencing Quality through Sending the Best Packet Next Application-level QoS : Improving Video Conferencing Quality through Sending the Best Packet Next Ian McDonald and Richard Nelson School of Computing and Mathematical Sciences, University of Waikato, Hamilton,

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Multimedia Communications Voice over IP

Multimedia Communications Voice over IP Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony

More information

Active Queue Management (AQM) based Internet Congestion Control

Active Queue Management (AQM) based Internet Congestion Control Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu (sryu@eng.buffalo.edu) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control

More information

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?

More information

2.1 Introduction. 2.2 Voice over IP (VoIP)

2.1 Introduction. 2.2 Voice over IP (VoIP) 2.1 Introduction In this section can provide the necessary background on the structure of VoIP applications and on their component, and the transmission protocols generally used in VoIP. 2.2 Voice over

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

SCTP over Satellite Networks

SCTP over Satellite Networks 1 SCTP over Satellite Networks Shaojian Fu Mohammed Atiquzzaman School of Computer Science University of Oklahoma, Norman, OK 73019-6151. William Ivancic Satellite Networks & Architectures Branch NASA

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Moven Studio realtime. streaming

Moven Studio realtime. streaming Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax

More information

An Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol

An Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol An Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol Horia Vlad Balan International University Bremen h.balan@iu-bremen.de Lars Eggert Nokia Research Center lars.eggert@nokia.com

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to

More information

An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol

An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol An Experimental Evaluation of Voice-over-IP Quality over the Datagram Congestion Control Protocol School of Engineering and Science International University Bremen May 26 Vlad Balan Review Committee: Jürgen

More information

Performance of VoIP with DCCP for Satellite Links

Performance of VoIP with DCCP for Satellite Links Performance of VoIP with DCCP for Satellite Links Golam Sarwar, Roksana Boreli, Emmanuel Lochin To cite this version: Golam Sarwar, Roksana Boreli, Emmanuel Lochin. Performance of VoIP with DCCP for Satellite

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information