Mobile Communications Chapter 9: Mobile Transport Layer
|
|
|
- Nicholas Simon
- 10 years ago
- Views:
Transcription
1 Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP TCP for 2.5G/3G wireless Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.1
2 Transport Layer E.g. HTTP (used by web services) typically uses TCP TCP Reliable transport between client and server required Steam oriented, not transaction oriented Network friendly: time-out congestion slow down transmission Well known TCP wrongly assumes congestion in wireless and mobile networks when Result Packet losses due to transmission errors Packet loss due to change of network Severe performance degradation Client TCP SYN TCP SYN/ACK TCP ACK HTTP request HTTP response GPRS: 500ms! Server Connection setup Data transmission >15 s no data Connection release Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.2
3 Motivation I Transport protocols typically designed for Fixed end-systems Fixed, wired networks Research activities How to improve TCP performance in wireless networks Maintain congestion control behavior Efficient retransmissions TCP congestion control in fixed networks Timeouts/Packet loss typically due to (temporary) overload Routers discard packets when buffers are full TCP recognizes congestion only indirectly via missing ACKs, retransmissions unwise, since they increase congestion slow-start algorithm as reaction Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.3
4 Motivation II TCP slow-start algorithm sender calculates a congestion window for a receiver start with a congestion window size equal to one segment (packet) Exponentially increase congestion window till congestion threshold, then linear increase Timeout/missing acknowledgement causes reduction of congestion threshold to half of the current congestion window congestion window starts again with one segment TCP fast retransmit/fast recovery TCP sends an ACK only after receiving a packet If sender receives duplicate ACKs, this is due to gap in received packets at the receiver Receiver got all packets up to the gap and is actually receiving packets Conclusion: packet loss not due to congestion, retransmit, continue with current congestion window (do not use slow-start) Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.4
5 Influences of Wireless/mobility on TCP-mechanisms TCP assumes congestion if packets are dropped typically wrong in wireless networks, here we often have packet loss due to transmission errors furthermore, mobility can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while packets in transit to the old access point and forwarding is not possible The performance of an unchanged TCP degrades severely TCP cannot be changed fundamentally due to large installed base in the fixed network, TCP for mobility has to remain compatible the basic TCP mechanisms keep the whole Internet together Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.5
6 Early approach: Indirect TCP I Indirect TCP or I-TCP segments the connection no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol optimized TCP protocol for mobile hosts splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer hosts in the fixed part of the net do not notice the characteristics of the wireless part mobile host access point (foreign agent) wired Internet wireless TCP standard TCP Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.6
7 I-TCP socket and state migration access point 1 socket migration and state transfer Internet mobile host access point 2 Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.7
8 Indirect TCP II Advantages No changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work Wireless link transmission errors isolated from those in fixed network simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known Disadvantages loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.8
9 Early approach: Snooping TCP I Transparent extension of TCP within the foreign agent buffering of packets sent to the mobile host lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called local retransmission) the foreign agent therefore snoops the packet flow and recognizes acknowledgements in both directions, it also filters ACKs changes of TCP only within the foreign agent local retransmission foreign agent correspondent host wired Internet mobile host snooping of ACKs buffering of data end-to-end TCP connection Prof. Dr.-Ing. Jochen Schiller, MC SS05 9.9
10 Snooping TCP II Data transfer to the mobile host FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out fast retransmission possible, transparent for the fixed network Data transfer from the mobile host FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH MH can now retransmit data with only a very short delay Integration with MAC layer MAC layer often has similar mechanisms to those of TCP thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them Problems snooping TCP does not isolate the wireless link as good as I-TCP snooping might be tough if packets are encrypted Prof. Dr.-Ing. Jochen Schiller, MC SS
11 Early approach: Mobile TCP Special handling of lengthy and/or frequent disconnections M-TCP splits as I-TCP does unmodified TCP fixed network to supervisory host (SH) optimized TCP SH to MH Supervisory host no caching, no retransmission monitors all packets, if disconnection detected set sender window size to 0 sender automatically goes into persistent mode old or new SH reopen the window Advantages maintains semantics, supports disconnection, no buffer forwarding Disadvantages loss on wireless link propagated into fixed network adapted TCP on wireless link Prof. Dr.-Ing. Jochen Schiller, MC SS
12 Fast retransmit/fast recovery Change of foreign agent often results in packet loss TCP reacts with slow-start although there is no congestion Forced fast retransmit as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose this forces the fast retransmit mode at the communication partners additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration Advantage simple changes result in significant higher performance Disadvantage Cooperation required between IP and TCP, no transparent approach Prof. Dr.-Ing. Jochen Schiller, MC SS
13 Transmission/time-out freezing Mobile hosts can be disconnected for a longer time no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic TCP disconnects after time-out completely TCP freezing MAC layer is often able to detect interruption in advance MAC can inform TCP layer of upcoming loss of connection TCP stops sending, but does now not assume a congested link MAC layer signals again if reconnected Advantage scheme is independent of data Disadvantage TCP on mobile host has to be changed, mechanism depends on MAC layer Prof. Dr.-Ing. Jochen Schiller, MC SS
14 Selective retransmission TCP acknowledgements are often cumulative ACK n acknowledges correct and in-sequence receipt of packets up to n if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth Selective retransmission as one solution RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps sender can now retransmit only the missing packets Advantage much higher efficiency Disadvantage more complex software in a receiver, more buffer needed at the receiver Prof. Dr.-Ing. Jochen Schiller, MC SS
15 Transaction oriented TCP TCP phases connection setup, data transmission, connection release using 3-way-handshake needs 3 packets for setup and release, respectively thus, even short messages need a minimum of 7 packets! Transaction oriented TCP RFC1644, T-TCP, describes a TCP version to avoid this overhead connection setup, data transfer and connection release can be combined thus, only 2 or 3 packets are needed Advantage efficiency Disadvantage requires changed TCP mobility not longer transparent Prof. Dr.-Ing. Jochen Schiller, MC SS
16 Comparison of different approaches for a mobile TCP Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection isolation of wireless loss of TCP semantics, into two connections link, simple higher latency at Snooping TCP M-TCP Fast retransmit/ fast recovery Transmission/ time-out freezing Selective retransmission Transaction oriented TCP snoops data and acknowledgements, local retransmission splits TCP connection, chokes sender via window size transparent for end-toend connection, MAC integration possible Maintains end-to-end semantics, handles long term and frequent disconnections simple and efficient handover problematic with encryption, bad isolation of wireless link Bad isolation of wireless link, processing overhead due to bandwidth management avoids slow-start after roaming mixed layers, not transparent freezes TCP state at independent of content changes in TCP disconnect, resumes or encryption, works for required, MAC after reconnection longer interrupts dependant retransmit only lost data very efficient slightly more complex receiver software, more buffer needed combine connection setup/release and data transmission Efficient for certain applications changes in TCP required, not transparent Prof. Dr.-Ing. Jochen Schiller, MC SS
17 TCP Improvements I Initial research work Indirect TCP, Snoop TCP, M-TCP, T/TCP, SACK, Transmission/time-out freezing, TCP over 2.5/3G wireless networks Fine tuning today s TCP Learn to live with Data rates: 64 kbit/s up, kbit/s down; asymmetry: 3-6, but also up to 1000 (broadcast systems), periodic allocation/release of channels High latency, high jitter, packet loss Suggestions Large (initial) sending windows, large maximum transfer unit, selective acknowledgement, explicit congestion notification, time stamp, no header compression Already in use i-mode running over FOMA WAP 2.0 ( TCP with wireless profile ) BW 0.93* MSS RTT * p max. TCP BandWidth Max. Segment Size Round Trip Time loss probability Prof. Dr.-Ing. Jochen Schiller, MC SS
18 TCP Improvements II Performance enhancing proxies (PEP, RFC 3135) Transport layer Local retransmissions and acknowledgements Additionally on the application layer Content filtering, compression, picture downscaling E.g., Internet/WAP gateways Web service gateways? Big problem: breaks end-to-end semantics Disables use of IP security Choose between PEP and security! More open issues RFC 3150 (slow links) Recommends header compression, no timestamp RFC 3155 (links with errors) States that explicit congestion notification cannot be used In contrast to 2.5G/3G recommendations! Mobile system wireless PEP Internet Comm. partner Prof. Dr.-Ing. Jochen Schiller, MC SS
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology
TCP/IP Networking for Wireless Systems Integrated Communication Systems Group Ilmenau University of Technology Content Internet Protocol Suite Link Layer: Ethernet, PPP, ARP, MAC Addressing Network Layer:
TCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
Congestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
TCP/IP In Cellular Networks
TCP/IP In Cellular Networks Two Techniques To Improve TCP Performance In Cellular Networks UNC Wireless Networks 790-088 November, 29 2010 John DeArmon M-TCP: TCP for Cellular Networks Improving TCP Performance
TCP Over Wireless Network. Jinhua Zhu Jie Xu
TCP Over Wireless Network Jinhua Zhu Jie Xu Overview 1. TCP congestion control scheme 2. ECN scheme 3. Problems with TCP over wireless network 4. ATCP:TCP for mobile ad hoc networks 5. ptcp: a transport
TCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
La couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Cours de C. Pham,
17: Queue Management. Queuing. Mark Handley
17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
TCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
Transport layer protocols for ad hoc networks
Transport layer protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: [email protected] http://www.cs.tut.fi/kurssit/tlt-2616/ Which transport layer protocol? Classification of transport
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
2 TCP-like Design. Answer
Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
High Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
La couche transport dans l'internet (la suite TCP/IP)
La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
ECSE-6600: Internet Protocols Exam 2
ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will
SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS
SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS by Rajashree Paul Bachelor of Technology, University of Kalyani, 2002 PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of
Improved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
Index. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284
bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Chapter 9 TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS 9.1 INTRODUCTION The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end
TCP PACKET CONTROL FOR WIRELESS NETWORKS
TCP PACKET CONTROL FOR WIRELESS NETWORKS by Wan Gang Zeng B. Sc. in Computer Science, University of Ottawa, 2000 THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE
15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student
Active Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu ([email protected]) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
Challenges of Sending Large Files Over Public Internet
Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
CS551 End-to-End Internet Packet Dynamics [Paxson99b]
CS551 End-to-End Internet Packet Dynamics [Paxson99b] Bill Cheng http://merlot.usc.edu/cs551-f12 1 End-to-end Packet Dynamics How do you measure Internet performance? Why do people want to know? Are ISPs
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
A Study on TCP Performance over Mobile Ad Hoc Networks
215 A Study on TCP Performance over Mobile Ad Hoc Networks Shweta Sharma 1, Anshika Garg 2 1 School of Computing Science and Engineering, Galgotias University, Greater Noida 2 School of Computing Science
B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
High-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
Stop And Wait. ACK received; transmit frame 2 CS 455 3
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
A Survey on Improving TCP Performance over Wireless Networks
A Survey on Improving TCP Performance over Wireless Networks Xiang Chen, Hongqiang Zhai, Jianfeng Wang and Yuguang Fang Dept. of Electrical and Computer Engineering University of Florida, Gainesville,
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Distributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
MOBILITY AND MOBILE NETWORK OPTIMIZATION
MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn
Dynamic Load Balancing and Node Migration in a Continuous Media Network
Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies
HyperIP : VERITAS Replication Application Note
QuickTime and a Graphics decompressor are needed to see this picture. HyperIP : VERITAS Replication Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Questions for Mobile Communications 2 nd ed.
Questions for Mobile Communications 2 nd ed. Jochen H. Schiller, Freie Universität Berlin, Germany [email protected], www.jochenschiller.de 1. Introduction 1.1 Discover the current numbers of subscribers
An Improved TCP Congestion Control Algorithm for Wireless Networks
An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA [email protected] Md. Humayun
Chapter 6 Congestion Control and Resource Allocation
Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;
