1 Introduction FRAME LOSSES DUE TO BUFFER OVERFLOWS IN FAST PACKET NETWORKS. Abstract CH2826-5/90/0000/0132/$01.OO IEEE 132
|
|
- Damon Powell
- 5 years ago
- Views:
Transcription
1 FRAME LOSSES DUE TO BUFFER OVERFLOWS IN FAST PACKET NETWORKS AMIT BHARGAVA AND MICHAEL 6. HLUCHYJ Codex Corporation 20 Cabot Boulevard Mansfield, MA Abstract When a fast packet subnetwork is used to transport higher layer Protocol Data Units (PDU), each PDU is typically segmented into multiple fast packets which are then individually relayed along a fixed path through the fast packet subnetwork. At the far edge of the subnetwork, the PDU is reassembled and checked for missing or corrupted data. The loss of one or more of its constituent fast packets causes the entire PDU to be discarded at the subnetwork edge, with retransmissions initiated by higher layers in the protocol stack. An analytical method is derived to estimate the PDU frame loss probability as a function of buffer size when identical sources are multiplexed on a fast packet link. The generation of PDUs from each source is govemed by an On-Off source model, and upper and lower bounds on the frame loss probability are derived. The analysis takes into account the correlated nature of fast packet losses within a PDU due to buffer overflows. As one would expect, the required buffer size for a given frame loss probability is directly proportional to the expected PDU frame length, and the loss probability decreases exponentially with increasing buffer size. 1 Introduction A key technology trend for both private and public communication networks is the movement toward fast packet techniques in the multiplexing and switching of a wide diversity of traffic types. In a fast packet network, all traffic is transported in the form of packets that are relayed from node to node along fixed paths using address information in the packet header. Unlike traditional packet networks, link-by-link flow control and error recovery are not done within a fast packet subnetwork. The intermediate nodal processing of fast packets is limited to the simple functions of fast packet framing, error checking, address look-up/translation, switching and queueing. If a fast packet header is found in error or there are insufficient buffers available at an intermediate node, the entire fast packet is discarded. Where required, retransmissions are initiated at the subnetwork edge or in some cases are left to the end systems. The application of fast packet techniques for framed data is best described in the context of a reference model. As Figure 1 illustrates, fast packets are incorporated in the model below the Data Link Control (DLC) of Layer 2. In a traditional packet network, a Layer 2 (e.g., LAPB) Protocol Data Unit VDU) is framed (delimited by flags and bit stuffed) and passed over a physical channel to the next node. In a fast packet network, the Layer 2 PDU is generally segmented into smaller units (i.e., fast packets) each containing an address identifying the specific Layer 2 entity to which it belongs. This function is provided by the Fast Packet Adaption (FPA) layer shown in Figure 1. Fast packets are multiplexed (for those Layer 2 entities that share a common physical channel to another node) by the Fast Packet Relay (FPR) layer before transmission over the physical channel. After being relayed though one or more intermediate nodes, the pieces of the original Layer 2 PDU that were placed in separate fast packets arrive at the edge node, are reassembled, and the entire PDU is checked for errors (i.e., random bit errors and missing bytes), with error recovery generally done by the Layer 2 DLC or left to higher layers. In some cases the DLC is terminated by the end system (i.e., the Layer 2 DLC lies outside the subnetwork), and the subnetwork provides a simple frame relay service. Here the frame relay function in the edge node is done in the RA layer. As before, the received Layer 2 PDU from the end system is divided into fast packets that are relayed through the fast packet subnetwork until they reach the destination edge node. At the destination cdgc node, the Layer 2 PDU is reassembled from the received fast packets and checked for errors. If an error is detected, the PDU is discarded, otherwise it is passed on to the end system. In some CH2826-5/90/0000/0132/$01.OO IEEE 132
2 PH DL FPR FPA DLC Figure 1 : Fast Packet Layered Model cases, the FF'A and FPR functions are also included in the end system. Note that the service provided to the Layer 2 DLC, whether at an edge node or in the end system, is one in which either a Layer 2 PDU frame is delivered without errors and without missing data or is not delivered at all. Hence, one performance measure of interest to the Layer 2 DLC is the (PDU) frame loss rate. It is the frame loss rate along with the data rate and edge-to-edge (or end-to-end) delay that will determine the selection of an appropriate retransmission strategy (e.g., go-back-n or selective repeat [2]). In this paper we examine the frame loss performance due to buffer overflows in a fast packet network. At the Fast Packet Relay layer, fast packets from different Layer 2 entities (or sources) are statistically multiplexed onto a single link, with a queue to absorb fluctuations in packet amvals. Though the sum total of the average rates of these sources can be kept less than the link capacity (B), the instantaneous rate can exceed the link capacity causing the buffer queue to build and possibly overflow. The model that we use to analyze the behavior of the queue is termed the On-Off model since the sources are either in the on state generating bits or in the off state when they are silent. This model assumes that when the sources are on, they generate bits that ff ow out in a continuous manner at a rate V. If the link capacity is larger than the total rate at which bits enter, the queue does not grow. However, if the number of sources that are on at any instant is larger than c = B/V, the queue grows and may eventually overflow. In this paper the interval of time for which the queue is held at its limit is termed the loss period, which ends as soon as the number of on sources falls below c. Note that this model is approximate in that it ignores the effects of packetization and the highfrequency fluctuations in the queue length that occur when packets arrive together in a short interval of time (even though the number of sources that are on may be less than c). On-Off modells have been studied in the past with both infinite and finite queues in References [l] and [4], respectively. We will use results derived in these papers in our analysis. The model assumes that the sources come on and go off for random intervals of time that are exponentially distributed with rates l/t'o~ and ~/TQFF, respectively, where TON is the average on time and TOFF is the average off time for a source. The number of bits that a source generates in one on time (If x TQN on the average), corresponds to one frame of data, which we assume is also the Layer 2 PDU in this analysis. A total of N sources are multiplexed on the link and are assumed to be identical. Section 2 describes the analysis that is used to calculate the bounds on the frame loss probability. In Section 3, we present numerical results for typical parameters, verification of the analysis by simulation, and a comparison of the analysis with simpler models. Finally, Section 4 presents the conclusions. 133
3 Time Figure 2: Fluctuations in the Number of On Sources and the Queue Length with Time 2 Analysis for the Frame Loss Probability Figure 2 illustrates the fluctuations in the number of on sources with time, and the consequent changes in queue length. The periods during which the number of on sources exceeds c is termed an overload period and the interval of time during which the queue is held at its limit is called a loss period. Note that not every overload period results in losses. Focusing our attention on an arbitrary interval of time t, we define F(t) = Number of frames lost in time t A(t) = Number of frames amved in time t. Hence, we may write assuming the limits exist. Let Then, n(t) = fi = Number of loss periods in time t Number of frames lost in the ith loss period in time t. (1) where E[f] is the average number of frames lost in a loss period. Also, Therefore, (3) We first find the average number of frames lost in a loss period, E[f]. When a loss period starts, some of the sources that are on and are sending frames will lose fast packets. The worst case is that all of the sources that are on lose packets at this instant. In the best case, since the link can accommodate c sources, only (i - LcJ) sources would lose packets, where i is the number of sources that are on at the instant of the start of the loss period and IC] indicates the largest integer less than or equal to c. In reality, the number of sources that are affected would be between these two limiting values which yield an upper and a lower bound, respectively. In addition to the frames lost at the start of the loss period, each new source that comes on during the loss period will cause the dropping of an additional frame since additional sources cannot be accommodated on the link. The finite queue is held at its limit for the duration of the loss period. Therefore, where E[f ]i ] is the expected number of frames lost in a loss period, given i sources are on at the beginning I34
4 of the loss period, and v; is the probability of having i sources on at the start of the loss period. Defining E [ U 1 i ] to be the average number of sources that come on during the loss period (until the loss period ends, when the number of on sources falls below c), given that i were on at its start, we have < E[Uli]+i (upper bound) E[U )i ] + i - LcJ (lower bound) (6) To find vi, we draw upon the analyses in [ 11 and [4] and approximate it by vi = (7) where U; is the joint probability that i sources are on and the queue is held at its limit (i.e., the probablity of having i sources on during the loss period rather than at the start of the loss period). The 21; s can be found for a finite queue or an infinite queue using the methods described in References [4] and [ 11, respectively. To find E[ U Ii ] we use the birth-death process model for the number of on sources shown in Figure 3 (A = I/TOFF and p = l/to~). Note that for this model, a loss period can only be entered from a state i where i > Lc]. The loss period ends when the transition from state IC] + 1 is made to state LcJ. The average number of sources that come on during this interval is equal to the average number of up transitions that are made during the loss period (after entering it from state i). 21; ~sj=icj +I uj Defining E[D Ii ] to be the average number of down transitions during the loss period and T~,FJ to be the average number of transitions from state 1 to state IC], we have, E[D(i 3 = E[U li ]+(i- LCJ) (8) T~,L.] = E[U )i ] + E[D li 3 (9) Note that ri,j is the first passage time from state i to state j for a discrete time birth-death process obtained by embedding the continuous time birth-death process at the instants of transition. Using the method outlined in [3], we have where rj,+ 1 can be computed recursively for 0 < j < N from The transition probabilities pj and qj are given by The next quantity that is needed for calculating the loss probability, 9, is Lz T. We first define L; = L ena of the ith loss period. Noting that the fraction of time spent in loss periods in an interval of length t converges to the probability of the queue being held at its limit, as t + m, we have Multiplying and dividing the left hand side of this equation by n(t) and then rearranging terms we obtain, Solving for E[U ]i ] and substituting in Equations 6 and 5, we obtain The analysis for frame loss probabilities in this paper is done for a finite queue. The infinite queue analysis of [ 11 can be used to approximate the 11, s since it does not require the solution of large systems of linear equations like [4] and is therefore easier to use for computations. where E[L] is the average length of a loss period. Therefore, Once again, we solve for E[L] in terms of the first passage times from state?: to Lc], T;,J~J, for the continuous 135
5 Figure 3: Birth-death process for the number of on sources C time birth-death process, N Using the approach outlined in [3] and defining Fj = Tj,j- 1 we have i ~i,~cl = rj (20) where for 0 < j < N j=lcj+l 3 Numerical Results and Discussion ig L4 9% b 2! I Buffer Size (in Frames) Figure 4: Comparison of bounds with simulation results - UB...IJ e PEL. FL=S Sim. Sim. FLdOO In this section we present some numerical results based on the analysis in Section 2. Figure 4 compares the lower bound (LB) and the upper bound (UB) with loss probabilities obtained by simulation, for average frame lengths (FL) of 1, 50 and 100 fast packets, respectively, but keeping the ratio A/p constant. These curves are generated for N = 8,c = 4 and a link utilization (p) of 0.8. Note that the buffer sizes are in units offrames; in these normalized units the frame loss probability predicted by the analysis is exactly the same for all frame sizes. The dependence of 0 on the ratio X/p (rather than X and ji individually) can be verified algebraically and is expected intuitively, since changing the quantities but keeping their ratio constant is like changing the unit of time which does not alter F(t)/A(t) as t --t 00. The size of the buffer in bytes grows in direct proportion to the expected frame length. The curves are plotted for loss probabilities that would be required in in a typical network, given that the overall error performance would still be bounded by the bit error rate on the links. The simulation takes into the account the packetization of the frames and the fact that fast packets amve to the queue, rather than the bits flowing in smoothly. That is, the simulation includes both the high-frequency queue fluctuations caused by the arrival pattem of the packets from sources in the on state, and the low-frequency fluctuation caused by the smooth flow of bits entering the queue at rate iv, i = 0, 1,..., N. To maintain the desired utilization on the link for a fair comparison with the analysis, we assume that the multiplexer can accept fractions of packets when it is about to overflow. For example, if 16 bytes of buffer are left when a 64-byte packet amves, 16 bytes flow into the buffer and 48 bytes are dropped. The exponential length of the on time is accounted for by generating shorter packeb at the end of the on time. Notice that the lower and upper bounds are parallel to 136
6 each other on a logarithmic scale. This can be expected if the ratio of the two bounds is roughly a constant for different values of the buffer size. From the results of Section 2, it is easy to show - E[flupper -- =1+ E [fllower E [f llower (23) where the subscripts lower and upper refer to the lower and upper bound analyses, respectively. Our observation can be explained if we can show that the quantity E[f]lower does not change significantly with the buffer size. Note that E[f]lower consists of two components: the number of frames that are lost at the start of the loss period and the number that are lost during the loss period. The latter depends (in our analysis) only on the on-off behaviour of the sources, which is independent of the buffer size. The former quantity, however, is not strictly independent of the buffer size (for example, for a buffer of size zero, it is always one frame), but we conjecture that as more buffer is added the distribution of this quantity rapidly approaches the conditional distribution of the number of on sources i, given i > IC]. Intutively, this could be expected since by increasing the buffer, we are giving the sources more time in the overload states (i.e., the number of on sources being larger than LcJ) without the buffer overflowing. Therefore, at the instant when the queue hits its maximum, the number of sources that are on would roughly be some number picked from the distribution of the number of on sources (conditioned on being in the overload states), and therefore independent of the buffer size. What changes with the buffer size is the probability of getting into a loss period, and causes both curves to slope down. The second observation from Figure 4 is that the simulation points lie between the two bounds though the points predict a consistently larger loss than the lower bound analysis. The lower bound analysis underestimates the loss due to the fact that packets from various sources can line up and cause losses when the queue is close to its limit, even though the total number of on sources is less than LcJ. This?he apparant increase in deviation from the lower bound analysis curve for larger buffer sizes is due to the limitations of computing resources in the simulation. For large frames and large buffers the simulation must be run for unreasonable lengths of time to obtain more accurate values. corresponds to a high-frequency component of the queue fluctuation. The upper bound analysis, however, still predicts a larger loss as it always assumes that i frames are lost at the start of a loss period if i sources are on. In addition, if the queue length hovers around its limit, multiple loss periods can occur during the duration of a single frame. Even though the effect of dropping packets from that frame in different loss periods is losing just one frame, the upper bound analysis counts a lost frame for each loss period. The conclusion of these observations is that in the range of interest, the frame loss probability lies between the two bounds, and we use these to characterize the system behavior further. U i2 i5 Buffer Size (in Frames) Figure 5: Comparison of the bounds with analyses assuming independent packet losses Figure 5 compares the bounds with a simplified frame loss analysis (marked SA on the figure) for frame lengths of 1, 50 and 100. In this analysis we assume that packets are lost independently of each other with a packet loss probability 8. In this case the frame loss probability is given by (see appendix for details) In( 1-6) QPapprox = In(1-6) - ft where M is the average frame length in packets. As can be seen from Figure 5, the analysis predicts a frame loss probability that is proportional to the average frame length and can predict either a larger or a smaller result for large and small frame lengths, respectively. For a frame length of 1 packet we expect a frame loss Probability prediction that is close to the packet loss probability, since for each packet dropped, only 1 frame 137
7 is dropped on the average. In this paper, however, 8 is computed using the method described in [4], which is based on counting the fraction of information lost. The actual packet loss for an average frame length of 1, will be larger since the loss of information equal to a fraction of a packet results in the whole packet being dropped. Consequently, the curve for the independent packet loss with a frame length of 1 lies below the lower bound curve, instead of close to it. For larger frame lengths, however, this error decreases. In addition, as the frame length is increased, the simplified analysis assumes that packets are dropped independently from all frames rather than multiple packets being dropped from the same frame. Naturally this predicts a higher frame loss rate and is unsuitable for estimating frame loss probabilities Buffer Size (in Frames) Figure 7: Effect of increasing N and TOFF with fixed p, TON and c I I I I UB 1 - N=8 fixed p), the sources look like continuous bit streams and since N must now be less than or equal to c, the model will predict no loss at all. This explains why a worse performance is seen for larger N. Y i2 Buffer Size (in Frames) Figure 6: Effect of increasing N and c in proportion for fixed p, Torv and TOFF In Figure 6, we examine the effect of varying N and c in proportion while keeping the link utilization (p) and the on and off times of the source constant. Notice that the bounds move lower as we increase AT since the law of large numbers decreases the probability of getting into the loss periods. The bounds also move further apart for larger N due to the factor IC] in Equation 23. Finally, Figure 7 shows the effect of changing N and TOFF with fixed TON, c and p. A larger N now implies that the aggregate stream entering the multiplexer looks more 'Poisson-like' and in the limit as N -, 0;) the interamval times of the frames will be exponentially distributed (though the bits will still flow in at the rate 17). On the other hand, if TOFF is made zero for all sources to get the smallest N (with 4 Conclusions We have presented an analytical method for estimating bounds on the frame loss probabilities as a function of buffer size in fast packet networks. The analysis was validated by simulation and shown to be accurate in the region of practical interest. Since edge-to-edge protocols retransmit frames in a fast packet network, we noted that the frame loss probability is the more important quantity in establishing the quality of service of the fast packet subnetwork for framed data. We showed that using a simple analysis where packets are assumed to be dropped independently yields inaccurate results and it is important to use an analysis (such as the one in this paper) that accounts for the correlation of packet losses in a frame. The analysis also indicates, as one would expect, that the amount of buffering (in bytes) required to attain a given frame loss probability is proportional to the average size of the frame. 138
8 APPENDIX Frame loss probability based OII independent packet losses In this approximation, we assume that a frame of average length M packets is lost due to the loss of one of its packets, each of which is lost independently with a probability 8. Let X be the length of an individual frame in packets and since the on time is exponentially distributed the density function of X is The approximate frame loss is given by: 03 cppapprox = 1 Pr[Frame is lost 12 ]fx.(z)da: (A.2) The frame is not lost only if none of its packets lost. Therefore are where r.1 to 2. is the smallest integer greater than or equal References [ 11 D. Anick, D. Mitra, and M. M. Sondhi, Stochastic theory of a data-handling system with multiple sources, Bell System Technical Journal, vol. 61, 1982, pp [2] D. Bertsekas and R. Gallager, Data Nemorks, Prentice Hall, [3] D. P. Heyman and M. J. Sobel, Stochastic Models in Operations Research, Volume I, McGraw Hill, [4] R. C. F. Tucker, Accurate method for analysis of a packet-speech multiplexer with limited delay, IEEE Transactions on Communications, vol. 36, no. 4, April 1988, pp
Application of Importance Sampling in Simulation of Buffer Policies in ATM networks
Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationSimulation Studies of the Basic Packet Routing Problem
Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using
More informationA PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING
A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer
More informationCongestion control in TCP
Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationTeletraffic theory (for beginners)
Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationPeer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja
Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationEpisode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto
Episode 4. Flow and Congestion Control Baochun Li Department of Electrical and Computer Engineering University of Toronto Recall the previous episode Detailed design principles in: The link layer The network
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More information3 Fractional Ramsey Numbers
27 3 Fractional Ramsey Numbers Since the definition of Ramsey numbers makes use of the clique number of graphs, we may define fractional Ramsey numbers simply by substituting fractional clique number into
More informationAdvanced Internet Technologies
Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
More informationSequence Number. Acknowledgment Number. Data
CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make
More informationECE 610: Homework 4 Problems are taken from Kurose and Ross.
ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose
More informationA Strategy for Designing Error Detection Schemes for General Data Networks
IEEE Network, vol.8, no.4, pp.41-48, Jul/Aug 1994 1994 IEEE 1 A Strategy for Designing Error Detection Schemes for General Networks Jane M. Simmons, Member, IEEE Abstract Any real-world network system
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL 2006 243 Segment-Based Streaming Media Proxy: Modeling Optimization Songqing Chen, Member, IEEE, Bo Shen, Senior Member, IEEE, Susie Wee, Xiaodong
More informationCCNA 1: Chapter 2 Exam Answer v %
1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function
More informationCommunication Networks
Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started
More informationTransport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)
Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationReliable Transport II: TCP and Congestion Control
Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationAnalysis of Slotted Multi-Access Techniques for Wireless Sensor Networks
Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los
More informationCommunication Fundamentals in Computer Networks
Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More informationTHE TRANSPORT LAYER UNIT IV
THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer
More informationOutline. CS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,
More informationCompeting Tahoe Senders Adam Stambler Brian Do Group 7 12/7/2010. Computer and Communication Networks : 14:332:423
Competing Tahoe Senders Adam Stambler Brian Do Group 7 12/7/2010 Computer and Communication Networks : 14:332:423 1 Break Down of Contributions Adam Stambler Brian Do Algorithm Design 50 50 Coding 70 30
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationCalculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation
Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationChapter 20 Network Layer: Internet Protocol 20.1
Chapter 20 Network Layer: Internet Protocol 20.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 20-1 INTERNETWORKING In this section, we discuss internetworking,
More informationFrom Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols
SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward
More informationHomework Assignment #1 Due 9/19 at 5:00pm EE122 Fall 2011
Homework Assignment #1 Due 9/19 at 5:00pm EE122 Fall 2011 Please submit your solutions using BSpace (https://bspace.berkeley.edu/). Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa11 tab,
More informationPriority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies
CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation
More informationTELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh
TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationManagement of Protocol State
Management of Protocol State Ibrahim Matta December 2012 1 Introduction These notes highlight the main issues related to synchronizing the data at both sender and receiver of a protocol. For example, in
More informationA New Congestion Control Scheme: Slow Start and Search (Tri-S)
A New Congestion Control Scheme: Slow Start and Search (ri-s) Zheng Wang Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6B, United Kingdom zwang@cs.ucl.ac.uk,
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationCongestion in Data Networks. Congestion in Data Networks
Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet
More informationNetwork-Adaptive Video Coding and Transmission
Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213
More informationMaximizing the Number of Users in an Interactive Video-on-Demand System
IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,
More informationAnswers to Sample Questions on Transport Layer
Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.
More informationC H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) SUM M A RY
C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) 497 15.15 SUM M A RY Transmission C ontrol Protocol (T C P) is one of the transport layer protocols in the T C P/IP protocol suite.
More informationAugust, Jane M. Simmons MIT, Laboratory for Information and Decision Systems
LIDS-P-2189 STRATEGY FOR DESIGNING ERROR DETECTION SCHEMES FOR GENERAL DATA NETWORKS August, 1993 Jane M. Simmons MIT, Laboratory for Information and Decision Systems Abstract: Any real-world network system
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationContinuous Real Time Data Transfer with UDP/IP
Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor
More informationIntroduction: Two motivating examples for the analytical approach
Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationPERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING
Chapter 1 PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Gianluigi Ferrari, Paolo Medagliani, Marco Martalò Wireless Ad-hoc and Sensor Networks (WASN) Laboratory Department of Information
More informationRefer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J
1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic
More informationPacket Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction
Areas for Discussion Packet Switching - Asynchronous Transfer Mode 3.3 Cell Switching (ATM) Introduction Cells Joseph Spring School of Computer Science BSc - Computer Network Protocols & Arch s Based on
More informationITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS
ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial
More informationThe p-sized partitioning algorithm for fast computation of factorials of numbers
J Supercomput (2006) 38:73 82 DOI 10.1007/s11227-006-7285-5 The p-sized partitioning algorithm for fast computation of factorials of numbers Ahmet Ugur Henry Thompson C Science + Business Media, LLC 2006
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationTCP/IP Protocol Suite 1
TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationNetwork management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:
Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized
More informationSTATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network
; STATE UNIVERSITY OF NEW YORK AT STONY BROOK CEASTECHNICAL REPe Multiclass Information Based Deflection Strategies for the Manhattan Street Network J.-W. Jeng and T.G. Robertazzi June 19, 1992 Multiclass
More informationMPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE
MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,
More informationDE62 TELECOMMUNICATION SWITCHING SYSTEMS JUN 2015
Q.2 a. With neat diagrams explain the configuration of a step-by-step switching system. (8) b. List the basic functions of a switching system. (8) The switching office performs the following basic functions
More informationA Delayed Vacation Model of an M/G/1 Queue with Setup. Time and its Application to SVCC-based ATM Networks
IEICE TRANS. COMMUN., VOL. 0, NO. 0 1996 1 PAPER Special Issue on Telecommunications Network Planning and Design A Delayed Vacation Model of an M/G/1 Queue with Setup Time and its Application to SVCCbased
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
RATE CONTROL SCHEME IN DATA NETWORK Joy Eneh 1, Harris Orah 2 1 Department of Electrical and Electronic Engineering, Nnamdi Azikiwe University Awka, Anambra state, Nigeria. 2 Department of Electronic Engineering,
More informationVideo Streaming Over Multi-hop Wireless Networks
Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University hwang@cameron.edu Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationThis Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer
This Lecture US35 - Computer Facilities Network Management Synchronisation and interfacing insufficient by themselves. Need to provide: Flow control - allow the receiver to regulate the flow of data. Error
More informationFast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation
Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation November 2010 Nelson Shaw njd50@uclive.ac.nz Department of Computer Science and Software Engineering University of Canterbury,
More informationResource Sharing for QoS in Agile All Photonic Networks
Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:
More informationCOMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B
More informationCHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS
CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.
More informationQuality of Service II
Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated
More informationCongestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources
Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets
More informationn = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0
A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationMODELING AND SIMULATION OF MPEG-2 VIDEO TRANSPORT OVER ATM NETWOR.KS CONSIDERING THE JITTER EFFECT
MODELING AND SIMULATION OF MPEG-2 VIDEO TRANSPORT OVER ATM NETWOR.KS CONSIDERING THE JITTER EFFECT Wenwu Zhu: Yiwei Thomas Hou, and Yao Wang Polytechnic University Brooklyn, NY 11201 Ya-Qin Zhang David
More informationRouting Performance Analysis in Delay Tolerant Networks
Routing Performance Analysis in Delay Tolerant Networks Presenter: Hao Liang Main References: [1] G. Resta and P. Santi, A framework for routing performance analysis in delay tolerant networks with application
More informationChapter 3 Review Questions
Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications
More information