TRANSPORT LAYER LOAD BALANCING IN FCS NETWORKS
|
|
|
- Sylvia Payne
- 9 years ago
- Views:
Transcription
1 RANSPOR LAYER LOAD BALANCING IN FCS NEWORKS Janardhan R. Iyengar, Paul D. Amer, Armando L. Caro, Jr. Protocol Engineering Lab Computer and Information Sciences University of Delaware iyengar, amer, Randall R. Stewart Cisco Systems Inc. ABSRAC he Stream Control ransmission Protocol (SCP) allows for end-to-end load balancing in FCS networks to be performed at the transport layer, through repeated changeover. We present a problem in the current SCP (RFC2960) specification that results in unnecessary retransmissions and CPunfriendly growth of the sender s congestion window during certain changeover conditions. We first illustrate the problem using an example scenario. We then briefly describe the proposed solutions for problem and our future direction. 1 INRODUCION A node is multihomed if it can be addressed by multiple IP addresses [3], as would be the case when the host has multiple network interfaces. Network layer redundancy allows access to a host even if one of its IP addresses becomes unreachable; ideally packets can be rerouted to one of the host s alternate IP addresses. However, since IP is connectionless, end-to-end session persistence under failure conditions becomes the responsibility of the transport layer and above. o provide for such fault tolerance, the Stream Control ransmission Protocol (SCP) supports multihoming at the transport layer. SCP sessions, or associations, can dynamically span over multiple local and peer IP addresses so that an association can remain alive even if one of the endpoints addresses becomes unreachable. Multihoming also allows for end-to-end load balancing to be performed at the transport layer. Bearing in mind that all Prepared through collaborative participation in the Communications and Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative echnology Alliance Program, Cooperative Agreement DAAD he U. S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. resources available should be optimally used in FCS networks, our investigation focusses on utilizing all network resources visible at the transport layer. SCP [9] is a recent standards track transport layer protocol in the Internet Engineering ask Force (IEF). Of the salient features that distinguish SCP from CP, we concern ourselves with multihoming. SCP multihoming allows binding of one transport layer association to multiple IP addresses. his binding allows an SCP sender to send data to a multihomed receiver through different destination addresses. For instance, in figure 1, could send data to using destination address or. SCP s multihoming feature was motivated by fault tolerance; if one destination address becomes unreachable, the destination can still send and receive via other interfaces bound to the association. In a multihomed SCP association, the sender transmits data to its peer s primary destination address. SCP provides for application-initiated changeovers so that the sending application can change the sender s primary destination address, thus moving the outgoing traffic to a potentially different path 1. his feature can be used to perform end-to-end load balancing using SCP, thus helping FCS network elements exploit all network resources visible at the transport layer. We uncovered a problem in the current SCP (RFC2960) specification [9] that results in unnecessary retransmissions and CPunfriendly growth of the sender s congestion window under certain changeover conditions. In section 2, we present a specific example which illustrates the problem of cwnd overgrowth with SCP s currently 1 SCP was designed as a transport protocol for telephony signaling in SS7 networks. In an SS7 network the upper layers can dictate to which destination address packets will be sent, motivating the application-initiated changeover feature in SCP. 1 of 5
2 specified handling of changeover. Section 3 presents two changeover aware congestion control algorithms: Conservative CACC (C-CACC) and Split Fast Retransmit CACC (SFR- CACC), and the Rhein algorithm. In light of the bigger problem of end-to-end load balancing, we conclude with questions which describe our future direction in section 4. 2 CONGESION WINDOW OVERGROWH Host A A 1 A 2 Path1 Network Path2 Figure 1: Architecture used in example B 1 Host B B 2 In this section, we present an example illustrating the occurence of cwnd mishandling and unnecessary retransmissions with SCP s currently specified handling of changeover. he example uses the architecture shown in figure 1. Endpoints and have an SCP association between them. Both endpoints are multihomed, with network interfaces and, and with interfaces and 2. All four addresses are bound to the one SCP association. For several possible reasons (e.g., path diversity, policy based routing, load balancing), we assume in this example that the data traffic from to is locally routed through, and from to through. Non overlapping paths are assumed with the bottleneck bandwidth of path 1 being 10Mbps, and that of path 2 being 100Mbps. he propagation delay of both paths is 200ms, and the path MU for both paths is 1250 bytes. Figure 2 shows a timeline of events for our example. he vertical lines represent interfaces,, and. he numbers along the lines represent times in milliseconds. Each arrow depicts the departure of a packet from one interface and its arrival at the destination. he labels on the arrows are either SCP ransmission Sequence Numbers (SN) or labels of the form. Assuming one chunk per packet, every packet in the example corresponds to one SN. A number represents the SN of the chunk in the packet being transmitted. A label! "# represents a packet carrying a SACK chunk with cumulative ack, and gap ack for SNs for destination, and through. $ is the cwnd at $ is the cwnd at for destination. $% and $ are denoted in terms of MUs, not bytes. 2 More precisely, & ', &)(, *#' and *)( are IP addresses associated with link layer interfaces. Here we assume only one address per interface, so address and interface are used interchangeably. he assignments such as initial SN = 1 and initial time +#,.- are arbitrary assignments to signify the beginning of the snapshot. hese assignments are not meant to imply the beginning of the association. Initially, $,0/ because we assume that either there has been no transmission to before +!,1- during the lifetime of the association, or $ has decayed 3 to two by +6, Example Description he sender ( ) initially sends to the receiver ( ) using primary destination address. his setting causes packets to leave through. Assume these packets leave the transport/network layers, and get buffered at s link layer 8, whereupon they get transmitted according to the channel s availability. his initial condition is depicted in figure 2 at time +9,:-, when in this example has 50 packets buffered on interface. At +,<;, as SNs 1-50 are being transmitted through, the sender s application changes the primary destination to, thus requiring any new data from to be sent to. In the example, we assume SN 51 is transmitted to the new primary at +#,1;. We refer to this moment as the changeover time. his new primary destination causes new SNs to leave the sender through. Concurrently, the packets buffered earlier at are still being transmitted. Previous packets sent through, and the packets sent through, can arrive at the receiver in an interleaved fashion on interfaces 8 and respectively. In figure 2, SNs 1, 51, 52 and 2 arrive at times 21, 21.1, 21.2, 22, respectively. his reordering is introduced as a result of changeover; the specific times depend on the delays of paths 1 and 2. he receiver starts reporting gaps as soon as it notices reordering. If the receiver communicates four missing reports to the sender before all of the original transmissions (SNs 1-50) have been acked, the sender will start retransmitting the unacked SNs. SCP s Fast Retransmit algorithm is based on CP s Fast Retransmit algorithm [4], with the additional use of selective acks and a modification to handle some cases of reordering 4. Accordingly, the SACKs resulting from the receipt of SNs will be the only ones generating missing reports. he SACKs received by on at +=,?>@;BAC; and +D,E>@;BAF/ will be considered as the first and second missing 3 he cwnd for a destination address decays exponentially if no data is transmitted to that destination address [9]. 4 [7] goes hand-in-hand with RFC2960. he Implementor s guide maintains all changes and additions to be included in RFC2960 s next version. All implementations are expected to carry the specifications and modifications in this guide. 2 of 5
3 Receiver B B 1 A 1 Sender A 2 B 2 A 1-50* 0 (C 2 =2) S1 S2(51-52) S3(51-52) S41(51-52) S42(51-54) S43(51-54) S44(51-54) S45(51-54) S46(51-54) S49 (51-54) S54 ى لا مل م مو ف لم منن ق ممق م فو ٥٠-١ خسش. م ه ىمق م ف ل ف ١ ء ه ىل م ك م ف (C 2 =2) 2 (C 2 =2) 41.1 (C 2 =2) 41.2 (C 2 =2) 81.2 (C 2 =2) 81.3 (C 2 =3) 82 (C 2 =4) 83 (C 2 =5) 84 (C 2 =6) 85 (C 2 =7) 86 (C 2 =10) 89 (C 2 =11) S1(51-51) S1(51-52) S41(51-53) S41(51-54) (rtx) 43, 44 (rtx) 45, 46 (rtx) 47, 48 (rtx) 49, 50 (rtx) 56, 57 62, 63 64, Receiver B Figure 2: imeline for the example reports for SNs Since these SACKs do not carry new cumulative acks, they do not cause growth of $. Between +#,.>G/ and +#,IHJ;, the cumulative ack in the SACKs received by on increases as a consequence of the original transmissions to destination reaching. In this period, receives 40 SACKs which incrementally carry cumulative acks of he SACKs received by carry a cumulative ack of 41, and are the third and the fourth missing reports for SNs Upon the fourth missing report, retransmits only SN 42, since $ permits only one on 9 at +,KHJ;BAF/ and +,KHJ;BAFL more packet to be outstanding. Note that this falsely triggered retransmission leads to an unnecessary reduction of the $4 by half, since the sender infers congestion from to. At +M,NHO/, the SACK for the original transmission of SN 42 reaches on. Since the sender cannot distinguish between SACKs generated by transmissions from SACKs generated by retransmissions, this SACK incorrectly acks the retransmission of SN 42, thereby increasing $ by one, reducing the amount of data outstanding on destination, and triggering the retransmission of SNs 43 and 44. At +P,QHOL, the SACK for the original transmission of SN 43 arrives at on 8. As before, this SACK acks the retransmission (of SN 43), further incorrectly increasing $, and triggering retransmission of SNs 45 and 46. his behaviour of SACKs for original transmissions incorrectly acking retransmissions continues until the SACKs of all the original transmissions to (up to SN 50) are received by A. hus, the SACKs from the original transmissions cause $ to grow (possibly drastically) from wrong interpretation of the feedback. 2.2 Discussion While the values chosen in our example illustrate but a single case of the congestion window overgrowth problem, our preliminary investigation shows that the problem occurs for a range of R propagation delay, bandwidth, MUS settings. For example, with both paths having Rs of 200ms (bandwidth = 100Kbps, propagation delay = 40ms) and MU = 1500 bytes, the incorrect retransmission starts much earlier (at SN 3), and the cwnd overgrowth is even more dramatic. he congestion window overgrowth problem exists even if the buffering occurs not at the sender s link layer, but in a router along the path (in figure 1, path 1). In essence, the transport layers at the endpoints can be thought of as the sending and receiving entities, and the buffering could potentially be distributed anywhere along the end-to-end path. Further, the reduction in $ causes the sender to reduce its sending rate on path 1 unnecessarily. In our preliminary investigation of load balancing, we have observed multiple occurrences of such false retransmissions. Such false retransmissions cause the sending rate to reduce drastically on path 1, resulting in 3 of 5
4 suboptimal utilization of the path. 4 ANALYSIS AND FUURE WORK 3 PROPOSED SOLUIONS he CP-unfriendly cwnd growth and incorrect retransmissions during changeover occur due to a current inadequacy of SCP - either (i) the sender is unable to distinguish SACKs for transmissions from SACKs for retransmissions, or (ii) the sender s congestion control mechanism is unaware of the occurrence of a changeover, and hence is unable to identify reordering introduced due to changeover. Addressing either of these inadequacies will solve the problems of CP-unfriendly cwnd growth and unnecessary retransmissions. he Rhein Algorithm [6] solves the problems by addressing (i). he Rhein algorithm is based on the Eifel algorithm, which uses meta information in the CP header. his meta information is used in disambiguating acks for transmissions from acks for retransmissions to improve the throughput of a CP connection. he Rhein algorithm uses meta information in the SCP header to curb the unnecessary cwnd growth and reduction due to spurious retransmissions. In our initial conception of the Rhein algorithm, each data packet has to carry an extra Retransmission Identifier (RID) Chunk, and each SACK has to carry an extra RID Echo. Additional complexity is also introduced at the sender and receiver for processing these new chunks. he Changeover aware congestion control (CACC) algorithms solve the problem by addressing (ii). In other words, the CACC solutions introduce changeover awareness in the sender s congestion control mechanism. he cwnd overgrowth occurs due to the sender misinterpreting SACK feedback, and incorrectly sending fast retransmissions. CACC algorithms curb the cwnd miscalculations by eliminating these improper fast retransmissions. he key in a CACC algorithm is maintaining state at the sender for each destination when changeover happens. On receipt of a SACK, the sender selectively increases the missing report count for SNs in the retransmission list, thus preventing incorrect fast retransmissions. [5] describes two CACC algorithms: Conservative CACC (C-CACC) and Split Fast Retransmit CACC (SFR- CACC). he C-CACC algorithm has the disadvantage that in the face of loss, a significant number of SNs could potentially wait for a retransmission timeout when they could have been fast retransmitted. he SFR-CACC algorithm alleviates this disadvantage. [5] provides the details of the CACC algorithms, including verification of the effectiveness of the SFR- CACC algorithm through ns-2 simulations. Results from [5] suggest that the problem presented in Section 2 might not be a corner case. By approaching the problem from different perspectives, the Rhein algorithm and the CACC algorithms all solve the problem of cwnd overgrowth. he Rhein algorithm recognizes that this growth occurs due to the sender s inability to distinguish between SACKs for original transmissions from SACKs for retransmissions. his algorithm does not solve the problem of unnecessary fast retransmissions on a changeover. his algorithm also adds the overhead of an extra chunk for every SCP packet. he CACC algorithms maintain state information during a changeover, and use this information to avoid incorrect fast retransmissions. hese algorithms have the added advantage that no extra bits are added to any packets, and thus the load on the wire and network is not increased. One disadvantage of the CACC algorithms is that some of the SNs on the old primary are ineligible for fast retransmit. Furthermore, complexity is added at the sender to maintain and use the added state variables. We have implemented SFR-CACC in the NetBSD/FreeBSD release for the KAME stack [1, 2]. he implementation uses three flags and one SN marker for each destination, as described in [5]. Approximately twenty lines of $ code were needed to facilitate the SFR-CACC algorithm, most of which will be executed only when a changeover is performed in an association. In light of the enveloping issue of end-to-end load balancing, we plan to research the following questions in the future: How well do the Rhein and CACC algorithms perform during cycling changeovers? A changeover where the sender repeatedly cycles through the destination address space while sending data is called a cycling changeover. In an FCS network wireless environment where paths have frequent disruptions, would load balancing improve or degrade overall performance? Given the path parameters for all paths between the sender and the receiver, is it possible for the sender to send data out of order such that the receiver receives all data in order? Is it possible for the sender to do the same while probing for path information at the same time? his line of thought leads to efficient load balancing for realtime and/or multimedia transfers. What is the effect of performing shared/separate congestion control at the sender among various paths to 4 of 5
5 the receiver when the bottlenecks along the paths are shared/separate? his question arises from an inquiry into the effects of shared/separate bottlenecks on SCP congestion control. his study is important for SCP to be CP-friendly in sending data. [9] R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer,. aylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream Control ransmission Protocol. Proposed standard, RFC2960, Internet Engineering ask Force (IEF), October DISCLAIMER he views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. 6 ACKNOWLEDGMENS hanks to Ivan Arias Rodriguez, Vern Paxson, Mark Allman, Phillip Conrad and Johan Garcia for their comments and inputs. Ivan helped in the formulation of the problem. REFERENCES [1] he SCP Homepage. [2] Webpage of the KAME project. [3] R. Braden. Requirements for internet hosts communication layers. RFC1122, Internet Engineering ask Force (IEF), October [4] M. Allman et al. CP Congestion Control. RFC2581, Internet Engineering ask Force (IEF), April [5] Janardhan R. Iyengar, Armando L. Caro Jr., Paul D. Amer, Gerard J. Heinz, and Randall Stewart. Making SCP More Robust o Changeover. echnical Report R , CIS Department, University of Delaware, July [6] Janardhan R. Iyengar, Armando L. Caro Jr., Paul D. Amer, Gerard J. Heinz, and Randall Stewart. SCP Congestion Window Overgrowth During Changeover. Proc. SCI2002, Orlando, July [7] R. Stewart, L. Ong, I. Arias-Rodriguez, K. Poon, P. Conrad, A. Caro, and M. uexen. SCP Implementers Guide. Internet Draft: draft-ietf-tsvwg-sctpimpguide-06.txt, Internet Engineering ask Force (IEF), May (work in progress). [8] R. Stewart and Q. Xie. Stream Control ransmission Protocol (SCP): A Reference Guide. Addison Wesley, New York, NY, of 5
Making SCTP More Robust to Changeover
Making SCTP More Robust to Changeover Janardhan R. Iyengar, Armando L. Caro, Jr., Paul D. Amer, Gerard J. Heinz Computer and Information Sciences University of Delaware iyengar, acaro, amer, heinz @cis.udel.edu
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Improved Multiple File Transfer Protocol using Extended features of SCTP
Vol.2, Issue.3, May-June 2012 pp-1034-1038 ISSN: 2249-6645 Improved Multiple File Transfer Protocol using Extended features of SCTP Prabhanshu Jaiswal 1,Gaurav Agrawal 2,Pushpendra Singh 3, Dr. A.K. Sharma
SCTP over Satellite Networks
1 SCTP over Satellite Networks Shaojian Fu Mohammed Atiquzzaman School of Computer Science University of Oklahoma, Norman, OK 73019-6151. William Ivancic Satellite Networks & Architectures Branch NASA
Mobile SCTP Transport Layer Mobility Management for the Internet
Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: [email protected] Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: [email protected]
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Network Friendliness of Mobility Management Protocols
Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Stop And Wait. ACK received; transmit frame 2 CS 455 3
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
A Network-Controlled Architecture for SCTP Hard Handover
A Network-Controlled Architecture for SCTP Hard Handover Khadija Daoud, Karine Guillouard, Philippe Herbelin Orange Labs, Issy Les Moulineaux, France {first name.last name}@orange-ftgroup.com Abstract
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross
Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A
Congestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
An Improved TCP Congestion Control Algorithm for Wireless Networks
An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA [email protected] Md. Humayun
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
A Study of Internet Packet Reordering
A Study of Internet Packet Reordering Yi Wang 1, Guohan Lu 2, Xing Li 3 1 Department of Electronic Engineering Tsinghua University, Beijing, P. R. China, 100084 [email protected] 2 China Education
Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Solving complex performance problems in TCP/IP and SNA environments.
IBM Global Services Solving complex performance problems in TCP/IP and SNA environments. Key Topics Discusses how performance analysis of networks relates to key issues in today's business environment
High Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Introduction. Channel Associated Signaling (CAS) Common Channel Signaling (CCS) Still widely deployed today Considered as old technology
VoIP and SS7 Introduction Channel Associated Signaling (CAS) Still widely deployed today Considered as old technology Common Channel Signaling (CCS) Separation of signaling and call paths Signaling System
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Boosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
TCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Publication III. c 2003 IEEE. Reprinted with permission.
Publication III G. Camarillo, H. Schulzrinne, and R. Kantola. Evaluation of Transport Protocols for the Session Initiation Protocol. IEEE Network, Vol. 17, No. 5, Pages 40-46, September 2003. c 2003 IEEE.
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Internet Protocol (IP)/Intelligent Network (IN) Integration
Internet Protocol (IP)/Intelligent Network (IN) Integration Definition The convergence of the public switched telephone network (PSTN) and Internet protocol (IP) data networks promises exciting opportunities
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
TCP Flow Control. TCP Receiver Window. Sliding Window. Computer Networks. Lecture 30: Flow Control, Reliable Delivery
TCP Flow Control Computer Networks The receiver side of a TCP connection maintains a receiver buffer: Lecture : Flow Control, eliable elivery application process may be slow at reading from the buffer
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
EFFICIENT BANDWIDTH ESTIMATION MANAGEMENT FOR VOIP CONCURRENT MULTIPATH TRANSFER
EFFICIENT BANDWIDTH ESTIMATION MANAGEMENT FOR VOIP CONCURRENT MULTIPATH TRANSFER 1 J.FARITHA BANU, 2 V.RAMACHANDRAN 1 Research Scholar / CSE, Sathyabama University. Chennai, India 2 Professor / IST, Anna
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
1 An application in BPC: a Web-Server
1 An application in BPC: a Web-Server We briefly describe our web-server case-study, dwelling in particular on some of the more advanced features of the BPC framework, such as timeouts, parametrized events,
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Introduction, Rate and Latency
Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text
