Chapter 3: TCP. TCP: Overview. TCP: Overview. TCP: Overview. TCP seq. # s and ACKs (I) TCP segment structure
|
|
- Violet Harmon
- 7 years ago
- Views:
Transcription
1 ECE-4670: Computer Communication Networks (CCN) Chapter 3: TCP hivkumar Kalyanaraman: Biplab ikdar: ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 1 Point-to-point: TCP: Overview one sender, one receiver eliable, in-order byte steam: no message boundaries But TCP chops it up into segments for transmission internally Pipelined (window) flow control: Window size decided by receiver and network end & receive buffers ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 2 TCP: Overview TCP: Overview socket door application writes data TCP send buffer segment application reads data TCP receive buffer socket door Full duplex data: bi-directional data flow in same connection M: maximum segment size Connection-oriented: handshaking (exchange of control msgs) init s sender, receiver state before data exchange Flow & Congestion Control: sender will not overwhelm receiver or the network ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 3 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 4 UG: urgent data (generally not used) ACK: ACK # valid PH: push data now (generally not used) T, YN, FIN: connection estab (setup, teardown commands) Internet checksum (as in UDP) TCP segment structure 32 bits source port # dest port # sequence number acknowledgement number head not UAP rcvr window size len used F checksum ptr urgent data Options (variable length) application data (variable length) counting by bytes of data (not segments!) # bytes rcvr willing to accept ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 5 TCP seq. # s and ACKs (I) equence Numbers: byte stream number of first byte in segment s data ACKs: seq # of next byte expected from other side cumulative ACK Q: how receiver handles out-of-order segments A: TCP spec doesn t say, - up to implementor ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 6 1
2 TCP eq. # s and ACKs (II) Temporal edundancy Model User types C host ACKs receipt of echoed C Host A Host B eq=42, ACK=79, data = C eq=79, ACK=43, data = C eq=43, ACK=80 host ACKs receipt of C, echoes back C Timeout Packets tatus eports etransmissions equence Numbers CC or Checksum ACKs NAKs, ACKs Bitmaps Packets FEC information simple telnet scenario ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 7 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 8 tatus eport Design Cumulative acks: obust to losses on the reverse channel Can work with go-back-n retransmission Cannot pinpoint blocks of data which are lost The first lost packet can be pinpointed because the receiver would generate duplicate acks ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 9 TCP: reliable data transfer (I) event: data received from application above create, send segment wait for event event: ACK received, with ACK # y ACK processing event: timer timeout for segment with seq # y retransmit segment one way data transfer no flow, congestion control ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 10 TCP: reliable data transfer (II) implified TCP sender 00 sendbase = initial_sequence number 01 nextseqnum = initial_sequence number loop (forever) { 04 switch(event) 05 event: data received from application above 06 create TCP segment with sequence number nextseqnum 07 start timer for segment nextseqnum 08 pass segment to IP 09 nextseqnum = nextseqnum + length(data) 10 event: timer timeout for segment with sequence number y 11 retransmit segment with sequence number y 12 compute new timeout interval for segment y 13 restart timer for sequence number y 14 event: ACK received, with ACK field value of y 15 if (y > sendbase) { /* cumulative ACK of all data up to y */ 16 cancel all timers for segments with sequence numbers < y 17 sendbase = y 18 } 19 else { /* a duplicate ACK for already ACKed segment */ 20 increment number of duplicate ACKs received for y 21 if (number of duplicate ACK received for y == 3) { 22 /* TCP fast retransmit */ 23 resend segment with sequence number y 24 restart timer for segment y 25 } 26 } /* end of loop forever */ ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 11 Event TCP ACK generation in-order segment arrival, no gaps, everything else already ACKed in-order segment arrival, no gaps, one delayed ACK pending out-of-order segment arrival higher-than-expect seq. # gap detected! arrival of segment that partially or completely fills gap TCP eceiver action delayed ACK. Wait up to 500ms for next segment. If no next segment, send ACK immediately send single cumulative ACK send duplicate ACK, indicating seq. # of next expected byte immediate ACK if segment starts at lower end of gap ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 12 2
3 TCP: retransmission scenarios timeout time Host A eq=92, 8 bytes data X loss Host B ACK=100 eq=92, 8 bytes data ACK=100 lost ACK scenario eq=100 timeout eq=92 timeout time Host A eq=100, 20 bytes data ACK=100 Host B eq=92, 8 bytes data ACK=120 eq=92, 8 bytes data ACK=120 premature timeout, cumulative ACKs ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 13 TCP Flow Control flow control sender won t overrun receiver s buffers by transmitting too much, too fast cvbuffer = size or TCP eceive Buffer cvwindow = amount of spare room in Buffer receiver buffering receiver: explicitly informs sender of free buffer space cvwindow field in TCP segment sender: keeps the amount of transmitted, unacked data less than most recently received cvwindow ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 14 Timeout and TT Estimation Timeout: for robust detection of packet loss Problem: How long should timeout be? Too long => underutilization Too short => wasteful retransmissions olution: adaptive timeout: based on estimate of max TT ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 15 How to estimate max TT? TT = prop + queuing delay Queuing delay highly variable o, different samples of TTs will give different random values of queuing delay Chebyshev s Theorem: MaxTT = Avg TT + k*deviation Error probability is less than 1/(k**2) esult true for ANY distribution of samples ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 16 ound Trip Time and Timeout (II) Q: how to estimate TT? amplett: measured time from segment transmission until ACK receipt ignore retransmissions, cumulatively ACKed segments amplett will vary wildly => want estimated TT smoother use several recent measurements, not just current amplett to calculate AverageTT ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 17 TCP ound Trip Time and Timeout (III) AverageTT = (1-x)*AverageTT + x*amplett Exponential weighted moving average (EWMA) influence of given sample decreases exponentially fast; x = 0.1 etting the timeout AverageTT plus safety margin proportional to variation Timeout = AverageTT + 4*Deviation Deviation = (1-x)*Deviation + x* amplett- AverageTT ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 18 3
4 TCP Connection Management - 1 ecall: TCP sender, receiver establish connection before exchanging data segments initialize TCP variables: seq. #s buffers, flow control info (e.g. cvwindow) client: connection initiator ocket clientocket = new ocket("hostname","port number"); server: contacted by client ocket connectionocket = welcomeocket.accept(); ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 19 TCP Connection Management - 2 Three way handshake: tep 1: client end system sends TCP YN control segment to server specifies initial seq # tep 2: server end system receives YN, replies with YNACK control segment ACKs received YN allocates buffers specifies server-> receiver initial seq. # ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 20 TCP Connection Management - 3 TCP Connection Management - 4 Closing a connection: client closes socket: clientocket.close(); Fddfdf close client FIN server tep 1: client end system sends TCP FIN control segment to server ACK FIN close tep 2: server receives FIN, replies with ACK. Closes connection, sends FIN. timed wait closed d ACK ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 21 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 22 TCP Connection Management - 5 TCP Connection Management - 6 tep 3: client receives FIN, replies with ACK. Enters timed wait - will respond with ACK to received FINs tep 4: server, receives ACK. Connection closed. Note: with small modification, can handle simultaneous FINs. ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 23 TCP client lifecycle ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 24 4
5 TCP Connection Management - 7 ecap: tability of a Multiplexed ystem Average Input ate > Average Output ate => system is unstable! TCP server lifecycle ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 25 How to ensure stability? 1. eserve enough capacity so that demand is less than reserved capacity 2. Dynamically detect overload and adapt either the demand or capacity to resolve overload ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 26 Congestion Problem in Packet witching A B 10 Mbs Ethernet queue of packets waiting for output link statistical multiplexing 1.5 Mbs ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 27 C 45 Mbs D E Cost: self-descriptive header per-packet, buffering and delays for applications. Need to either reserve resources or dynamically detect/adapt to overload for stability The Congestion Problem λ i µ Problem: demand i λ outstrips µ available capacity λ 1 Demand λ n Capacity If information about λ i, λ and µ is known in a central location where control of λ i or µ can be effected with zero time delays, the congestion problem is solved! ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 28 The Congestion Problem (Continued) Problems: Incomplete information (eg: loss indications) Distributed solution required Congestion and control/measurement locations different Time-varying, heterogeneous timedelay The Congestion Problem tatic fixes may not solve congestion a) Memory becomes cheap (infinite memory) No buffer Too late b) Links become cheap (high speed links)? All links 19.2 kb/s eplace with 1 Mb/s File Transfer time = 5 mins File Transfer Time = 7 hours ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 29 5
6 The Congestion Problem (Continued) c) Processors become cheap (fast routers & switches) A C B D cenario: All links 1 Gb/s. A & B send to C => high-speed congestion!! (lose more packets faster!) Principles of Congestion Control Congestion: informally: too many sources sending too much data too fast for network to handle different from flow control (receiver overload)! manifestations: lost packets (buffer overflow at routers) long delays (queuing in router buffers) a top-10 problem! ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 32 Causes/costs of congestion: scenario 1 two senders, two receivers one router, infinite buffers no retransmission large delays when congested maximum achievable throughput ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 33 Causes/costs of congestion: scenario 2 one router, finite buffers sender retransmission of lost packet ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 34 Causes/costs of congestion: scenario 2 (continued) Causes/costs of congestion: scenario 3 Costs of congestion: More work (retrans) for given goodput Unneeded retransmissions: link carries multiple copies of pkt due to spurious timeouts ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 35 Another cost of congestion: when packet dropped, any upstream transmission capacity used for that packet was wasted! ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 36 6
7 Approaches towards congestion control - 1 Two broad approaches towards congestion control: End-end congestion control: no explicit feedback from network congestion inferred from end-system observed loss, delay approach taken by TCP Approaches towards congestion control - 2 Network-assisted congestion control: routers provide feedback to end systems single bit indicating congestion (NA, DECbit, TCP/IP ECN, ATM) explicit rate sender should send at ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 37 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 38 TCP congestion control - 1 TCP congestion control - 2 end-end control (no network assistance) transmission rate limited by congestion window size, Congwin, over segments: w segments, each with M bytes sent in one TT: throughput = w * M TT Bytes/sec ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 39 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 40 TCP congestion control - 3 Probing for usable bandwidth: Window flow control: avoid receiver overrun Dynamic window congestion control: avoid/control network overrun Policy: Increase Congwin until loss (congestion) Loss => decrease Congwin, then begin probing (increasing) again Additive Increase/Multiplicative Decrease (AIMD) Policy For stability: rate-of-decrease > rate-of-increase Decrease performed enough times as long as congestion exists AIMD policy satisfies this condition, provided packet loss is congestion indicator window ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 41 time ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 42 7
8 Fairness Fairness Analysis Fairness goal: if N TCP sessions share same bottleneck link, each should get 1/N of link capacity TCP connection 1 TCP connection 2 bottleneck router capacity ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 43 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 44 AIMD Converges to Fairness TCP congestion control - 4 TCP uses AIMD policy in steady state Two phases Transient phase: aka low start teady tate: aka Congestion avoidance Important variables: Congwin threshold: defines threshold between two slow start phase, congestion avoidance phase ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 45 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 46 TCP lowstart - 1 TCP lowstart - 2 lowstart algorithm initialize: Congwin = 1 for (each segment ACKed) Congwin++ until (loss event O CongWin > threshold) Exponential increase (per TT) in window size (not so slow!) Loss event: timeout (Tahoe TCP) and/or three duplicate ACKs (eno TCP) asdf Host A TT Host B one segment two segments four segments time ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 47 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 48 8
9 TCP Dynamics 1st TT 2nd TT 3rd TT 4th TT ate of acks determines rate of packets : elf-clocking property. 100 Mbps 10 Mbps outer Q TCP Congestion Avoidance - 1 Congestion avoidance /* slowstart is over */ /* Congwin > threshold */ Until (loss event) { every w segments ACKed: Congwin++ } threshold = Congwin/2 Congwin = 1 1 perform slowstart ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 49 1: TCP eno skips slowstart (aka fast recovery) after three duplicate ACKs and performs close to AIMD ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 50 TCP Congestion Avoidance - 2 TCP window dynamics (more) Congestion Window (cwnd) ssthresh Timeout eceiver Window Idle Interval 1 Time (units of TTs) ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 51 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 52 TCP latency modeling - 1 Q: How long does it take to receive an object from a Web server after sending a request? TCP connection establishment data transfer delay TCP latency modeling - 2 Notation, assumptions: Assume one link between client and server of rate Assume: fixed congestion window, W segments : M (bits) O: object size (bits) no retransmissions (no loss, no corruption) ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 53 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 54 9
10 TCP latency modeling - 3 Two cases to consider: W/ > TT + /: ACK for first segment in window returns before window s worth of data sent TCP latency modeling - 4 W/ < TT + /: wait for ACK after sending window s worth of data sent ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 55 Case 1: latency = 2TT + O/ ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 56 TCP latency modeling - 5 Case 2: latency = 2TT + O/ + (K-1)[/ + TT - W/] K = O/W ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 57 TCP latency modeling: slow start - 1 Now suppose window grows according to slow start. Will show that the latency of one object of size O is: O P Latency = 2TT + + P TT (2 1) + where P is the number of times TCP stalls at server: ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 58 TCP latency modeling: slow start - 2 TCP latency modeling: slow start - 3 P = min{ Q, K 1} - where Q is the number of times the server would stall if the object were of infinite size. - and K is the number of windows that cover the object. ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 59 Example: O/ = 15 segments K = 4 windows Q = 2 P = min{k-1,q} = 2 erver stalls P=2 times. initiate TCP connection request object first window = / TT second window = 2/ third window = 4/ fourth window = 8/ complete object transmission delivered time at time at server client ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 60 10
11 TCP latency modeling: slow start - 4 TT time from when server starts to send segment + = until server receives acknowledgement k 2 1 = time to transmit the kth window + k TT = stall time after the kth window latency = TCP latency modeling: slow start - 5 = = P O + 2TT + stalltime p P O k + 2TT + [ + TT 2 O p= 1 k = 1 + 2TT + P[ TT + ] (2 1 P ] 1) ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 61 ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 62 ample esults ummary: Chapter 3 O/ P Minimum Latency: O/ + 2 TT 28 Kbps 28.6 sec sec 28.9 sec 100 Kbps 8 sec sec 8.4 sec 1 Mbps 800 msec 5 1 sec 1.5 sec 10 Mbps 80 msec sec 0.98 sec Latency with slow start ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 63 Principles behind transport layer services: multiplexing/demultiplexing reliable data transfer flow control congestion control Instantiation and implementation in the Internet UDP, TCP ensselaer Polytechnic Institute hivkumar Kalvanaraman & Biplab ikdar 64 11
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationTCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery
TCP Flow Control Computer Networks The receiver side of a TCP connection maintains a receiver buffer: Lecture : Flow Control, eliable elivery application process may be slow at reading from the buffer
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationOutline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationTransport Layer and Data Center TCP
Transport Layer and Data Center TCP Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 5, 2014 Slides used and adapted judiciously
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationTCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationChapter 6 Congestion Control and Resource Allocation
Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationTCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
More informationChapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,
More informationMidterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
More informationThis sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationTCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
More informationTCP Adaptation for MPI on Long-and-Fat Networks
TCP Adaptation for MPI on Long-and-Fat Networks Motohiko Matsuda, Tomohiro Kudoh Yuetsu Kodama, Ryousei Takano Grid Technology Research Center Yutaka Ishikawa The University of Tokyo Outline Background
More informationApplication Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
More information1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
More informationB-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
More informationData Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 6 Main Theme Reliable Data Transfer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationA Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationPrefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More information15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
More informationTCP, Active Queue Management and QoS
TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle
More informationActive Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu (sryu@eng.buffalo.edu) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
More information2 TCP-like Design. Answer
Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about
More informationAdvanced Computer Networks Project 2: File Transfer Application
1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application
More informationCongestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationLecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
More informationCongestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More information17: Queue Management. Queuing. Mark Handley
17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.
More informationHigher Layer Protocols: UDP, TCP, ATM, MPLS
Higher Layer Protocols: UDP, TCP, ATM, MPLS Massachusetts Institute of Technology Slide 1 The TCP/IP Protocol Suite Transmission Control Protocol / Internet Protocol Developed by DARPA to connect Universities
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationRouter-assisted congestion control. Lecture 8 CS 653, Fall 2010
Router-assisted congestion control Lecture 8 CS 653, Fall 2010 TCP congestion control performs poorly as bandwidth or delay increases Shown analytically in [Low01] and via simulations Avg. TCP Utilization
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More informationComputer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
More informationIntroduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationArchitecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
More informationTCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
More informationCOMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
More informationSimulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
More informationLow-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
More informationCSE331: Introduction to Networks and Security. Lecture 9 Fall 2006
CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationCMPE 150 Winter 2009
CMPE 150 Winter 2009 Lecture 6 January 22, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationQuality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?
18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationParallel TCP Data Transfers: A Practical Model and its Application
D r a g a n a D a m j a n o v i ć Parallel TCP Data Transfers: A Practical Model and its Application s u b m i t t e d t o the Faculty of Mathematics, Computer Science and Physics, the University of Innsbruck
More informationTCP/IP Inside the Data Center and Beyond. Dr. Joseph L White, Juniper Networks
Dr. Joseph L White, Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations
More informationAnalytic Models for the Latency and Steady-State Throughput of TCP Tahoe, Reno and SACK
REVISION 1 1 Analytic Models for the Latency and Steady-State Throughput of TCP Tahoe, Reno and SACK B. Sikdar, S. Kalyanaraman and K. S. Vastola Dept. of ECSE, Rensselaer Polytechnic Institute Troy, NY
More informationLa couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationCOMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationMobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationD. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More informationBasic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
More informationTCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationProtagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student
More informationRandom Early Detection Gateways for Congestion Avoidance
Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson Lawrence Berkeley Laboratory University of California floyd@eelblgov van@eelblgov To appear in the August 1993 IEEE/ACM
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationMultipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationOptimization of Communication Systems Lecture 6: Internet TCP Congestion Control
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP
More informationAnswer: that dprop equals dtrans. seconds. a) d prop. b) d trans
Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link
More informationDelay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)
Computer Networks Delay, loss and throughput Layered architectures How do loss and delay occur? packets queue in router buffers packet arrival rate to exceeds output capacity packets queue, wait for turn
More informationD1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,
More informationHigh Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
More informationTransport layer protocols for ad hoc networks
Transport layer protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ Which transport layer protocol? Classification of transport
More informationCS551 End-to-End Internet Packet Dynamics [Paxson99b]
CS551 End-to-End Internet Packet Dynamics [Paxson99b] Bill Cheng http://merlot.usc.edu/cs551-f12 1 End-to-end Packet Dynamics How do you measure Internet performance? Why do people want to know? Are ISPs
More informationComputer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationNetworking part 3: the transport layer
Networking part 3: the transport layer Juliusz Chroboczek Université de Paris-Diderot (Paris 7) September 2011 Summary of the previous episodes Episode 1: switching, packet switching and the Internet.
More informationA Congestion Control Algorithm for Data Center Area Communications
A Congestion Control Algorithm for Data Center Area Communications Hideyuki Shimonishi, Junichi Higuchi, Takashi Yoshikawa, and Atsushi Iwata System Platforms Research Laboratories, NEC Corporation 1753
More information