Transmission Control Protocol (TCP) Model - A Simulation Study

Size: px
Start display at page:

Download "Transmission Control Protocol (TCP) Model - A Simulation Study"

Transcription

1 Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 4(2): Scholarlink Research Institute Journals, 2013 (ISSN: ) jeteas.scholarlinkresearch.org Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 4(2): (ISSN: ) Transmission Control Protocol (TCP) Model - A Simulation Study Akinwole A.K., Fatoki O.K., Oludipe O., and Yekini N.A Department of Computer Technology, Yaba College of Technology, Yaba, Lagos State, Nigeria. Corresponding Author: Yekini N.A Abstract The purpose of this project work is to evaluate the Transmission Control Protocol Model in a ClientServer network. The transmission of data is between two host; client and server. Simulation and Evaluation of TCP Model is carried out using Network Simulator OMNet++ version 4.x. OMNeT++ is an object-oriented modular discrete event network simulation framework. Two parameters were considered for the evaluation of the model; the Queuing Time and End-To-End Delay for both the Client and Server computer. This project work adhered to the simulation results as evidence that the network response time in the Server computer is better than the network response time in the Client computer based on Queuing Time, likewise End-To-End Delay in both the Client and Server computer is in a low value because the network response time is short which make transmission packets faster. All this evaluation shows that TCP is a good transport protocol for sending and receiving of data in a computer network. Keywords: OMNeT+, end-to-end delay, TCP, clientserver network, simulation, queuing time INTRODUCTION As technology evolves at an ever-increasing pace, time and distance seem to take on new meanings for all of us (Clark, D.D., (1982). Nowhere is this truer than in the computer industry, where the computers of today are often made obsolete by the systems that will arrive next week. In the midst of this constant change, it is good sometimes to reflect on some of the technologies that have been around seemingly forever. The Transmission Control Protocol/Internet Protocol (TCP/IP) is an industry-standard suite of protocols designed to be routable, robust, and functionally efficient (A. Papoulis and S. U. Pillai, 2002). TCP/IP was originally designed as a set of wide area network (WAN) protocols for the express purpose of maintaining communication links and data transfer between sites in the event of an atomic or nuclear war (A. S. Tanenbaum, 1996). Since those early days, development of the protocols has passed from the hands of the military and has been the responsibility of the Internet community (Rob Scrimger 1998). OMNeT++ is a discrete event simulator in development since 1992 (R. G. Ingalls, 2002). OMNeT++ is primarily use to simulate communication networks and other distributed systems and it is an open source simulation package that runs on both UNIX and Window (R. E. Shannon, 1989). Different contributors have written several of models for OMNeT++. Some of these models simulate simple queuing model, others simulate more realistic protocols such as TCP/IP. OMNeT++ is used by universities and companies (Ns-2) (R. G. Ingalls, pp ). The authors of this research work at reviewing related works on Transmission Control Protocol (TCP) model using OMNeT++ and C++, simulate the TCP Model and Evaluate the Queuing time and End-to-End Delay of the client and server of TCP model. Historical Background of Communication Network People communicate. One way or another, they exchange some information among themselves all the times. In the past several decades, many electronic technologies have been invented to aid this process of exchanging information in an efficient and creative way. Among these are the creation of fixed telephone networks, the broadcasting of television and radio, the advent of computers, and the emergence of wireless sensation. Originally, these technologies existed and operated independently, serving their very own purposes. Not until recently that these technological wonders seem to converge, and it is a well-known fact that a computer communication network is a result of this convergence (Issariyakul and Hossain 2009). The Transmission Control Protocol is a connectionbased protocol; this means that it requires the establishment of a session before data is transmitted between two machines. Because TCP sets up a connection between two machines, it is designed to verify that all packets sent by a machine are received on the other end. If, for some reason, packets are lost, 353

2 the sending machine will resend the data. Therefore, it is because a session is established that delivery of packets can be considered reliable. However, there is additional overhead involved with using TCP to transmit packets to support connection oriented communications. (Varga, A. 2004). An event-driven simulation ignores the intervals of inactivity by advancing the simulation clock from one event time to another (Tranter, et al., 2004). This process goes on and on until all the events are executed, or until the system reaches a specific state (e.g., the simulation time reaches a predefined value). Along the way, we certainly need a way to gather some statistics or states of the system for analysis purposes. This process of gathering information can take place right after every event execution. Alternatively, it can be done using a specialized entity which gathers statistics during the simulation (Banks and Carson 1984). RESEARCH METHODOLOGY This project work employed basically OMNeT++ and C++ to implement TCP Model. In this chapter, we describe the Simulator we used, our simulation methods, and the simulation parameters. OMNeT++ is an object-oriented modular discrete event network simulation framework. It has a generic architecture, so it can be (and has been) used in various problem domains: i. Modeling of wired and wireless communication networks. ii. Protocol modeling. iii. iv. Modeling of queuing networks. Modeling of multiprocessors and other distributed hardware systems. v. Validating of hardware architectures. vi. vii. Evaluating performance aspects of complex software systems. In general, modeling and simulation of any system where the discrete event approach is suitable, and can be conveniently mapped into entities communicating by exchanging messages Figure 1: The OMNeT++ 4.x IDE OMNeT++ itself is not a simulator of anything concrete, but rather provides infrastructure and tools for writing simulations. One of the fundamental ingredients of this infrastructure is a component architecture for simulation models. Models are assembled from reusable components termed modules. Well-written modules are truly reusable, and can be combined in various ways like LEGO blocks. Running the Simulation A simulation in OMNeT++ can be run in two different ways: Animation and Text-only. This way of running the simulation is particularly useful when first running the simulation, or to get acquainted with the protocols or networks the program simulates. It shows all the messages that are exchanged between the modules in an animation. The visual simulations are shown in the following graphics. Figure 3 shows the main window of the simulation. This is again the simulation used in section 4.1. This screen includes several controls to run the simulation. Simulations can be run step by step, normal (shows every message as an animation), fast (show animations, but faster) and express (which doesn t shows any animation). It is also possible to run the simulation until some point. In this screen, you can also see all modules and their parameters. There is also a list of scheduled events. 354

3 Figure 4 to Figure 6 show the actual network that is simulated. Figure 4 is the top view of the network, which has only four components (client1, server, configurator, and netamin Trace). Figure 5 show the internal modules of the client1 module. And again, in Figure 6, the internal modules of the Standard Host are shown run the simulation. Simulations can be run step by step, normal (shows every message as an animation), fast (show animations, but faster) and express (which doesn t shows any animation). It is also possible to run the simulation until some point. In this screen, you can also see all modules and their parameters. There is also a list of scheduled events. It is also possible to run the simulation until some point. In this screen, you can also see all modules and their parameters. There is also a list of scheduled events. From Figure 4 above, you can see a message (the dot) travelling between the client1 and the server. This is the way all messages are displayed. Figure 3: OMNeT++ Output window RESULT AND DISCUSSION Results of the Simulation Results from the simulation is gathered and stored in the output files and were stated in table 4-1 to table 4-4. Four graphs were plotted base on the result of the simulation that is the Queuing time and End-to-End Delay each for both the Client and Server computer. Figure 4.1 shows the overall event log of the simulation. Running the Simulation A simulation in OMNeT++ can be run in two different ways: Animation and Text-only. This way of running the simulation is particularly useful when first running the simulation, or to get acquainted with the protocols or networks the program simulates. It shows all the messages that are exchanged between the modules in an animation. Figure 4.1: Simulation Event Log Environment The visual simulations are shown in the following graphics. Figure 3 shows the main window of the simulation. This is again the simulation used in chapter 4.1. This screen includes several controls to 355

4 Table 4.1: ClientServer.client1.tcpApp[0] Queuing time bin_lower(time) bin_upper(time) value(packet kps) #NAME? E E E E Inf 0 Table 4.3: ClientServer.sever.tcpApp[0] Queuing Time bin_lower(time) bin_upper(time) value(packets Kps) #NAME? E E Inf 0 Table 4.4: ClientServer.client1.tcpApp[0] EndToEndDelay bin_lower(time) bin_upper(time) value(packets Kps) #NAME? E E Inf 0 Figure 4.2: Queueing Time (Client1) Table 4.2: ClientServer.client1.tcpApp[0] End-toEnd Delay bin_lower(time) bin_upper(time) value(packets Kps) #NAME? E E E E E E E E E E E E Inf 0 Figure 4.3: End-To-End Delay 356

5 DISCUSSION Queuing Time (Client) From the graph in Figure 4.2 the maximum time for the queue is 4.66E-05seconds when the packets in the Queue is 4, the queuing time reduces dramatically to seconds when the packets in the Queue reduces by 1(3 packets). When the packets in the queue are 3, the queuing time increases to seconds which may be caused by delay acknowledgement. The queuing time increases again to when the packets waiting for transmission reduces to 2. Queuing Time (Server) From the graph in Figure 4.4 the maximum time in the queue is 4.66E-05s when the number of packets in the queue (queue length) is 2. When the number of packets in the queue increases to 7, the queuing time reduces to 1.55E-05s. When the queue length reduces to 2 the queuing time reduces to s. These analyses shows that Queue length (number of packets awaiting transmission) in the Server computer does not determine the queuing time because when the queue length is 7, the queuing time is 1.55E-05s and when the queue length is 4 in the Client computer, the queuing time is 4.66E-05s. This brings us to a conclusion that the network response time in the Server computer is better than the network response time in the Client computer End-To-End Delay (Client) From the graph in Figure 4.3, it shows that the network response time for the TCP to retransmit three (3) lost segments transmission of packets is s and it occur only ones during transmission of packets. End-To-End Delay (Server) From the graph in Figure 4.5, it shows that the network response time for the TCP to retransmit three (3) lost segments transmission of packets is s and it occur only ones during transmission of packets in the network. From these analyses (End-To-End Delay in Client and Server), it shows that their acknowledgements return quickly, the round-trip time is short and the retransmission timer is low, the network response time is short for both the Client and Server computer. Therefore TCP is a good transmission protocol for sending and receiving data in the network base on this research. CONCLUSION In this project work a simulation environment for evaluating the performance of TCP Model in a simple ClientServer network was carried out using OMNeT++ version 4.x. Queuing Time and End-To- End Delay on both the Client and Server computer were the parameters used to evaluate TCP model. The two parameters were clearly stated and analyzed based on the result of the simulation. The results of the simulation were presented in visual event log; which show how data is been exchange between the two hosts, tables and bar charts/graph. This project work adhered to the simulation results as evidence that the network response time in the Server computer is better than the network response time in the Client computer based on Queuing Time, likewise End-To-End Delay in both the Client and Server computer is set to a low value. Based on all this evaluation it shows that TCP is a goon transport protocol for sending and receiving of data in a computer network. RECOMMENDATION TCP model in OMNeT++ proved to be working, but not free of errors. Some features were missing, and some were not correctly implemented. All TCP behavior was coded into one single module (clientserver), which made it hard to understand. For future version, it might be possible to split TCP functionality into several modules. REFERENCE A. Papoulis and S. U. Pillai, (2002) Probability, Random Variables and Stochastic A. S. Tanenbaum, (1996) Computer Networks, 3rd ed. Prentice Hall. Clark, D.D., (1982). RFC 813: Window and acknowledgement strategy in TCP. MIT DOI: / , c_ Springer Science+Business Media. J. Banks and I. J. S. Carson, (1984) Discrete-Event Systems Simulation. Prentice-Hall J. Kurose. The TCP/IP course website.available: com/enp/ John Wiley & Rob Scrimger, pp. 20 (1998) Introduction To Networking With Tcp/Ip Sons, Inc. Stevens, W.R. and G.R. Wright, (1994). TCP/IP illustrated. Addison-Wesley Kaage, U., V. Kahmann, and F. Jondral, (2001). An Omnet++ TCP Model. Laboratory for Computer Science, Computer Systems and Communications Processes, 2nd ed. McGrawHill. R. E. Shannon, (1989 ) Introduction to the art and science of simulation R. G. Ingalls, pp (2002) Introduction to simulation: Introduction to simulation, 357

6 R. M. Goldberg, (2000) Parallel and Distributed Simulation Systems. T. Issariyakul, E. Hossain, (2009) Introduction to Network Simulator NS2, the 30th conference on Winter simulation (WSC 98). Varga, A. (2004). IPSuite documentation. W. H. Tranter, et al., (2004) Principles of Communication Systems Simulation. Prentice Winter Simulation Conference. 358

Introduction to OMNeT++

Introduction to OMNeT++ Introduction to OMNeT++ Acknowledgment The source material for this presentation was borrowed from the OMNeT++ User Manual Version 4.1 What is OMNeT++ OMNeT++ is an object-oriented modular discrete event

More information

Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering

Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering Course Syllabus Note : This is a major revision, the

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Recap. More TCP. Congestion avoidance. TCP timers. TCP lifeline. Application Presentation Session Transport Network Data Link Physical

Recap. More TCP. Congestion avoidance. TCP timers. TCP lifeline. Application Presentation Session Transport Network Data Link Physical Recap ½ congestion window ½ congestion window More TCP Congestion avoidance TCP timers TCP lifeline Application Presentation Session Transport Network Data Link Physical 1 Congestion Control vs Avoidance

More information

Layered Architecture

Layered Architecture 1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C Networks Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 21 Homework, announcements New chapter (23) online No homework assigned today, sorry!

More information

Energy Framework Enhancements in the WSN Simulator OMNETPP

Energy Framework Enhancements in the WSN Simulator OMNETPP International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 1 (July 2014) PP: 18-24 Energy Framework Enhancements in the WSN Simulator OMNETPP M.Thangaraj 1, S.Anuradha

More information

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Performance of TCP Protocol Running over Wireless LAN Network using the Snoop Protocol

Performance of TCP Protocol Running over Wireless LAN Network using the Snoop Protocol ENSC 833 Network Protocols And Performance Final Project Presentations - Spring 2001 Performance of TCP Protocol Running over Wireless LAN Network using the Snoop Protocol Chi-ho Ng and Jack Chow cng@sierrawireless.com

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Data Network Protocol Analysis & Simulation

Data Network Protocol Analysis & Simulation Module Details Title: Long Title: Data Network PENDING APPROVAL Data Network Module Code: EE509 Credits: 7.5 NFQ Level: 9 Field of Study: Electronic Engineering Valid From: 2017/18 (Sep 2017) Module Delivered

More information

RECITAL INVESTIGATION OF IPv4 AND IPv6 USING WIRED NETWORKS IN OMNET++

RECITAL INVESTIGATION OF IPv4 AND IPv6 USING WIRED NETWORKS IN OMNET++ RECITAL INVESTIGATION OF IPv4 AND IPv6 USING WIRED NETWORKS IN OMNET++ 1 Pallavi Gupta, 2 Savita Shiwani Computer Science Department, Suresh Gyan Vihar University,India ABSTRACT-Internet protocol was designed

More information

An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization

An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization Sayid Mohamed Abdule 1, Wan Tat Chee 1, Ahmed Mustafa 2 & Aisha Hassan 2 1 Network Research

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Computer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks

Computer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks Outline: Computer Networks Introduction General course information. Some basic concepts for computer s. Network programming. General Course Information Course Web page http://www.cs.rochester.edu/~kshen/csc257-fall2009

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Network Architecture I

Network Architecture I Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17

More information

STUDY OF TCP THROUGHPUT ON NETWORK SIMULATOR OPNET++ BY USING DIFFERENT PARAMETERS

STUDY OF TCP THROUGHPUT ON NETWORK SIMULATOR OPNET++ BY USING DIFFERENT PARAMETERS STUDY OF TCP THROUGHPUT ON NETWORK SIMULATOR OPNET++ BY USING DIFFERENT PARAMETERS Bhargava Neeraj*, Kumawat Anchal 1, Bhargava Ritu 2 and Kumar Bharat 3 1. Department of Computer Science, School of Engineering

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

Neural-based TCP performance modelling

Neural-based TCP performance modelling Section 1 Network Systems Engineering Neural-based TCP performance modelling X.D.Xue and B.V.Ghita Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Reliable Multicast in Mobile Networks

Reliable Multicast in Mobile Networks Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:

More information

Applied Computer Networks. Introduction (2 nd Edition) John Morton

Applied Computer Networks. Introduction (2 nd Edition) John Morton Applied Computer Networks Introduction (2 nd Edition) John Morton Fred Halsall Some Books Computer Networking and the Internet 5 th Ed, Addison-Wesley, 2005. James Kurose and Keith Ross Computer Networking

More information

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3 International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 2017 Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Hands-On IP Multicasting for Multimedia Distribution Networks

Hands-On IP Multicasting for Multimedia Distribution Networks Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide

More information

Analysis of Captured Data on a Typical Tcp Connection

Analysis of Captured Data on a Typical Tcp Connection IOSR Journal Of Environmental Science, Toxicology And Food Technology (IOSR-JESTFT) e-issn: 2319-2402,p- ISSN: 2319-2399. Volume 4, Issue 4 (May. - Jun. 2013), PP 75-80 www.iosrjournals.org Analysis of

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Improved Model for a Non-Standard TCP Behavior

Improved Model for a Non-Standard TCP Behavior IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 45 Improved Model for a Non-Standard TCP Behavior Mohammed Abdullah Alnuem, King Saud University, Riyadh,

More information

A New Statistical Procedure for Validation of Simulation and Stochastic Models

A New Statistical Procedure for Validation of Simulation and Stochastic Models Syracuse University SURFACE Electrical Engineering and Computer Science L.C. Smith College of Engineering and Computer Science 11-18-2010 A New Statistical Procedure for Validation of Simulation and Stochastic

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Introduction. Introduction to Network Communications G64INC. Lectures. Related Modules. Assessment. Objectives

Introduction. Introduction to Network Communications G64INC. Lectures. Related Modules. Assessment. Objectives Introduction to Network Communications G64INC Dr. Gail Hopkins Introduction Practical matters Module goals, structure and contents Initial introduction to some key ideas and issues Lectures Two lectures

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 1 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet

More information

Principles of Reliable Data Transfer

Principles of Reliable Data Transfer Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets

More information

Introduction ETSN01 Advanced Telecommunications. Emma Fitzgerald

Introduction ETSN01 Advanced Telecommunications. Emma Fitzgerald Introduction ETSN01 Advanced Telecommunications Emma Fitzgerald 2015 Course administration and overview Expected outcomes Pre-requisites Course structure Teaching team Assessment General points Socrative

More information

TCP CONGESTION CONTROL PROTOCOLS OVER UMTS WCDMA NETWORK

TCP CONGESTION CONTROL PROTOCOLS OVER UMTS WCDMA NETWORK International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831; ISSN(E): 2249-7943 Vol. 4, Issue 5, Oct 2014, 83-90 TJPRC Pvt. Ltd. TCP CONGESTION

More information

Kent State University

Kent State University CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-10, S-2 IP- Internet

More information

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420 Based on the book Computer Networking: A Top Down Approach,

More information

CISC 7332X T6. C12a: LAN Switching. Hui Chen Department of Computer & Information Science CUNY Brooklyn College. 11/13/2018 CUNY Brooklyn College

CISC 7332X T6. C12a: LAN Switching. Hui Chen Department of Computer & Information Science CUNY Brooklyn College. 11/13/2018 CUNY Brooklyn College CISC 7332X T6 C12a: LAN Switching Hui Chen Department of Computer & Information Science CUNY Brooklyn College 1 Acknowledgements Some pictures used in this presentation were obtained from the Internet

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Reti di Calcolatori I

Reti di Calcolatori I Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Evaluation of End-to-End TCP performance over WCDMA

Evaluation of End-to-End TCP performance over WCDMA Evaluation of End-to-End TCP performance over WCDMA Liang Hu Department of Communications, Optics & Materials Technical University of Denmark, Lyngby, Denmark Email:{lh}@com.dtu.dk Abstract this article

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 1 Foundation Eng. Haneen El-Masry February, 2014 A Computer Network A computer

More information

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 Performance Analysis of TCP LBA and TCP TAHOE Approaches in 802.11g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 1 (MTechCSE Student, Chandigarh Engineering College Landran,India) 2 (Associate Professor

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Networks II Agenda Introduction to networking architecture Historical

More information

Redes de Computadores. Introduction

Redes de Computadores. Introduction Redes de Computadores Introduction Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 Introduction to the Course 2 RCOM Professors, Information, Language Prof. Manuel Ricardo mricardo@fe.up.pt

More information

6.2 Elements of Transport Protocols

6.2 Elements of Transport Protocols CEN445 Network Protocols and Algorithms Chapter 6 Transport Layer 6.2 Elements of Transport Protocols Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

NWEN 243. Networked Applications. Layer 4 TCP and UDP

NWEN 243. Networked Applications. Layer 4 TCP and UDP NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols

More information

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H... 1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination Hans Kruse McClure School of Communication Systems Management Ohio University 9 S. College Street Athens,

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324 Transport Layer TCP & UDP Week 7 Module : Computer Networks Lecturers : Lucy White lbwhite@wit.ie Office : 324 1 Purpose of the Transport Layer The Transport layer provides for the segmentation of data

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Performance Evaluation of TCP over WLAN with the Snoop Performance Enhancing Proxy

Performance Evaluation of TCP over WLAN with the Snoop Performance Enhancing Proxy Performance Evaluation of TCP over WLAN 802.11 with the Snoop Performance Enhancing Proxy Case study Chi-ho Ng, Jack Chow, and Ljiljana Trajković Simon Fraser University 1 Roadmap Introducing the problem

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System VM Chavan 1, MM Kuber 2 & RJ Mukhedkar 3 1&2 Department of Computer Engineering, Defence

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Homework 2 COP The total number of paths required to reach the global state is 20 edges.

Homework 2 COP The total number of paths required to reach the global state is 20 edges. Homework 2 COP 5611 Problem 1: 1.a Global state lattice 1. The total number of paths required to reach the global state is 20 edges. 2. In the global lattice each and every edge (downwards) leads to a

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36 Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals. CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L1: Introduction Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/15/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures used in this presentation

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

CSE 461. TCP and network congestion

CSE 461. TCP and network congestion CSE 461 TCP and network congestion This Lecture Focus How should senders pace themselves to avoid stressing the network? Topics Application Presentation Session Transport Network congestion collapse Data

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Military Messaging. Over Low. Bandwidth. Connections

Military Messaging. Over Low. Bandwidth. Connections Military Messaging Over Low Bandwidth Connections White Paper Contents Paper Overview 3 The Technical Challenges 4 Low Bandwidth 4 High Latency 4 High Error Rates 4 Multicast 4 Emission Control (EMCON)

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

Lecture (03) Network Model

Lecture (03) Network Model ١ Lecture (03) Network Model By: Dr. Ahmed ElShafee Agenda Layering concept History Discovering the network layers Application Layer same layer interaction concept; Transport Layer Adjacent layer interaction

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information