1 Introduction FRAME LOSSES DUE TO BUFFER OVERFLOWS IN FAST PACKET NETWORKS. Abstract CH2826-5/90/0000/0132/$01.OO IEEE 132

Size: px
Start display at page:

Download "1 Introduction FRAME LOSSES DUE TO BUFFER OVERFLOWS IN FAST PACKET NETWORKS. Abstract CH2826-5/90/0000/0132/$01.OO IEEE 132"

Transcription

1 FRAME LOSSES DUE TO BUFFER OVERFLOWS IN FAST PACKET NETWORKS AMIT BHARGAVA AND MICHAEL 6. HLUCHYJ Codex Corporation 20 Cabot Boulevard Mansfield, MA Abstract When a fast packet subnetwork is used to transport higher layer Protocol Data Units (PDU), each PDU is typically segmented into multiple fast packets which are then individually relayed along a fixed path through the fast packet subnetwork. At the far edge of the subnetwork, the PDU is reassembled and checked for missing or corrupted data. The loss of one or more of its constituent fast packets causes the entire PDU to be discarded at the subnetwork edge, with retransmissions initiated by higher layers in the protocol stack. An analytical method is derived to estimate the PDU frame loss probability as a function of buffer size when identical sources are multiplexed on a fast packet link. The generation of PDUs from each source is govemed by an On-Off source model, and upper and lower bounds on the frame loss probability are derived. The analysis takes into account the correlated nature of fast packet losses within a PDU due to buffer overflows. As one would expect, the required buffer size for a given frame loss probability is directly proportional to the expected PDU frame length, and the loss probability decreases exponentially with increasing buffer size. 1 Introduction A key technology trend for both private and public communication networks is the movement toward fast packet techniques in the multiplexing and switching of a wide diversity of traffic types. In a fast packet network, all traffic is transported in the form of packets that are relayed from node to node along fixed paths using address information in the packet header. Unlike traditional packet networks, link-by-link flow control and error recovery are not done within a fast packet subnetwork. The intermediate nodal processing of fast packets is limited to the simple functions of fast packet framing, error checking, address look-up/translation, switching and queueing. If a fast packet header is found in error or there are insufficient buffers available at an intermediate node, the entire fast packet is discarded. Where required, retransmissions are initiated at the subnetwork edge or in some cases are left to the end systems. The application of fast packet techniques for framed data is best described in the context of a reference model. As Figure 1 illustrates, fast packets are incorporated in the model below the Data Link Control (DLC) of Layer 2. In a traditional packet network, a Layer 2 (e.g., LAPB) Protocol Data Unit VDU) is framed (delimited by flags and bit stuffed) and passed over a physical channel to the next node. In a fast packet network, the Layer 2 PDU is generally segmented into smaller units (i.e., fast packets) each containing an address identifying the specific Layer 2 entity to which it belongs. This function is provided by the Fast Packet Adaption (FPA) layer shown in Figure 1. Fast packets are multiplexed (for those Layer 2 entities that share a common physical channel to another node) by the Fast Packet Relay (FPR) layer before transmission over the physical channel. After being relayed though one or more intermediate nodes, the pieces of the original Layer 2 PDU that were placed in separate fast packets arrive at the edge node, are reassembled, and the entire PDU is checked for errors (i.e., random bit errors and missing bytes), with error recovery generally done by the Layer 2 DLC or left to higher layers. In some cases the DLC is terminated by the end system (i.e., the Layer 2 DLC lies outside the subnetwork), and the subnetwork provides a simple frame relay service. Here the frame relay function in the edge node is done in the RA layer. As before, the received Layer 2 PDU from the end system is divided into fast packets that are relayed through the fast packet subnetwork until they reach the destination edge node. At the destination cdgc node, the Layer 2 PDU is reassembled from the received fast packets and checked for errors. If an error is detected, the PDU is discarded, otherwise it is passed on to the end system. In some CH2826-5/90/0000/0132/$01.OO IEEE 132

2 PH DL FPR FPA DLC Figure 1 : Fast Packet Layered Model cases, the FF'A and FPR functions are also included in the end system. Note that the service provided to the Layer 2 DLC, whether at an edge node or in the end system, is one in which either a Layer 2 PDU frame is delivered without errors and without missing data or is not delivered at all. Hence, one performance measure of interest to the Layer 2 DLC is the (PDU) frame loss rate. It is the frame loss rate along with the data rate and edge-to-edge (or end-to-end) delay that will determine the selection of an appropriate retransmission strategy (e.g., go-back-n or selective repeat [2]). In this paper we examine the frame loss performance due to buffer overflows in a fast packet network. At the Fast Packet Relay layer, fast packets from different Layer 2 entities (or sources) are statistically multiplexed onto a single link, with a queue to absorb fluctuations in packet amvals. Though the sum total of the average rates of these sources can be kept less than the link capacity (B), the instantaneous rate can exceed the link capacity causing the buffer queue to build and possibly overflow. The model that we use to analyze the behavior of the queue is termed the On-Off model since the sources are either in the on state generating bits or in the off state when they are silent. This model assumes that when the sources are on, they generate bits that ff ow out in a continuous manner at a rate V. If the link capacity is larger than the total rate at which bits enter, the queue does not grow. However, if the number of sources that are on at any instant is larger than c = B/V, the queue grows and may eventually overflow. In this paper the interval of time for which the queue is held at its limit is termed the loss period, which ends as soon as the number of on sources falls below c. Note that this model is approximate in that it ignores the effects of packetization and the highfrequency fluctuations in the queue length that occur when packets arrive together in a short interval of time (even though the number of sources that are on may be less than c). On-Off modells have been studied in the past with both infinite and finite queues in References [l] and [4], respectively. We will use results derived in these papers in our analysis. The model assumes that the sources come on and go off for random intervals of time that are exponentially distributed with rates l/t'o~ and ~/TQFF, respectively, where TON is the average on time and TOFF is the average off time for a source. The number of bits that a source generates in one on time (If x TQN on the average), corresponds to one frame of data, which we assume is also the Layer 2 PDU in this analysis. A total of N sources are multiplexed on the link and are assumed to be identical. Section 2 describes the analysis that is used to calculate the bounds on the frame loss probability. In Section 3, we present numerical results for typical parameters, verification of the analysis by simulation, and a comparison of the analysis with simpler models. Finally, Section 4 presents the conclusions. 133

3 Time Figure 2: Fluctuations in the Number of On Sources and the Queue Length with Time 2 Analysis for the Frame Loss Probability Figure 2 illustrates the fluctuations in the number of on sources with time, and the consequent changes in queue length. The periods during which the number of on sources exceeds c is termed an overload period and the interval of time during which the queue is held at its limit is called a loss period. Note that not every overload period results in losses. Focusing our attention on an arbitrary interval of time t, we define F(t) = Number of frames lost in time t A(t) = Number of frames amved in time t. Hence, we may write assuming the limits exist. Let Then, n(t) = fi = Number of loss periods in time t Number of frames lost in the ith loss period in time t. (1) where E[f] is the average number of frames lost in a loss period. Also, Therefore, (3) We first find the average number of frames lost in a loss period, E[f]. When a loss period starts, some of the sources that are on and are sending frames will lose fast packets. The worst case is that all of the sources that are on lose packets at this instant. In the best case, since the link can accommodate c sources, only (i - LcJ) sources would lose packets, where i is the number of sources that are on at the instant of the start of the loss period and IC] indicates the largest integer less than or equal to c. In reality, the number of sources that are affected would be between these two limiting values which yield an upper and a lower bound, respectively. In addition to the frames lost at the start of the loss period, each new source that comes on during the loss period will cause the dropping of an additional frame since additional sources cannot be accommodated on the link. The finite queue is held at its limit for the duration of the loss period. Therefore, where E[f ]i ] is the expected number of frames lost in a loss period, given i sources are on at the beginning I34

4 of the loss period, and v; is the probability of having i sources on at the start of the loss period. Defining E [ U 1 i ] to be the average number of sources that come on during the loss period (until the loss period ends, when the number of on sources falls below c), given that i were on at its start, we have < E[Uli]+i (upper bound) E[U )i ] + i - LcJ (lower bound) (6) To find vi, we draw upon the analyses in [ 11 and [4] and approximate it by vi = (7) where U; is the joint probability that i sources are on and the queue is held at its limit (i.e., the probablity of having i sources on during the loss period rather than at the start of the loss period). The 21; s can be found for a finite queue or an infinite queue using the methods described in References [4] and [ 11, respectively. To find E[ U Ii ] we use the birth-death process model for the number of on sources shown in Figure 3 (A = I/TOFF and p = l/to~). Note that for this model, a loss period can only be entered from a state i where i > Lc]. The loss period ends when the transition from state IC] + 1 is made to state LcJ. The average number of sources that come on during this interval is equal to the average number of up transitions that are made during the loss period (after entering it from state i). 21; ~sj=icj +I uj Defining E[D Ii ] to be the average number of down transitions during the loss period and T~,FJ to be the average number of transitions from state 1 to state IC], we have, E[D(i 3 = E[U li ]+(i- LCJ) (8) T~,L.] = E[U )i ] + E[D li 3 (9) Note that ri,j is the first passage time from state i to state j for a discrete time birth-death process obtained by embedding the continuous time birth-death process at the instants of transition. Using the method outlined in [3], we have where rj,+ 1 can be computed recursively for 0 < j < N from The transition probabilities pj and qj are given by The next quantity that is needed for calculating the loss probability, 9, is Lz T. We first define L; = L ena of the ith loss period. Noting that the fraction of time spent in loss periods in an interval of length t converges to the probability of the queue being held at its limit, as t + m, we have Multiplying and dividing the left hand side of this equation by n(t) and then rearranging terms we obtain, Solving for E[U ]i ] and substituting in Equations 6 and 5, we obtain The analysis for frame loss probabilities in this paper is done for a finite queue. The infinite queue analysis of [ 11 can be used to approximate the 11, s since it does not require the solution of large systems of linear equations like [4] and is therefore easier to use for computations. where E[L] is the average length of a loss period. Therefore, Once again, we solve for E[L] in terms of the first passage times from state?: to Lc], T;,J~J, for the continuous 135

5 Figure 3: Birth-death process for the number of on sources C time birth-death process, N Using the approach outlined in [3] and defining Fj = Tj,j- 1 we have i ~i,~cl = rj (20) where for 0 < j < N j=lcj+l 3 Numerical Results and Discussion ig L4 9% b 2! I Buffer Size (in Frames) Figure 4: Comparison of bounds with simulation results - UB...IJ e PEL. FL=S Sim. Sim. FLdOO In this section we present some numerical results based on the analysis in Section 2. Figure 4 compares the lower bound (LB) and the upper bound (UB) with loss probabilities obtained by simulation, for average frame lengths (FL) of 1, 50 and 100 fast packets, respectively, but keeping the ratio A/p constant. These curves are generated for N = 8,c = 4 and a link utilization (p) of 0.8. Note that the buffer sizes are in units offrames; in these normalized units the frame loss probability predicted by the analysis is exactly the same for all frame sizes. The dependence of 0 on the ratio X/p (rather than X and ji individually) can be verified algebraically and is expected intuitively, since changing the quantities but keeping their ratio constant is like changing the unit of time which does not alter F(t)/A(t) as t --t 00. The size of the buffer in bytes grows in direct proportion to the expected frame length. The curves are plotted for loss probabilities that would be required in in a typical network, given that the overall error performance would still be bounded by the bit error rate on the links. The simulation takes into the account the packetization of the frames and the fact that fast packets amve to the queue, rather than the bits flowing in smoothly. That is, the simulation includes both the high-frequency queue fluctuations caused by the arrival pattem of the packets from sources in the on state, and the low-frequency fluctuation caused by the smooth flow of bits entering the queue at rate iv, i = 0, 1,..., N. To maintain the desired utilization on the link for a fair comparison with the analysis, we assume that the multiplexer can accept fractions of packets when it is about to overflow. For example, if 16 bytes of buffer are left when a 64-byte packet amves, 16 bytes flow into the buffer and 48 bytes are dropped. The exponential length of the on time is accounted for by generating shorter packeb at the end of the on time. Notice that the lower and upper bounds are parallel to 136

6 each other on a logarithmic scale. This can be expected if the ratio of the two bounds is roughly a constant for different values of the buffer size. From the results of Section 2, it is easy to show - E[flupper -- =1+ E [fllower E [f llower (23) where the subscripts lower and upper refer to the lower and upper bound analyses, respectively. Our observation can be explained if we can show that the quantity E[f]lower does not change significantly with the buffer size. Note that E[f]lower consists of two components: the number of frames that are lost at the start of the loss period and the number that are lost during the loss period. The latter depends (in our analysis) only on the on-off behaviour of the sources, which is independent of the buffer size. The former quantity, however, is not strictly independent of the buffer size (for example, for a buffer of size zero, it is always one frame), but we conjecture that as more buffer is added the distribution of this quantity rapidly approaches the conditional distribution of the number of on sources i, given i > IC]. Intutively, this could be expected since by increasing the buffer, we are giving the sources more time in the overload states (i.e., the number of on sources being larger than LcJ) without the buffer overflowing. Therefore, at the instant when the queue hits its maximum, the number of sources that are on would roughly be some number picked from the distribution of the number of on sources (conditioned on being in the overload states), and therefore independent of the buffer size. What changes with the buffer size is the probability of getting into a loss period, and causes both curves to slope down. The second observation from Figure 4 is that the simulation points lie between the two bounds though the points predict a consistently larger loss than the lower bound analysis. The lower bound analysis underestimates the loss due to the fact that packets from various sources can line up and cause losses when the queue is close to its limit, even though the total number of on sources is less than LcJ. This?he apparant increase in deviation from the lower bound analysis curve for larger buffer sizes is due to the limitations of computing resources in the simulation. For large frames and large buffers the simulation must be run for unreasonable lengths of time to obtain more accurate values. corresponds to a high-frequency component of the queue fluctuation. The upper bound analysis, however, still predicts a larger loss as it always assumes that i frames are lost at the start of a loss period if i sources are on. In addition, if the queue length hovers around its limit, multiple loss periods can occur during the duration of a single frame. Even though the effect of dropping packets from that frame in different loss periods is losing just one frame, the upper bound analysis counts a lost frame for each loss period. The conclusion of these observations is that in the range of interest, the frame loss probability lies between the two bounds, and we use these to characterize the system behavior further. U i2 i5 Buffer Size (in Frames) Figure 5: Comparison of the bounds with analyses assuming independent packet losses Figure 5 compares the bounds with a simplified frame loss analysis (marked SA on the figure) for frame lengths of 1, 50 and 100. In this analysis we assume that packets are lost independently of each other with a packet loss probability 8. In this case the frame loss probability is given by (see appendix for details) In( 1-6) QPapprox = In(1-6) - ft where M is the average frame length in packets. As can be seen from Figure 5, the analysis predicts a frame loss probability that is proportional to the average frame length and can predict either a larger or a smaller result for large and small frame lengths, respectively. For a frame length of 1 packet we expect a frame loss Probability prediction that is close to the packet loss probability, since for each packet dropped, only 1 frame 137

7 is dropped on the average. In this paper, however, 8 is computed using the method described in [4], which is based on counting the fraction of information lost. The actual packet loss for an average frame length of 1, will be larger since the loss of information equal to a fraction of a packet results in the whole packet being dropped. Consequently, the curve for the independent packet loss with a frame length of 1 lies below the lower bound curve, instead of close to it. For larger frame lengths, however, this error decreases. In addition, as the frame length is increased, the simplified analysis assumes that packets are dropped independently from all frames rather than multiple packets being dropped from the same frame. Naturally this predicts a higher frame loss rate and is unsuitable for estimating frame loss probabilities Buffer Size (in Frames) Figure 7: Effect of increasing N and TOFF with fixed p, TON and c I I I I UB 1 - N=8 fixed p), the sources look like continuous bit streams and since N must now be less than or equal to c, the model will predict no loss at all. This explains why a worse performance is seen for larger N. Y i2 Buffer Size (in Frames) Figure 6: Effect of increasing N and c in proportion for fixed p, Torv and TOFF In Figure 6, we examine the effect of varying N and c in proportion while keeping the link utilization (p) and the on and off times of the source constant. Notice that the bounds move lower as we increase AT since the law of large numbers decreases the probability of getting into the loss periods. The bounds also move further apart for larger N due to the factor IC] in Equation 23. Finally, Figure 7 shows the effect of changing N and TOFF with fixed TON, c and p. A larger N now implies that the aggregate stream entering the multiplexer looks more 'Poisson-like' and in the limit as N -, 0;) the interamval times of the frames will be exponentially distributed (though the bits will still flow in at the rate 17). On the other hand, if TOFF is made zero for all sources to get the smallest N (with 4 Conclusions We have presented an analytical method for estimating bounds on the frame loss probabilities as a function of buffer size in fast packet networks. The analysis was validated by simulation and shown to be accurate in the region of practical interest. Since edge-to-edge protocols retransmit frames in a fast packet network, we noted that the frame loss probability is the more important quantity in establishing the quality of service of the fast packet subnetwork for framed data. We showed that using a simple analysis where packets are assumed to be dropped independently yields inaccurate results and it is important to use an analysis (such as the one in this paper) that accounts for the correlation of packet losses in a frame. The analysis also indicates, as one would expect, that the amount of buffering (in bytes) required to attain a given frame loss probability is proportional to the average size of the frame. 138

8 APPENDIX Frame loss probability based OII independent packet losses In this approximation, we assume that a frame of average length M packets is lost due to the loss of one of its packets, each of which is lost independently with a probability 8. Let X be the length of an individual frame in packets and since the on time is exponentially distributed the density function of X is The approximate frame loss is given by: 03 cppapprox = 1 Pr[Frame is lost 12 ]fx.(z)da: (A.2) The frame is not lost only if none of its packets lost. Therefore are where r.1 to 2. is the smallest integer greater than or equal References [ 11 D. Anick, D. Mitra, and M. M. Sondhi, Stochastic theory of a data-handling system with multiple sources, Bell System Technical Journal, vol. 61, 1982, pp [2] D. Bertsekas and R. Gallager, Data Nemorks, Prentice Hall, [3] D. P. Heyman and M. J. Sobel, Stochastic Models in Operations Research, Volume I, McGraw Hill, [4] R. C. F. Tucker, Accurate method for analysis of a packet-speech multiplexer with limited delay, IEEE Transactions on Communications, vol. 36, no. 4, April 1988, pp

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto Episode 4. Flow and Congestion Control Baochun Li Department of Electrical and Computer Engineering University of Toronto Recall the previous episode Detailed design principles in: The link layer The network

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

3 Fractional Ramsey Numbers

3 Fractional Ramsey Numbers 27 3 Fractional Ramsey Numbers Since the definition of Ramsey numbers makes use of the clique number of graphs, we may define fractional Ramsey numbers simply by substituting fractional clique number into

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

A Strategy for Designing Error Detection Schemes for General Data Networks

A Strategy for Designing Error Detection Schemes for General Data Networks IEEE Network, vol.8, no.4, pp.41-48, Jul/Aug 1994 1994 IEEE 1 A Strategy for Designing Error Detection Schemes for General Networks Jane M. Simmons, Member, IEEE Abstract Any real-world network system

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL 2006 243 Segment-Based Streaming Media Proxy: Modeling Optimization Songqing Chen, Member, IEEE, Bo Shen, Senior Member, IEEE, Susie Wee, Xiaodong

More information

CCNA 1: Chapter 2 Exam Answer v %

CCNA 1: Chapter 2 Exam Answer v % 1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

THE TRANSPORT LAYER UNIT IV

THE TRANSPORT LAYER UNIT IV THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Competing Tahoe Senders Adam Stambler Brian Do Group 7 12/7/2010. Computer and Communication Networks : 14:332:423

Competing Tahoe Senders Adam Stambler Brian Do Group 7 12/7/2010. Computer and Communication Networks : 14:332:423 Competing Tahoe Senders Adam Stambler Brian Do Group 7 12/7/2010 Computer and Communication Networks : 14:332:423 1 Break Down of Contributions Adam Stambler Brian Do Algorithm Design 50 50 Coding 70 30

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Chapter 20 Network Layer: Internet Protocol 20.1

Chapter 20 Network Layer: Internet Protocol 20.1 Chapter 20 Network Layer: Internet Protocol 20.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 20-1 INTERNETWORKING In this section, we discuss internetworking,

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward

More information

Homework Assignment #1 Due 9/19 at 5:00pm EE122 Fall 2011

Homework Assignment #1 Due 9/19 at 5:00pm EE122 Fall 2011 Homework Assignment #1 Due 9/19 at 5:00pm EE122 Fall 2011 Please submit your solutions using BSpace (https://bspace.berkeley.edu/). Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa11 tab,

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Management of Protocol State

Management of Protocol State Management of Protocol State Ibrahim Matta December 2012 1 Introduction These notes highlight the main issues related to synchronizing the data at both sender and receiver of a protocol. For example, in

More information

A New Congestion Control Scheme: Slow Start and Search (Tri-S)

A New Congestion Control Scheme: Slow Start and Search (Tri-S) A New Congestion Control Scheme: Slow Start and Search (ri-s) Zheng Wang Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6B, United Kingdom zwang@cs.ucl.ac.uk,

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) SUM M A RY

C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) SUM M A RY C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) 497 15.15 SUM M A RY Transmission C ontrol Protocol (T C P) is one of the transport layer protocols in the T C P/IP protocol suite.

More information

August, Jane M. Simmons MIT, Laboratory for Information and Decision Systems

August, Jane M. Simmons MIT, Laboratory for Information and Decision Systems LIDS-P-2189 STRATEGY FOR DESIGNING ERROR DETECTION SCHEMES FOR GENERAL DATA NETWORKS August, 1993 Jane M. Simmons MIT, Laboratory for Information and Decision Systems Abstract: Any real-world network system

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING

PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Chapter 1 PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Gianluigi Ferrari, Paolo Medagliani, Marco Martalò Wireless Ad-hoc and Sensor Networks (WASN) Laboratory Department of Information

More information

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J 1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic

More information

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction Areas for Discussion Packet Switching - Asynchronous Transfer Mode 3.3 Cell Switching (ATM) Introduction Cells Joseph Spring School of Computer Science BSc - Computer Network Protocols & Arch s Based on

More information

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial

More information

The p-sized partitioning algorithm for fast computation of factorials of numbers

The p-sized partitioning algorithm for fast computation of factorials of numbers J Supercomput (2006) 38:73 82 DOI 10.1007/s11227-006-7285-5 The p-sized partitioning algorithm for fast computation of factorials of numbers Ahmet Ugur Henry Thompson C Science + Business Media, LLC 2006

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network ; STATE UNIVERSITY OF NEW YORK AT STONY BROOK CEASTECHNICAL REPe Multiclass Information Based Deflection Strategies for the Manhattan Street Network J.-W. Jeng and T.G. Robertazzi June 19, 1992 Multiclass

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

DE62 TELECOMMUNICATION SWITCHING SYSTEMS JUN 2015

DE62 TELECOMMUNICATION SWITCHING SYSTEMS JUN 2015 Q.2 a. With neat diagrams explain the configuration of a step-by-step switching system. (8) b. List the basic functions of a switching system. (8) The switching office performs the following basic functions

More information

A Delayed Vacation Model of an M/G/1 Queue with Setup. Time and its Application to SVCC-based ATM Networks

A Delayed Vacation Model of an M/G/1 Queue with Setup. Time and its Application to SVCC-based ATM Networks IEICE TRANS. COMMUN., VOL. 0, NO. 0 1996 1 PAPER Special Issue on Telecommunications Network Planning and Design A Delayed Vacation Model of an M/G/1 Queue with Setup Time and its Application to SVCCbased

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 RATE CONTROL SCHEME IN DATA NETWORK Joy Eneh 1, Harris Orah 2 1 Department of Electrical and Electronic Engineering, Nnamdi Azikiwe University Awka, Anambra state, Nigeria. 2 Department of Electronic Engineering,

More information

Video Streaming Over Multi-hop Wireless Networks

Video Streaming Over Multi-hop Wireless Networks Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University hwang@cameron.edu Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

This Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer

This Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer This Lecture US35 - Computer Facilities Network Management Synchronisation and interfacing insufficient by themselves. Need to provide: Flow control - allow the receiver to regulate the flow of data. Error

More information

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation November 2010 Nelson Shaw njd50@uclive.ac.nz Department of Computer Science and Software Engineering University of Canterbury,

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

MODELING AND SIMULATION OF MPEG-2 VIDEO TRANSPORT OVER ATM NETWOR.KS CONSIDERING THE JITTER EFFECT

MODELING AND SIMULATION OF MPEG-2 VIDEO TRANSPORT OVER ATM NETWOR.KS CONSIDERING THE JITTER EFFECT MODELING AND SIMULATION OF MPEG-2 VIDEO TRANSPORT OVER ATM NETWOR.KS CONSIDERING THE JITTER EFFECT Wenwu Zhu: Yiwei Thomas Hou, and Yao Wang Polytechnic University Brooklyn, NY 11201 Ya-Qin Zhang David

More information

Routing Performance Analysis in Delay Tolerant Networks

Routing Performance Analysis in Delay Tolerant Networks Routing Performance Analysis in Delay Tolerant Networks Presenter: Hao Liang Main References: [1] G. Resta and P. Santi, A framework for routing performance analysis in delay tolerant networks with application

More information

Chapter 3 Review Questions

Chapter 3 Review Questions Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications

More information